Dasar Router TI PDF
Dasar Router TI PDF
MODUL PERKULIAHAN
Basic Router
Introduction Router
01
Ilmu Komputer Program 15006 Tim Dosen
Studi Teknik
Informatika
Abstract Kompetensi
Memperlajari Introduction Routing Memahami Konsep Routing Protocol
Protocol
Introducing Routing
Objektif
Identify a router as a computer with an OS and hardware designed for the routing
process.
Demonstrate the ability to configure devices and apply addresses.
Describe the structure of a routing table.
Describe how a router determines a path and switches packets
Router Sebagai Komputer:
Describe the basic purpose of a router, -Computers that specialize in sending packets
over the data network. They are responsible for interconnecting networks by
selecting the best path for a packet to travel and forwarding packets to their
destination
Routers examine a packet’s destination IP address and determine the best path by
enlisting the aid of a routing table
Interfaces - There exist multiple physical interfaces that are used to connect
network. Examples of interface types: -Ethernet / fast Ethernet
interfaces,-Serial interfaces,-Management interfaces,Komponen Router
Execute bootstrap loader: Locate & load Cisco IOS software, Locate IOS, Load IOS,Locate
& load startup configuration file or enter setup mode, -Bootstrap program looks for
configuration file
-The show version command is used to view information about the router during the bootup
process. Information includes: Platform model number, Image name & IOS version,
Bootstrap version stored in ROM, Image file name & where it was loaded from, Number &
type of interfaces, Amount of NVRAM, Amount of flash, Configuration register
LAN Interfaces:Are used to connect router to LAN network, Has a layer 2 MAC address,
Can be assigned a Layer 3 IP address, Usually consist of an RJ-45 jack
WAN Interfaces: Are used to connect routers to external networks that interconnect LANs.,
Depending on the WAN technology, a layer 2 address may be used., Uses a layer 3 IP
address
Routers use destination IP address to forward packets: The path a packet takes is determined
after a router consults information in the routing table., After router determines the best path,
Packet is encapsulated into a frame, Frame is then placed on network medium in form of Bits
Routers Operate at Layers 1, 2 & 3: Router receives a stream of encoded bits, Bits are
decoded and passed to layer 2, Router de-encapsulates the frame, Remaining packet passed
up to layer 3
-Routing decision made at this layer by examining destination IP address: Packet is then re-
encapsulated & sent out outbound interface
-Interface configurations - Specify interface type, IP address and subnet mask. Describe
purpose of interface. Issue no shutdown command. If DCE serial interface issue clock rate
command.
After entering in the basic configuration the following tasks should be completed
-Save the basic router configuration by Issuing the copy running-config startup-config
command
-Additional commands that will enable you to further verify router configuration are:
-Router interfaces
In order for static and dynamic routes to exist in routing table you must
have directly connected networks
-Includes: network address and subnet mask and IP address of next hop router or exit
interface, -Denoted with the code S in the routing table, -Routing tables must contain directly
connected networks used to connect remote networks before static or dynamic routing can be
used,
When to use static routes: -When network only consists of a few routers, -Network is
connected to internet only through one ISP, -Hub & spoke topology is used on a large
network
Dynamic routing protocols: -Used to add remote networks to a routing table, -Are
used to discover networks, -Are used to update and maintain routing tables,
Automatic network discovery, -Routers are able discover new networks by sharing
routing table information, Maintaining routing tables
-Dynamic routing protocols are used to share routing information with other router & to
maintain and up date their own routing table.
Every router makes its decisions alone, based on the information it has
in its routing table., Different routing table may contain different
information, A routing table can tell how to get to a destination but
not how to get back
-Packets are forwarded through the network from one router to another, on a hop by hop
basis., -Packets can take path “X” to a destination but return via path “Y” (Asymmetric
routing).
Internet Protocol (IP) packet format contains fields that provide information about the
packet and the sending and receiving hosts, Fields that are importance for CCNA
students:-Destination IP address-Source IP address-Version & TTL-IP header length-
Precedence & type of service-Packet length
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Routing Protocols
02
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
Memperlajari Routing Protocol Memahami cara kerja routing protocol
algorithm
[Type text]
Routing Protocol
Objectives
Describe the directly connected networks, different router interfaces Examine directly
connected networks in the routing table and use the CDP protocol
Introducing the Topology, 3 1800 series routers connected via WAN links Each router
connected to a LAN represented by a switch and a PC
Connections of a Router for WAN , -A router has a DB-60 port that can
support 5 different cabling standards, Connections of a Router for Ethernet-2
types of connectors can be used: Straight through and Cross-over .
-Show IP router command – used to view routing table,-Show Interfaces command – used to
show status of an interface, -Show IP Interface brief command – used to show a portion of
the interface information, -Show running-config command – used to show configuration file
in RAM
-By default all serial and Ethernet interfaces are down -To enable an interface use the No
Shutdown command
-Show interfaces for fastEthernet 0/0 – command used to showstatus of fast Ethernet port
-Enter interface configuration mode,-Enter in the ip address and subnet mask,-Enter in the no
shutdown commandExample:
-R1(config-if)#no shutdown
-Physically connecting a WAN Interface. -A WAN Physical Layer connection has sides:
One side of a serial connection must be considered a DCE,This requires placing a clocking
signal – use the clock rate command.Example:
-R1(config-if)#clockrate 64000
Serial Interfaces require a clock signal to control the timing of the communcations.
Allows you to view changes that the router performs when adding or removing
routesExample:
-R2#debug ip routing
Example:
-R2(config-if)#no shutdown
When a router only has its interfaces configured & no other routing protocols are
configured then:-The routing table contains only the directly connected networks,-
Only devices on the directly connected networks are reachable
Checking each route in turn, The ping command is used to check end to end
connectivity
Purpose of CDP
A layer 2 cisco proprietary tool used to gather information about other directly connected
Cisco devices. Concept of neighbors-2 types of neighbors,Layer 3 neighborsLayer 2
neighbors
IP route command
Example:
Principle 1: "Every router makes its decision alone, based on the information
it has in its own routing table.“
Principle 2: "The fact that one router has certain information in its routing
table does not mean that other routers have the same information.“
Using Zinin’s 3 routing principles, how would you answer the following?-Would
packets from PC1 reach their destination?Yes, packets destined for 172.16.1.0/24 and
192.168.1.0/24 networks would reach their destination.-Does this mean that any
packets from these networks destined for 172.16.3.0/24 network will reach their
-Recursive route lookup - Occurs when the router has to perform multiple lookups in the
routing table before forwarding a packet. A static route that forwards all packets to the next-
hop IP address goes through the following process (reclusive route lookup)The router first
must match static route’s destination IP address with the Next hop addressThe next hop
address is then matched to an exit interface
-Static routes configured with an exit interface are more efficient because the routing
– The routing table can resolve the exit interface in a single search instead of 2
searches
Existing static routes cannot be modified. The old static route must be deleted
by placing no in front of the ip route
Example:
-Use the following commandsStep 1 show running-config Step 2 verify static route has been
entered correctly Step 3 show ip route Step 4 verify route was configured in routing table
Step 5 issue ping command to verify packets can reach destination and that Return path is
working
Step 1: Delete the current static route Step 2: Configure the summary static route
Step 3: Verify the new static route
This is a route that will match all packets. Stub routers that have a number of static
routes all exiting the same interface are good candidates for a default route. -Like
route summarization this will help reduce the size of the routing table
The routing table lookup process will use the most specific match when comparing
destination IP address and subnet mask
Since the subnet mask used on a default static route is 0.0.0.0 all packets will match.
The routing table lookup process will use the most specific match when comparing
destination IP address and subnet mask
Since the subnet mask used on a default static route is 0.0.0.0 all packets will match.
Packet forwarding with static routes. (recall Zinin’s 3 routing principles), Router 1
static route.
Packet forwarding with static routes. (recall Zinin’s 3 routing principles) Router 2
-Ping– tests end to end connectivity-Traceroute– used to discover all of the hops
(routers) along the path between 2 points-Show IP route– used to display routing table
& ascertain forwarding process-Show ip interface brief- used to show status of router
interfaces-Show cdp neighbors detail– used to gather configuration information about
directly connected neighbors
-If there is a problem with a mis-configured static route remove the static route then
reconfigure the new static route
Objektif
Identify a router as a computer with an OS and hardware designed for the routing
process.
Demonstrate the ability to configure devices and apply addresses.
Describe the structure of a routing table.
Describe how a router determines a path and switches packets
Router Sebagai Komputer:
Describe the basic purpose of a router, -Computers that specialize in sending packets
over the data network. They are responsible for interconnecting networks by
selecting the best path for a packet to travel and forwarding packets to their
destination
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
12 Dosen Pengampu http://www.mercubuana.ac.id
Routers examine a packet’s destination IP address and determine the best path by
enlisting the aid of a routing table
Interfaces - There exist multiple physical interfaces that are used to connect
network. Examples of interface types: -Ethernet / fast Ethernet
interfaces,-Serial interfaces,-Management interfaces,Komponen Router
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
13 Dosen Pengampu http://www.mercubuana.ac.id
Execute bootstrap loader: Locate & load Cisco IOS software, Locate IOS, Load IOS,Locate
& load startup configuration file or enter setup mode, -Bootstrap program looks for
configuration file
-The show version command is used to view information about the router during the bootup
process. Information includes: Platform model number, Image name & IOS version,
Bootstrap version stored in ROM, Image file name & where it was loaded from, Number &
type of interfaces, Amount of NVRAM, Amount of flash, Configuration register
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
14 Dosen Pengampu http://www.mercubuana.ac.id
LAN Interfaces:Are used to connect router to LAN network, Has a layer 2 MAC address,
Can be assigned a Layer 3 IP address, Usually consist of an RJ-45 jack
WAN Interfaces: Are used to connect routers to external networks that interconnect LANs.,
Depending on the WAN technology, a layer 2 address may be used., Uses a layer 3 IP
address
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
15 Dosen Pengampu http://www.mercubuana.ac.id
Routers use destination IP address to forward packets: The path a packet takes is determined
after a router consults information in the routing table., After router determines the best path,
Packet is encapsulated into a frame, Frame is then placed on network medium in form of Bits
Routers Operate at Layers 1, 2 & 3: Router receives a stream of encoded bits, Bits are
decoded and passed to layer 2, Router de-encapsulates the frame, Remaining packet passed
up to layer 3
-Routing decision made at this layer by examining destination IP address: Packet is then re-
encapsulated & sent out outbound interface
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
16 Dosen Pengampu http://www.mercubuana.ac.id
-Interface configurations - Specify interface type, IP address and subnet mask. Describe
purpose of interface. Issue no shutdown command. If DCE serial interface issue clock rate
command.
After entering in the basic configuration the following tasks should be completed
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
17 Dosen Pengampu http://www.mercubuana.ac.id
-Save the basic router configuration by Issuing the copy running-config startup-config
command
-Additional commands that will enable you to further verify router configuration are:
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
18 Dosen Pengampu http://www.mercubuana.ac.id
-Router interfaces
In order for static and dynamic routes to exist in routing table you must
have directly connected networks
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
19 Dosen Pengampu http://www.mercubuana.ac.id
-Includes: network address and subnet mask and IP address of next hop router or exit
interface, -Denoted with the code S in the routing table, -Routing tables must contain directly
connected networks used to connect remote networks before static or dynamic routing can be
used,
When to use static routes: -When network only consists of a few routers, -Network is
connected to internet only through one ISP, -Hub & spoke topology is used on a large
network
Dynamic routing protocols: -Used to add remote networks to a routing table, -Are
used to discover networks, -Are used to update and maintain routing tables,
Automatic network discovery, -Routers are able discover new networks by sharing
routing table information, Maintaining routing tables
-Dynamic routing protocols are used to share routing information with other router & to
maintain and up date their own routing table.
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
20 Dosen Pengampu http://www.mercubuana.ac.id
Every router makes its decisions alone, based on the information it has
in its routing table., Different routing table may contain different
information, A routing table can tell how to get to a destination but
not how to get back
-Packets are forwarded through the network from one router to another, on a hop by hop
basis., -Packets can take path “X” to a destination but return via path “Y” (Asymmetric
routing).
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
21 Dosen Pengampu http://www.mercubuana.ac.id
Internet Protocol (IP) packet format contains fields that provide information about the
packet and the sending and receiving hosts, Fields that are importance for CCNA
students:-Destination IP address-Source IP address-Version & TTL-IP header length-
Precedence & type of service-Packet length
Daftar Pustaka
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
22 Dosen Pengampu http://www.mercubuana.ac.id
MODUL PERKULIAHAN
Basic Router
Routing Dynamic Protocols
03
Disini diisi Program 15006 Andrew Fiade, MKom
Fakultas penerbit Studi Teknik
Modul Informatika
Abstract Kompetensi
Memperlajari Routing Dynamic Memahami cara kerja routing dynamic
Protocol algorithm protocol
Routing Dynamic Protocol
Objektif
Describe the role of dynamic routing protocols and place these protocols in the
context of modern network design.
Describe how metrics are used by routing protocols and identify the metric types used
by dynamic routing protocols.
Determine the administrative distance of a route and describe its importance in the
routing process.
Algorithm
In the case of a routing protocol algorithms are used for facilitating routing information and
best path determination
Routing protocol messages
These are messages for discovering neighbors and exchange of routing information
-RIP-IGRP-EIGRP-OSPF-IS-IS-BGP
-Interior Gateway Protocols (IGP)
-Used for routing inside an autonomous system & used to route within the individual
networks themselves.-Examples: RIP, EIGRP, OSPF
Distance vector: routes are advertised as vectors of distance & direction.incomplete view
of network topology.Generally, periodic updates.
Link state: complete view of network topology is created. updates are not, periodic.
Classful routing protocols: Do NOT send subnet mask in routing updates
Metric
A value used by a routing protocol to determine which routes are better than others.
The Metric Field in the Routing Table
-IGRP & EIGRP - Bandwidth (used by default), Delay (used by default), Load, Reliability
Load balancing
This is the ability of a router to distribute packets among multiple same cost paths
Purpose of a metric
Identifying the Administrative Distance (AD) in a routing table
Dynamic Routing Protocols
Have a default AD of 0
Static Routes
Dynamic routing protocols fulfill the following functions
-Classless routing protocols - these protocols include subnet mask in routing updates
-Classful routing protocols - these protocols do not include subnet mask in routing update
Metrics are used by dynamic routing protocols to calculate the best path to a
destination.
Daftar Pustaka
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
10 Tim Dosen http://www.mercubuana.ac.id
[1] Camera Mapping., http://www.blenderguru.com/videos/camera-mapping-tutorial-v2/
[2] Ebook, http://www.blenderguru.com
[3] Cisco CCNA Academy, http://www.cisco.com
MODUL PERKULIAHAN
Basic Router
Distance Vektor Protocols
04
Disini diisi Program 15006 Andrew Fiade, MKom
Fakultas penerbit Studi Teknik
Modul Informatika
Abstract Kompetensi
Memperlajari Routing Protocol Memahami cara kerja routing protocol
Distance Vektor Distance Vektor
Distance Vektor Routing Protocol
Objectives
Describe the network discovery process of distance vector routing protocols using
Routing Information Protocol (RIP).
Describe the processes to maintain accurate routing tables used by distance vector
routing protocols.
Identify the conditions leading to a routing loop and explain the implications for
router performance.
The Meaning of Distance Vector:A router using distance vector routing protocols knows 2
things:Distance to final destination, Vector, or direction, traffic should be directed
Routing Protocol Characteristics
-Initial network discovery : Directly connected networks are initially placed in routing
table
-Router checks update for new information
Periodic Updates: RIPv1 & RIPv2: These are time intervals in which a router sends
out its entire routing table.
RIP uses 4 timers: -Update timer -Invalid timer -Holddown timer -Flush timer
Triggered Updates
Random Jitter
Synchronized updates: A condition where multiple routers on multi access LAN segments
transmit routing updates at the same time.
Solution to problems with: synchronized updates, - Used of random variable called
RIP_JITTER
Routing loops are A condition in which a packet is continuously transmitted within a series
of routers without ever reaching its destination.
Routing loops may be caused by: -Incorrectly configured static routes -Incorrectly
configured route redistribution -Slow convergence -Incorrectly configured discard
routes
Routing loops can create the following issues -Excess use of bandwidth -CPU
resources may be strained -Network convergence is degraded -Routing updates may
be lost or not processed in a timely manner
Count to Infinity This is a routing loop whereby packets bounce infinitely around a
network.
Setting a maximum
Distance Vector routing protocols set a specified metric value to indicate infinity
Once a router “counts to infinity” it marks the route as unreachable
Preventing loops with holddown timers: -Holddown timers allow a router to not
accept any changes to a route for a specified period of time.
-Point of using holddown timers: Allows routing updates to propagate through network with
the most current information.
Split Horizon rule: A router should not advertise a network through the interface from
which the update came.
Split horizon with poison reverse The rule states that once arouter learns of an unreachable
routethrough an interface, advertise it as unreachable back through the same interface
IP & TTL
Purpose of the TTL field The TTL field is found in an IP header and is used to prevent
packets from endlessly traveling on a network
How the TTL field works -TTL field contains a numeric value The numeric value is
decreased by one by every router on the route to the destination.If numeric value reaches 0
then Packet is discarded.
Factors used to determine whether to use RIP or EIGRP include -Network size -
Compatibility between models of routers -Administrative knowledge
RIP
Features of RIP:-Supports split horizon & split horizon with poison reverse-
Capable of load balancing -Easy to configure-Works in a multi vendor router
environment
EIGRP
Features of EIGRP:
–
Periodic updates RIP routing updates include the entire routing table
Neighbors are defined as routers that share a link and are configured to use the
same protocol
–
Directly connected routes are placed in routing table 1st
•
If a routing protocol is configured then Routers will exchange routing
information
–
Convergence is reached when all network routers have the same network
information
– Slow convergence
– Routing updates may be lost or not processed
– A distance vector routing protocols that has some features of link state routing
protocols
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Routing Protocols RIP
05
Disini diisi Program 15006 Andrew Fiade, MKom
Fakultas penerbit Studi Teknik
Modul Informatika
Abstract Kompetensi
Memperlajari RIP algorithm Memahami cara kerja routing
information protocol
Routing Information Protocol
RIP (akronim, dibaca sebagai rip) termasuk dalam protokol distance-vector, sebuah
protokol yang sangat sederhana. Protokol distance-vector sering juga disebut protokol
Bellman-Ford, karena berasal dari algoritma perhitungan jarak terpendek oleh R.E.
Bellman, dan dideskripsikan dalam bentuk algoritma-terdistribusi pertama kali oleh
Ford dan Fulkerson.
Setiap router dengan protokol distance-vector ketika pertama kali dijalankan hanya
mengetahui cara routing ke dirinya sendiri (informasi lokal) dan tidak mengetahui
topologi jaringan tempatnya berada.
RIP tidak mengadopsi protokol distance-vector begitu saja, melainkan dengan melakukan
beberapa penambahan pada algoritmanya agar routing loop yang terjadi dapat diminimalkan
Split horizon digunakan RIP untuk meminimalkan efek bouncing. Prinsip yang
digunakan split horizon sederhana: jika node A menyampaikan datagram ke tujuan X
melalui node B, maka bagi B tidak masuk akal untuk mencapai tujuan X melalui A.
Jadi, A tidak perlu memberitahu B bahwa X dapat dicapai B melalui A.
RIP yang didefinisikan dalam RFC-1058 menggunakan metrik antara 1 dan 15,
sedangkan 16 dianggap sebagai tak-hingga. Route dengan distance-vector 16 tidak
dimasukkan ke dalam forwarding table.
Router harus menganggap setiap route yang diterima memiliki subnet yang sama
dengan subnet pada router itu. Dengan demikian, RIP tidak mendukung Variable
Length Subnet Masking (VLSM).
RIP versi 2 (RIP-2 atau RIPv2) berupaya untuk menghasilkan beberapa perbaikan
atas RIP, yaitu dukungan untuk VLSM, menggunakan otentikasi, memberikan
informasi hop berikut (next hop), dan multicast. Penambahan informasi subnet mask
pada setiap route membuat router tidak harus mengasumsikan bahwa route tersebut
memiliki subnet mask yang sama dengan subnet mask yang digunakan padanya.
RIP-2 juga menggunakan otentikasi agar dapat mengetahui informasi routing mana
yang dapat dipercaya. Otentikasi diperlukan pada protokol routing untuk membuat
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
3 Tim Dosen http://www.mercubuana.ac.id
protokol tersebut menjadi lebih aman. RIP-1 tidak menggunakan otentikasi sehingga
orang dapat memberikan informasi routing palsu. Informasi hop berikut pada RIP-2
digunakan oleh router untuk menginformasikan sebuah route tetapi untuk mencapai
route tersebut tidak melewati router yang memberi informasi, melainkan router yang
lain. Pemakaian hop berikut biasanya di perbatasan antar-AS.
RIP merupakan protokol routing yang sederhana, dan ini menjadi alasan mengapa RIP
paling banyak diimplementasikan dalam jaringan. Mengatur routing menggunakan
RIP tidak rumit dan memberikan hasil yang cukup dapat diterima, terlebih jika jarang
terjadi kegagalan link jaringan. Walaupun demikian, untuk jaringan yang besar dan
kompleks, RIP mungkin tidak cukup. Dalam kondisi demikian, penghitungan routing
dalam RIP sering membutuhkan waktu yang lama, dan menyebabkan terjadinya
routing loop. Untuk jaringan seperti ini, sebagian besar spesialis jaringan komputer
menggunakan protokol yang masuk dalam kelompok link-state
Pinhole Congestion
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
4 Tim Dosen http://www.mercubuana.ac.id
JIka dalam desain jaringan tersebut alternatif yang lebih baik melewati Router 0 dengan
Bandwidth 1 Mb, tetapi karena menggunakan RIP jalur tersebut terlihat Memiliki cost yang
sama.
Routing Loop
Tabel Routing
keluar.Router 2 mengirimkan update dari routing tabel dan router 0 menghentikan
routing ke network 5. tetapi router 1 dan 3 masih belum terupdate.Bagi router 1 dan 3
network 5 masih tersedia melalui router B dengan metric 3 (jumlah hop
count)Maslahnya ketika router 1 mengirimkan update dengan informasi netowrk 5
masih dapat dilalui melalui router 0.Router 0 dan 2 menerima informasi yang
menyenangkan bahwa network 5 dapat dicapai dari router A, maka router –router
akan mengirimkan informasi ke network lain bahwa network 5 masih tersedia melalui
router 1Setiap paket yang ditunjukan ke network 5 akan ditunjukan ke router 1.
kemudianke router 0 , dan karena router tabel di rotuer 0 terupdate dengan informasi
bahwa network 5 dapat dicapai melalui router 1, maka paket akan dikirimkan kembali
ke router 1.Inilah yang disebut dengan routing loop
Split Horizon:
Route Poisoning
Meracuni router
Holddowns
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
6 Tim Dosen http://www.mercubuana.ac.id
Mencegah route-route dari perubahan yang terlalu cepat dengan memberikan waktu
kepada route yang mati untuk hidup lagi atau agar network menjadi cukup stabil
sebelum router mengubah route yang gagal tadi menjadi route terbaik berikutnya
Jika sebuah update yang baru, tiba dari sebuah router tetangga dengan sebuah metric
yang lebih baik dari padaentri network yang asli, maka holdown akan dihapus dan
data akan dilewatkan
Tetapi jika sebuah update diterima dari rotuer tetangga sebelum holdown timer habis,
dan route memiliki metric yang sama atau yang lebih rendah dari sebelumnya,maka
holdown akan dibiarkan dan holdwon timer terus berjalan
Rip Timers
Holdown Timers
Router invalid timer: menentukan router menjadi tidak valid, 180 detik
Route Flush time: menset router menjadi tidak valid dan penghapusan dari tabel
routing, 240 detik.
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
8 Tim Dosen http://www.mercubuana.ac.id
Default Route and RIPv1
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
10 Tim Dosen http://www.mercubuana.ac.id
Administrative Distance
RIP header - divided into 3 fields
-Command field
-Version field
-Must be zero
-IP address
-Metric
Daftar Pustaka
[2] Ebook, http://www.blenderguru.com
[3] Cisco CCNA Academy, http://www.cisco.com
MODUL PERKULIAHAN
Basic Router
Cisco Discovery Protocol
06
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
Memperlajari Protocol Cisco Discovery Memahami Konsep Protocol dari Cisco
Protocol Discovery Protocol
[Type text]
Cisco Discovery Protocol
Cisco Discovery Protocol (CDP) adalah tool yang berguna untuk mengatasi incomplete
atau inaccurate network. CDP adalah media dan protocol independent, CDP hanya
menampilkan informasi tentang koneksi router tetangga terdekat.
CDP merupakan protocol yang terdapat hanya pada router atau switch merk cisco, yang
digunakan untuk melihat rangkuman informasi dari router tetangga.
1. CDP
CDP adalah protokol layer 2 yang terhubung ke medi fisik dan protokol layer network,
seperti yang ditunjukkan oleh gambar 1.1.
CDP digunakan untuk mendapatkan informasi tentang cisco tetangga, seperti informasi
tentang tipe device yang terhubung, interface yang terhubung, interface yang digunakan
untuk koneksi dan jumlah model device. CDP adalah media dan protokol yang
independen dan jalan di atas Subnetwork Access protocol (SNAP).
CDP versi 2 (CDPv2) adalah versi terbaru. Cisco IOS release 12.0(3)T atau yang lebih
baru menggunakan CDPv2, sedangkan CDPv1 defaultnya enable di Cisco IOS release
10.3 sampai 12.0(3)T.
Ketika cisco device boot up, CDP secara otomatis start dan device melakukan deteksi
terhadap device tetangga yang menggunakan CDP. CDP beroperasi pada data link
layer dan membiarkan sistem learn ke tetangganay, meskipun menggunakan protokol
layer berbeda.
Masing-masing device yang dikonfigurasi CDP mengirimkan pesan secara periodik yang
dikenal dengan advertisement ke device cisco yang terhubung langsung. Masing-
masing advertise paling sedikit satu address yang menerima pesan Network
Management Protocol (SNMP). Advertisement juga berisi time-to-live atau informasi
holdtime yang menentukan panjang waktu device menerima informasi CDP sebelum
discard informasi tersebut. Setiap device listen secara periodic pesan CDP yang dikirim
oleh device tetangga.
Untuk mengetahui informasi cisco yang terhubung langsung digunakan perintah show
cdp neighbors. Gambar 1.2 adalah contoh bagaimana CDP mengumpulkan informasi
tentang cisco yang terhubung langsung. CDP mengirimkan type length values (TLVs)
untuk memberikan informasi tentang masing-masing device CDP tetangga.
ID dari device
Interface local
Holdtime
Kapasitas
Platform
Port ID
Gambar 1.2 show cdp neighbors
Contoh
Mengaktifkan CDP
Menonaktifkan CDP
Menteng>enable
Menteng#config t
Menteng(config)#cdp run
Menteng(config-if)#cdp enable
Menteng(config-if)#exit
Menteng(config-if)#cdp enable
Menteng(config-if)#
Verifikasi
Device ID Local Intrfce Holdtme Capability Platform Port ID
Menteng#
Hasil CDP neighbors dapat disimpulkan router menteng mempunyai router tetangga
bernama router meruya, dimana router meruya mempunyai interface serial dengan
capabiliry R ( router ) jenis router 2621 dan yang aktif adalah interface serial 0/1
Selain itu router meruya terhubung dengan switch yang terhubung dengan router
Ethernet 0/1. diketahui jenis switch 1900, dan port id 6.
Menteng#sh cdp neighbors detail
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
Device ID: Meruya
Entry address(es):
IP Address: 10.1.1.1
Platform: cisco 2621, Capabilities: Router
Interface: Serial0/1, Port ID (outgoing port): Serial0/1
Holdtime : 146 sec
Version :
Router1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router1(config)#cdp run
Router1(config)#interface FastEthernet0/0
Router1(config‐if)#no cdp enable
Router1(config‐if)#end
Router1#
Router1#configure terminal
Router1(config)#end
Router1#
Menteng(config)#ip host LAN 192.168.0.1
Menteng(config)#end
Menteng#config t
Enter configuration commands, one per line. End with CNTL/Z
Menteng(config)#ip host Jaringan_luar 10.1.1.2
Menteng(config)#
Menteng#show host
Default domain is not set
Name/address lookup uses domain service
Name servers are 255.255.255.255
Host Flags Age Type Address(es)
Jaringan_luar (perm, OK) 0 IP 10.1.1.2
LAN (perm, OK) 0 IP 192.168.0.1
Menteng#
Menteng#reload in 10
Reload scheduled in 9 minutes
Menteng#
Membatalkan reload
Menteng#reload cancel
***
*** ‐‐‐ SHUTDOWN ABORTED ‐‐‐
***
Menteng#
ARP digunakan untuk mencatat informasi MAC Address terhadap setiap interface
yang terhubung oleh router
Menteng#sh ip arp
Menteng#
Menteng#show interfaces fastethernet 0/1
FastEthernet0/1 is up, line protocol is up
Hardware is AmdFE, address is 00b0.9dc1.9308 (bia 00b0.9dc1.9308)
Internet address is 192.168.10.1/27
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliablility 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10)
Full ‐duplex, 100Mb/s, 100BaseTX/FX
ARP type: ARPA, ARP Timeout 04:00:00
Menteng#
Cisco Discovery Protocol didukung oleh mikrotik, dan sistem operasi router lainnya.
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Network Address Translation
07
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
Memperlajari Konsep NAT dan PAT Memahami konsep NAT dan PAT dan
dalam jaringan implementasinya
[Type text]
NAT:
Inside local address – Merupakan IP Private dari alamat host dalam inside network
(network asal).
Inside global address – Merupakan IP Public dari alamat inside network.
Outside local address – IP Private host dari outside network (network tujuan)
Outside global Address- IP Public dari alamat network tujuan
Contoh NAT
NAT allows you to have more than your allocated number of IP addresses by using RFC 1918
address space with smaller mask.
However, because you have to use your Public IP addresses for the Internet, NAT still limits
the number of hosts you can have access the Internet at any one time (depending upon the
number of hosts in your public network mask.)
PAT (Port Address Translation) allows you to use a single Public IP address and
assign it up to 65,536 inside hosts (4,000 is more realistic).
PAT modifies the TCP/UDP source port to track inside Host addresses.
Tracks and translates SA, DA and SP (which uniquely identifies each connection) for
each stream of traffic.
NAT Dinamis, digunakan untuk pool ip address, kumpulan dari IP private dan keluar
internet menggunakan ip public.umumnya hal ini dapat overload ip, artinya ip private
sama dapat mengakses banyak ip public, seperti mengakses internet, 1 pc dapat
mengakses banyak url, untuk mengatasi itu menggunakan PAT (Port Address
Translation) , dimana junlah port terdapat 65.536
Group dari Port number 0-511, 512-1023, or 1024-65535, umumnya default port dari
semua protocol 0-1023 , dan 1024 sampai 65535 bebas.
Dapat anda perhatikan IP 10.0.0.2 ingin mengakses internet menggunakan port 1331
ini untuk mengenali IP Router dalam memberikan balasan dari luar ( internet ) akan
diteruskan ke IP private yang mana, kadang juga masih dalam satu IP 10.0.0.2
namun berbeda browser, contoh ip yang sama mengakses google dan mail
yahoo.com
Demonstrasi dengan Packet Tracert
Contoh Konfigurasi NAT
Router(config)#access‐list 15 permit 192.168.1.0 0.0.0.255
Router(config‐if)#ip nat inside source list 15 interface serial 0/1/0 overload
Router(config)#interface fastEthernet 0/0
Router(config‐if)#ip nat inside
Router(config‐if)#
Awalnya client akan membroadcast server dari DHCP dengan alamat FF:FF:FF:FF:FF:FF , dalam packet
tersebut mencari juga alamat gateway dan mengirim pula alamat dari MAC Address client.
Server akan menerima packet client dan mencatat mac address client, kemudian memeriksa daftar
list alamat yang akan diberikan client, jika ada maka diberikan alamat ip , gateway , wins ,dns
tergantung dari konfigurasi yang dilakukan admin.
Dilihat dari gambar client akan mengirim protocol UDP dengan port 67 dan Server akan membalas
dengan protocol yang sama dengan port 68
Sebelum adanya DHCP yang protocol yang sama persis adalah BOOTP, BOOTP biasa digunakan untuk
workstation diskless ( jaringan menggunakan disket ), bootp hanya mendukng 4 parameter yaitu :
IP Address
Alamat Gateway
Subet Mask
DNS Server
DHCP sendiri selain 4 parameter tersebut, kelebihannya adalah dapat memberikan batas waktu bagi
client, dan memberikan WINS dan nama domain.
Proses Lebih Detail
Penjelasan dari gambar diatas, client akan mengirimkan pesan broadcast ke semua
jaringan pesan ini disebut DHCPDISCOVER, Server akan menerima pesan tersebut
serta informasi dari client, server tidak langsung menerima client tapi akan
mengirimkan dahulu DHCPOFFER , karena client mengirimkan pesan keseluruh
jaringan, dapat dimungkinkan server DHCP dapat lebih dari dua. DHCPOFFER
berisikan tentang IP Address, gateway,subnetmask, lease time, dns, wins
Umumnya client menerima DHCPOFFER dari penawaran server yang pertama kali
masuk, maka client akan mengirimkan pesan secara unicast , pesan tersebut adalah
DHCPREQUEST, secara unicast pula server akan mengirim DHCPACK.
Jika ternyata client menerima ip dan telah digunakan oleh komputer lain maka client
akan mengirimkan DHCPDECLINE dan proses akan dimulai dari awal. Dapat juga
terjadi server mengirim DHCPNACK setelah menerima DHCPREQUEST dari client –
jika terjadi maka proses akan dimulai dari awal .
Proses DHCP
Contoh Konfigurasi DHCP Demonstrasi dengan Packet Tracert
Router(config‐if)#exit
Router(config)#ip dhcp pool Percobaan_DHCP
Router(dhcp‐config)#network 192.168.1.0 255.255.255.0
Router(dhcp‐config)#default‐router 192.168.1.1
Router(dhcp‐config)#dns‐server 10.1.1.1
Router(dhcp‐config)#exit
Router(config)#ip dhcp excluded‐address 192.168.1.1 192.168.1.5
Router(config)#
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Access List Cisco
09
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to configure access list in cisco How to configure access list in cisco
connected to linux and solaris connected to linux and solaris
[Type text]
Text Summary
Overview\
Access Control Lists (ACLs) can be used to selectively block IP traffic to provide a
rudimentary firewall. In this lab, you will be using Cisco extended IP access lists to secure
your network.
PART1 – PC Setup
Download and install NTP version 3 on your UNIX systems. Configure ntpd to use the R6
loopback0 port (192.168.66.6) as your time source. You can find the software at
http://www.eecis.udel.edu/~ntp/.
Download and install Sendmail version 8 on your UNIX systems. Configure so that you can
send e-mail between your two UNIX systems. You can find the latest software at
http://www.sendmail.org.
Download and install the Apache web server. Configure a sample default web page. You
can find the software at http://www.apache.org.
Download and install SSH client and server. You can find this at http://SL.us.fsu.edu or
http://www.ssh.com.
NT 4.0 Server:
Install the Internet Information Server (IIS) version 4. If not already loaded, you will first
need to install IIS version 2 from the NT 4.0 Server distribution CD-ROM. Afterwards,
update the IIS server to version 4.0 using the Windows NT 4.0 Option Pack CD-ROM.
Afterwards, be sure to reinstall the latest service pack (6a as of this writing). Create a sample
default web page and verify you can access it from a web browser on another system.
Download and install an SSH client. You can find this at http://SL.us.fsu.edu or
http://www.ssh.com.
Begin with the following baseline router configuration. You should be able to copy and
paste the common configuration and router specific configuration into your router’s
configuration as appropriate.
COMMON:
service udp-small-servers
service tcp-small-servers
enable password cisco
no ip domain-lookup
no ip classless
logging buffered
snmp-server community public RO
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
password cisco
login
R1:
hostname r1
interface Loopback0
ip address 192.168.11.1 255.255.255.0
no shutdown
interface Fddi0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
interface Serial1/2
description Link to R2 S1/1
ip address 192.168.12.1 255.255.255.0
bandwidth 2000
no shutdown
interface Serial1/3
description Link to R3 S1/1
ip address 192.168.13.1 255.255.255.0
bandwidth 2000
no shutdown
interface Serial1/4
description Link to R4 S1/1
ip address 192.168.14.1 255.255.255.0
bandwidth 2000
no shutdown
interface Serial1/6
description Link to R6 S0
ip address 192.168.16.1 255.255.255.0
bandwidth 2000
no shutdown
interface E2/0
description Vlan 10 to cat1 FA0/1
ip address 192.168.10.1 255.255.255.0
no shutdown
interface E2/1
description Vlan 20 to cat1 FA0/2
ip address 192.168.20.1 255.255.255.0
no shutdown
interface E2/2
description Vlan 30 to cat1 FA0/3
ip address 192.168.30.1 255.255.255.0
no shutdown
interface E2/3
description Vlan 40 to cat1 FA0/4
ip address 192.168.40.1 255.255.255.0
no shutdown
interface E2/4
description Vlan 50 to cat1 FA0/5
ip address 192.168.50.1 255.255.255.0
no shutdown
interface E2/5
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
4 Tim Dosen http://www.mercubuana.ac.id
R2:
hostname r2
interface Loopback0
ip address 192.168.22.2 255.255.255.0
no shutdown
interface Fddi0/0
ip address 192.168.1.2 255.255.255.0
no shutdown
interface Serial1/1
description Link to R1 S1/2
ip address 192.168.12.2 255.255.255.0
bandwidth 2000
clockrate 2000000
no shutdown
interface Serial1/3
description Link to R3 S1/2
ip address 192.168.23.2 255.255.255.0
bandwidth 2000
no shutdown
interface Serial1/4
description Link to R4 S1/2
ip address 192.168.24.2 255.255.255.0
bandwidth 2000
no shutdown
router rip
network 192.168.12.0
network 192.168.22.0
network 192.168.23.0
network 192.168.24.0
network 192.168.1.0
R3:
hostname r3
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
5 Tim Dosen http://www.mercubuana.ac.id
interface Loopback0
ip address 192.168.33.3 255.255.255.0
no shutdown
interface Fddi0/0
ip address 192.168.1.3 255.255.255.0
no shutdown
interface Serial1/0
description Link to self
no ip address
bandwidth 2000
no shutdown
interface Serial1/1
description Link to R1 S1/3
ip address 192.168.13.3 255.255.255.0
bandwidth 2000
clockrate 2000000
no shutdown
interface Serial1/2
description Link to R2 S1/3
ip address 192.168.23.3 255.255.255.0
bandwidth 2000
clockrate 2000000
no shutdown
interface Serial1/3
description Link to self
no ip address
bandwidth 2000
clockrate 2000000
no shutdown
interface Serial1/4
description Link to R4 S1/3
ip address 192.168.34.3 255.255.255.0
bandwidth 2000
no shutdown
interface Serial1/6
description Link to R6 S1
ip address 192.168.36.3 255.255.255.0
bandwidth 2000
no shutdown
router rip
network 192.168.33.0
network 192.168.13.0
network 192.168.23.0
network 192.168.34.0
network 192.168.36.0
network 192.168.1.0
R4:
hostname r4
interface Loopback0
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
6 Tim Dosen http://www.mercubuana.ac.id
R5:
hostname r5
interface loopback0
ip address 192.168.55.5 255.255.255.0
no shutdown
interface FastEthernet0
description Vlan70 to cat1 FA0/7
ip address 192.168.70.1 255.255.255.0
media-type 100BaseX
no shutdown
interface Ethernet0
description Vlan80 to cat1 FA0/8
ip address 192.168.80.1 255.255.255.0
media-type 10BaseT
no shutdown
interface Ethernet1
description Vlan90 to cat1 FA0/9
ip address 192.168.90.1 255.255.255.0
media-type 10BaseT
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
7 Tim Dosen http://www.mercubuana.ac.id
no shutdown
interface Fddi0
description Link to R4 FDDI0/0
ip address 192.168.1.5 255.255.255.0
no keepalive
no shutdown
router rip
network 192.168.55.0
network 192.168.70.0
network 192.168.80.0
network 192.168.90.0
network 192.168.1.0
Configure your router to sync its clock using the network time protocol with the clock on
router r6/fw. Use the r6 loopback0 address, 192.168.66.6. Use “show ntp association” and
“show ntp status” to test. Configure your router for the appropriate timezone and daylight
savings time with the “clock” configuration command. We are in the Eastern time zone
which is –5 hours different than UTC/GMT and use EDT in the summer. Use the “show
clock” command to verify you have it working correctly.
Now that you have an accurate clock, configure the router so that log messages and debug
messages will prepend the local date, time, and timezone using the “service timestamp”
configuration command.
Configure your router to generate SYSLOG messages to your Linux syslog server. Use the
default “local7” facility and log all messages including those with severity level debug. You
will need the “logging” and “logging trap” configuration commands. Verify your router
settings with “show log”. Once you have it configured, turn on some debug messages such as
“debug ntp packets” and verify you see the messages on your Linux syslog file
/var/log/cisco.log. Remember to turn off debugging with “undebug all”.
Extended IP access lists numbered between 100 through 199. Your team’s VLAN should
connect to a router Ethernet or fast Ethernet port. Create two extended IP access lists and
apply one to your ethernet port input and other to your ethernet port output as follows:
interface [ethernetX|fastethernetX]
ip access-group XXX in
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
8 Tim Dosen http://www.mercubuana.ac.id
(The terms Input and Output are relative to your router’s ethernet port. The terms “host” and
“server” are synonymous in this context.)
Create two IP extended access lists for the input and output of your gateway router’s ethernet
interface to your team VLAN and apply to your ethernet or fast ethernet port with the
following security policy:
Security Policy:
- Hosts on your VLAN should generally be able to access services outside your
VLAN provided the services are not outside the FSU network. (FSU networks
128.186.0.0/16, 146.201.0.0/16, and 144.174.0.0/16 and RFC1918 private
address space 192.168.0.0/16, 172.16.0.0/12, and 10.0.0.0/8 should be
permitted).
- Do not allow any spoofed packets into your VLAN.
- Allow all NETBIOS over TCP/IP traffic.
- Allow all DNS, NTP, TFTP, SNMP, SYSLOG, and RIP v1 datagrams. (Do not
worry about SNMP traps or DNS zone transfers).
- Allow TCP DISCARD and TTCP/IPERF packets for testing.
- Allow all ICMP packets for testing.
- Allow all shell (ssh), and web (www/http) access to hosts on your VLAN (Do not
worry about secure http).
- Allow e-mail access (smtp,pop3,imap) to only your Linux server.
- Allow TELNET access to your servers if sourced from a trusted group’s VLAN.
All even groups only trust each other. All odd groups only trust each other.
- Disallow any other TELNET access from unauthorized IP addresses
- Deny everything else.
- All disallowed traffic must be logged to your Linux host using syslog on file
/var/log/cisco.log
You can find out TCP/IP port number assignments from the Internet Assigned Numbers
Authority, http://www.isi.edu/in-notes/iana/assignments/port-numbers. The relevant
assignments are also included in the table below.
Example of how to apply an access list to an ethernet interface and converting the policy into
a detailed intermediate form before coding the access lists:
interface ethernet0
ip address 192.168.10.1 255.255.255.0
ip access-group 110 in
ip access-group 111 out
PART5 – Verification
Verify that your access lists are working. The following are some examples of tests that can
be performed on the routers and Linux PC for partly testing out your access lists.
PING packets use ICMP protocol and should work from your PC to an FSU destination, but
fail to an outside destination:
Ping should also work from outside your Vlan from r6 to your Linux server:
fw/r6#ping 192.168.10.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/7/12 ms
fw/r6#
Test NTP protocol by syncing Linux server clock to ntp server on r6 loopback address
192.168.66.6 using the ntpdate utility:
Test SNMP protocol by fetching the system.sysName.0 MIB variable from r6:
Test DNS datagram traffic by fetching the SOA record for domain cs.fsu.edu from
nu.cs.fsu.edu:
fsu.edu
origin = dns1.fsu.edu
mail addr = hostmaster.acns.fsu.edu
serial = 2000112203
refresh = 3600 (1H)
retry = 1200 (20M)
expire = 604800 (1W)
minimum ttl = 86400 (1D)
>
From Linux PC, test iperf client using discard TCP port 9 on r6:
From the Linux PC, test access to an outside FSU web page http://www.cs.fsu.edu/~curci:
GET /~curci/
<html>
<head><title>Ray Curci Home Page</title></head>
<body>Ray Curci Home Page 16-Nov-2000</p>
I am presently working on an MS degree in the FSU Computer
Network and Systems Administration track.
</body></html>
Connection closed by foreign host.
[root@s1 curci]#
Your team VLAN should connect to an ethernet port on either r1 or r5. If you go to r1 or r5,
whichever does not connect to your VLAN, you can execute TELNET sourced from a trusted
and untrusted group to verify the access list. For example, I am on team 1 served from router
r1 interface ethernet 2/0, and my Linux server is at IP address 192.168.10.2. (Vlan10). If try
to telnet to my Linux PC from r5 and source from team 8’s untrusted ethernet port Ethernet0
it should fail, but work if sourced from team 9’s trusted ethernet port Ethernet1, it should
work and I will see the login prompt:
My my Linux syslog server in logfile /var/log/cisco.log, the denied telnet attempt from
192.168.80.1 appears. There are four fields in this message (1) time/date stamp prepended by
the Linux syslogd program, (2) IP address of device that sent the message, r1’s ethernet 2/0
port, prepended by Linux syslogd, (3) time/date stamp prepended by router r1, and (4) the log
message itself indicating a denied TCP packet from 192.168.80.1 port 11000 to 192.168.10.2
port 23 (telnet port):
From outside, I should be able to access the WWW server on my Linux system
(192.168.10.2) or NT system at 192.168.10.3:
fw/r6#telnet 192.168.10.2 80
Trying 192.168.10.2, 80 ... Open
GET /
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
13 Tim Dosen http://www.mercubuana.ac.id
fw/r6#telnet 192.168.10.3 80
Trying 192.168.10.3, 80 ... Open
GET /
<html><head><title>S2 Sample WWW Page</title></head>
<body><h1>S2 Sample WWW Page</h1><hr>
This is a test WWW page on server S2 Windows NT 4.0 Server
<hr></body></html>
[Connection to 192.168.10.3 closed by foreign host]
fw/r6#
From outside on r6, I should be able to access my Linux system 192.168.10.2 with SMTP e-
mail:
fw/r6#telnet 192.168.10.2 25
Trying 192.168.10.2, 25 ... Open
220 s1.egghead.net ESMTP Sendmail 8.9.3/8.9.3; Wed, 22 Nov 2000 23:50:05 -0500
quit
221 s1.egghead.net closing connection
[Connection to 192.168.10.2 closed by foreign host]
Here is an excerpt from “show access-list 111”. Note that some lines have been matched and
the number of matches are displayed:
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Frame Relay
10
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to configure frame relay and How to configure frame relay and
testing in cisco 2610, with real or testing in cisco 2610, with real or
simulation in packet tracert simulation in packet tracert
[Type text]
Text Summary
Overview
In this lab, we will explore the frame-relay data link protocol. Frame-relay is widely
deployed by phone companies in wide area networks (WANs) and related to the X.25 and
ATM protocols. Routers or frame-relay access devices (FRADs) have a physical serial
connection to a service provider’s nearest frame-relay switch typically across a T1 or digital
data service (DDS) circuit. Usually, the service provider will have several interconnected
frame-relay switches depicted in diagrams as a cloud. A state-wide service provider in
Florida, for example, would typically have a frame-relay switch in each of Florida’s ten
LATAs. Since an end user data circuit to the nearest frame-relay switch would be intralata
(will not cross a LATA boundary), the cost for the “local loop” is greatly reduced. Within
the frame network, permanent virtual circuits (PVCs) are created. The PVC endpoints are
identified by data link channel identifiers (DLCIs) represented by integers in the range
[16..1007]. Although possible to build a full mesh of PVCs in the frame network, this is
rarely done because there is usually a recurring cost associated with each PVC and with N
nodes, the number of PVCs required, N(N-1)/2 becomes large quickly. A more common
configuration is a logical “hub-and-spoke” topology. In this lab, r2 will be the hub, while r1,
r3, and r4 will be spokes. (Router r5 will not have a frame-relay connections because it has
no serial WAN interfaces.) Frame-relay switches also use a control protocol called the link
management interface (LMI) used to inform routers what DLCIs are defined and their status.
ASSIGNMENT:
In this lab, you will be given a partially broken router configuration with 3 problems that
need to be identified and solved:
1. The frame-relay DLCIs by default are associated with the router physical interfaces
but in this exercise need to be associated with the subinterfaces. For example, on
r4, the DLCI 402 should be associated with the multipoint subinterface Serial1/3.1
instead of physical interface Serial1/3.
2. Routers r1, r2, r3, and r4 all have their frame-relay interfaces addressed on the
same 192.168.5.0/24 network, yet only some will be able to PING each other. A
protocol called “inverse arp” can automatically map frame-relay DLCI numbers to
IP addresses, but the mapping will be incomplete because there is not a full mesh
of PVCs. You will find that R2 can PING the R1, R3, and R4 and they can PING
R2, but that R1, R3, and R4 cannot PING each other.
3. Distance vector routing protocols like RIP normally do not advertise routes out an
interface on which the route was learned. This behavior is called “split horizon”.
Hints:
Even with the partially broken configuration given, you should see LMI or Link Management
Interface messages on your router. These are status messages where the frame-relay switch
informs your router which DLCIs are defined and their status. You can use the “show frame-
relay lmi” command. If set up correctly, you should see the number of status enquire
messages sent incrementing, with an equal number of status messages received as shown
below.
Good Luck!
LMI Statistics for interface Serial1/3 (Frame Relay DTE) LMI TYPE = ANSI
Invalid Unnumbered info 0 Invalid Prot Disc 0
Invalid dummy Call Ref 0 Invalid Msg Type 0
Invalid Status Message 0 Invalid Lock Shift 0
Invalid Information ID 0 Invalid Report IE Len 0
Invalid Report Request 0 Invalid Keep IE Len 0
Num Status Enq. Sent 94818 Num Status msgs Rcvd 94818
Num Update Status Rcvd 0 Num Status Timeouts 0
COMMON:
service udp-small-servers
service tcp-small-servers
enable password cisco
no ip domain-lookup
ip classless
ip subnet-zero
logging buffered
service timestamps debug datetime localtime
service timestamps log datetime localtime
clock timezone EST -5
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
5 Tim Dosen http://www.mercubuana.ac.id
R1:
hostname r1
interface E2/0
description Vlan 10 to cat1 FA0/1
ip address 192.168.10.1 255.255.255.0
no shutdown
interface E2/1
description Vlan 20 to cat1 FA0/2
ip address 192.168.20.1 255.255.255.0
no shutdown
interface E2/2
description Vlan 30 to cat1 FA0/3
ip address 192.168.30.1 255.255.255.0
no shutdown
interface E2/3
description Vlan 40 to cat1 FA0/4
ip address 192.168.40.1 255.255.255.0
no shutdown
interface E2/4
description Vlan 50 to cat1 FA0/5
ip address 192.168.50.1 255.255.255.0
no shutdown
interface E2/5
description Vlan 60 to cat1 FA0/6
ip address 192.168.60.1 255.255.255.0
no shutdown
interface loopback0
ip address 192.168.11.1 255.255.255.0
no shutdown
interface Serial1/3
description Frame-Relay WAN
encapsulation frame-relay IETF
frame-relay lmi-type ansi
no shutdown
interface Serial1/3.1 multipoint
ip address 192.168.5.1 255.255.255.0
no shutdown
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
6 Tim Dosen http://www.mercubuana.ac.id
router rip
network 192.168.11.0
network 192.168.10.0
network 192.168.20.0
network 192.168.30.0
network 192.168.40.0
network 192.168.50.0
network 192.168.60.0
network 192.168.5.0
R2:
hostname r2
interface loopback0
ip address 192.168.22.2 255.255.255.0
no shutdown
interface Serial1/3
description Frame-Relay WAN
encapsulation frame-relay IETF
frame-relay lmi-type ansi
no shutdown
interface Serial1/3.1 multipoint
ip address 192.168.5.2 255.255.255.0
no shutdown
router rip
network 192.168.22.0
network 192.168.5.0
R3:
hostname r3
frame-relay switching
interface loopback0
ip address 192.168.33.3 255.255.255.0
no shutdown
interface Serial1/0
description Frame-Relay WAN
encapsulation frame-relay IETF
frame-relay lmi-type ansi
no shutdown
interface Serial1/0.1 multipoint
ip address 192.168.5.3 255.255.255.0
no shutdown
interface Serial1/1
description Frame-Relay port to R1 S1/3
no ip address
encapsulation frame-relay IETF
clockrate 2000000
frame-relay lmi-type ansi
frame-relay intf-type dce
frame-relay route 102 interface Serial1/2 201
no shutdown
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
7 Tim Dosen http://www.mercubuana.ac.id
interface Serial1/2
description Frame-Relay port to R2 S1/3
no ip address
encapsulation frame-relay IETF
clockrate 2000000
frame-relay lmi-type ansi
frame-relay intf-type dce
frame-relay route 201 interface Serial1/1 102
frame-relay route 203 interface Serial1/3 302
frame-relay route 204 interface Serial1/4 402
no shutdown
interface Serial1/3
description Frame-Relay port to R3 S1/0
no ip address
encapsulation frame-relay IETF
clockrate 2000000
frame-relay lmi-type ansi
frame-relay intf-type dce
frame-relay route 302 interface Serial1/2 203
no shutdown
interface Serial1/4
description Frame-Relay port to R4 S1/3
no ip address
encapsulation frame-relay IETF
frame-relay lmi-type ansi
frame-relay intf-type dce
frame-relay route 402 interface Serial1/2 204
no shutdown
!
interface serial1/6
descr Serial link to R6 S1 toward Internet
ip address 192.168.36.3 255.255.255.0
no shutdown
router rip
network 192.168.36.0
network 192.168.33.0
network 192.168.5.0
R4:
hostname r4
interface loopback0
ip address 192.168.44.4 255.255.255.0
no shutdown
interface fddi0/0
descr Link to R5 FDDI0
ip address 192.168.45.4 255.255.255.0
no shutdown
interface Serial1/3
description Frame-Relay WAN
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
8 Tim Dosen http://www.mercubuana.ac.id
R5:
hostname r5
interface FastEthernet0
description Vlan70 to cat1 FA0/7
ip address 192.168.70.1 255.255.255.0
media-type 100BaseX
no shutdown
interface Ethernet0
description Vlan80 to cat1 FA0/8
ip address 192.168.80.1 255.255.255.0
media-type 10BaseT
no shutdown
interface Ethernet1
description Vlan90 to cat1 FA0/9
ip address 192.168.90.1 255.255.255.0
media-type 10BaseT
no shutdown
interface Fddi0
description Link to R4 FDDI0/0
ip address 192.168.45.5 255.255.255.0
no shutdown
interface loopback0
ip address 192.168.55.5 255.255.255.0
no shutdown
router rip
network 192.168.70.0
network 192.168.80.0
network 192.168.90.0
network 192.168.45.0
network 192.168.55.0
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Internet Gateway Protocol
11
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to configure internet gateway How to configure internet gateway
protocol, combone another network protocol, combone another network and
and routing protocol routing protocol
Text Summary
Overview
You will be configuring routers R1 through R5, while router R6 is preconfigured for EIGRP
protocol on serial port S1 and will supply a default route for the lab network. For each of the
above 5 routing protocols, three of the routers will participate as follows:
- RIP: R1,R2,R3
- OSPF: R2,R3,R4
- EIGRP: R3,R4,R5
- IGRP: R4,R5,R1
- ISIS: R5,R1,R2
Each of your routers will have a loopback and FDDI interface that needs to participate in all
three appropriate routing protocols. Additionally, R1 and R5 will need the IGRP protocol on
all ethernet and fast ethernet interfaces. Router R3 will need EIGRP on interface S1/6 to
learn the default route to the outside world.
PART1 – IP ADDRESSING
Configure IP addresses as listed in the table below. Loopback0 interfaces need to be created
if they do not exist and any other loopback addresses removed. Any interfaces not explicitly
mentioned below, should be shut down. Once addressed, verify you have appropriate
physical connectivity with “show cdp neighbors”. Verify that additional interfaces are shut
down with “show ip interface brief.” At this point, you should be able to view your IP
routing table with “show ip route” and should only see directly connected routes. Verify that
you can PING the other router’s FDDI IP addresses. You will not be able to PING the other
router’s loopback addresses because you will not have routes for them until later in this lab
exercise. Make certain you have no static routes including default routes.
Ethernet1 192.168.90.1/24 IGRP
Debug Mode
Cisco routers have a debug mode that can be helpful in debugging routing protocols,
especially distance vector protocols. This mode should never be used on a production
network because a large number of messages can be generated that can even cause a router to
crash. To turn on your console window to receive debug messages, use the command “term
monitor” or to turn it off “term no monitor.” To turn on a particular debug mode, use the
command “debug XXX” such as “debug ip routing” or turn it off with “undebug all”. The
command “debug ?” will show you your options. You can turn on more than one debug
mode, or even turn them all on with “debug all”. To see which debug modes are active, use
“show debug.”
Configure RIP on your router’s FDDI and Loopback0 interface. The following commands
may be helpful.
- show ip route
- show ip route rip
- show ip protocol
- debug ip rip
- debug ip rip events
Configure OSPF on your router’s FDDI and Loopback0 interface. Use process ID 100.
Place all OSPF interfaces in the special OSPF backbone area 0. The following commands
may be helpful.
- show ip route
- show ip route ospf
- show ip protocol
- show ip ospf neighbor
- show ip ospf interface
- show ip ospf database
- show ip ospf database database-summary
- debug ip ospf event
- debug ip ospf packet
PART4 – EIGRP (R3,R4,R5 Only)
Configure EIGRP on your router’s FDDI and Loopback0 interfaces. Use autonomous system
number 100. The following commands may be helpful.
- show ip route
- show ip route eigrp
- show ip protocol
- show ip eigrp interfaces
- show ip eigrp neighbors
- show ip eigrp topology
- show ip eigrp traffic
- debug ip eigrp neighbor
Configure IGRP on your router’s FDDI and Loopback0 inerfaces. On R1 and R5, also
configure all ethernet and fast ethernet ports for IGRP. Use autonomous system 100. The
following commands may be helpful.
- show ip route
- show ip route igrp
- show ip protocol
- debug ip igrp events
- debug ip igrp transactions
Configure ISIS on your router’s FDDI and Loopback0 interfaces. Use “100” for your ISO
Routing Tag. ISIS incorporates an adrea number and MAC address into a “Network Entity
Title” We will use area 1 and make up a dummy MAC address in the form
NNNN.NNNN.NNNN for router N. Use the following Network Entity Title, substituting
your router number for the letter N: “00.0001.NNNN.NNNN.NNNN.00”. In this example,
the “00.0001” represents the area number in hex, while the “NNNN.NNNN.NNNN.00” is an
identifier for your router in hex. The following commands may be helpful.
- show ip route
- show ip route isis
- show ip protocol
- show isis database
Router R3 should be receiving EIGRP routes from R6 including a default route (0.0.0.0) and
a route for R6’s Loopback0 interface 192.168.66.6. Some of the routers, however, may not
be getting these routes. On R3 only, redistribute all RIP routes into both RIP and OSPF. For
RIP, use a hop count/metric of 10. Verify with “show ip route” that you can see both 0.0.0.0
and 192.168.66.6/24 from all routers.
PART8 – Verification
Verify that everything is working. You can display the routing tables with “show ip route”
which should look like the the output below. Note that the letter designation to the left of
each routing entry indicates which protocol put the route in the routing table. When the same
route is learned by multiple protocols, the protocol with the lowest administrative distance is
used. Administrative distance is like a believability factor. Administrative distances for
some common protocols are listed in the table below. You will notice in the output below,
that the “show ip route” output entries indicate two numbers in square brackets,
administrative distance and route metric.
PROTOCOL ADMIN.DIST.
Connected 0
Static 1
EIGRP 90
IGRP 100
ISIS 115
OSPF 110
ISIS 115
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route
R1:
Gateway of last resort is 192.168.1.3 to network 0.0.0.0
R 192.168.66.0/24 [120/10] via 192.168.1.3, 00:00:06, Fddi0/0
I 192.168.90.0/24 [100/1110] via 192.168.1.5, 00:01:08, Fddi0/0
I 192.168.80.0/24 [100/1110] via 192.168.1.5, 00:01:08, Fddi0/0
C 192.168.40.0/24 is directly connected, Ethernet2/3
I 192.168.44.0/24 [100/610] via 192.168.1.4, 00:01:19, Fddi0/0
R 192.168.33.0/24 [120/1] via 192.168.1.3, 00:00:06, Fddi0/0
R 192.168.36.0/24 [120/10] via 192.168.1.3, 00:00:06, Fddi0/0
C 192.168.60.0/24 is directly connected, Ethernet2/5
C 192.168.50.0/24 is directly connected, Ethernet2/4
I 192.168.55.0/24 [100/610] via 192.168.1.5, 00:01:08, Fddi0/0
C 192.168.10.0/24 is directly connected, Ethernet2/0
C 192.168.11.0/24 is directly connected, Loopback0
C 192.168.1.0/24 is directly connected, Fddi0/0
C 192.168.30.0/24 is directly connected, Ethernet2/2
C 192.168.20.0/24 is directly connected, Ethernet2/1
i L1 192.168.22.0/24 [115/20] via 192.168.1.2, Fddi0/0
R* 0.0.0.0/0 [120/10] via 192.168.1.3, 00:00:06, Fddi0/0
R2:
Gateway of last resort is 192.168.1.3 to network 0.0.0.0
O E2 192.168.66.0/24 [110/100] via 192.168.1.3, 00:26:50, Fddi0/0
O E2 192.168.90.0/24 [110/100] via 192.168.1.5, 00:26:50, Fddi0/0
O E2 192.168.80.0/24 [110/100] via 192.168.1.5, 00:26:50, Fddi0/0
O E2 192.168.40.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
192.168.44.0/32 is subnetted, 1 subnets
O 192.168.44.4 [110/2] via 192.168.1.4, 00:26:50, Fddi0/0
192.168.33.0/24 is variably subnetted, 2 subnets, 2 masks
O E2 192.168.33.0/24 [110/100] via 192.168.1.3, 00:26:50, Fddi0/0
O 192.168.33.3/32 [110/2] via 192.168.1.3, 00:26:50, Fddi0/0
O E2 192.168.36.0/24 [110/100] via 192.168.1.3, 00:26:50, Fddi0/0
O E2 192.168.60.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
O E2 192.168.50.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
O E2 192.168.55.0/24 [110/100] via 192.168.1.5, 00:26:50, Fddi0/0
O E2 192.168.10.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
i L1 192.168.11.0/24 [115/20] via 192.168.1.1, Fddi0/0
C 192.168.1.0/24 is directly connected, Fddi0/0
O E2 192.168.30.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
O E2 192.168.20.0/24 [110/100] via 192.168.1.4, 00:26:50, Fddi0/0
C 192.168.22.0/24 is directly connected, Loopback0
R* 0.0.0.0/0 [120/10] via 192.168.1.3, 00:00:08, Fddi0/0
R3:
Gateway of last resort is 192.168.36.6 to network 0.0.0.0
D 192.168.66.0/24 [90/2297856] via 192.168.36.6, 01:24:50, Serial1/6
D 192.168.90.0/24 [90/284160] via 192.168.1.5, 01:24:50, Fddi0/0
D 192.168.80.0/24 [90/284160] via 192.168.1.5, 01:24:50, Fddi0/0
D EX 192.168.40.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
192.168.44.0/24 is variably subnetted, 2 subnets, 2 masks
O 192.168.44.4/32 [110/2] via 192.168.1.4, 00:26:52, Fddi0/0
D 192.168.44.0/24 [90/156160] via 192.168.1.4, 01:24:50, Fddi0/0
C 192.168.33.0/24 is directly connected, Loopback0
C 192.168.36.0/24 is directly connected, Serial1/6
D EX 192.168.60.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
D EX 192.168.50.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
D 192.168.55.0/24 [90/156160] via 192.168.1.5, 01:24:50, Fddi0/0
D EX 192.168.10.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
R 192.168.11.0/24 [120/1] via 192.168.1.1, 00:00:10, Fddi0/0
C 192.168.1.0/24 is directly connected, Fddi0/0
D EX 192.168.30.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
D EX 192.168.20.0/24 [170/286720] via 192.168.1.4, 01:09:33, Fddi0/0
[170/286720] via 192.168.1.5, 01:09:33, Fddi0/0
192.168.22.0/24 is variably subnetted, 2 subnets, 2 masks
O 192.168.22.2/32 [110/2] via 192.168.1.2, 00:26:52, Fddi0/0
R 192.168.22.0/24 [120/1] via 192.168.1.2, 00:00:27, Fddi0/0
D*EX 0.0.0.0/0 [170/2195456] via 192.168.36.6, 01:24:50, Serial1/6
R4:
Gateway of last resort is 192.168.1.3 to network 0.0.0.0
D 192.168.66.0/24 [90/2300416] via 192.168.1.3, 01:24:08, Fddi0/0
D 192.168.90.0/24 [90/284160] via 192.168.1.5, 01:24:08, Fddi0/0
D 192.168.80.0/24 [90/284160] via 192.168.1.5, 01:24:08, Fddi0/0
I 192.168.40.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
C 192.168.44.0/24 is directly connected, Loopback0
192.168.33.0/24 is variably subnetted, 2 subnets, 2 masks
D 192.168.33.0/24 [90/156160] via 192.168.1.3, 01:24:08, Fddi0/0
O 192.168.33.3/32 [110/2] via 192.168.1.3, 00:26:55, Fddi0/0
D 192.168.36.0/24 [90/2172416] via 192.168.1.3, 01:24:08, Fddi0/0
I 192.168.60.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
I 192.168.50.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
D 192.168.55.0/24 [90/156160] via 192.168.1.5, 01:24:08, Fddi0/0
I 192.168.10.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
I 192.168.11.0/24 [100/610] via 192.168.1.1, 00:00:36, Fddi0/0
C 192.168.1.0/24 is directly connected, Fddi0/0
I 192.168.30.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
I 192.168.20.0/24 [100/1110] via 192.168.1.1, 00:00:36, Fddi0/0
192.168.22.0/32 is subnetted, 1 subnets
O 192.168.22.2 [110/2] via 192.168.1.2, 00:26:55, Fddi0/0
D*EX 0.0.0.0/0 [170/2198016] via 192.168.1.3, 01:24:08, Fddi0/0
R5:
Gateway of last resort is 192.168.1.3 to network 0.0.0.0
D 192.168.44.0/24 [90/156160] via 192.168.1.4, 03:57:37, Fddi0
C 192.168.90.0/24 is directly connected, Ethernet1
I 192.168.30.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
I 192.168.60.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
I 192.168.10.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
I 192.168.40.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
I 192.168.11.0/24 [100/610] via 192.168.1.1, 00:00:38, Fddi0
C 192.168.55.0/24 is directly connected, Loopback0
C 192.168.80.0/24 is directly connected, Ethernet0
I 192.168.20.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
D 192.168.66.0/24 [90/2300416] via 192.168.1.3, 01:26:36, Fddi0
D 192.168.36.0/24 [90/2172416] via 192.168.1.3, 01:26:38, Fddi0
i L1 192.168.22.0/24 [115/20] via 192.168.1.2, Fddi0
I 192.168.50.0/24 [100/1110] via 192.168.1.1, 00:00:38, Fddi0
C 192.168.1.0/24 is directly connected, Fddi0
D 192.168.33.0/24 [90/156160] via 192.168.1.3, 01:26:38, Fddi0
D*EX 0.0.0.0/0 [170/2198016] via 192.168.1.3, 01:26:36, Fddi0
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
10 Tim Dosen http://www.mercubuana.ac.id
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Spanning Tree Protocol
12
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to configure spanning tree How to configure spanning tree
protocol, implement in software protocol, implement in software
simulation packet tracert simulation packet tracert
[Type text]
Text Summary
INTERNET TEACHING LAB: SPANNING TREE PROTOCOL
Overview
The Spanning Tree Protocol, also known as the Djistrja’s Algorithm, is documented in the
IEEE 802.1D standard. It is implemented in many current routers, bridges, and switches to
provide a loop-free network topology. It is popular to build layer2 networks with redundant
network connections to improve reliability, but the redundancy can lead to broadcast storms.
Spanning Tree Protocol provides a mechanism for network devices to learn the network
topology, elect a root bridge, and selectively block ports to form a loop-free spanning tree.
We will explore some of the capabilities of this protocol, advantages, and limitations. The
IEEE spanning tree protocol was first implemented in the DEC LAN Bridge 100 in the mid
1980s by Dr. Radia Perlman whose text book, Interconnections, now in the second edition, is
the definitive reference.
Configuration
We will explore the Cisco Router implementation of 802.1D. Set up the physical cabling as
specified in diagram above. The initial configuration for all five routers is listed at the end of
this document also also on text file span-config.txt. Log into each of the five routers R1, R2,
R3, R4, and R5, go into router configuration mode, and paste the appropriate configuration
commands. Verify that all appropriate interfaces are up and that everything is cabled to the
correct routers and ports. Use the commands “show ip interface”, “show ip interface brief”,
and “show cdp neighbors” for verification.
Setup PCs
Configure PCs S1 and S2 with IP addresses in the same IP network. Verify that you can
PING between the two PCs. (Hint: If this does not work you can test the PCs by temporarily
connecting them to the same physical Ethernet segment or by using a 10baseT Ethernet
crossover cable. You may have difficulty if your router interface accidently has an IP address
on one of the bridge interface in which case it may be routing IP protocol and bridging non-
IP traffic. You can verify that the router is bridging IP traffic on the appropriate interfaces
with the command “show interface crb”)
Try sending a series of PINGs from S1 S2 using both small 64-byte packets and large
1500-byte packets and note the average round-trip time. Repeat this test while S1 and S2 are
temporarily directly connected. Compare the numbers and if substancially different, explain
why.
There are redundant connections in your network and we want to determine the physical path
between S1 and S2 used by the PING packets. First, determine the Ethernet MAC addresses
for the NIC cards in S1 and S2. (Hint: If two devices on the same IP network have recently
communicated, you will find each other’s Ethernet MAC address inside their respective ARP
caches which can be displayed with the command “arp –a”)
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
3 Tim Dosen http://www.mercubuana.ac.id
Use the command “show bridge 1” on each router to display the bridge forwarding table and
find the S1 and S2 entries. Record the forwarding path on your network diagram.
Using the command “show span 1”, determine which router is the root bridge and indicate it
on your network diagram. This implementation of 802.1D computes the port path cost by
dividing 1,000,000,000 by the bandwidth of the port in bits/second. This gives us the
following port costs for the connections in your network:
Given your diagram, knowledge of the root bridge, and above table, manually compute the
spanning tree algorithm. For each bridge port, indicate the port state (F=forwarding,
B=blocking) as well as the port type (RP=root port, DP=designated port, NDP=non-
designated port).
Verify your calculations by comparing them with the output of the command “show
spanning-tree 1” on each router.
On one of your routers with a blocked bridge port, issue the command “show interface xxx”
where xxx is the name of the blocked interface/port. Note the input and output packet
counters. Are they incrementing? If so, why are they incrementing? Instead of doing the
arithmetic, you may find it easier to “clear counters” to zero the counters before you start.
The Cisco router has a number of debug modes used to diagnose network problems.
Although sometimes dangerous to use on a production network, they are very good tools in a
lab environment. The command “term monitor” will enable debug messages to be displayed
on your router session and disabled with “term no monitor”. Try turning on the spanning tree
topology change debug with “debug spanning tree” until you collect a few messages, then
turn it off with “undebug all”. You should see some bridge protocol data unit packets
represented in hexadecimal. You should be able to spot the MAC address of your root bridge
embedded in the packet. Using the following table, decode the root bridge ID (priority and
MAC address), sending bridge ID (priority and MAC address), root path cost, and timers.
Bridge ports can be in one of five states: disabled, blocking, listening, learning, and
forwarding. See the diagram span-fsm.pdf to see what events cause transitions between
different states. Log into one of your routers and identify a bridge interface in the forwarding
state. Turn on spanning tree topology events debugging with “debug spanning events” and
shut down the interface with “interface xyz” and “shutdown”. Wait a minute, then turn it
back on with “no shutdown”. Note the state changes as it transitions from the disabled to the
forwarding state including intermediate states. Record how much time was spent in each
state. Turn off debugging with “undebug all”.
TEST TCP
Locate the program TTCP by searching the Internet. At the time of this writing, it was
available for anonymous/ftp download at ftp://FTP.ARL.MIL/pub/ttcp. It is a TCP/IP
benchmarking program. There are both C-language versions, usually named ttcp.c, and java
implementations that work on Windows systems. You basically start this program on one
system in receive mode, then start the other copy in transmit mode and supply the IP address
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
6 Tim Dosen http://www.mercubuana.ac.id
of the receiver. The utility sends several blocks of data (you specify how many blocks and
how many bytes per block) then displays statistics in Bytes/Second and Bits/Second on speed
of the transfer. Use this tool to measure the network performance from S1 S2 traversing
your network. How many bits per second did you achieve? Study your network diagram
paying particular attention to your router link speeds and which interfaces are blocked. As
packets traverse your network, your throughput is affected factors such as the speed of the
links traversed, congestion, router CPU load and switching method, errors, etc. If you focus
on the link speeds, is there a better (faster) path through your network that is not used?
Determine which bridge should be made the root bridge in order to maximize the S1 S2
throughput and change your configuration to make it so. Is there an optimal solution or more
than one equally good solution? Repeat your S1 S2 test and compare results with the first
time. (Hint: The bridge with lowest bridge ID is elected the root. BIDs are 64-bit numbers
by concatenating the bridge priority with the bridge MAC address. Although you normally
cannot change the MAC address, you can change the bridge priority.) What is the slowest
link traversed in the new network configuration? Was your throughput significantly less than
your slowest link speed? Why? (Hint: read up on CSMA/CD)
INITIAL ROUTER CONFIGURATION:
COMMON:
service timestamps debug uptime
enable password cisco
no ip domain-lookup
ip classless
line con 0
exec-timeout 0 0
line vty 0 4
password cisco
login
R1:
hostname r1
interface Serial1/2
description Link to R2 S1/1
no ip address
bandwidth 56
bridge-group 1
no shutdown
interface Serial1/3
description Link to R3 S1/1
no ip address
bandwidth 56
bridge-group 1
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
7 Tim Dosen http://www.mercubuana.ac.id
no shutdown
interface Ethernet2/0
description Link to S1
ip address 192.168.10.1 255.255.255.0
bridge-group 1
no shutdown
interface Ethernet2/1
description Link to R5 E1
no ip address
bridge-group 1
no shutdown
bridge crb
bridge 1 protocol ieee
bridge 1 route ip
R2:
hostname r2
interface Serial1/1
description Link to R1 S1/2
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
interface Serial1/3
description Link to R3 S1/2
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
interface Serial1/4
description Link to R4 S1/2
no ip address
bandwidth 56
bridge-group 1
no shutdown
bridge crb
bridge 1 protocol ieee
bridge 1 priority 100
R3:
hostname r3
interface Serial1/1
description Link to R1 S1/3
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
interface Serial1/2
description Link to R2 S1/3
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
interface Serial1/4
description Link to R4 S1/3
no ip address
bandwidth 56
bridge-group 1
no shutdown
bridge crb
bridge 1 protocol ieee
R4:
hostname r4
interface Fddi0/0
description Link to R5 FDDI0
no ip address
bridge-group 1
no shutdown
interface Serial1/2
description LINK to R2 S1/0
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
interface Serial1/3
description LINK to R3 S1/0
no ip address
bandwidth 56
clockrate 56000
bridge-group 1
no shutdown
bridge crb
bridge 1 protocol ieee
bridge 1 route ip
R5:
hostname r5
interface Ethernet0
description Link to S2
no ip address
bridge-group 1
no shutdown
interface Ethernet1
‘13 Dasar Router Pusat Bahan Ajar dan eLearning
9 Tim Dosen http://www.mercubuana.ac.id
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Count to Infinity
13
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to detect problem count to infinity, How to detect problem count to infinity,
detect problem network and analyze detect problem network and analyze
network network
Text Summary
COUNT TO INFINITY LAB
OVERVIEW
In this lab, we will explore the “count to infinity” problem of distance vector routing protocols
such as RIP version 1. (For background information, read Tanenbaum’s Computer Networks 3rd
Edition pages 357 through 359.) Normally, routers with distance vector routing protocols
implement the split horizon algorithm where they will not advertise a network route out an
interface to a neighbor from whom the route was learned. This can help reduce the convergence
time, the time it takes the routing tables in each router to reach a steady state. We will configure
the lab network on routers R1, R2, R3, and R4 as shown on the diagram above. By configuring
routers R1, R2, and R3 in a cycle, we will attempt to defeat the split horizon hack and will try to
demonstrate the count to infinity problem, the problem where distance vector routing protocols
can take a very long time to reach convergence.
Routers R1, R2, and R3 are connected with serial links in the shape of a triangle. R3 also has a
serial link to R4. R4 has a loopback interface to network 192.168.44.0/24 which we will simply
call “network 44”. This lab network contains five IP networks that will be abbreviated as shown
in the following table.
IP
NETWORK ABBREVIATION
192.168.12.0/24 12
192.168.13.0/24 13
192.168.23.0/24 23
192.168.34.0/24 34
192.168.44.0/24 44
1. Configure the network as in the above diagram with RIP version 1 protocol and
wait for RIP to converge to a steady state.
2. Examine the routing tables and verify that each router has a route for networks 12,
13, 23, 34, and 44. We are especially interested in network 44 on the loopback
interface of R4.
3. “Break” the connection between R3 and R4 by installing an access list on R3’s
Serial1/4 interface that blocks RIP traffic received R4.
4. Examine the routing announcements on R1, R2, and R3 and watch how their
routing tables change the R3---R4 connection is “broken.” Pay particular
attention to network 44 which is no longer reachable but this will not be
immediately known to router R3. We expect the routing metric on routers R1,
R2, and R3 for network 44 to gradually increase, by one hop at a time, until a hop
count of 16 or RIP infinity is reached.
BACKGROUND
The RIP protocol uses four adjustable timers to control its operation. There is a single UPDATE
timer and an instance of the INVALID, HOLDDOWN, and FLUSH timers for each entry in the
routing table.
- UPDATE
This timer controls how frequently a router announces routes to its neighbors. By
default, this occurs every 30 seconds.
- INVALID
This controls how long after not hearing an update for a route that the route will be
declared invalid. By default, this timer is set to 180 seconds or 3 minutes which
represents 6 RIP update cycles. It is restarted whenever a route is received.
- HOLDDOWN
This controls how long after a route has been invalidated a router will wait before
accepting a new route of a higher metric. This helps reduce the count-to-infinity
problem. By default, this timer is set to 180 seconds or 3 minutes.
- FLUSH
This timer controls when a routing table entry is removed. It restarts every time a
route is received and runs concurrently with the INVALID and HOLDDOWN timers.
When the FLUSH timer has expired for a route, the route is removed from the routing
table. The FLUSH timer expires before the HOLDDOWN timer, so HOLDDOWN
never runs for its complete cycle.
The “show ip protocols” router command displays the current values for the RIP timers, as well
as a list of routers from whom RIP announcements have been received:
r3#show ip protocols
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 6 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: rip
Default version control: send version 1, receive any version
Interface Send Recv Key-chain
Serial1/1 1 12
Serial1/2 1 12
Serial1/4 1 12
Routing for Networks:
192.168.13.0
192.168.23.0
192.168.34.0
Routing Information Sources:
Gateway Distance Last Update
192.168.34.4 120 00:00:03
192.168.13.1 120 00:00:16
192.168.23.2 120 00:00:04
Distance: (default is 120)
r3#
For this exercise, we will only need to use routers R1, R2, R3, and R4. Configure these routers
by erasing their configurations and pasting the following configuration information into the
routers. Note that the “COMMON” section should be applied to all 4 routers, and the other
sections as appropriate. For more information on router configuration basics, see the “Basic
Router Configuration” lab.
COMMON:
service timestamp debug uptime
enable password cisco
no ip domain-lookup
ip classless
line con 0
exec-timeout 0 0
line vty 0 4
password cisco
login
R1:
hostname r1
interface Serial1/2
description Link to R2 S1/1
ip address 192.168.12.1 255.255.255.0
no shutdown
interface Serial1/3
description Link to R3 S1/1
ip address 192.168.13.1 255.255.255.0
no shutdown
router rip
network 192.168.12.0
network 192.168.13.0
R2:
hostname r2
interface Serial1/1
description Link to R1 S1/2
ip address 192.168.12.2 255.255.255.0
clockrate 2000000
no shutdown
interface Serial1/3
description Link to R3 S1/2
ip address 192.168.23.2 255.255.255.0
no shutdown
router rip
network 192.168.12.0
network 192.168.23.0
R3:
hostname r3
interface Serial1/1
R4:
hostname r4
interface Loopback0
ip address 192.168.44.4 255.255.255.0
no shutdown
interface Serial1/3
description Link to R3 S1/4
ip address 192.168.34.4 255.255.255.0
clockrate 2000000
no shutdown
router rip
network 192.168.44.0
network 192.168.34.0
Output from the “show ip route” command on each of the four routers is shown below. Note
that routes for the same 5 networks appear on each router. For each router, networks that are
directly connected prefixed with “C” for Connected while those learned through RIP are
prefixed with “R”. Note that for the RIP entries in the square brackets are the administrative
distance (120 for RIP) and the RIP hop count metric which are boldfaced. You will also
notice sometimes where there are more than one entry for the same network. For example,
notice that router R1 has two entries for network 23 both with metric 1. This is because there
are two equal cost paths from R1 to network 23, one via interface Serial1/2 and the other via
interface Serial1/3.
r1#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
R 192.168.44.0/24 [120/2] via 192.168.13.3, 00:00:20, Serial1/3
R 192.168.34.0/24 [120/1] via 192.168.13.3, 00:00:20, Serial1/3
C 192.168.12.0/24 is directly connected, Serial1/2
C 192.168.13.0/24 is directly connected, Serial1/3
R 192.168.23.0/24 [120/1] via 192.168.13.3, 00:00:20, Serial1/3
[120/1] via 192.168.12.2, 00:00:07, Serial1/2
r2#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
R 192.168.44.0/24 [120/2] via 192.168.23.3, 00:00:06, Serial1/3
R 192.168.34.0/24 [120/1] via 192.168.23.3, 00:00:06, Serial1/3
C 192.168.12.0/24 is directly connected, Serial1/1
R 192.168.13.0/24 [120/1] via 192.168.12.1, 00:00:19, Serial1/1
[120/1] via 192.168.23.3, 00:00:07, Serial1/3
C 192.168.23.0/24 is directly connected, Serial1/3
r3#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
R 192.168.44.0/24 [120/1] via 192.168.34.4, 00:00:04, Serial1/4
C 192.168.34.0/24 is directly connected, Serial1/4
R 192.168.12.0/24 [120/1] via 192.168.13.1, 00:00:27, Serial1/1
[120/1] via 192.168.23.2, 00:00:27, Serial1/2
C 192.168.13.0/24 is directly connected, Serial1/1
C 192.168.23.0/24 is directly connected, Serial1/2
r4#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
C 192.168.44.0/24 is directly connected, Loopback0
C 192.168.34.0/24 is directly connected, Serial1/3
R 192.168.12.0/24 [120/2] via 192.168.34.3, 00:00:20, Serial1/3
We will now break the connection between R3 and R4 such that R3 will no longer hear
advertisements for network 44. Instead of unplugging the cable where R3 would
immediately notice the that connection went down, we will be sneaky and instead install an
access list on R3’s interface Serial1/4 input to prevent it from hearing any RIP
advertisements. From router R3’s RIP process perspective, it will not have any indication of
any problems except that it will no longer hear advertisements for network 44.
Router R3 was reconfigured to filter out all RIP updates from R4 at 23:11:00. Here are the
messages from “debug ip rip” and “debug ip rip events” on R3:
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
9 Dosen Pengampu http://www.mercubuana.ac.id
In this example, routers R1, R2, and R3 marked their routes to network 44 with metric 16 or
unreachable after just over 3 minutes after the “break” and converged to a consistent state.
This is much faster than we would have predicted from Tanenbaum. The CISCO use of the
HOLDDOWN timer when a router will not accept routes with a higher metric and the use of
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
10 Dosen Pengampu http://www.mercubuana.ac.id
a technique called “poison reverse” where a router advertises a network with metric 16 or
unreachable help the roting tables converge more quickly than predicted.
Daftar Pustaka
‘13 Nama Mata Kuliah dari Modul Pusat Bahan Ajar dan eLearning
11 Dosen Pengampu http://www.mercubuana.ac.id
MODUL PERKULIAHAN
Basic Router
Border Gateway Protocol
14
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to configure network border How to configure network border
gateway protocol and analyze problem gateway protocol and analyze problem
Text Summary
INTERNET TEACHING LAB: BGP LAB
Overview
In this lab, we will explore the Border Gateway Protocol (BGP) and Generic Route
Encapsulation (GRE) tunnels. Each router r1 through r5 will physically connect to a
common FDDI ring. A set of 5 GRE tunnels will be implemented connecting r1r2, r2r3,
r3r4, r4r5, and r5r1. These tunnels do not use TCP or UDP, but instead a separate
protocol number 47 that operates over IP. Once established, tunnels are treated by the router
like any other point-to-point interface. Each router r1 through r5 will be in a separate
autonomous system each with its own /19 CIDR block of IP address space. Each router r1
through r5 will be configured to peer using exterior BGP with its two neighbors. BGP
version 4 is the exterior routing protocol deployed on the backbone of the Internet. BGP
organizes the network into autonomous systems identified by autonomous system numbers
(ASNs). ASNs are uniquely assigned by the American Registry for Internet Numbers
(ARIN). Only organizations with more than one Internet Service Provider (ISP) who are
“multihomed” are eligible to receive a registered ASN. You can find out more about BGP in
the Cisco routing protocols configuration guide. As of this writing, the definitive source of
information for this protocol is the textbook Internet Routing Architectures by Bassam Halabi
published by Cisco Press in 1997.
Coordinator:
Garner, Lee [Systems Programmer] (LG36-ARIN) [email protected]
850-644-2592 (FAX) 850-644-8722
Here is a summary of BGP peering sessions on the FSU BFS-7507 router. Note that our peer
at IP address 199.44.5.225 (Sprint) is sending us over 92,000 prefixes.
FSU is only advertising a small number of networks to our ISP (Sprint). This helps prevent
us from unintentionally becoming a transit AS:
Each router r1 through r5 will have only its physical FDDI interface enabled. The only
exception is router r3 who will additionally have its serial port enabled to connect with r6 for
Internet connectivity. When finished with this part, verify that you can PING the loopback0
IP address on r6, 192.168.66.6. Test by PINGing the FDDI IP broadcast address
192.168.1.255. You should hear responses from the other 4 FDDI-connected routers if all is
well.
For each router, you will need both the common part of the configuration and router specific
portion as appropriate that follows:
COMMON:
service udp-small-servers
service tcp-small-servers
enable password cisco
no ip domain-lookup
ip classless
ip subnet-zero
logging buffered
clock timezone EST -5
clock summer-time EDT recurring
ntp server 192.168.66.6
snmp-server community public RO
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
password cisco
login
R1:
hostname r1
interface Fddi0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
interface E2/0
description Vlan 10 to cat1 FA0/1
ip address 192.168.10.1 255.255.255.0
no shutdown
interface E2/1
description Vlan 20 to cat1 FA0/2
ip address 192.168.20.1 255.255.255.0
no shutdown
interface E2/2
description Vlan 30 to cat1 FA0/3
ip address 192.168.30.1 255.255.255.0
no shutdown
interface E2/3
description Vlan 40 to cat1 FA0/4
ip address 192.168.40.1 255.255.255.0
no shutdown
interface E2/4
description Vlan 50 to cat1 FA0/5
ip address 192.168.50.1 255.255.255.0
no shutdown
interface E2/5
description Vlan 60 to cat1 FA0/6
ip address 192.168.60.1 255.255.255.0
no shutdown
router rip
network 192.168.1.0
network 192.168.10.0
network 192.168.20.0
network 192.168.30.0
network 192.168.40.0
network 192.168.50.0
network 192.168.60.0
R2:
hostname r2
interface Fddi0/0
ip address 192.168.1.2 255.255.255.0
no shutdown
router rip
network 192.168.1.0
R3:
hostname r3
interface Fddi0/0
ip address 192.168.1.3 255.255.255.0
no shutdown
interface Serial1/6
description Link to R6 S1
ip address 192.168.36.3 255.255.255.0
bandwidth 2000
no shutdown
router rip
network 192.168.36.0
network 192.168.1.0
R4:
hostname r4
interface Fddi0/0
description Link to R5 FDDI0
ip address 192.168.1.4 255.255.255.0
no shutdown
router bgp 4
network 172.16.96.0 mask 255.255.224.0
neighbor 192.168.234.3 remote-as 3
neighbor 192.168.234.3 version 4
neighbor 192.168.245.5 remote-as 5
neighbor 192.168.245.5 version 4
ip route 172.16.96.0 255.255.224.0 null0
router rip
network 192.168.1.0
R5:
hostname r5
interface FastEthernet0
description Vlan70 to cat1 FA0/7
ip address 192.168.70.1 255.255.255.0
media-type 100BaseX
no shutdown
interface Ethernet0
description Vlan80 to cat1 FA0/8
ip address 192.168.80.1 255.255.255.0
media-type 10BaseT
no shutdown
interface Ethernet1
description Vlan90 to cat1 FA0/9
ip address 192.168.90.1 255.255.255.0
media-type 10BaseT
no shutdown
interface Fddi0
description Link to R4 FDDI0/0
ip address 192.168.1.5 255.255.255.0
no keepalive
no shutdown
router rip
network 192.168.70.0
network 192.168.80.0
network 192.168.90.0
network 192.168.1.0
GRE tunnel and loopback interfaces are virtual interfaces created in the Cisco IOS software.
On each router, establish two GRE tunnel interfaces and four loopback interfaces as shown
on your network diagram and table below. GRE Tunnel interfaces are normally used to
encapsulate non-IP traffic through an IP-only core network or to encapsulate private IP
addresses through the public Internet. Recent versions of the Linux operating system also
support GRE tunnels. The tunnel interfaces in this lab will encapsulate IP traffic in frames
that will physically traverse the FDDI ring but will appear to the routers as point-to-point
interfaces. You will assign an IP address to each tunnel interface just like a serial point-to-
point interface. Anchor the tunnels using the FDDI IP addresses as specified in the following
table. Be sure you can PING both your tunnel endpoints and the IP address assigned to the
tunnel interfaces on the other side. Do NOT enable RIP on any tunnel or loopback interfaces
(NOT on any 172.16.x.y interfaces). We will use BGP for routing across the tunnels in the
next part. Note that CDP does not work across tunnel interfaces. The following commands
may be helpful in debugging this section:
- ping
- show ip interface
- show ip interface brief
- clear counters
- show interface
Notice that the loopback and tunnel interfaces have status=up and protocol=up:
r1#show ip int brief
Interface IP-Address OK? Method Status Protocol
Fddi0/0 192.168.1.1 YES manual up up
Loopback0 172.16.0.1 YES manual up up
Loopback1 172.16.1.1 YES manual up up
Loopback2 172.16.2.1 YES manual up up
Loopback3 172.16.3.1 YES manual up up
Tunnel2 192.168.212.1 YES manual up up
Tunnel5 192.168.215.1 YES manual up up
r1#
...
Daftar Pustaka
MODUL PERKULIAHAN
Basic Router
Case Studies
15
Ilmu Komputer Program 15006 Andrew Fiade, MKom
Studi Teknik
Informatika
Abstract Kompetensi
How to detect and configure problem How to detect and configure problem
network with study case network with study case
Text Summary
INTERNET TEACHING LAB: START-FROM-SCRATCH LAB
Overview
Your instructor has deleted the configuration on all lab routers except for the firewall/r6
router. Since the lab network is not functional, you will need to access your router by
telnetting from xi.cs.fsu.edu to the firewall/r6 router at ITL1.cs.fsu.edu (128.186.121.88).
Once logged in, you will need to connect using reverse telnet to access your router’s console
port to get basic TCP/IP with RIP v1 working. To prove you have successfully completed
this assignment, submit a copy of your router’s output to the following commands: “show
running-config”, “show ip interface brief”, “show cdp neighbor”, and “show ip route”.
Trying 128.186.121.88...
Connected to itl1.
Password:
fw/r6>enable 2
Password:
fw/r6#clear line 1
[confirm]y [OK]
fw/r6#r1
Password:
Router>en
Password:
Router#
Use “enable” to put your router in privileged mode to allow you to make changes. Go into
configuration mode and add the basic configuration information as shown below.
Configuration mode is entered with the command “config term” and exited with control-Z.
Notice how the prompt changes to indicate the router mode. The command “show run”
displays the running configuration. “term length 24” will make the router page every 24
lines, while “term length 0” will inhibit paging. The running configuration on a router whose
configuration has been erased is shown below.
Router>enable
Router#term len 24
Router#show running-config
Building configuration...
Current configuration:
version 11.1
service udp-small-servers
service tcp-small-servers
hostname Router
line con 0
line aux 0
line vty 0 4
login
end
There are some configuration parts that will be common to all routers. In this example, we
are adding three passwords:
Two other handy commands are “no ip domain-lookup” to prevent the router from trying to
lookup any typos with DNS, and “exec-timeout 0 0” which disables a login port from logging
you out automatically.
Router#config term
r1(config)#line con 0
r1(config-line)#password cisco
r1(config-line)#login
r1(config-line)#exec-timeout 0 0
r1(config-line)#line vty 0 4
r1(config-line)#password cisco
r1(config-router)#^Z
r1#
no ip domain-lookup
line con 0
password cisco
login
exec-timeout 0 0
line vty 0 4
password cisco
Now enter the specific configuration for your router as appropriate below. I have included
the “no shutdown” command because interfaces are left in a shutdown state by default.
int loopback0
no shutdown
int serial1/2
no shutdown
no shutdown
no shutdown
no shutdown
no shutdown
no shutdown
no shutdown
router rip
network 192.168.10.0
network 192.168.20.0
network 192.168.30.0
network 192.168.40.0
network 192.168.50.0
network 192.168.60.0
network 192.168.12.0
network 192.168.13.0
network 192.168.11.0
R2:
int loopback0
no shutdown
int serial1/1
no shutdown
no shutdown
router rip
network 192.168.12.0
network 192.168.22.0
network 192.168.23.0
network 192.168.24.0
R3:
int loopback0
no shutdown
int serial1/1
no shutdown
no shutdown
no shutdown
no shutdown
router rip
network 192.168.13.0
network 192.168.23.0
network 192.168.33.0
network 192.168.34.0
network 192.168.36.0
R4:
int loopback0
no shutdown
int serial1/2
no shutdown
no shutdown
int fddi0/0
no shutdown
network 192.168.24.0
network 192.168.34.0
network 192.168.44.0
network 192.168.45.0
R5:
int loopback0
no shutdown
int FDDI0
no shutdown
int fastethernet 0
media-type 100baseX
no shutdown
int ethernet 0
media-type 10baseT
no shutdown
int ethernet 1
media-type 10baseT
no shutdown
network 192.168.45.0
network 192.168.55.0
network 192.168.70.0
network 192.168.80.0
network 192.168.90.0
R6:
int loopback0
no shutdown
int serial 1
no shutdown
router rip
network 192.168.36.0
network 192.168.66.0
default-metric 5
By default, Cisco routers send out Cisco Discovery Protocol (CDP) packets. As your router
hears CDP packets, it maintains a table of adjacent devices. Display your CDP neighbors
with the command “show cdp neighbor”. You should see a listing like this if all is working
correctly.
You can display the status of your interfaces with “show ip int brief” for an abbreviated
listing, or “show ip int” for a detailed listing. If everything is working, you should have a
status of “interface up and line protocol up” on the active interfaces. If you see the status as
“administratively down”, it means that your interface is shutdown which can be fixed with a
“no shutdown” command issued under the appropriate interface. It is normal for interfaces
not used in this lab to be in the default “shutdown” state.
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
Verify that everything is working by trying to PING each router IP address from both your
router and PC. By default, PING will send 5 ICMP echo packets. If the destination
responds, exclaimation marks “!” are displayed, otherwise a timeout is indicated by a period
“.” Try using the TRACEROUTE utility to trace the path to the other routers. Both the
PING and TRACEROUTE commands can be entered without the destination argument to
give you extended option choices such as changing the packet size, number of packets, source
interface, etc.
r1#ping 192.168.11.1
!!!!!
r1#ping 192.168.22.2
!!!!!
r1#ping 192.168.33.3
!!!!!
r1#ping 192.168.44.4
r1#ping 192.168.55.5
!!!!!
r1#ping 192.168.66.6
!!!!!
r1#traceroute 192.168.55.5
1 192.168.13.2 0 msec
192.168.12.2 0 msec
192.168.13.2 0 msec
2 192.168.24.4 8 msec
192.168.34.2 4 msec
192.168.24.4 4 msec
Display the routing table with “show ip route” and verify you have a route to each IP
network.
r3#show ip route
...
When you have everything working, save the configuration. Cisco routers have both a
running configuration and startup configuration. Issue the command:
Daftar Pustaka