CCNA Study Guide Vol2
CCNA Study Guide Vol2
CCNA Study Guide Vol2
Udemy:
https://www.udemy.com/u/chrisb
Over 38,000 happy students
have made me the #1
individual instructor on Udemy,
and that link shows you a full
list of my free and almost-free
Video Boot Camps! (Use the
discount code BULLDOG60 to
join my 27-hour CCNA Video
Boot Camp for just $44!)
YouTube :
http://www.youtube.com/user/cc
(Over 325 free training videos!)
Website:
http://www.thebryantadvantage.
(New look and easier-to-find
tutorials in Dec. 2013!
Facebook:
http://on.fb.me/nlT8SD
Twitter:
https://twitter.com/ccie12933
See you there!
Chris B.
inferred.
Printed in the United States of
America
First Printing, 2013
The Bryant Advantage, Inc.
9975 Revolutionary Place
Mechanicsville, VA 23116
Contents
Fundamentals
The Wildcard Mask
OSPF and Link-State Protocols
EIGRP
Intro To Network Managment
and Licensing
Intro To VPNs and Tunnels
1st-Hop Redundancy Protocols
IP Version 6
Mastering Binary Math and
Subnetting
down.
Then, of course, we want that
backup path to become
available ASAP.
The Spanning Tree Protocol
(STP), defined by IEEE 802.1d,
does this for us by placing ports
along the most desirable path
into forwarding mode, while
ports along less-desirable paths
are placed into blocking mode.
Once STP converges, every port
on these paths is in either
forwarding or blocking mode. At
that point, only one path is
available between any two
problems:
Frames cant reach their
intended destination,
either totally or in part,
due to MAC address table
entries that will
continually change.
Unnecessary strain put on
switch CPUs.
These continually flooded
frames end up causing a
broadcast storm.
Unnecessary use of
bandwidth.
Priority
32769 (
Priority
32868 (
Sta
1
default
act
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10,
1002 fddi-default
1003 token-ring-default
1004 fddinet-default
1005 trnet-default
VLAN0001
Spanning tree enabled protoco
Root ID Priority
32769
Address
000b.be2c.5180
Cost
19
Port
11 (Fa
Hello Time 2 sec
15 sec
Interface
Pri
Fa0/11
Fa0/12
Root FWD 19
Altn BLK 19
128
128
two values:
Root ID BID: 32769:000b-be-2c-51-80
Bridge ID BID: 32769:000f-90-e2-25-c0
The device with the lowest BID
will be elected root. Since both
devices have the exact same
priority, the switch with the
lowest MAC address is named
the root switch, and thats
exactly what happened here.
On SW1, Fa0/11 is in FWD
status, short for forwarding.
This port is marked Root,
VLAN0001
Spanning tree enabled protoco
Root ID
Priority
3276
Address
000b.be2c.5180
This bridge is the root
Hello Time
2 sec
Priority
3276
Address
000b
Hello Time 2 se
Max Age 20 sec Forward Delay 1
Aging Time 15
Interface
Fa0/11
Fa0/12
Desg FWD 19
Desg FWD 19
1
1
Cisco switches!
The switch MAC addresses:
SW1: 000f.90e2.2540
SW2: 0022.91bf.5c80
SW3: 0022.91bf.bd80
Fa0/11
Fa0/12
Desg FWD 19
Desg FWD 19
Fa0/11
Root FWD 19
Fa0/11
Root FWD 19
Fa0/11
Fa0/12
Root FWD 19
Desg FWD 19
Root FWD 19
Altn BLK 19
http://www.youtube.com/watch?
v=9Db_5o_eXKE
http://www.youtube.com/watch?
v=Hxf8f5U3eKU
Four tip-offs youre NOT on the
root bridge:
No this bridge is the
root message
The MAC address of the
Root ID and Bridge ID are
different
The bridge has a root port
Theres a port in blocking
mode
SW2(config)#spanning-tree vlan
SW2(config)#spanning-tree vlan
Root ID Priority
24606
Address
000f.90e2.1300
This bridge is the root
SW2(config)#spanning-tree vlan
primary Configure this switch
secondary Configure switch as
SW3(config)#spanning vlan 20 r
SW1(config)#spanning vlan 20 r
SW1#show spanning vlan 20
VLAN0020
Spanning tree enab
Root ID Priority
24596
Address
0011.9375.de00
Bridge ID
Priority 28692 (priority 28672
Address
0019.557d.8880
SW2(config)#spanning-tree vlan
<061440> bridge priority in i
seconds.
Forward Delay: The
amount of time a port
should stay in the
listening and learning
stages as it changes from
blocking to forwarding
mode. Default: 15
seconds.
Two important notes regarding
changing these timers:
These timer values
werent pulled out of the
sky. Cisco has them set at
these values to prevent
Switch(config)#spanning vlan ?
WORD vlan range, example: 1,
Switch(config)#spanning vlan 1
forward-time
Set the forwar
hello-time
Set the hello
max-age
Set the max ag
priority
Set the bridge
root
Configure swit
<cr>
Switch(config)#spanning vlan 1
Switch(config)#spanning vlan 1
<110> number of seconds betwe
Switch(config)#spanning vlan 1
<640> maximum number of secon
Switch(config)#spanning vlan 1
learning to forwarding.
The one STP state not
mentioned here is disabled.
Some non-Cisco documentation
does not consider this an
official STP state, but since the
CCNA is a Cisco exam, we
certainly should! Ports in
disabled mode are not learning
MAC addresses, and theyre not
accepting or sending BPDUs.
Theyre not doing anything!
Those timers are there for a
reason, but theyre still a pain
in the butt on occasion. Lets
talk about one of those times
Portfast
Consider the amount of time a
port ordinarily takes to go from
blocking to forwarding when it
stops receiving Hello BPDUs:
Port stays in blocking
mode for 20 seconds
before beginning the
transition to listening (as
defined by the MaxAge
value)
Port stays in listening
mode for 15 seconds
before transition to
Pr
Fa0/11
Fa0/12
Desg FWD 19
Desg FWD 19
12
12
Pr
Fa0/11
Fa0/12
Desg FWD 19
Desg FWD 19
12
12
Fa0/11
Fa0/12
Root FWD 19
Altn BLK 19
Pr
128
128
Pr
Fa0/11
Root FWD 19
12
Fa0/12
Altn BLK 19
12
SW2(config-if)#spanning cost ?
<1200000000>
port path cost
SW2(config-if)#spanning cost 1
Fa0/11
Fa0/12
Altn BLK 19
Root LIS 12
VLAN 100.
SW2#show spanning vlan 100
Interface
Fa0/11
Fa0/12
Interface
Fa0/11
Fa0/12
Altn BLK 19
Root FWD 12
SW2(config-if)#spanning vlan ?
WORD vlan range, example: 1,
SW2(config-if)#spanning vlan 1
cost
Change an in
port-priority
Change an in
SW2(config-if)#spanning vlan 1
<1200000000>
Change an inte
SW2(config-if)#spanning vlan 1
Fa0/11
Fa0/12
Altn BLK 19
Root FWD 12
Fa0/11
Fa0/12
Root FWD 19
Altn BLK 19
Etherchannels
An Etherchannel is the logical
bundling (aggregation) of two
to eight parallel Ethernet
trunks. This provides greater
throughput, and is another
effective way to avoid the 50second wait between blocking
and forwarding states in case of
a link failure.
How do we avoid the delay
entirely? STP considers an
Etherchannel to be one physical
link. If one of the physical links
making up the logical
vlan 1.
SW1#show interface trunk
Port
Mode
Encapsulatio
Fa0/10 desirable
Fa0/11 desirable
Fa0/12 desirable
802.1q
802.1q
802.1q
Fa0/10
Fa0/11
Fa0/12
Root FWD 19
Altn BLK 19
Altn BLK 19
SW1(config)#interface range fa
SW1(config-if-range)#channel-g
Creating a port-channel interf
00:33:57: %LINK-3-UPDOWN: Inte
00:33:58: %LINEPROTO-5-UPDOWN:
changed state to up
SW2(config)#int range fast 0/1
SW2(config-if-range)#channel-g
Creating a port-channel interf
00:47:36: %LINK-3-UPDOWN: Inte
00:47:37: %LINEPROTO-5-UPDOWN:
After configuring an
Etherchannel on each router
with the interface-level
command channel-group, the
Po1
desirable
802.1q
Number of channel-groups in us
Number of aggregators:
Group
5
Port-channel
Po5(SU)
Proto
Channel group = 5
Port-channel = Po5
Port index = 0
Mode =
GC = Load =
BPDU Guard
Remember that warning from
the router when configuring
PortFast?
SW1(config-if)#spanning-tree b
disable Disable BPDU guard for
enable Enable BPDU guard for t
SW1(config-if)#spanning-tree b
SW1(config)#spanning-tree port
SW2(config-if)#shut
SW2(config-if)#no shut
R1(config)#int s1
R1(config-if)#ip address 172.1
R1(config-if)#no shut
R3(config)#int s1
R3(config-if)#ip address 172.1
R3(config-if)#no shut
R1#show int s1
Serial1 is up, line protocol i
R3#show int s1
Serial1 is up, line protocol i
R3(config)#int s1
R3(config-if)#clockrate 56000
19:13:42: %LINEPROTO-5-UPDOWN:
R1#show int s1
Serial1 is up, line protocol i
R3#show int s1
Serial1 is up, line protocol i
Hardware is HD64570
Internet address is 172.12.13
MTU 1500 bytes, BW 1544 Kbit,
reliability 255/255, txload 1
Encapsulation HDLC, loopback
R1#ping 172.12.13.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
R3#ping 172.12.13.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
R3(config)#int s1
R3(config-if)#encapsulation ?
frame-relay Frame Relay netwo
hdlc Serial HDLC synchronous
ppp Point-to-Point protocol
R3(config-if)#encapsulation pp
PPP Features
The default setting of a Cisco
serial interface is to use HDLC
encapsulation, but youre
generally going to change that
encap type to PPP.
Why, you ask? Because PPP
offers many features that HDLC
does not, including:
Authentication through
the use of the Password
Authentication Protocol
(PAP) and the ChallengeHandshake Authentication
Protocol (CHAP)
Support for error
detection and error
recovery features
Multiprotocol support
(which Ciscos HDLC does
offer, but the original
HDLC does not)
We can authenticate over PPP
with either PAP or CHAP, and
when you have two choices for
the same task, you just know
youre going to see a lot of
those two choices on your
exams. Lets discuss both of
R1(config)#int s1
R1(config-if)#encap ppp
19:37:20: %LINEPROTO-5-UPDOWN:
R1#show int s1
R3#show int s1
Serial1 is up, line protocol i
Encapsulation PPP, loopback n
password.
R3(config)#username R1 passwor
R1(config)#username R3 passwor
20:21:06:
20:21:06:
20:21:06:
20:21:06:
20:21:06:
20:21:06:
Se1
Se1
Se1
Se1
Se1
Se1
CHAP:
CHAP:
CHAP:
CHAP:
CHAP:
CHAP:
O
I
O
I
O
I
CHALLENG
CHALLENG
RESPONSE
RESPONSE
SUCCESS
SUCCESS
Success!
When all is well with CHAP
authentication, this is the
debug output. First, a set of
challenges from each router,
then a set of responses from
each, and then two success
messages.
Now that we know what the
debug output is when things
20:30:49:
20:30:49:
20:30:49:
20:30:49:
20:30:49:
20:30:49:
%LINK-3-UPDOWN: Inte
Se1 CHAP: O CHALLENG
Se1 CHAP: I CHALLENG
Se1 CHAP: O RESPONSE
Se1 CHAP: I RESPONSE
Se1 CHAP: O FAILURE
20:38:09:
20:38:09:
20:38:09:
20:38:09:
20:38:09:
20:38:09:
20:38:09:
20:38:10:
%LINK-3-UPDOWN: Inte
Se1 CHAP: O CHALLENG
Se1 CHAP: I CHALLENG
Se1 CHAP: O RESPONSE
Se1 CHAP: I RESPONSE
Se1 CHAP: O SUCCESS
Se1 CHAP: I SUCCESS
%LINEPROTO-5-UPDOWN:
Success!
Thats why you want to practice
with debugs in a lab
environment when things are
working properly. You see
exactly whats going on behind
the command and it gives you
a HUGE leg up when real-world
troubleshooting time comes
around.
If you get the username wrong,
the output of that debug will be
slightly different. Ill remove the
working username/password
entry and replace it with one
that has the right password but
a mistyped username.
R1(config)#int s1
R1(config-if)#no ppp authentic
R3(config)#int s1
R3(config-if)#no ppp authentic
R1(config)#int s1
R1(config-if)#ppp authenticati
R3(config)#int s1
R3(config-if)#ppp authenticati
Heres the result of the debug
2d05h: Se1 PAP: I AUTH-REQ id
2d05h: Se1 PAP: O AUTH-REQ id
2d05h: Se1 PAP: Authenticating
2d05h: Se1 PAP: O AUTH-ACK id
2d05h: Se1 PAP: I AUTH-ACK id
R3(config-if)#ppp authenticati
callback Authenticate remote
callin Authenticate remote on
callout Authenticate remote o
chap Challenge Handshake Auth
ms-chap Microsoft Challenge H
optional Allow peer to refuse
<cr>
R1(config-if)#ppp authenticati
R3(config-if)#ppp authenticati
R3(config-if)#ppp authenticati
challenge is a random
number.
The challenged router
runs a hash algorithm
against its password,
using that random
number as part of the
process. The challenged
router passes that value
back to the authenticating
router in a RESPONSE
packet.
The authenticating router
looks at the algorithm
result, and if it matches
the answer the
authenticating router
came up with using the
same algorithm and the
same random number,
authentication has
succeeded! The
authenticating router
sends an ack to the
challenged router in the
form of a SUCCESS
message.
In earlier labs, we had R3
authenticating R1 and R1
authenticating R3. When
authentication was properly
configured, we saw the
Se1
Se1
Se1
Se1
Se1
Se1
CHAP:
CHAP:
CHAP:
CHAP:
CHAP:
CHAP:
O
I
O
I
O
I
CHALLENG
CHALLENG
RESPONSE
RESPONSE
SUCCESS
SUCCESS
R3(config)#int s1
R3(config-if)#ppp authenticati
R3(config-if)#^Z
R3#
1w0d: %LINEPROTO-5-UPDOWN: Lin
1w0d: %SYS-5-CONFIG_I: Configu
R3#show int s1
Serial1 is up, line protocol i
Hardware is HD64570
Internet address is 172.12.13
MTU 1500 bytes, BW 1544 Kbit,
Encapsulation PPP, loopback n
Keepalive set (10 sec)
LCP TERMsent
Frame Relay
Point-to-point networks are
nice, but theres a limit to
scalability. Its just not practical
to build a dedicated PTP link
between every single router in
our network, nor is it costeffective. It would be a lot
easier (and cheaper) to share a
network thats already in place,
and thats where Frame Relay
comes in!
A frame relay network is a
nonbroadcast multi-access
(NBMA) network.
Terminal Equipment. We
have a lot to do with their
configuration!
Each router will be connected
to a Frame Relay switch via a
Serial interface connected to a
leased line, and the DCE must
send a clockrate to that DTE. If
the clockrate isnt there, the
line protocol will go down.
q933a
The Gang Of Four refers to
the four vendors involved in its
development. (Cisco,
StrataCom, DEC, NorTel)
The LMI type can be changed
with the frame lmi-type
command. Before doing
anything with the frame relay
commands, we have to enable
frame relay on the interface
with the encapsulation framerelay command. Remember, the
default encapsulation type on a
Cisco Serial interface is HDLC.
R1(config)#interface serial0
R1(config-if)#encapsulation ?
R1(config-if)#encapsulation fr
R1(config-if)#frame-relay lmicisco
ansi
q933a
R1#show int s0
Serial0 is up, line protocol i
Internet address is 172.12.12
MTU 1500 bytes, BW 1544 Kbit,
reliability 255/255, txload 1/
Encapsulation FRAME-RELAY, lo
Keepalive set (10 sec)
R1(config)#int serial0
R1(config-if)#frame lmi-type a
About 30 seconds later, the li
R1(config)#int serial0
R1(config-if)#frame lmi-type a
R1(config-if)#
3d04h: %LINEPROTO-5-UPDOWN: Li
R1#show int s0
Serial0 is up, line protocol i
R1#undebug all
All possible debugging has bee
R1#
3d04h: Serial0(out): StEnq, my
3d04h: datagramstart = 0xE23D0
3d04h: FR encap = 0xFCF10309
3d04h: 00 75 01 01 01 03 02 43
3d04h:
3d04h: Serial0(in): Status, my
3d04h: RT IE 1, length 1, type
3d04h: KA IE 3, length 2, your
R1#undebug all
All possible debugging has bee
R1#show int s0
Serial0 is up, line protocol i
Internet address is 172.12.12
Encapsulation FRAME-RELAY, lo
Keepalive set (10 sec)
LMI enq sent 180, LMI stat re
LMI enqrecvd 0, LMI stat sent
LMI DLCI 1023 LMI type is CISC
R1(config)#int s0
R1(config-if)#encap frame ?
ietf Use RFC1490/RFC2427 encap
<cr>
Inverse ARP
Inverse ARP is enabled by
default on a Cisco interface
running Frame Relay. When you
enter the encapsulation framerelay command and then open
the interface, youre running
Inverse ARP. Its that easy!
Whats supposed to happen
next: The routers each send an
Inverse ARP packet announcing
its IP address. The receiving
router opens the packet, sees
the IP address and a DLCI,
which will be one of the local
there.
Again, nothing against Inverse
ARP or the admins who use it.
Theoretically, its great. In the
real world, it doesnt always
work so well and youll wish
you knew how to use static
map statements.
And after this next section, you
will!
Ive removed all earlier
configurations from the routers,
so lets configure R1 for frame
encapsulation and then open
the interface.
R1#conf t
Enter configuration commands,
R1(config)#int s0
R1(config-if)#ip address 172.1
R1(config-if)#encapsulation fr
R1(config-if)#no shutdown R1(c
00:10:43: %SYS-5-CONFIG_I: Con
00:10:45: %LINK-3-UPDOWN: Inte
00:10:56: %LINEPROTO-5-UPDOWN:
broadcast,
CISCO, status defined, inact
Serial0 (up): ip 0.0.0.0 dlci
broadcast,
CISCO, status defined, inact
R1(config)#int s0
R1(config-if)#no frame-relay i
R1(config)#int s0
R1(config-if)#frame inverse-ar
R1(config)#int s0
R1(config-if)#ip address 172.1
R1(config-if)#encap frame
R1(config-if)#no frame inverse
R1(config-if)#frame map ?
appletalk AppleTalk
bridge Bridging
decnetDECnet
ip IP
ipx Novell IPX
llc2 llc2
R1(config-if)#frame map ip ?
A.B.C.D Protocol specific add
R1(config-if)#frame map ip ?
A.B.C.D Protocol specific add
R1(config-if)#frame map ip 172
The next value needed is the D
R1(config-if)#frame map ip 172
<161007> DLCI
map
ip 172.12.123.2
deleted
ip 172.12.123.3
R2(config)#int s0
R2(config-if)#ip address 172.1
R2(config-if)#encap frame
R2(config-if)#no frame inverse
R2(config-if)#frame map ip 172
R2(config-if)#frame map ip 172
R2(config-if)#no shutdown
00:21:27: %SYS-5-CONFIG_I: Con
00:21:28: %LINK-3-UPDOWN: Inte
00:21:38: %FR-5-DLCICHANGE: In
00:21:39: %LINEPROTO-5-UPDOWN:
R3(config)#int serial0
R3(config-if)#ip address 172.1
R3(config-if)#encap frame
R3(config-if)#no frame inver
R3(config-if)#frame map ip 172
R3(config-if)#frame map ip 172
R3(config-if)#no shutdown
00:24:38: %LINEPROTO-5-UPDOWN:
R3#show frame map
Serial0 (up): ip 172.12.123.1
CISCO, status defined, activ
Serial0 (up): ip 172.12.123.2
R1#ping 172.12.123.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
R1#ping 172.12.123.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
statement.
Youll usually see the broadcast
statement on the end of all
frame map statements. Its so
common that many admins
think its required!
You dont have to put the
broadcast option on spoke-tospoke mappings, since all
spoke-to-spoke traffic goes
through the hub, and the hub
will not forward those
broadcasts. In our lab, R2s
mapping to R3 doesnt require
broadcast, and vice versa. It
doesnt hurt anything, but its
not a requirement.
network topology.
(I know we havent hit EIGRP in
this course yet. No advance
knowledge of EIGRP is needed
to understand this lab.)
R1(config)#int s0
R1(config-if)#no ip split-hori
R1(config)#int s0
R1(config-if)#ip split eigrp 1
and R3 accordingly.
R1(config)#int s0.12 ?
multipoint Treat as a multipo
point-to-point Treat as a poi
R1(config)#int s0
R1(config-if)#encap frame
R1(config-if)#no frame inverse
R1(config-subif)#frame-relay i
R1(config)#int s0.12
R1(config-subif)#frame map ip
FRAME-RELAY INTERFACE-DLCI com
statements.
R2:
R2(config)#int s0
R2(config-if)#ip address 172.1
R2(config-if)#encap frame
R2(config-if)#no frame inverse
R2(config-if)#frame map ip 172
R3:
R3(config)#int s0
R3#ping 2.2.2.2
Configuring Multipoint
Subinterfaces
Had I chosen to configure
multipoint subinterfaces in that
lab, I would have configured
them with the same command I
use with physical interfaces
frame map. Ill create an
additional subinterface to
illustrate:
multipoint or point-topoint.
Always, always, always
use the frame interfacedlci command with ptp
subinterfaces.
Local
Switched
Unused
Active
2
0
0
Inactive
0
0
0
input pkts 30
output pkts
out bytes 0
dropped pkt
in BECN pkts 0
out FECN pk
in DE pkts 0out DE pkts 0
ou
bytes 0
pvc create time 00:07:45, last
Inactive
1
0
0
designed.
Digital Signal One (DS1)
channels run at 1.544 Kbps,
and if that sounds familiar,
thats because we usually refer
to DS1 lines as T1 lines.
Digital Signal Three (DS3)
channels run at 44.736 Mbps
(sometimes rounded up to 45
Mbps in sales materials). T3
lines can carry 28 DS1 channels
or 672 DS0 channels.
http://www.cisco.com/en/US/pro
564978.html
Those router choices include
the popular Integrated Services
Router (ISR):
http://www.cisco.com/en/US/pro
Neither of those links are
required reading for the CCENT
or CCNA exams, but its good
material to have handy when
youre the one making these
choices!
A (Very) Little About MPLS
Multiprotocol Label Switching
(MPLS) is a complex topic, and
were not going to go very far
into it here. I do want to point
out that where Frame Relay
and EWANs run at Layer 2,
MPLS VPNs can run at Layer 2
or 3, but when you hear
someone mention MPLS VPN,
they mean the Layer 3 variety.
Routing And IP
Addressing
Fundamentals:
A Review
Before we head into our OSPF
and EIGRP studies, spend some
time with this chapter from my
ICND1 Study Guide. When
youre comfortable with the
routing fundamentals in this
section, charge forward!
it!
The PCerr, the host Im
creating this document on has
an IP address, shown here with
the Microsoft command
ipconfig.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Co
IP Address: 192.168.1.100
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
128
64
32
16
192
192
128
1
64
32
16
128
1
64
1
32
16
128
1
64
1
32
0
16
0
8
0
4
0
2
0
24
Number of host bits: 8
The RFC 1918 Private Address
Classes
If youve worked on different
production networks, you may
have noticed that the hosts at
different sites use similar IP
addresses. Thats because
certain IP address ranges have
been reserved for internal
networks that is, networks
with hosts that do not need to
communicate with other hosts
outside their own internal
network.
Address classes A, B, and C all
have their own reserved range
of addresses. You should be
able to recognize an address
from any of these ranges
immediately.
Class A: 10.0.0.0
10.255.255.255
Class B: 172.16.0.0
172.31.255.255
Class C: 192.168.0.0
192.168.255.255
You should be ready to identify
Introduction To The
Routing Process
Before we start working with
routing protocols, we need to
understand the very basics of
the routing process and how
routers decide where to send
packets.
Well take a look at a basic
network and follow the
decision-making process from
the point of view of the host,
then the router. Well then
examine the previous example
in this section to see why its a
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Co
IP Address: 192.168.1.100
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
connected network.
Destined for a nondirectly connected
network that the router
has an entry for in its
routing table.
Destined for a nondirectly connected
network that the router
does not have an entry
for.
Lets take an illustrated look at
each of these three
possibilities.
R1#show ip route
Codes: C connected, S stat
Gateway of last resort is not
C
C
00000000 = /8
The C indicates a directly
connected network, and there
is an entry for 20.0.0.0. The
router will then send the packet
out its E1 interface and Host B
will receive it.
R1#show ip route
Codes: C connected, S stat
Gateway of last resort is not
C
20.0.0.0/8 is directly con
R1#show ip route
Codes: C connected, S stat
C
20.0.0.0/8 is directly con
C
S
1st Octet
All bits must
match.
2nd Octet
All bits must
match.
3rd Octet
All bits must
match.
4th Octet
I dont
care
Resulting
Wildcard
Mask:
00000000
00000000
00000000
11111111
00000000
00000000
00000000
11111111
0 0 0
0 0 0
0 0 0
1 1 1
00000000
00000000
00000000
00001111
must match.
Resulting
Wildcard
Mask:
00000000
00000000
00000000
00001111
R2(config)#router ospf 1
R2(config-router)#network 172.
R3(config)#router ospf 1
R3(config-router)#network 172.
R2#
00:22:29: OSPF: Rcv hello from
172.12.23.3
00:22:29: OSPF: Mismatched hel
00:22:29: Dead R 40 C 40, Hell
R2(config)#int e0
R2(config-if)#ip address 172.1
R2(config)#router ospf 1
R2(config-router)#no network 1
R2(config-router)#network 172.
Neighbor ID
172.12.23.3
Pri
1
State
FULL/DR
We do!
Lets now switch focus to the
other two values you saw in
that debug command the
Hello and Dead timers.
Neighbor Value #3 & 4: The
Hello And Dead Timers
These timers have vastly
different roles, but they are
bound together in one very
important way.
The Hello timer defines how
often OSPF Hello packets will
R2(config)#interface ethernet0
R2(config-if)#ip ospf hello ?
<165535> Seconds
R2(config)#int e0
R2(config-if)#no ip ospf hello
R2(config-if)#^Z
R2#
00:56:19: %SYS-5-CONFIG_I: Con
00:56:19: OSPF: Rcv hello from
00:56:19: OSPF: End of hello p
R2#
00:56:27: OSPF: Rcv DBD from 1
00:56:27: OSPF: 2 Way Communic
00:56:27: OSPF: Neighbor chang
00:56:27: OSPF: DR/BDR electio
00:56:27:
00:56:27:
00:56:27:
00:56:27:
00:56:27:
0x800000
09
00:56:29: OSPF: Rcv hello from
172.12.23.3
00:56:29: OSPF: End of hello p
R2#
00:56:39: OSPF: Rcv hello from
172.12.23.3
00:56:39: OSPF: Neighbor chang
00:56:39: OSPF: DR/BDR electio
00:56:39: OSPF: Elect BDR 172.
00:56:39: OSPF: Elect DR 172.1
00:56:39: DR: 172.12.23.3 (Id)
00:56:39: OSPF: End of hello p
Pri
172.12.23.3
State
FULL/DR
R2#undebug all
All possible debugging has bee
ADV Router
1.1.1.1
Age
319
2.2.2.2
3.3.3.3
2.2.2.2
3.3.3.3
319
79
A
2
ADV Router
1.1.1.1
2.2.2.2
3.3.3.3
Age
67
1
186
R2 is using Serial0.123, a
multipoint subinterface
R3 is using Serial0.31, a
point-to-point
subinterface
Each router has a loopback with
its own number for each octet.
Each loopback has a subnet
mask of 255.255.255.255 (a
host mask).
requirement.
Before we dive into the lab,
lets chat about OSPF areas.
As you go through OSPF in your
CCNA and CCNP studies, and
youre introduced to the
different area types we have
available, and the operation
and rules for each one, youre
going to wonder why we dont
just chuck all our routers into
one big Area 0 and just be
done with it!
zero.
R2(config)#int s0.123
R2(config-subif)#ip ospf prior
R3(config)#int s0.31
R3(config-subif)#ip ospf prior
R1(config)#router ospf 1
R1(config)#router ospf 1
R1(config-router)#network 172.
R1(config-router)#network 1.1.
R2(config)#router ospf 1
R2(config-router)#network 172.
R2(config-router)#network 2.2.
R3(config)#router ospf 1
R3(config-router)#network 172.
R1(config)#router ospf 1
R1(config-router)#neighbor 172
R1(config-router)#neighbor 172
R3(config)#int s0.31
R3(config-subif)#ip ospf netwo
broadcast Specify OSPF broadca
point-to-multipoint Specify OS
Pri
1
State
FULL/DR
Pri
State
2.2.2.2
3.3.3.3
0
0
FULL/DROTHER
FULL/DROTHER
R2(config)#router ospf 1
R2(config-router)#network 172.
R3(config)#router ospf 1
R3(config-router)#network 172.
Pri
1
1
State
FULL/DR
FULL/DR
Pri
1
1
State
FULL/BDR
FULL/DR
2.0.0.0/32 is subnetted, 1
O IA 2.2.2.2 [110/65] via 172.
3.0.0.0/32 is subnetted, 1
O IA 3.3.3.3 [110/65] via 172.
172.23.0.0/24 is subnetted
O IA 172.23.23.0 [110/74] via
[110/74] via
physical interface.
Its rare to have a router
running OSPF that doesnt have
at least one loopback interface,
but if there is no loopback, the
highest IP address on the
routers physical interfaces will
be the RID.
You can hardcode the RID with
the router-id command.
R1(config-router)#exit R1(conf
R1(config-router)#router-id ?
A.B.C.D OSPF router-id in IP
R1(config-router)#router-id 11
Reload or use clear ip ospf p
R1#show ip ospf
Routing Process ospf 1 with
Pri
1
State
FULL/DR
Pri
State
11.11.11.11
FULL/DR
R1(config)#router ospf 1
R1(config-router)#default-info
R1(config)#router ospf 1
R1(config-router)#default-info
always
Always advertise d
metric
OSPF default metr
metric-type OSPF metric type
route-map
Route-map referen
R3(config)#router ospf 1
R3(config-router)#default-info
always
Always advertise d
metric
OSPF default met
metric-type
OSPF metric type
route-map
Route-map refere
R3(config-router)#default-info
Yep!
R1(config)#router ospf 1
R1(config-router)#?
Router configuration commands:
area
OSPF area parameter
auto-cost Calculate OSPF inte
(The rest of the OSPF commands
R1(config-router)#auto-cost ?
reference-bandwidth Use refere
<cr>
R1(config-router)#auto-cost re
<14294967>The reference bandw
Recommended settings:
Highest post speed is 1 Gig
Ethernet = Ref. bandwidth 1000
Mbps
Highest port speed is 10 Gig
R1(config-router)#auto-cost re
% OSPF: Reference bandwidth is
Please ensure reference bandwi
R1(config)#int s0
R1(config-if)#?
Interface configuration comman
access-expression
Bu
appletalk
Ap
arp
Se
autodetect
Au
backup
Mo
bandwidth
Se
<110000000>
Bandwidth in ki
Neighbor ID
4.4.4.4
1.1.1.1
Pri
1
1
State
FULL/BDR
FULL/DR
R3(config)#router ospf 1
R3(config-router)#passive-inte
Ethernet IEEE 802.3
Loopback Loopback interface
Null Null interface
Serial Serial
R3(config-router)#passive-inte
22:26:21: %OSPF-5-ADJCHG: Proc
R3#show ip protocols
Routing Protocol is ospf 1
Outgoing update filter list f
Incoming update filter list f
Router ID 3.3.3.3
It is an area border router
Number of areas in this route
Maximum path: 4
EIGRP
Over the years, EIGRP has been
called each of the following:
A hybrid of distance
vector and link state
protocols
A super-duper advanced
distance vector protocol
(okay, maybe just
advanced)
None or both of the above
an adjacency is formed.
After that, EIGRP updates
contain only the routes
that have changed, and
these updates are sent
only when that change
occurs.
Hello Packets and RTP: The
Heartbeat Of EIGRP
EIGRP uses Hello packets (sent
to multicast address
224.0.0.10) to establish and
maintain neighbor
relationships. The Reliable
Transport Protocol (RTP) is
used to handle the transport of
in separate autonomous
systems will not exchange
routes. They wont even
become neighbors to begin
with!
For an EIGRP neighbor
relationship to be established,
routers must receive Hello
packets from each other, be on
the same subnet as the
potential neighbor, and the
Autonomous System number
must match.
EIGRP authentication is not part
of the CCNA course, but
naturally, if you have that in
Broadcast, point-to-point
serial, and high-bandwidth
links send EIGRP Hellos
every 5 seconds. (Anything
over T1 speed is
considered a highbandwidth link.)
Multipoint links running at
T1 speed or less will send
Hellos every 60 seconds.
There are major differences
here between OSPF and EIGRP,
though:
EIGRP refers to its dead
time as Hold Time
place.
The Successor and Feasible
Successor
EIGRP keeps three tables:
the route table,
containing the best
route(s) to destinations
the topology table, where
those best routes are also
kept, along with valid but
less-desirable routes to
those same destinations
the neighbor table, where
info about the neighbors
is kept
As an EIGRP-enabled router
learns about the network, the
router will put the best route to
a given destination in its
routing table. EIGRP keeps the
best routes along with all loop
free, valid routes in the
topology table. EIGRP actually
calculates these backup routes
before a failure occurs, making
convergence after a failure
pretty darn quick.
The EIGRP term for the best
route is the Successor. Any
valid alternate route is referred
P 172.23.0.0/16, 2 successors,
via 172.12.123.2 (2195456/2816
via 172.12.123.3 (2195456/2816
Successor: FD 5, RD 4
Possible Feasible Successor #1
Possible Feasible Successor #2
Possible Feasible Successor #3
0000
111
00001100
01111011
00000000
00000000
00000000
R1#
04:09:16: %DUAL-5-NBRCHANGE: I
04:09:19: %DUAL-5-NBRCHANGE: I
Address
(sec)
172.12.123.2
172.12.123.3
Interfac
Se0
Se0
masks!
The loopbacks all have their
router number for each octet,
and each loopback has been
configured with a host mask
(255.255.255.255 or /32).
R1(config-router)#network 1.1.
1 su
via
1 su
via
172.23.0.0/27 is subnetted, 1
D
172.23.23.0 [90/2195456]
P 3.3.3.3/32, 1 successors, FD
via 172.12.123.3 (2297856/1282
via 172.12.123.2 (2323456/4096
P 2.2.2.2/32, 1 successors, FD
P 1.1.1.1/32, 1 successors, FD
via Connected, Loopback0
P 172.23.23.0/27, 2 successors
via 172.12.123.3 (2195456/2816
via 172.12.123.2 (2195456/2816
P 172.12.123.0/24, 1 successor
via Connected, Serial0
P 3.3.3.3/32, 1 successors, FD
via 172.12.123.3 (2297856/1282
via 172.12.123.2 (2323456/4096
P 2.2.2.2/32, 1 successors, FD
via 172.12.123.2 (2297856/1282
via 172.12.123.3 (2323456/4096
3.0.0.0/32 is subnetted, 1 su
3.3.3.3 [90/2297856] via 1
172.23.0.0/27 is subnetted, 1
D
172.23.23.0 [90/2195456] v
[90/2195456] via 172.12.123.
R1#show ip protocols
Routing Protocol is eigrp 100
EIGRP maximum hopcount 100
EIGRP maximum metric variance
Redistributing: eigrp 100
Automatic network summarizati
Maximum path: 4
Distance: internal 90 externa
3.0.0.0/32 is subnetted, 1 su
3.3.3.3 [90/2297856] via 1
[90/2323456] via 172.12.123.
172.23.0.0/27 is subnetted, 1
D
172.23.23.0 [90/2195456] v
[90/2195456] via 172.12.123.
P 2.2.2.2/32, 1 successors, FD
via 172.12.123.2 (2
via 172.13.13.3 (40
via 172.12.123.3 (2
Network 20.0.0.0 is
discontiguous there is no
single path to all subnets of the
major network number. Thats a
problem for routing protocols
such as RIPv1 that do not carry
subnet mask information.
EIGRP and RIPv2 do carry
subnet mask information, but
the default autosummarization
causes trouble with this
network. R1 is now receiving
the exact same update from
both R2 and R3, and its for the
classful network 20.0.0.0 /8.
R1#ping 20.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!U!.!
Success rate is 60 percent (3/
R1#ping 20.2.2.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
U!.!U
Success rate is 40 percent (2/
R1#ping 20.3.3.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
U!.!U
Success rate is 40 percent (2/
R1#ping 20.4.4.4
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!U!.!
Success rate is 60 percent (3/
00:26:09: %DUAL-5-NBRCHANGE: I
eigrp
is subnetted,
[90/2297856]
[90/2297856]
[90/2297856]
[90/2297856]
Here we go!
R1(config)#int s0
R1(config-if)#ip hello-interva
eigrp Enhanced Interior Gatew
R1(config-if)#ip hello-interva
<165535> Autonomous system nu
R1(config-if)#ip hello-interva
<165535> Seconds between hell
R1(config-if)#ip hello-interva
<cr>
R1(config-if)#ip hello-interva
R1(config)#int s0
R1(config-if)#ip hold-time ?
eigrp Enhanced Interior Gatew
R1#show int s0
Serial0 is up, line protocol i
Hardware is HD64570
Internet address is 172.12.12
MTU 1500 bytes, BW 1544 Kbit
172.23.0.0/24 is subnetted
172.23.23.0 [90/219545
[90/219545
[90/219545
R1(config)#int s1
R1(config-if)#bandwidth ?
<110000000> Bandwidth in kilo
R1(config-if)#bandwidth 56
R3(config)#int s1
R3(config-if)#bandwidth 56
method:
R1(config)#int s0
R1(config-if)#delay ?
<116777215> Throughput delay
RID
Like OSPF, we can change the
EIGRP hello-time and hold-time
(dead time). Unlike OSPF, the
commands are a bit longwinded, and the syntax is a
little different than many EIGRP
commands.
R1(config)#int s0
R1(config-if)#ip eigrp ?
% Unrecognized command
R1(config-if)#ip hello-interva
eigrp Enhanced Interior Gatew
R1(config-if)#ip hello-interva
<165535> Autonomous system nu
R1(config-if)#ip hello-interva
<165535> Seconds between hell
R1(config-if)#ip hello-interva
R1(config-if)#ip hold-time eig
<165535> Seconds before neigh
Intro To Network
Management and
Licensing
Theres a lot of intro in this
section, for two reasons:
The current CCNA exam
requires some fundamental
knowledge of these topics
You could write an entire
book on some of these
R1(config)#snmp-server ?
chassis-id
String to uniq
community
Enable SNMP; s
R1(config)#snmp-server communi
WORD SNMP community string
R1(config)#snmp-server communi
<199>
<13001999>
WORD
ipv6
ro
rw
view
<cr>
Std IP accesslist
Expanded IP acces
string
Access-list na
Specify IPv6 N
Read-only acce
Read-write acc
Restrict this
Syslog
Unlike some other vendor
products, Cisco routers and
switches speak to us in pretty
clear terms when somethings
going on. We just have to know
where that conversation is
happening, and in many cases
its in the system logging
messages, or Syslogs.
Lets take a detailed look at a
message weve seen quite a bit
of in this course:
2d03h: %LINEPROTO-5-UPDOWN: Li
R1#show logging
Syslog logging: enabled (0 mes
0 overruns)
Console logging: level debugg
Monitor logging: level debugg
Buffer logging: level debuggi
Logging Exception size (4096
Trap logging: level informati
IP addres
Set buffe
Set conso
Limit siz
Facility
Configure
Set syslo
Set termi
Enable lo
Set messa
Specify i
transacti
Set syslo
R1(config)#logging buffered ?
<07>
Logging sev
<40962147483647> Logging buf
alerts
Immediate
critical
debugging
emergencies
errors
informational
notifications
warnings
Critical
Debugging
System is
Error con
Informati
Normal bu
Warning c
R1(config)#logging buffered 5
buffer log.
Another important option in
that readout:
R1(config)#logging ?
Hostname or A.B.C.D IP addres
2d03h: %LINEPROTO-5-UPDOWN: Li
R1(config)#service timestamps
debug
Timestamp debug mes
log
Timestamp log messa
<cr>
R1(config)#service timestamps
datetime
Timestamp with date
uptime
Timestamp with sy
<cr>
R1(config)#service timestamps
localtime
Use local time z
msec
Include millis
show-timezone Add time zone
<cr>
R1(config)#service
msec
show-timezone
<cr>
timestamp
Include
Add tim
R1(config)#service timestamps
R1(config)#service ?
compress-config
config
dhcp
disable-ip-fast-frag
exec-callback
exec-wait
finger
hide-telnet-addresses
linenumber
nagle
old-slip-prompts
pad
password-encryption
prompt
pt-vty-logging
sequence-numbers
slave-log
tcp-keepalives-in
tcp-keepalives-out
Compr
TFTP
Enabl
Disab
Enabl
Delay
Allow
Hide
enable
Enable
Allow
Enabl
Encry
Enabl
Log si
Stamp
Enabl
Gener
conne
Gener
tcp-small-servers
conne
Enabl
R1(config)#service sequence-nu
R1(config)#^Z
000156: Sep 8 12:05:58: %SYS-5
or without.
R1(config-if)#ip flow-export ?
% Unrecognized command whoop
R1(config-if)#exit
R1(config)#ip flow-export ?
destination
Specify the
interface-names
Export inte
source
Specify the
template
Specify the
version
Specify the
FastEthernet0/0
ip route-cache flow
ip flow ingress
ip flow egress
1536
.000
Total
Flows
-------/Flow
ICMP
15.2
Total:
15.2
Flows
/Sec
0.0
0.0
SrcIfSrcIPaddressDstIfDstIPadd
Fa0/0
0.0.0.0
Null
255.2
Communications, including
Voice over IP
Datak9 -- Includes the moreimportant-by-the-moment MPLS
Appxk9 -- Application
Experience features
Licensing Types and Processes
Its not always necessary to go
through online software
activation with a new Cisco
router. If you buy a permanent
license via Ciscos online sales
tool while choosing your router
and IOS, the key and code are
preinstalled. When you pop
Device#
*0
PID
C3900-AAAAAA/K9
S
B
using it.
3. You buy a new laptop.
4. You realllllllly want to
move that software license
to the new laptop without
buying another license.
Realizing how often this
happens, some software
vendors have made this a much
friendlier process, and that
includes Cisco! You can actually
move a license from one router
to another via the Cisco Product
License Registration online
http://www.cisco.com/web/learn
Anti-replay protection
(sometimes just called replay
protection) protects against
replay attacks, a malicious
repeat and/or delay of a valid
transmission.
Replay attacks begin innocently
enough. In this example,
Router C requests proof of
identity from Router A. Router
Data Encryption
Technologies
For data to be encrypted, it
follows that somethings got to
perform this encryption! One
such encryption tool is the Data
Encryption Standard (DES). DES
was developed in 1976, and
just a few security issues with
networking have popped up
since then!
The main issue is that the key
used by DES to encrypt data is
only 56 bits in size. (A key is a
random string of binary digits.)
capability.
a while.
IPSec is very secure, but it does
have drawbacks. Multicast
traffic generated by OSPF and
EIGRP cant be carried by basic
IPSec weve got to run a
combination of IPSec and GRE,
commonly called GRE over
IPSec. (As of IOS 12.4(4), IPSec
supports multicast traffic but
not dynamic routing protocols.)
By combining GRE and IPSec,
each protocol helps to
compensate for the others
limitation:
1st-Hop Redundancy
Protocols
Youve heard this before, and
youre hearing it again -- well
take as much redundancy as
we can get in our networks,
and thats particularly true of
our routers!
If a router goes down, we have
real problems. Hosts are relying
on that router as a gateway to
send packets to remote
networks.
In networking, its vital to avoid
the single point of failure,
which is a quick way of saying
if this thing goes down, were
really in a lot of trouble. R3 in
the following illustration is
definitely a single point of
failure!
R2(config)#interface ethernet0
R2(config-if)#standby 5 ip 172
R3(config)#interface ethernet0
R3(config-if)#standby 5 ip 172
Ethernet0 Group 5
Local state is Standby, prior
Hellotime 3 sec, holdtime 10
Next hello sent in 0.776
Virtual IP address is 172.12.
Active router is 172.12.23.3,
Standby router is local
1 state changes, last state ch
R3#show standby
Ethernet0 Group 5
Local state is Active, priori
Hellotime 3 sec, holdtime 10
Next hello sent in 2.592
Virtual IP address is 172.12.
Active router is local
Standby router is 172.12.23.2
Virtual mac address is 0000.0
2 state changes, last state ch
R3 is in Active state, R2 is in
Standby. When you see Active
R3(config-if)#standby 5 timers
<1254>
Hello interval in se
msec
Specify hello interv
R3(config-if)#standby 5 timers
<5255> Hold time in seconds
R3(config-if)#standby 5 timers
R2(config)#interface ethernet0
R2(config-if)#standby 5 priori
R2#show standby
Ethernet0 Group 5
Local state is Standby, prior
Hellotime 4 sec, holdtime 12
Next hello sent in 0.896
Virtual IP address is 172.12.
Active router is 172.12.23.3,
Standby router is local
1 state changes, last state c
Why?
The current Active router does
not lose that role unless one of
these two things happens:
The current Active router
goes down, with another
Active router chosen in its
absence
Another router has its
priority set to a higher
value than the Active
router, AND the preempt
option is used while doing
so
Heres the command we need
to get the job done, which well
verify with show standby.
R2(config-if)#standby 5 priori
1d11h: %STANDBY-6-STATECHANGE:
R2#show standby
Ethernet0 Group 5
Local state is Active, priori
Hellotime 4 sec, holdtime 12
Next hello sent in 1.844
Virtual IP address is 172.12.
Active router is local
R2(config-if)#standby 5 mac-ad
1d12h: %STANDBY-6-STATECHANGE:
R2#show standby
Ethernet0 Group 5
Local state is Active, priori
Hellotime 4 sec, holdtime 12
Next hello sent in 3.476
Virtual IP address is 172.12.
Active router is local
Standby router is 172.12.23.3
Virtual mac address is 0000.1
4 state changes, last state c
1d12h: %STANDBY-6-STATECHANGE:
The configs:
R2:
int e0
ip address 172.12.23.2 255.255
standby 11 ip 172.12.23.11 pre
standby 22 ip 172.12.23.22 pre
standby 11 priority 99
R3:
int e0
ip address
standby 11
standby 22
standby 22
172.12.23.3 255.255
ip 172.12.23.11 pre
priority 99
ip 172.12.23.22 pre
Troubleshooting HSRP
The show standby command is
great for HSRP troubleshooting
and verification. Ive
deliberately misconfigured
HSRP on this router to illustrate
a few things to watch out for.
R1#show standby
FastEthernet0/0 Group 1
State is Active
2 state changes, last state c
Virtual IP address is 172.12.
Active virtual MAC address is
Local virtual MAC address is
Hello time 3 sec, hold time 1
Next hello sent in 2.872 secs
Preemption disabled
Active router is local
Standby router is unknown
Priority 100 (default 100)
IP redundancy name is hsrp-F
FastEthernet0/0 Group 5
State is Init (virtual IP in
Virtual IP address is 172.12.
Active virtual MAC address is
Local virtual MAC address is
Hello time 3 sec, hold time 1
Preemption disabled
Active router is unknown
Standby router is unknown
Priority 75 (default 100)
IP redundancy name is hsrp-F
VRRP documentation
refers to this router as the
IP Address Owner.) This is
the router that has the
virtual routers IP address
as a real IP address on
the interface it will
receive packets on.
The physical routers in a
VRRP Group combine to
form a Virtual Router. The
VRRP Virtual Router uses
an IP address already
configured on a router in
its group, as opposed to
how the HSRP router is
assigned a separate IP
address.
VRRP Advertisements are
multicast to 224.0.0.18.
VRRPs equivalent to
HSRPs Standby router
state is the Backup state.
The MAC address of VRRP
virtual routers is 00-005e-00-01-xx, and xx is
the group number in
hexadecimal.
preempt is a default
setting for VRRP routers.
addresses.
four members.
GLBPs load balancing also
offers the opportunity to finetune it to your networks needs.
GLBP offers three different
forms of MAC address
assignment, the default being
round-robin. With round-robin
assignments, a host that sends
an ARP request will receive a
response containing the next
virtual MAC address in line.
If a host or hosts need the
same MAC gateway address
every time it sends an ARP
request, host-dependent load
IP Version 6
IP Version 6 is all around us
today, and even if youre not
working directly with it today,
you will be one day!
Well, you will be if youve taken
the initiative to learn IPv6. A lot
of network admins have put off
learning IPv6, which is a huge
mistake. Even if it doesnt
impact your current career,
youre definitely limiting your
Original format:
1234:1234:0000:0000:0000:0000
Using zero compression:
1234:1234::3456:3434
Since blocks of numbers are
separated by a single colon in
the first place, be careful when
scanning IPv6 addresses for
legality. If you see two sets of
colons in the same address, its
Original format:
1234:0000:1234:0000:1234:0000
With leading zero compression:
1234:0:1234:0:1234:0:123:1234
For your exam and for the real
world, both of those
expressions are correct. Its just
Original format:
1111:0000:0000:1234:0011:0022
With zero and leading zero
compression:
1111::1234:11:22:33:44
Zero compression uses the
double colon to replace the
second and third block of
1111:0000:0000:2222:0000:0000
If we were able to use zero
compression more than once,
we could compress that
address thusly:
1111::2222::3333
Great! But what happens when
the full address is needed? We
know there are eight blocks of
numbers in an IPv6 address,
but how would we know the
number of blocks represented
each set of colons?
1111:0000:2222:0000:0000:0000
Or this:
1111:0000:0000:0000:0000:2222
Or this!
1111:0000:0000:0000:2222:0000
If multiple uses of zero
compression were legal, every
one of those addresses could
be represented by
1111::2222::3333 and none
of them would actually be the
original address!
Thats why using zero
1111:2222:3300:0000:0000:0000
does NOT compress to
1111:2222:33::44:5555
xs
Decompressing While
Avoiding The Bends
Decompressing an IPv6 address
is pretty darn simple. Example:
2222:23:a::bbcc:dddd:342
First, insert zeroes at the
beginning of each block that
has at least one value in it. The
result:
2222:0023:000a::bbcc:dddd:0342
Next, insert fields of zeroes
where you see the set of
colons.
2222:0023:000a:0000:0000:bbcc
Done and done!
This is also an easy skill to
practice whenever you have a
few minutes, and you dont
even need a practice exam to
do so. Just take a piece of
paper, and without putting a lot
of thought into it, just write out
V6ROUTER1(config)#ipv6 unicast
V6ROUTER1(config)#int fast 0/0
V6ROUTER1(config-if)#ipv6 addr
Serial0/1
[administratively d
Uncompressed:
FE80:0000:0000:0000:020C:31FF
According to the official IPv6
address standards, the link-
( 8, 4, 2, 1 for
FE80 = 1111 1110 1000 0000
1122:33FF:FEAA:BBCC
and youre almost done.
Write out the hex value for the
first two digits, 11 in this
case, and invert the 7th bit.
Invert the bit is a fancy way
of saying If its a zero, make it
a one, and if its a one, make it
a zero.
11 = 0001 0001
Invert the 7th bit
0001 0011
result is 13
Replace the first two characters
with the ones you just
calculated, and youre done!
The interface identifier is
1322:33FF:FEAA:BBCC.
Lets practice this skill using the
MAC address of FastEthernet
0/0 on our live IPv6 router.
exactly!
While this is an important
process to know about, you can
also configure an interfaces
link-local address with the ipv6
address command:
V6ROUTER1(config-if)#ipv6 addr
WORD
General
X:X:X:X::X
IPv6 lin
X:X:X:X::X/<0128>
IPv6 pre
autoconfig
Obtain a
unique address.
Ill use that option on the live
equipment, after first removing
the full address we applied
earlier.
V6ROUTER1(config-if)#ipv6 addr
anycast Configure as an anyca
eui-64 Use eui-64 interface i
<cr>
V6ROUTER1(config-if)#ipv6 addr
The Solicited-Node
Multicast Address
Dying is easy. Comedy is
hard.
-- Edmund Kean
Determining the solicited-note
multicast address for a given
IPv6 address is easy. Figuring
out what the heck a solicitednode multicast address is
now THATS hard.
-- Chris Bryant
I doubt my quote goes down in
FF02::2
FF02::1:FFEF:D240
Thats it!
Now back to our Neighbor
Solicitations and
Advertisements!
When last we left our IPv6
host, now named Host A, it
was sending a Neighbor
Solicitation to the solicited-note
multicast address that
corresponds with the IPv6
address of the destination host,
Host B.
DHCP In IPv6
DHCP is one of the most useful
protocols well ever use, so
IPv6 certainly wasnt going to
eliminate it but just as we
can always get better, so can
protocols. Lets jump into DHCP
for IPv6, starting with a
comparison of Stateful DHCP
and Stateless DHCP.
Stateless DHCP works a lot like
the DHCP weve come to know
and love in our IPv4 networks.
See if this story sounds
familiar:
agent. We do that by
configuring the ipv6 dhcp relay
command on the interface that
will be receiving the DHCP
packets that need to be
relayed.
V6ROUTER1(config-if)#ipv6 dhcp
destination Configure relay d
V6ROUTER1(config-if)#ipv6 dhcp
X:X:X:X::X IPv6 address
V6ROUTER1(config-if)#$elay des
Stateless Autoconfiguration!
Where Stateful
Autoconfiguration has a lot in
common with DHCPv4,
Stateless is a whole new world.
We have hosts that create their
own IPv6 addresses!
That process starts with some
info the host received from the
router way back during those
Router Solicitation and Router
Advertisement messages. We
discussed a little of that info at
that time, but heres some
more detail on what the RA
contains and one important
happen:
The host that sent the NS
receives a Neighbor
Advertisement (NA),
which means another host
on the link is already
using that address, and
the host that wanted to
use it cant do so.
The host that sent the NS
doesnt hear anything
back, so its okay for that
host to use its new
address.
And thats it! DAD is just a
http://tools.ietf.org/html/rfc6106
R3:
V6ROUTER1#ping 2001:1111:2222:
V6ROUTER1#traceroute 2001:1111
1 2001:1111:2222:1:20E:D7FF:F
http://www.cisco.com/en/US/doc
xml/ios/ipv6/command/ipv6s4.html#wp1680937550
Interface refers to the local
interface through which the
neighbor is reached.
Speaking of local, lets spend
a little time with our IPv6 route
types and protocols.
With both IPv4 and v6, there
2001:1111:2222:1::/64 [0/
via ::, FastEthernet0/0
L
2001:1111:2222:1:20C:31FF
via ::, FastEthernet0/0
L
FF00::/8 [0/0]
via ::, Null0
Ethernet segment.
V6ROUTER1(config)#ipv6 route 2
Dialer
Dialer interf
FastEthernet
FastEthernet
Loopback
Loopback inte
MFR
Multilink Fra
Multilink
Multilink-gro
Null
Null interfac
Port-channel
Ethernet Chan
Serial
Serial
X:X:X:X::X
IPv6 address
2001:1111:2222:1:20E:D7FF:FEA
Lets send a ping from R1 to
R3s loopback.
V6ROUTER1#ping 2001:2222:3333:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
Success, indeed!
Lets run the exact same lab
but with a default static route.
First, well remove the previous
route by using our up arrow
and then ctrl-a to go to front of
the lonnnng command, and
V6ROUTER1(config)#ipv6 route :
V6ROUTER1#ping 2001:2222:3333:
Ta da!
When checking your V6 routing
table, be sure to give it a twiceover its really easy to scan
right past the routing table
entry for the default static
route.
2001:1111:2222:1::/64 [0/
via ::, FastEthernet0/0
L
2001:1111:2222:1:20C:31FF
via ::, FastEthernet0/0
L FF00::/8 [0/0]
via ::, Null0
and v3:
They both use the same
overall terms and
concepts when it comes
to areas, LSAs, and the
OSPF metric cost.
Values such as the hello
and dead time must be
agreed upon for an
adjacency to form, and for
that adjacency to remain
in place.
The SPF algorithm is used
by both versions, and
dynamic neighbor
discovery is supported by
both.
One big difference
OSPFv3 routers do not
have to agree on the
prefix length.
OSPF v3 point-to-point
and point-to-multipoint
configurations do not
elect DRs and BDRs, just
like IP v4.
OSPF v3 headers are
smaller than v2, since v3
headers have no
authentication fields.
A Sample OSPFv3
Configuration
As always, we need the ipv6
unicast-routing command to do
anything IPv6-related. We also
need the ipv6 router ospf 1
command enabled globally.
V6ROUTER1
V6ROUTER1
Eigrp
Ospf
Rip
V6ROUTER3 (config-rtr) #
*Nov 5 18:59:45.566: %OSPFv3-4
V6ROUTER3 (config-rtr) #router
database-filter
dead-interval
demand-circuit
encryption
flood-reduction
hello-interval
mtu-ignore
neighbor
network
priority
retransmit-interval
transmit-delay
Filter
Interva
OSPF de
Enable
OSPF Fl
Time be
Ignores
OSPF ne
Network
Router
Time be
adverti
Link st
V6ROUTER1(config-if)#ipv6 ospf
area Set the OSPF area ID
V6ROUTER1(config-if)#ipv6 ospf
<04294967295>
OSPF area ID
A.B.C.D
OSPF area
V6ROUTER1(config-if)#ipv6 ospf
R3:
Pri
1
State
FULL/BDR
V6ROUTER3(config)#int loopback
V6ROUTER3(config-if)#ipv6 ospf
2001:1111:2222:1::/64 [0/0
via ::, FastEthernet0/0
2001:1111:2222:1:20C:31FF:
via ::, FastEthernet0/0
2001:2222:3333:1:20E:D7FF:
via FE80::20E:D7FF:FEA4:F
FF00::/8 [0/0]
via ::, Null0
V6ROUTER1#ping 2001:2222:3333:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
FULL/BDR
One of my favorite
troubleshooting commands,
show protocols, got quite the
overhaul with IPv6. Heres the
output of that command at the
end of that last lab.
V6ROUTER1#show ipv6 protocols
R1#ping 2001:1111:2222:13:3::
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
R3#ping 2001:1111:2222:13:1::
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos
!!!!!
Success rate is 100 percent (5
FE80::20E:D7FF:FEA4:F4A0
There we go!
Now that weve taken care of
that, lets look at this
fundamental EIGRPv6 config
WITH the no shutdown
command!
ipv6 unicast-routing
interface Serial0/1
no ip address
ipv6 address 2001:1111:2222:1
ipv6 eigrp 100
!
ipv6 router eigrp 100
no shutdown
R1(config)#ipv6 unicast-routin
R1(config-rtr)#router-id 1.1.1
R1(config-if)#ipv6 hold-time e
<165535> Seconds before neigh
R3(config-rtr)#redistribute co
metric
Metric for redist
route-map
Route map referen
<cr>
R3(config-rtr)#redistribute co
<14294967295>
Bandwidth met
R3(config-rtr)#redistribute co
<04294967295>
EIGRP delay m
R3(config-rtr)#redistribute co
<0255>
EIGRP reliability m
R3(config-rtr)#redistribute co
<1255>
EIGRP Effective ban
R3(config-rtr)#redistribute co
<165535> EIGRP MTU of the pa
R3(config-rtr)#redistribute co
router-id
shutdown
stub
timers
variance
proto
route
Shutd
Set E
Adjus
Contr
Differences between
EIGRPv4 and EIGRPv6:
Theres no auto-summary
command with EIGRPv6! If
youve been working with
EIGRPv4, dont freak out when
you try to use this command
with EIGRPv6 and get this
message:
R3(config)#ipv6 unicast-routin
R3(config-rtr)#router-id 3.3.3
R3(config-if)#ipv6 ospf ?
<165535>
Process ID
R3(config-if)#ipv6 ospf 1 area
%OSPFv3-5-ADJCHG: Process 5, N
R1#show ipv6 ospf neighbor
Neighbor ID
3.3.3.3
Pri
1
State
FULL/
to our config.
R2:
ipv6 unicast-routing
interface Serial0/1
no ip address
ipv6 address 2001:1111:2222:2
ipv6 ospf 1 area 23
ipv6 router ospf 1
router-id 2.2.2.2
R3:
ipv6 router ospf 1
router-id 2.2.2.2
interface Serial1/3
no ip address
ipv6 address 2001:1111:2222:2
ipv6 ospf 1 area 23
clock rate 56000
Pri
1
1
State
De
FULL/ - 00
FULL/ - 00
R1(config)#int s0/1
R1(config-if)#ipv6 ospf helloR1#show ipv6 ospf neigh
*Aug 5 07:17:24.504: %OSPFv3-5
R1(config)#int s0/1
R1(config-if)#no ipv6 ospf hel
%OSPFv3-5-ADJCHG: Process 5, N
metric
metric-type
route-map
<cr>
OSPF default me
OSPF metric typ
Route-map refer
Area BACKBONE(0)
Number of interfaces in thi
SPF algorithm executed 10 t
Number of LSA 7. Checksum S
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
Area 23
Number of interfaces in thi
SPF algorithm executed 9 ti
Number of LSA 8. Checksum S
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
network)
The show ip ospf interface
command thankfully carried
over, and this command gives
you a treasure trove of tshooting and verification info.
Etc.
section!
Mastering Binary
Math and
Subnetting
I want to make sure everyones
covered on this vital subject, so
youll find this info in both my
ICND1 and ICND2 books. If you
worked with my ICND1 book,
work with this info again its
that important and you need as
much practice as you can get
for your big day!
Converting Binary To
Dotted Decimal
Its easy to overlook the
importance of this section, or
just to say, Hey, I know how to
do that, Im going to the next
section.
Dont do that.
Success in networking is all
about mastering the
fundamentals, and thats true
more of subnetting than any
other single feature on the
CCENT and CCNA exams.
When you master the
128 64 32 16 8 4 2 1
1st
2nd
3rd
4th
Just plug the binary values
under the 128, 64, etc., add em
up, and youre gold!
Filling it in from left to right,
heres the first octet conversion.
1st
128 64 32 16 8 4 2 1
0
1 1 0 0 0 1 0
128 64 32 16 8 4 2
1st
0
Octet:
0 0 1
2nd
0
Octet:
1 1 0
3rd
1 1 0
Octet:
4th
0
Octet:
0 1 0
Binary-To-Decimal Practice
Questions
Convert each binary string to
dotted decimal.
The string: 11110000 00110101
00110011 11111110
128 64 32 16 8 4 2 1
1st 0
2nd 0
0 0 0 0
0 0 0 0
3rd 0
4th 1
0 0 0 0
1 1 1 1
Answer: 240.53.51.254.
The string: 00001111 01101111
00011100 00110001
1st
128 64 32 16 8 4 2 1
0
0 0 0 1 1 1 1
2nd 0
3rd 0
1 1 1 1
1 1 0 0
4th 0
0 0 0 1
Answer: 15.111.28.49.
The string: 11100010 00000001
11001010 01110110
1st
128 64 32 16 8 4 2 1
1
1 1 0 0 0 1 0
2nd 0
3rd 1
0 0 0 1
1 0 1 0
4th 0
0 1 1 0
Answer: 226.1.202.118.
The string: 01010101 11111101
11110010 00010101
1st
128 64 32 16 8 4 2 1
0
1 0 1 0 1 0 1
2nd 1
3rd 1
1 1 0 1
0 0 1 0
4th 0
0 1 0 1
Answer: 85.253.242.21.
The string: 00000010 11111001
00110111 00111111
128 64 32 16 8 4 2 1
1st 1
1 0 0 1
2nd 0
3rd 0
1 1 1 1
1 1 1 1
4th 1
1 1 1 0
Answer: 2.249.55.63.
The string: 11001001 01011111
01111111 11111110
1st
128 64 32 16 8 4 2 1
0
0 0 0 0 0 0 0
2nd 0
3rd 0
0 0 0 0
0 0 0 0
4th 1
1 1 1 1
Answer: 201.95.127.254
The string: 11111000 00000111
11111001 01100110
1st
128 64 32 16 8 4 2 1
1
1 1 1 1 0 0 0
2nd 0
3rd 1
0 1 1 1
1 0 0 1
4th 0
0 1 1 0
Answer: 248.7.249.102.
The string: 00111110 11111111
01011010 01111110
1st
128 64 32 16 8 4 2 1
0
0 1 1 1 1 1 0
2nd 1
3rd 0
1 1 1 1
1 0 1 0
4th 0
1 1 1 0
Answer: 62.255.90.126.
The string: 11001101 11110000
00001111 10111111
128 64 32 16 8 4 2 1
1st 1
1 1 0 1
2nd 1
3rd 0
0 0 0 0
1 1 1 1
4th 1
1 1 1 1
Answer: 205.240.15.191
The string: 10011001 11110000
01111111 00100101
1st
128 64 32 16 8 4 2 1
1
0 0 1 1 0 0 1
2nd 1
3rd 0
0 0 0 0
1 1 1 1
4th 0
0 1 0 1
Answer: 153.240.127.37
The string: 11011111 01110110
11000011 00111111
1st
128 64 32 16 8 4 2 1
1
1 0 1 1 1 1 1
2nd 0
3rd 1
0 1 1 0
0 0 1 1
4th 0
1 1 1 1
Answer: 223.118.195.63.
The string: 00000100 00000111
00001111 00000001
1st
128 64 32 16 8 4 2 1
0
0 0 0 0 1 0 0
2nd 0
3rd 0
0 1 1 1
1 1 1 1
4th 0
0 0 0 1
Answer: 4.7.15.1.
The string: 11000000 00000011
11011011 00100101
128 64 32 16 8 4 2 1
1st 1
0 0 0 0
2nd 0
3rd 1
0 0 1 1
1 0 1 1
4th 0
0 1 0 1
Answer: 192.3.219.37.
The string: 10000000 01111111
00110011 10000011
1st
128 64 32 16 8 4 2 1
1
0 0 0 0 0 0 0
2nd 0
3rd 0
1 1 1 1
0 0 1 1
4th 1
0 0 1 1
Answer: 128.127.51.131
The string: 11111011 11110111
11111100 11111000
1st
128 64 32 16 8 4 2 1
1
1 1 1 1 0 1 1
2nd 1
3rd 1
0 1 1 1
1 1 0 0
4th 1
1 0 0 0
Answer: 251.247.252.248.
Great work!
Before we move on, let me
share a bonus exam prep tip
with you.
The only thing you need to
practice this skill is a piece of
paper and something to write
with, and you dont need to
practice for consecutive hours.
When you have 10 minutes to
yourself at work or home,
spend that time jotting down
strings of 1s and 0s and then
converting them to binary. That
little bit of time spent practicing
REALLY adds up in the end!
Converting Decimal To
Binary
Second verse, not quite the
same as the first.
Were pretty much doing the
same thing that we did in the
first section, just in reverse.
Makes sense, right? Well, it will
once we go through some
examples. This is definitely one
of those skills that seems
REALLY complicated when you
read about it, but when you do
it, you realize how easy it is!
217 1
217 1
decimal 217.
128 64 32 16 8 4 2
217 1
1 0 1 1 0 0
Converting Decimal To
Binary Questions
The address: 100.10.1.200
128
100 0
10 0
1
0
200 1
64
1
0
0
1
32
1
0
0
0
16
0
0
0
0
8
0
1
0
1
4
1
0
0
0
2
0
1
0
0
64
0
0
1
0
32
1
0
0
0
16
1
0
1
1
8
1
0
1
0
4
1
1
0
1
2
1
0
0
1
10
128 64 32 16 8 4 2
0
0 0 0 1 0 1
255 1
18 0
244 1
1
0
1
1
0
1
1
1
1
1 1 1
0 0 1
0 1 0
64
1
0
0
1
32
1
0
0
1
16
1
1
1
0
8
0
0
0
1
4
0
0
1
1
2
0
0
1
1
64
1
0
0
1
32
0
1
1
0
16
1
0
0
1
8
1
0
0
0
4
0
0
1
1
2
0
1
1
1
64
0
1
0
1
32
0
1
1
0
16
1
1
1
0
8
0
0
0
0
4
1
1
1
1
2
0
0
1
0
3
0
148 1
245 1
0
0
1
0
0
1
0
1
1
0 0 1
0 1 0
0 1 0
64
0
1
1
1
32
0
0
0
1
16
0
0
0
1
8
1
1
0
1
4
1
1
1
0
2
1
0
1
1
64
0
1
0
0
32
0
0
0
1
16
0
1
1
0
8
0
0
0
1
4
1
0
0
1
2
1
0
1
1
64
1
1
1
0
32
1
0
0
1
16
1
0
0
0
8
1
1
0
1
4
0
0
0
0
2
0
1
0
1
50
5
55
0
0
0
0
0
0
1
0
1
1
0
1
0 0 1
0 1 0
0 1 1
64
0
1
0
1
32
0
0
1
0
16
1
0
0
0
8
0
1
1
0
4
0
0
1
0
2
1
0
0
1
64
0
1
1
1
32
1
1
0
0
16
0
1
0
0
8
1
1
0
1
4
0
0
1
1
2
1
1
1
1
64
0
1
1
1
32
1
1
0
1
16
0
0
1
0
8
1
1
1
0
4
0
1
1
0
2
1
0
0
0
9
0
34 0
238 1
0
0
1
0
1
1
0
0
0
1 0 0
0 0 1
1 1 1
64
1
1
1
0
32
1
0
0
0
16
1
0
0
1
8
0
1
0
1
4
0
1
1
1
2
1
1
0
1
Class B
1st
1126
128191
Octet
Range
Network
255.0.0.0 255.255.0.
Mask
# of
Network 8
16
Bits
# of
Host
Bits
24
16
2nd
Octet
Octet
3rd
Oc
Class
A
11111111 00000000 000
NW
Mask
SN
11111111 11110000 000
Mask
20.0.0.0 255.192.0.0
130.30.0.0 255.255.224.0
128.10.0.0 /19
99.0.0.0 /17
222.10.8.0 /28
20.0.0.0 255.254.0.0
210.17.90.0 /29
130.45.0.0 /26
200.1.1.0 /26
45.0.0.0 255.240.0.0
222.33.44.0 255.255.255.248
23.0.0.0 255.255.224.0
NW
11111111 00000000 00
Mask
SN
11111111 11111000 00
Mask
222.10.1.0 /30
Class C, 24 network bits. 30
24 = 6, 2 to the 6th power = 64
valid subnets.
NW
11111111 11111111 111
Mask
SN
11111111 11111111 111
Mask
145.45.0.0 /25
Class B, 16 network bits. 25
16 = 9, 2 to the 9th power =
512 valid subnets.
NW
11111111 11111111 00
Mask
SN
11111111 11111111 11
Mask
20.0.0.0 255.192.0.0
Class A, 8 network bits. Subnet
mask converts to /10 in prefix
notation. 10 8 = 2, 2 to the
NW
11111111 00000000 00
Mask
SN
11111111 11000000 00
Mask
130.30.0.0 255.255.224.0
Class B, 16 network bits.
Subnet mask converts to /19 in
prefix notation. 19 16 = 3, 2
to the 3rd power = 8 valid
subnets.
NW 11111111 11111111 00
Mask
SN
11111111 11111111 11
Mask
128.10.0.0 /19
Class B, 16 network bits. 19
16 = 3, 2 to the 3rd power = 8
valid subnets.
NW
11111111 11111111 00
Mask
SN
11111111 11111111 11
Mask
99.0.0.0 /17
Class A, 8 network bits. 17 8
= 9. 2 to the 9th power = 512
valid subnets.
NW
11111111 00000000
Mask
SN
11111111 11111111
Mask
222.10.8.0 /28
Class C, 24 subnet bits. 28 24
= 4. 2 to the 4th power = 16
valid subnets.
NW
11111111 11111111 111
Mask
SN
11111111 11111111 111
Mask
20.0.0.0 255.254.0.0
Class A, 8 network bits. Mask
converts to /15 in prefix
notation. 15 8 = 7. 2 to the
7th power = 128 valid subnets.
NW
11111111 00000000 0
Mask
SN
11111111 11111110 0
Mask
210.17.90.0 /29
Class C, 24 network bits. 29
24 = 5. 2 to the 5th power = 32
valid subnets.
NW
11111111 111111111 11
Mask
SN
11111111 11111111
Mask
130.45.0.0 /26
11
NW
11111111 11111111 00
Mask
SN
11111111 11111111 11
Mask
200.1.1.0 /26
Class C, 24 network bits. 26
24 = 2. 2 to the 2nd power = 4
valid subnets.
45.0.0.0 255.240.0.0
Class A, 8 network bits. SN
mask converts to /12 in prefix
notation. 12 8 = 4. 2 to the
4th power = 16 valid subnets.
NW
11111111 00000000 00
Mask
SN
222.33.44.0 255.255.255.248
Class C, 24 network bits. SN
mask converts to /29 in prefix
notation. 29 24 = 5. 2 to the
5th power = 32 valid subnets.
NW
11111111 11111111 111
Mask
SN
11111111 11111111 111
Mask
23.0.0.0 255.255.224.0
Class A, 8 network bits. SN
mask converts to /19. 19 8 =
11. 2 to the 11th power = 2048
valid subnets.
NW
11111111 00000000
Mask
SN
11111111 11111111
Mask
following subnets:
220.11.10.0 /26
129.15.0.0 /21
222.22.2.0 / 30
212.10.3.0 /28
14.0.0.0 /20
221.10.78.0 255.255.255.224
143.34.0.0 255.255.255.192
128.12.0.0 255.255.255.240
125.0.0.0 /24
221.10.89.0 255.255.25.248
134.45.0.0 /22
The answers.
220.11.10.0 /26
Nothing to this. Subtract the
length of the subnet mask from
32 and you have your number
of host bits. In this case, thats
6, and 2 to the 6th power is 64.
Subtract 2 and you have 62
valid host addresses.
129.15.0.0 /21
Subtract the mask length from
32. That gives us 11.
2 to the 11th power equals
128.12.0.0 255.255.255.240
This mask converts to /28. 32
28 = 4.
2 to the 4th power is 16.
Subtract 2 from that, and 14
valid host addresses remain.
125.0.0.0 /24
32 24 = 8. 2 to the 8th power
is 256. Subtract 2 from that,
and 254 valid host addresses
remain.
221.10.89.0 255.255.255.248
troubleshooting production
networks and labs. Youd be
surprised how many issues pop
up just because an admin
thought a host was on Subnet
A and the host was actually on
Subnet B!
Lets tackle an example:
On what subnet is the IP
address 10.17.2.14
255.255.192.0 found?
24.194.34.12 /10
190.17.69.175
111.11.126.5 255.255.128.0
210.12.23.45 255.255.255.248
222.22.11.199 /28
111.9.100.7 /17
122.240.19.23 /10
184.25.245.89 /20
99.140.23.140 /10
10.191.1.1 /10
222.17.32.244 /28
24.194.34.12 /10
24.194.34.12 = 000110001100001
190.17.69.175 /22
111.11.126.5 255.255.128.0
210.12.23.45 255.255.255.248
222.22.11.199 /28
111.9.100.7 /17
122.240.19.23 /10
184.25.245.89 /20
99.140.23.143 /10
10.191.1.1 /10
222.17.32.244 /28
Onward!
Determining Broadcast
Addresses & Valid IP
Address Ranges For A Given
Subnet
(With The Same Quick
Operation!)
The operation we perform in
this section will answer two
different questions.
Need to determine the
broadcast address for a subnet?
Got you covered.
Need to determine the valid
Octet 1
Octet
210.210.210.0 11010010 1101
/25
11111111 1111
There are three basic rules to
remember when determining
the subnet address, broadcast
address, and range of valid
addresses once youve
identified the host bits and
these rules answer three
different questions.
1. The address with all 0s for
host bits is the subnet
address, also referred to
as the all-zeroes
address. This is not a valid
host address.
2. The address with all 1s for
host bits is the broadcast
address, also referred to
as the all-ones address.
This is not a valid host
address.
3. All addresses between the
all-zeroes and all-ones
addresses are valid host
addresses.
The all-zeroes address is
Octet 1
Octet 2
150.10.64.0 11010010 000010
/18
11111111 111111
What is the broadcast address
of the subnet 150.10.64.0 /18?
You dont have to write out the
mask on exam day if you dont
want to. Im including it here so
you see exactly what were
doing.
If all the host bits (bolded) are
zeroes, the address is
150.10.64.0, the subnet
Octet 1
Oc
222.23.48.64
11011110 00
255.255.255.192 11111111 11
140.10.10.0 /23
Octet 1
Octet 2
140.10.10.0 10001100 000010
/23
11111111 111111
10.200.0.0 /17
Octet 1
Octet 2
10.200.0.0 00001010 1100100
/17
11111111 1111111
198.27.35.128 /27
Octet 1
Octet
198.27.35.128 11000110 0001
/27
11111111 1111
132.12.224.0 /27
Octet 1
Octet
132.12.224.0 10000100 00001
/27
11111111 11111
211.18.39.16 /28
Octet 1
Octet
211.18.39.16 11010011 00010
/28
11111111 11111
10.1.2.20 /30
Octet 1
Octet 2
10.1.2.20 00001010 00000001
/30
11111111 11111111
144.45.24.0 /21
Octet 1
Octet 2
144.45.24.0 10010000 001011
/21
11111111 111111
10.10.128.0 255.255.192.0
Octet 1
Octe
10.10.128.0
00001010 0000
255.255.192.0 11111111 1111
221.18.248.224 /28
Octet 1
Oct
221.18.248.224 11011101 000
/28
11111111 111
123.1.0.0 /17
Octet 1
Octet 2
123.1.0.0 01111011 00000001
/17
11111111 11111111
203.12.17.32 /27
Octet 1
Octet
203.12.17.32 11001011 00001
/27
11111111 11111
2nd
3rd
NW
11111111 11111111
Bits
Host
Bits
(2 raised to the
power of the
number of subnet
bits)
The number of valid hosts =
(2 raised to the
power of the
number of host bits)
2
The key to this question is to
come up with the minimum
number of bits youll need for
the required number of
subnets, and make sure the
NW
11111111 11111111
Bits
SN
111
Bits
Host
Bits
This mask leaves eight host
bits, which would result in 254
hosts. This violates the
requirement that we have no
more than 150 hosts per
subnet.
What happens if you borrow
one more host bit for
subnetting, giving you 9 subnet
bits and 7 host bits?
9 Subnet Bits: 2 x 2 x 2 x 2 x 2
x 2 x 2 x 2 x 2 = 512
7 Host Bits: 2 x 2 x 2 x 2 x 2 x
2 x 2 = 128 2 = 126
This gives you 510 subnets and
126 hosts, meeting both
requirements.
The great thing about this
question type is that it plays to
your strengths. You already
know how to work with subnet
bits and host bits. What you
must watch out for are answers
that meet one requirement but
do not meet the other.
Lets walk through another
example:
NW
11111111 11111111 111
Bits
SN
Bits
Host
Bits
2nd
3rd
NW
11111111 11111111 111
Bits
SN
Bits
Host
Bits
NW
11111111 11111111
Bits
SN
Bits
Host
000
Bits
NW
11111111 11111111
Bits
SN
111
Bits
Host
Bits
NW
11111111 11111111 111
Bits
SN
Bits
Host
Bits
Four subnet bits would give you
1st Octet
NW
11111111 11111111 111
Bits
SN
Bits
Host
000
Bits
NW
11111111 11111111
Bits
SN
Bits
Host
000
Bits
For 500 subnets, a minimum of
nine subnet bits will be needed
(2 to the 9th power is 512).
That would leave 7 host bits.
Does this meet the second
requirement?
No. 2 to the 7th power is 128.
NW
11111111 11111111
Bits
SN
111
Bits
Host
Bits
NW
11111111 11111111 111
Bits
SN
Bits
Host
Bits
For a minimum of 10 subnets,
at least four subnet bits would
be needed
(2 to the 4th power = 16). This
would leave four host bits.
Does this meet the second
NW
11111111 11111111 111
Bits
SN
Bits
Host
Bits
NW
Bits 11111111
SN
Bits
Host
Bits
00000000 000
SN
Bits
Host
Bits
11111111
000
NW
11111111 11111111
Bits
SN
Bits
Host
000
Bits
NW
11111111 11111111
Bits
SN
111
Bits
Host
Bits
The proper mask is
255.255.254.0.
Octet
2nd
3rd
Octet
Octe
NW
11111111 11111111
Bits
SN
111
Bits
Host
Bits
Time for our final exam! Lets
get right to it in the very
next section!
Finals!
Lets put it all together for one
big final exam! Well sharpen
our skills for exam success on
these questions, and theyre
presented in the same order in
which they appeared in this
book. If youre a little hesitant
on how to answer any of these
questions, be sure to go back
and get more practice!
Lets get started!
Converting Binary To Dotted
Decimal
Answer: 85.226.106.74
Answer: 240.15.127.128.
Answer: 205.3.242.37.
Answer: 50.35.243.39.
Answer: 135.63.95.50
Converting Dotted Decimal
Addresses To Binary Strings
28 = 4.
To then determine the number
of host addresses, bring 2 to
that results power and subtract
2. 2 to the 4th power = 16, 16
2 = 14 valid host addresses.
How many valid host addresses
exist on the 211.12.45.0 /30
subnet?
Subtract the subnet mask
length from 32. 32 30 = 2
host bits.
Bring 2 to that results power
and subtract 2. 2 to the 2nd
0000
000
10110010
001
address 203.23.189.205
255.255.255.240 be found?
Write out the address in binary
and stop at the 28-bit mark,
then convert those 28 bits back
to decimal. Done!
1st 28 bits = 11001011
00010
to decimal.
00110001
11010010
01010011
101
0110
Determining Broadcast
Addresses and Valid IP Address
Ranges
For each of the following,
100.100.45.32 /28
All-Ones Broadcast Address:
100.100.45.47 /28
Valid IP Addresses:
100.100.45.33 46 /28
The subnet: 208.72.109.8 /29
208.72.109.15 /29
Valid IP Addresses:
208.72.109.9 208.72.109.14
/29
The subnet: 190.89.192.0
255.255.240.0
101.45.210.55 /30
Valid IP Addresses:
101.45.210.53, 101.45.210.54
/30
The subnet 90.34.128.0 /18
Congratulations! Youve
completed this final exam. If
you had any difficulty with the
final section, please review
Section Eight. If you nailed all
five of the final questions
great work!
To wrap things up, lets hit
Variable Length Subnet
Masking!
How To Develop A
VLSM Scheme
In the networks weve been
working with in the binary and
subnetting section, weve cut
our IP address space pie into
nice, neat slices of the same
size.
We dont always want to do
that, though. If we have a
point-to-point network, why
assign a subnet number to that
NW E: 3 hosts
Well need to use the formula
for determining how valid host
addresses are yielded by a
given number of host bits:
(2 to the nth power) 2,
with n representing the
number of host bits
To create our VLSM scheme,
well ask this simple question
over and over:
What is the smallest subnet
that can be created with all
host bits set to zero?
11010
11111
00
00
Network:
NW A
N
2
11
set to one.
Network Number = 11010010
00
00
Network:
NW A
NW B
N
2
2
210.49.29.48 in binary:
11010
11111
11010010
00
Network:
NW A
NW B
NW C
11010
11111
210.49.29.64 255.255.255.248,
or
210.49.29.64 /29. Calculate the
network number and broadcast
address as before, and bring
the VLSM table up to date.
Network Number = 11010010
001
001
Network:
NW A
NW B
NW C
NW D
111111
001
00
Network:
NW A
NW B
NW C
NW D
NW E
N
2
2
2
2
2
Chris Bryant
The Computer Certification
Bulldog
PS Use these resources to
advance on the path to exam
success!
Website:
http://www.thebryantadvantage.
YouTube:
http://www.youtube.com/user/cc
Blog:
http://thebryantadvantage.blogs