Newcr501-Implementing Connections To Remote
Newcr501-Implementing Connections To Remote
Purpose statement
This module is intended to the learner pursuing TVET certificate V in networking, at the end
of this module the learner will be able to Plan and Design Remote connectivity, Install,
Configure and Troubleshoot WAN and Document the work done, he or she will be able to
work.
Page 1 of 142
Table of Contents
Elements of competence and performance criteria Page No.
Learning Unit Performance Criteria
1. Plan and Design Remote 1.1 Proper Analysis of network requirements for 3
connectivity the type of applications, traffic volume, traffic
pattern, redundancy and backup needed.
1.2 Proper analysis of Enterprise facilities and
existing WIFI &WIRED networks and sites for
technology used, location of hosts, servers,
terminals and others end nodes
1.3 Systematic identification of Security
requirements
1.4 Proper Selection of WAN technology,
hardware and software components to support
requirements based on existing technology.
1.5 Appropriate identification of tools, equipment
and materials used in Remote connection
1.6 Systematic design and interpretation of
network blueprint.
2. Install, Configure and 2.1 Proper Configuration and verification of serial 59
Troubleshoot WAN. WAN configuration
2.2 Proper Configuration and verification of WAN
protocols
2.3 Proper Configuration and verification of site
to site VPN
2.4 Proper Configuration and verification of an
ADSL connection
2.5 Proper Troubleshooting of WAN Network
2.6
3. Document of the work 3.1 Accurate documentation and submission of 138
done review process
3.2 Systematic Documentation of all logs issues
and action taken for future reference
Page 2 of 142
Learning Unit 1 –Plan and Design Remote connectivity
1. Network architectures
Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we can say
that how computers are organized and how tasks are allocated to the computer.
1.1 The types of network architectures
Peer-To-Peer network(P2P)
Client/Server network
Hybrid of client server and Peer-to-peer (P2P)
1. 1.1 Peer-to-Peer network Architecture
In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore,
there is no real hierarchy in this network, all computers are considered equal and all have
the same abilities to use the resources available on this network. Instead of having a central
server which would act as the shared drive, each computer that connected to this network
would act as the server for the files stored on it.
Page 3 of 142
The over-all cost of building and maintaining this type of network is comparatively
very less.
Page 4 of 142
A server has a Network Operating System (NOS) to provide the resources to the
clients, but the cost of NOS is very high.
It requires a dedicated network administrator to manage all the resources.
The hybrid network is the combination of client-server and peer to peer network.
Many network use mixture of both network networks. This network can provide the
advantage of both networks.
2. Network applications
In the web application there are two different programs that communicate with each other.
Browser program running in the user’s host
Web server program running in the web server host.
Page 5 of 142
Examples of network applications:
2.1 E-mail
Short for electronic mail, email (or e-mail) is defined as the transmission of
messages over communications networks. Typically the messages are notes entered
from the keyboard or electronic files stored on disk. Most mainframes,
minicomputers, and computer networks have an email system.
Examples:
2.2 Web
The Web, or World Wide Web (W3), is basically a system of Internet servers that support
specially formatted documents. The documents are formatted in a markup language called
HTML (HyperText Markup Language) that supports links to other documents, as well as
graphics, audio, and video files.
A web page or webpage is a document, commonly written in HTML, that is viewed in an
Internet browser. A web page can be accessed by entering a URL address into a
browser's address bar. A web page may contain text, graphics, and hyperlinks to other web
pages and files.
A website refers to a central location that contains more than one web page. For example,
Computer Hope is considered a website, which includes thousands of different web pages,
including this web page you are reading now.
Page 6 of 142
1. Instant messaging
(IM) technology is a type of online chat that offers real-time text transmission over the
Internet. A LAN messenger operates in a similar way over a local area network. Short
messages are typically transmitted between two parties, when each user chooses to
complete a thought and select "send"
A remote login allows a user terminal to connect to a host computer via a network or direct
telecommunication link, and to interact with that host computer as if the user terminal were
directly connected to that host computer. Synonym remote logon.
The basic premise of peer-to-peer file-sharing networks is to allow people who want to
share files on their computer to freely connect with other persons of like mind without
having to know anything about how the network operates or anything about other
computers on the network. Every computer in a file-sharing network can be both a client
Page 7 of 142
and a server, and the methods for connecting them together into one huge network are all
handled by the file-sharing software
Multi user games are games where you play online with other online gamers. For example
you can play your component online; you can be playing an opponent which is sitting on the
other side of the earth. The internet creates a server for all the gamers to come into and
play each other. You can play online games from your PC, PS3 and X Box because they can
be connected to internet and play online. Online games can range from simple text
based environments to games incorporating complex graphics and virtual worlds populated
by many players simultaneously.
Streaming means a user can listen (or watch) the file after the downloading has started. In
the first category, streaming stored audio/video, the files are compressed and stored on a
server. A client downloads the files through the Internet. This is sometimes referred to as
on-demand audio/video.
Streaming of videos involve, storing of pre-recorded videos on servers.
Page 8 of 142
Users send request to those servers.
Users may watch the video from the start till the end, and may pause it anytime, do
a forward or reverse skip, or stop the video whenever they want to do so.
2.7 Real-time video conference
Video conferencing is a visual communication session between two or more users
(participants) regardless of their location, featuring audio and video content transmission in
real time.
Social networking is the use of Internet-based social media sites to stay connected with
friends, family, colleagues, customers, or clients. Social networking can have a social
purpose, a business purpose, or both, through sites such as Facebook, Twitter, LinkedIn, and
Instagram, among others.
Page 9 of 142
2.9 Massive parallel computing
Massively parallel is the term for using a large number of computer processors (or
separate computers) to simultaneously perform a set of coordinated computations
in parallel.
2.10 Internet telephone
Internet Telephony refers to all types of telephony services (including phone calls, fax,
voicemail, video calls and other forms of communication) where calls and data are sent
digitally over the Internet using the Internet Protocol (IP), rather than being transmitted
over traditional analogue landlines
Page 10 of 142
packetized, addressed, transmitted, routed and received on a TCP/IP network. This
functionality is organized into four abstraction layers and each protocol in the suite resides
in a particular layer.
The TCP/IP suite is named after its most important protocols, the Transmission Control
Protocol (TCP) and the Internet Protocol (IP). Some of the protocols included in the TCP/IP
suite are:
ARP (Address Resolution Protocol) – used to associate an IP address with a MAC
address.
IP (Internet Protocol) – used to deliver packets from the source host to the
destination host based on the IP addresses.
ICMP (Internet Control Message Protocol) – used to detects and reports network
error conditions. Used in ping.
TCP (Transmission Control Protocol) – a connection-oriented protocol that enables
reliable data transfer between two computers.
UDP (User Datagram Protocol) – a connectionless protocol for data transfer. Since a
session is not created before the data transfer, there is no guarantee of data
delivery.
FTP (File Transfer Protocol) – used for file transfers from one host to another.
Telnet (Telecommunications Network) – used to connect and issue commands on a
remote computer.
DNS (Domain Name System) – used for host names to the IP address resolution.
HTTP (Hypertext Transfer Protocol) – used to transfer files (text, graphic images,
sound, video, and other multimedia files) on the World Wide Web.
3.4 OSI Model
Page 11 of 142
3.4.3 The Session Layer (Layer 5)
Layer 5 of the OSI model is referred to as the Session Layer. The Session Layer is the layer
responsible for establishing, maintaining and ending connections between different
applications. This layer controls the terms on which applications interact with each other. A
key part of this is simple coordination, as the Session Layer will dictate how long a system
will wait for a response from another application. Typically you’ll see protocols such
as NetBIOS, NFS, RPC, and SQL operating on this layer.
Page 12 of 142
light up. At this layer, you will encounter Ethernet, RS232, ATM, and FDDI. Most of the time
administrators use the Physical Layer to check that cables and devices are connected
correctly.
4. Routing protocols
The purpose of routing protocols is to learn of available routes that exist on the enterprise
network, build routing tables and make routing decisions. Some of the most common
routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP.
4.1 Three (3) mainly x different classes of routing protocols:
4.1.1 Distance Vector Routing Protocol – These protocols selects best path in the basis of
hop counts to reach a destination network in the particular direction. Dynamic protocol like
RIP is an example of distance vector routing protocol. Hop count is each router which occurs
in between the source and the destination network. The path with the least hop count will
be chosen as the best path.
Features –
Updates of network are exchanged periodically.
Updates (routing information) is always broadcast.
Full routing tables are sent in updates.
Routers always trust on routing information received from neighbor routers. This is
also known as routing on rumors.
Disadvantages –
As the routing information are exchanged periodically, unnecessary traffic is
Page 13 of 142
Concept of triggered updates is used i.e updates are triggered only when there is a
topology change.
Only that much updates are exchanged which is requested by the neighbor router.
Page 14 of 142
5.1 Virtual Private Network (VPN) is basically of 2 types:
Remote Access VPN permits a user to connect to a private network and access all its services
and resources remotely. The connection between the user and the private network occurs
through the Internet and the connection is secure and private. Remote Access VPN is useful
for home users and business users both.
An employee of a company, while he/she is out of station, uses a VPN to connect to his/her
company’s private network and remotely access files and resources on the private network. Private
users or home users of VPN, primarily use VPN services to bypass regional restrictions on the
Internet and access blocked websites. Users aware of Internet security also use VPN services to
enhance their Internet security and privacy.
Page 15 of 142
generates a tunnel between two L2TP connection points and IPSec protocol encrypts the
data and maintains secure communication between the tunnel.
Point–to–Point Tunneling Protocol (PPTP):
PPTP or Point-to-Point Tunneling Protocol generates a tunnel and confines the data packet.
Point-to-Point Protocol (PPP) is used to encrypt the data between the connection. PPTP is
one of the most widely used VPN protocol and has been in use since the early release of
Windows. PPTP is also used on Mac and Linux apart from Windows.
SSL and TLS:
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) generate a VPN connection
where the web browser acts as the client and user access is prohibited to specific
applications instead of entire network. Online shopping websites commonly uses SSL and
TLS protocol. It is easy to switch to SSL by web browsers and with almost no action
required from the user as web browsers come integrated with SSL and TLS. SSL connections
have “https” in the initial of the URL instead of “http”.
OpenVPN:
OpenVPN is an open source VPN that is commonly used for creating Point-to-Point and
Site-to-Site connections. It uses a traditional security protocol based on SSL and TLS
protocol.
Secure Shell (SSH):
Secure Shell or SSH generates the VPN tunnel through which the data transfer occurs and
also ensures that the tunnel is encrypted. SSH connections are generated by a SSH client
and data is transferred from a local port on to the remote server through the encrypted
tunnel.
Page 16 of 142
Digital: No type of communication is transferred in an analog method. All data is
purely digital, and only at the end, modulated to be carried over the line.
Subscriber Line: The data is carried over a single twisted pair copper loop to the
subscriber premises.
How Does ADSL Work?
Functional Elements
Use of Bandwidth
Channel Separation & POTS Splitter
Transmission Methods:
-Discrete Multi-tone Modulation (DMT)
-Quadrate Amplitude Modulation (QAM)
-Carrier less Amplitude/phase Modulation (CAP)
ADSL2
ADSL2 stands for “Asymmetric digital subscriber line 2”, it is essentially the same as ADSL,
but can offer higher speeds. It consists of download speeds of 24Mbps and upload speeds of
8Mbps, this is depended on the provider, peak times, and contention ratio.
SDSL
SDSL stands for “Symmetric Digital Subscriber Line”, again, like all DSL technologies, it uses
copper wires to delivers a symmetrical internet connection. Symmetrical meaning the
upload speed is the same as the download speed. The max speed you can achieve on this
line is 3Mbps up and down.
VDSL
VDSL stands for “very-high-bit-rate digital subscriber line”, along with the HDSL, its one of
the most popular form of DSL due to the higher speed it can deliver. VSDL can reach speeds
of 52Mbps download and 16Mbps upload. It, again, uses copper telephone wires.
VDSL2
VDSL2 stands for “very-high-bit-rate digital subscriber line 2″, it’s essentially the same as a
VDSL but can deliver higher speeds and like VDSL it also uses existing copper telephone
lines. VDSL2 allows speeds of up to 80Mbps, which is considerably more than it’s inferior
VDSL.
Page 17 of 142
Traditional network boundaries have been removed
Complexities of networks
Reduce the time to develop and market products
What affect Network Design?
Page 18 of 142
1.3 Characterize the Existing Network and Sites
Page 19 of 142
Analyze technical goals and tradeoffs
- No downtime, access data anywhere
Characterize the existing network
Characterize network traffic
Phase 2 – Logical Network Design
• Design a network topology
• Design models for addressing and naming
• Select switching and routing protocols
o Selecting Switching Protocols
Selecting Switching Protocols VLANING, VLAN Trunking Protocols (ISL, Dot1q), inter-
VLAN Routing, VTP, STP, RSTP, PVST+, CEF
o Selecting Routing Protocols
Characterizing Routing Protocols Distance-vector, link-state, or hybrid, Interior or
exterior, Classless or classful, Fixed-length or variable-length subnet masks (VLSM),
Flat or hierarchical, IPv4 or IPv6
Page 20 of 142
Point-to-Point Protocol (PPP)
Cable modems
Digital subscriber line (DSL)
Phase 4 – Testing, Optimizing, and Documenting the Network Design
• Test the network design
• Optimize the network design
• Document the network design
2. Wired and Wireless network technologies
In computing terminology, the term "wired" is used to differentiate between wireless connections
and those that involve cables, While wireless devices communicate over the air, a wired setup uses
physical cables to transfer data between different devices and computer systems.
2.1 Wired Technology
Wired technology is more associated with wired communication Wired communication refers to the
transmission of data over a wire based communication technology.
Examples include telephone networks, cable television or internet access, and fiber-optic
communication. Anything and everything you see around yourself having wires and uses electricity
to operate belongs to wired technology.
Page 21 of 142
2.2.1 Types of Wireless Communication
The different types of wireless communication mainly include, IR wireless communication,
satellite communication, broadcast radio, Microwave radio, Bluetooth, etc.
Satellite Communication
A communications satellite is an artificial satellite that relays and amplifies radio
telecommunications signals via a transponder; it creates a communication channel between a source
transmitter and a receiver(s) at different locations on Earth.
Infrared Communication
IR, or infrared, communication is a common, inexpensive, and easy to use
wireless communication technology. IR light is very similar to visible light, except that it has
a slightly longer wavelength. This means IR is undetectable to the human eye - perfect for
wireless communication.
Broadcast Radio
Broadcast Radio is the distribution of audio content to a dispersed audience via any
electronic mass communications medium, but typically one using the electromagnetic
spectrum (radio waves), in a one-to-many model.
Page 22 of 142
Microwave Communication
Microwave transmission is the transmission of information or energy by electromagnetic
waves whose wavelengths are measured in small numbers of centimeter; these are called
microwaves.
(low frequency ).
Wi-Fi(Wireless Fidelity)
Wi-Fi is a low power wireless communication , that is used by various electronic devices like
smart phones, laptops, etc. In this setup, a router works as a communication hub wirelessly.
Routers
A network router is one kind of network device in a computer network and it is used for
routing traffic from one network to another. These two networks could be private to a
public company network.
Bridge
A Bridge in the computer network is used to unite two or more network segments. The main
function of a bridge in network architecture is to store as well as transmit frames among the
various segments. Bridges use MAC (Media Access Control) hardware for transferring
frames.
Repeater
The operating of a repeater can be done at the physical layer. The main function of this
device is to reproduce the signal on a similar network before the signal gets weak otherwise
Page 23 of 142
damaged. The significant point to be noted regarding these devices is that they do not
strengthen the signal. Whenever the signal gets weak, then they reproduce it at the actual
strength. A repeater is a two-port device.
Gateway
Generally, a gateway performs at the session & transport layers in the OSI model. Gateways
offer conversion between networking technologies like OSI (Open System Interconnection)
& TCP/IP. Because of this, these are connected to two or many autonomous networks,
where each network has its own domain name service, routing algorithm, topology,
protocols, and procedures of network administration & policies.
Gateways execute all the functions of routers. Actually, a router with additional conversion
functionality is a gateway, so the conversion between various network technologies is
known as a protocol converter.
Modem
A modem is the most important network device and it is used daily in our life. If we notice
the internet connection to homes was given with the help of a wire. then wire carries
internet data from one place to another. But, every computer gives digital or binary data in
the form of zeros & ones.
Network Switch
Similar to a hub, this is also working at the layer in the LAN and a switch is more clever
compare with a hub. As the hub is used for data transferring, whereas a switch is used for
Page 24 of 142
filtering & forwarding the data. So this is the more clever technique to deal with the data
packets.
2. Network nodes
A node is any physical device within a network of other tools that’s able to send, receive, or
forward information. A personal computer is the most common node. It's called
the computer node or internet node.
Modems, switches, hubs, bridges, servers, and printers are also nodes, as are other devices
that connect over Wi-Fi or Ethernet.
Page 25 of 142
LO 1.4 –Selection of WAN technology, hardware and software components
● Content/Topic 1 : Selection of WAN Technology
1. Selecting a WAN Technology
1.1 WAN Services
ISPs can use are several WAN access connection options to connect the local loop to the
enterprise edge. These WAN access options differ in technology, speed, and cost. Each has
distinct advantages and disadvantages. Familiarity with these technologies is an important
part of network design.
As shown in Figure below and described in the list that follows, an enterprise can get WAN
access in two ways.
The topology in the figure below, illustrates some of these WAN access technologies.
Page 26 of 142
Figure: WAN Access Technologies
When a WAN service provider receives data from a client at a site, it must forward the data
to the remote site for final delivery to the recipient. In some cases, the remote site may be
connected to the same service provider as the originating site. In other cases, the remote
site may be connected to a different ISP, and the originating ISP must pass the data to the
connecting ISP.
Long-range communications are usually those connections between ISPs, or between
branch offices in very large companies.
Service provider networks are complex. They consist mostly of high-bandwidth fiber-optic
media, using either the Synchronous Optical Networking (SONET) or Synchronous Digital
Hierarchy (SDH) standard. These standards define how to transfer multiple data, voice, and
video traffic over optical fiber using lasers or light-emitting diodes (LEDs) over great
distances.
SONET is an American-based ANSI standard, while SDH is a European-based ETSI and ITU
standard.
Both are essentially the same and, therefore, often listed as SONET/SDH.
A newer fiber-optic media development for long-range communications is called dense
wavelength division multiplexing (DWDM). DWDM multiplies the amount of bandwidth
that a single strand of fiber can support, as illustrated in the figure below.
Page 27 of 142
Figure: DWDM
DWDM circuits are used in all modern submarine communications cable systems and other
long-haul circuits, as illustrated in Figure below.
Page 28 of 142
1.2 Private WAN Infrastructures
Advantages Disadvantages
Simplicity: Point-to-point communication Cost: Point-to-point links are generally the
links require minimal expertise to install most expensive type of WAN access. The cost
and maintain. of leased-line solutions can become significant
when they are used to connect many sites over
Page 29 of 142
increasing distances. In addition, each endpoint
requires an interface on the router, which
increases equipment costs.
Quality: Point-to-point communication Limited flexibility: WAN traffic is often
links usually offer high service quality, if variable, and leased lines have a fixed capacity,
they have adequate bandwidth. The so the bandwidth of the line seldom matches
dedicated capacity removes latency or the need exactly. Any change to the leased line
jitter between the endpoints. generally requires a site visit by ISP personnel
to adjust capacity.
Availability: Constant availability is
essential for some applications, such as e-
commerce. Point-to-point communication
links provide permanent, dedicated
capacity, which is required for VoIP or
Video over IP.
1.2. 2 Dialup
Dialup WAN access may be required when no other WAN technology is available. For
example, a remote location could use modems and analog dialed telephone lines to provide
low capacity and dedicated switched connections. Dialup access is suitable when
intermittent, low-volume data transfers are needed.
Page 30 of 142
continuously varying electronic signal that is a translation of the subscriber voice into an
analog signal.
Traditional local loops can transport binary computer data through the voice telephone
network using a dialup modem. The modem modulates the binary data into an analog signal
at the source and demodulates the analog signal to binary data at the destination. The
physical characteristics of the local loop and its connection to the PSTN limit the rate of the
signal to less than 56 kb/s.
For small businesses, these relatively low-speed dialup connections are adequate for the
exchange of sales figures, prices, routine reports, and email. Using automatic dialup at night
or on weekends for large file transfers and data backup can take advantage of lower off-
peak rates. These rates, often referred to as tariffs or toll charges, are based on the distance
between the endpoints, time of day, and the duration of the call.
The advantages of modem and analog lines are simplicity, availability, and low
implementation cost. The disadvantages are the low data rates and a relatively long
connection time. The dedicated circuit has little delay or jitter for point-to-point traffic, but
voice or video traffic does not operate adequately at these low bit rates.
Although very few enterprises support dialup access, it is still a viable solution for remote
areas with limited WAN access options.
1.2.3 ISDN
Integrated Services Digital Network (ISDN) is a circuit-switching technology that enables the
local loop of a PSTN to carry digital signals, resulting in higher capacity switched
connections.
ISDN changes the internal connections of the PSTN from carrying analog signals to time-
division multiplexed (TDM) digital signals. TDM allows two or more signals, or bit streams,
to be transferred as sub channels in one communication channel. The signals appear to
transfer simultaneously; but physically, the signals are taking turns on the channel.
The following figure displays a sample ISDN topology. The ISDN connection may require a
terminal adapter (TA), which is a device used to connect ISDN Basic Rate Interface
(BRI) connections to a router.
Page 31 of 142
Basic Rate Interface (BRI): ISDN BRI is intended for the home and small enterprise
and provides two 64 kb/s bearer channels (B) for carrying voice and data and a 16 kb/s
delta channel (D) for signaling, call setup, and other purposes. The BRI D channel is often
underused because it has only two B channels to control.
Primary Rate Interface (PRI): ISDN is also available for larger installations. In North
America, PRI delivers 23 B channels with 64 kb/s and one D channel with 64 kb/s for a total
bit rate of up to 1.544 Mb/s. This includes some additional overhead for synchronization. In
Europe, Australia, and other parts of the world, ISDN PRI provides 30 B channels and one D
channel, for a total bit rate of up to 2.048 Mb/s, including synchronization overhead .
BRI has a call setup time that is less than a second, and the 64 kb/s B channel provides
greater capacity than an analog modem link. In comparison, the call setup time of a dialup
modem is approximately 30 or more seconds with a theoretical maximum of 56 kb/s. With
ISDN, if greater capacity is required, a second B channel can be activated to provide a total
of 128 kb/s. This permits several simultaneous voice conversations, a voice conversation
and data transfer, or a video conference using one channel for voice and the other for video.
Page 32 of 142
Although ISDN is still an important technology for telephone service provider networks, it has
declined in popularity as an Internet connection option with the introduction of high-speed DSL and
other broadband services.
1.2.5 ATM
Asynchronous Transfer Mode (ATM) technology is capable of transferring voice, video, and
data through private and public networks. It is built on a cell-based architecture rather than
on a frame-based architecture. ATM cells are always a fixed length of 53 bytes. The ATM cell
contains a 5-byte ATM header followed by 48 bytes of ATM payload. Small, fixed-length cells
are well suited for carrying voice and video traffic because this traffic is intolerant of delay.
Video and voice traffic do not have to wait for larger data packets to be transmitted, as
shown in the following figure.
Page 33 of 142
The 53-byte ATM cell is less efficient than the bigger frames and packets of Frame Relay.
Furthermore, the ATM cell has at least 5 bytes of overhead for each 48-byte payload. When
the cell is carrying segmented network layer packets, the overhead is higher because the
ATM switch must be able to reassemble the packets at the destination. A typical ATM line
needs almost 20 percent greater bandwidth than Frame Relay to carry the same volume of
network layer data.
ATM was designed to be extremely scalable and to support link speeds of T1/E1 to OC-12
(622 Mb/s) and faster.
As with other shared technologies, ATM allows multiple VCs on a single leased-line
connection to the network edge. ATM networks are now considered to be a legacy
technology.
Page 34 of 142
Figure: Sample Ethernet WAN Topology
Ethernet WANs have gained in popularity and are now commonly being used to replace the
traditional Frame Relay and ATM WAN links.
1.2.7 MPLS
Multiprotocol Label Switching (MPLS) is a multiprotocol high-performance WAN technology
that directs data from one router to the next. MPLS is based on short path labels rather than
IP network addresses.
MPLS has several defining characteristics. It is multiprotocol, meaning it has the ability to
carry any payload including IPv4, IPv6, Ethernet, ATM, DSL, and Frame Relay traffic. It uses
labels that tell a router what to do with a packet. The labels identify paths between distant
routers rather than endpoints, and while MPLS actually routes IPv4 and IPv6 packets,
everything else is switched.
Page 35 of 142
MPLS is a service provider technology. Leased lines deliver bits between sites, and Frame
Relay and Ethernet WAN deliver frames between sites. However, MPLS can deliver any type
of packet between sites. MPLS can encapsulate packets of various network protocols. It
supports a wide range of WAN technologies including T-carrier/E-carrier links, Carrier
Ethernet, ATM, Frame Relay, and DSL.
The sample topology in figure below , illustrates how MPLS is used. Notice that the different
sites can connect to the MPLS cloud using different access technologies.
1.2.8 VSAT
All private WAN technologies discussed so far used either copper or fiber-optic media. What
if an organization needed connectivity in a remote location where no service providers offer
WAN service?
Very small aperture terminal (VSAT) is a solution that creates a private WAN using satellite
communications. A VSAT is a small satellite dish similar to those used for home Internet and
TV. VSATs create a private WAN while providing connectivity to remote locations.
Specifically, a router connects to a satellite dish that is pointed to a service provider’s
satellite. This satellite is in geosynchronous orbit in space. The signals must travel
approximately 35,786 kilometers (22,236 miles) to the satellite and back.
The example in the figure below, displays a VSAT dish on the roofs of the buildings
communicating with a satellite thousands of kilometers away in space.
Page 36 of 142
Figure: Sample VSAT Topology
Page 37 of 142
The topology in Figure below, displays a sample DSL WAN connection.
Page 38 of 142
The topology in the figure below, displays a sample cable WAN connection.
1.3.3 Wireless
Wireless technology uses the unlicensed radio spectrum to send and receive data. The
unlicensed spectrum is accessible to anyone who has a wireless router and wireless
technology in the device he or she is using.
Until recently, one limitation of wireless access has been the need to be within the local
transmission range (typically less than 100 feet) of a wireless router or a wireless modem
that has a wired connection to the Internet. The following new developments in broadband
wireless technology are changing this situation:
Municipal Wi-Fi: Many cities have begun setting up municipal wireless networks.
Some of these networks provide high-speed Internet access for free or for substantially less
than the price of other broadband services. Others are for city use only, allowing police and
fire departments and other city employees to do certain aspects of their jobs remotely. To
connect to a municipal Wi-Fi, a subscriber typically needs a wireless modem, which
provides a stronger radio and directional antenna than conventional wireless adapters.
Most service providers provide the necessary equipment for free or for a fee, much like
they do with DSL or cable modems.
WiMAX: Worldwide Interoperability for Microwave Access (WiMAX) is a new
technology that is just beginning to come into use. It is described in the IEEE standard
Page 39 of 142
802.16. WiMAX provides high-speed broadband service with wireless access and provides
broad coverage like a cell phone network rather than through small Wi-Fi hotspots. WiMAX
operates in a similar way to Wi-Fi, but at higher speeds, over greater distances, and for a
greater number of users. It uses a network of WiMAX towers that are similar to cell phone
towers. To access a WiMAX network, subscribers must subscribe to an ISP with a WiMAX
tower within 30 miles of their location. They also need some type of WiMAX receiver and a
special encryption code to get access to the base station.
Satellite Internet: Typically, rural users use this type of technology where cable and
DSL are not available. A VSAT provides two-way (upload and download) data
communications. The upload speed is about one-tenth of the 500 kb/s download speed.
Cable and DSL have higher download speeds, but satellite systems are about 10 times
faster than an analog modem. To access satellite Internet services, subscribers need a
satellite dish, two modems (uplink and downlink), and coaxial cables between the dish and
the modem.
Page 40 of 142
Figure: Sample Cellular Topology
Phones, tablet computers, laptops, and even some routers can communicate through to the
Internet using cellular technology. These devices use radio waves to communicate through a
nearby mobile phone tower. The device has a small radio antenna, and the provider has a
much larger antenna sitting at the top of a tower somewhere within miles of the phone.
Security: VPNs provide the highest level of security by using advanced encryption
and authentication protocols that protect data from unauthorized access.
Scalability: Because VPNs use the Internet infrastructure within ISPs and devices, it is
easy to add new users. Corporations are able to add large amounts of capacity without
adding significant infrastructure.
Page 42 of 142
Figure: Sample Remote-Access VPN Topology
Page 43 of 142
What Quality of Service is required? This may limit the choices. If the traffic is highly
sensitive to latency and jitter, eliminate any WAN connection options that cannot provide
the required quality.
What are the security requirements (data integrity, confidentiality, and security)?
These are important factors if the traffic is of a highly confidential nature, or if it provides
essential services, such as emergency response.
Which connection options are available locally? In some areas, not all WAN
connection options are available. In this case, the selection process is simplified, although
the resulting WAN may provide less than optimal performance. For example, in a rural or
remote area, the only option may be VSAT or cellular access.
What is the cost of the available connection options? Depending on the option chosen, the
WAN can be a significant ongoing expense. The cost of a particular option must be weighed
against how well it meets the other requirements. For example, a dedicated leased line is
the most expensive option, but the expense may be justified if it is critical to ensure secure
transmission of high volumes of real-time data. For less demanding applications, a less
expensive switched or Internet connection option may be more suitable.
Page 44 of 142
Using the preceding guidelines, as well as those described by the Cisco Enterprise
Architecture, a network administrator should be able to choose an appropriate WAN
connection to meet the requirements of different business scenarios.
Broadband modem: This type of digital modem is used with high-speed DSL or cable
Internet service. Both operate in a similar manner to the voiceband modem but use higher
broadband frequencies to achieve higher transmission speeds.
Channel service unit/data service unit (CSU/DSU): Digital leased lines require a CSU
and a DSU. A CSU/DSU can be a separate device like a modem, or it can be an interface on
a router. The CSU provides termination for the digital signal and ensures connection
integrity through error correction and line monitoring. The DSU converts the line frames
into frames that the LAN can interpret and vice versa.
Router: This device provides internetworking and WAN access interface ports that
are used to connect to the service provider network. These interfaces may be serial
connections, Ethernet, or other WAN interfaces. With some types of WAN interfaces,
an external device, such as a DSU/CSU or modem (analog, cable, or DSL), is required
to connect the router to the local service provider.
Core router/Multilayer switch: This router or multilayer switch resides within the
middle or backbone of the WAN, rather than at its periphery. To fulfill this role, a
router or multilayer switch must be able to support multiple telecommunications
interfaces of the highest speed used in the WAN core. It must also be able to forward
IP packets at full speed on all of those interfaces. The router or multilayer switch
must also support the routing protocols being used in the core.
Page 45 of 142
Figure: Common WAN Devices
The preceding list is not exhaustive, and other devices may be required, depending on the
WAN access technology chosen.
Page 46 of 142
QR codes with their smartphones, pay their bills on the go and check the stock market in
real time.
Laptops: Today, these communication tools are used mostly for work.However,
laptops have some advantages over smart phones and tablets. Let's take software
development. Even though you can design an app or a website on your tablet, it's easier
to do in on a laptop or desktop computer.
If you're a blogger or copywriter, doing your work on a tablet can be difficult. The small
screen may cause eyestrain and affect your productivity. Additionally, laptops have a
larger storage capacity compared to smart phones and tablets, letting you save large files
and access them with ease.
Tablets: They're portable and have all the functionalities of a smartphone and
more.If you're a business owner, it's important to target customers across all devices and
channels. Your website needs to be responsive and provide a seamless mobile
experience. The same goes for your advertising campaigns, which need to be customized
for each device so you can target the right audience in the right context.
VOIP/Internet telephony: Nowadays, more and more organizations are carrying
voice communications over the internet. They use Skype and other platforms to interview
potential employees, hold video conferences and make international calls. These
communication modes are cheaper and more convenient than traditional phone services.
VoIP (Voice over Internet Protocol), has emerged as one of the most popular
communication tools worldwide. Small businesses can save as much as 75 percent on local
calls by switching to VoIP. Higher productivity, greater flexibility and more efficient
message management are just a few of the benefits linked to this service.
Intranet: An intranet is a private network that can be accessed by authorized users
within an organization. Companies use an intranet to streamline communication between
employees, share documents and keep them up-to-date with the latest industry news.
This technology ensures everyone is on the same page, allowing for more efficient
collaboration.
Social networks and forums: Social media is widely used by individuals and
corporations worldwide. It has the power to drive business decisions, increase brand
awareness and connect customers with their favourite brands. It's also one of the most
important communication tools, making it easier for brands to reach their target
audience and get their message across.
Companies can harness the power of social media to strengthen their online presence and
improve customer experience. For example, customers leave valuable feedback on your
Facebook business page. Here you can address their concerns and get better insights into
your audience.
Page 47 of 142
Forums can be a valuable communication tool. As a business owner, you can use these
platforms to learn more about your customers' needs and wants. You can also reply to
their questions, recommend products and find ideas for your marketing campaigns.
These are just a few of many communication tools available today. Messenger apps, chat
bots, email, internal blogs and tracking software are also useful and often essential
communication tools. Businesses can leverage modern technology to attract and engage
customers, address their inquiries and deliver a superior experience across all devices.
Steps
Like Telnet, a user accessing a remote device must have an SSH client installed. On a remote
device, an SSH server must be installed and running. SSH uses the TCP port 22 by default.
Here is an example of creating an SSH session using Putty, a free SSH client:
Page 48 of 142
1.3 Remote desktop tools
Remote Desktop Software is a tool that uses Virtual Network Computing (VNC) to allow one
computer to remotely access and control another computer over an internet/network connection.
1.3.1 TeamViewer
Available in premium and free versions, TeamViewer is quite an impressive online collaboration tool
used for virtual meetings and sharing presentations. It brings features like full-time access to the
remote computers and servers, plus online meetings with support for up to 25 participants, and
many other useful features. Also, the setup is incredibly easy and user friendly. If you’re a
businessperson planning to conduct online meetings or training sessions, TeamViewer can be a good
option.
1.3.2 Splashtop
Page 49 of 142
With more than 15 million users across the globe, Splashtop is another one of our best
remote desktop tools. What makes this remote tool different from the rest is its amazing
screen refresh rate and audio/video streaming capabilities. If you’re associated with the
education industry, there is a special version that can bring your classroom alive, and there
are other separate options for personal, business and enterprise use.
1.3.3. Chrome Remote Desktop
Chrome Remote Desktop is a cloud-based solution that offers all the essential features
required to control a desktop remotely. On top of that, you can use this free remote
desktop solution from either desktop or mobile devices.
1.3.4 TightVNC
Page 50 of 142
VNC, or Virtual Network Computing, is a graphical desktop sharing system that utilizes the
remote frame buffer protocol to control another computer remotely. TightVNC utilizes this
system to provide a high-caliber, remote desktop monitoring service. Its ample support for
multiple operating systems make this remote desktop tool quite popular among business
users and IT managers. If you are looking for free remote control software package, this is
one of the best options.
● Content/Topic 2 : Identification of Equipment and materials in remote connection
Equipments and materials used in remote access connection
Router : Is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet.
-Coaxial cable
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, braiding covers the insulation, and the insulation covers the conductor.
The following image shows these components.
Page 51 of 142
Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built from the
same metal that is used to build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided-shield. Since
both the core and the braided-shield use the same metal, without this layer, they will touch
each other and create a short-circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor, while
a multi-core coaxial cable uses multiple thin strands of metal wires. The following image
shows both types of cable.
-Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also
known as Ethernet cable. Almost all modern LAN computer networks use this cable.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair
cable; UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal
shield, then all pairs are wrapped in a single outer plastic sheath.
Page 52 of 142
PC : A personal computer (PC) is a multi-purpose computer whose size, capabilities, and
price make it feasible for individual use. Personal computers are intended to be operated directly
by an end user, rather than by a computer expert or technician.
Page 53 of 142
LO 1.6– Systematic design and interpretation of network blueprint.
● Content/Topic 1: description of Network design principles
4. Network design principles
Functionality : Your all network applications and devices should be performing all the
functions properly. You have to make sure, does your network infrastructure suppose
the all the services running in your network? For example you are using the Microsoft
dot net then you have the enough bandwidth and hardware to work your applications
to work efficiently.
Scalability: Is the ability to add additional resources, for example, routers, switches,
servers, memory, disks, and CPUs to an architecture without redesigning it
Manageability: You can manage your network using different tools like Cisco works or
tools that can improve control over the network like capacity management, monitoring
performance and detecting fault. You also need to manage the network security.
Cost effectiveness:
Efficiency: You can provide the efficiency with placing the best hardware and software
in the network. Also make sure that your network equipment is cost effective, you can
also build the most efficient network with choosing the most suitable and cost
effective hardware and software. You can provide the efficiency with QoS, AAA and
filtering.
Performance: You also need to focus of network performance during designing the
network, make sure that all your applications and devices have bandwidth they need.
Page 54 of 142
● Content/Topic 2 : Description of network design tools
5. Network design Tools
a) eDraw:
eDraw Max is another network mapping tool with a Microsoft-inspired user interface. Over
200 map template designs can be exported into PNG, JPEG and PDF formats. eDraw is more
of a generalist diagram tool rather than a specific network mapper. However, its capacity to
map out flow charts and complex layouts makes it a solid choice for drawing up a network
plan.
b)CONCEPTDRAW PRO
For medium size enterprises, ConceptDraw Pro stands its ground against every other
network-mapping program on this list. The user interface (clearly inspired by Microsoft
Visio) allows you to create a variety of visual displays of your network environment as well
as export Visio files.
Page 55 of 142
c) LUCIDCHART
Lucidchart is one of the less known network mapping platforms that packs a tremendous
punch. If you’re looking to fast track your map production, then look no further. From the
outset you can launch straight into a template and start building your IT environment.
d) INTERMAPPER
Intermapper is one of the pricier network mapping tools on this list. This program is
available for users on Windows, Linux, and Mac, making it a flexible platform in terms of
deployment. Intermapper was built with auto discovery in mind and will automatically
locate devices throughout your network and record them on a map.
Page 56 of 142
e) CADE (FREE)
As the name suggests, LanFlow is tailor made for mapping out networks. As a result, it is a
great choice for network administrators looking for a topology tool with a simple user
Page 57 of 142
interface. Everything in LanFlow is drag and drop, so if you want to add a new element to
your diagram, all you need to do is click and move it.
G) NETWORK NOTEPAD (FREE)
Network Notepad is a freeware application available for Windows made specifically for
mapping out network elements. While Network Notepad doesn’t have an extensive auto-
discovery feature, it does have the Cisco Discovery Protocol Neighbor Tool (CPD), which can
speed up the discovery process. The CPD tool allows the user to search through their
network devices and pull information from elements with CDP information.
Page 58 of 142
Learning Unit 2 – Install, Configure and Troubleshoot WAN and VPN
Dedicated Connection
Switched Connection
Page 59 of 142
It is a dedicated point to point connection which provides pre-establish WAN
communication path through ISP to remote destination is called as leased line.
It provide very high speed data transmission up to 64Gbps.
It is very expensive.
1.1 2 Digital Subscriber Line (DSL):
In circuit switches network every time before transferring data over the WAN, new
connection get establish after data transfer over the connection get closed.
In this technique generally data is transferred through single connection or single
route.
Integrated Service Digital Network (ISDN), shown in picture below, is an example of a
circuit-switched network.
Page 60 of 142
Circuit switching requires a dedicated physical connection between the sending and
receiving devices. For example, parties involved in a phone call have a dedicated link
between them for the duration of the conversation. When either party disconnects,
the circuit is broken, and the data path is lost. This is an accurate representation of
how circuit switching works with network and data transmissions. The sending
system establishes a physical connection, and the data is transmitted between the
two. When the transmission is complete, the channel is closed.
In packet switched network uses virtual connection for transferring data, it for
transferring data create connection on first data transmission and used it as
a permanent connection.
It is faster than circuit switched network.
It is used for multi path communication.
A Frame Relay network, shown in figure below, is an example of a packet-switched
network.
Page 61 of 142
In packet switching, messages are broken into smaller pieces called packets. Each packet is
assigned source and destination addresses. Packets are required to have this information
because they do not always use the same path or route to get to their intended destination.
Packets can take an alternative route if a particular route is unavailable for some reason.
In this type of network data transfer in fixed size cell that is 53 bytes.
Its example as ATM.
Page 62 of 142
Demarcation point: A point established in a building or complex to separate
customer equipment from service provider equipment. Physically, the demarcation
point is the cabling junction box, located on the customer premises, that connects
the CPE wiring to the local loop. It is usually placed for easy access by a technician.
The demarcation point is the place where the responsibility for the connection
changes from the user to the service provider. This is very important, because when
problems arise, it is necessary to determine whether the user or the service provider
is responsible for troubleshooting or repair.
Central office (CO): A local service provider facility or building where local cables link
to long-haul, all-digital, fiber-optic communications lines through a system of
switches and other equipment.
Page 63 of 142
● Content/Topic 2: identification of WAN Devices
1 . WAN Devices
WANs use numerous types of devices that are specific to WAN environments:
a) Modem: Modulates an analog carrier signal to encode digital information, and also
demodulates the carrier signal to decode the transmitted information. A voice band modem
converts the digital signals produced by a computer into voice frequencies that can be
transmitted over the analog lines of the public telephone network. On the other side of the
connection, another modem converts the sounds back into a digital signal for input to a
computer or network connection. Faster modems, such as cable modem sand DSL modems,
transmit using higher broadband frequencies.
b) CSU/DSU: Digital lines, such as T1and T3 carrier lines, require a channel service unit (CSU)
and a data service unit (DSU). The two are often combined into a single piece of equipment,
called the CSU/DSU. The CSU provides termination for the digital signal and ensures
connection integrity through error correction and line monitoring. The DSU converts the T-
carrier line frames into frames that the LAN can interpret and vice versa.
c)Access server: Concentrates dial-in and dial-out user communications. An access server
may have a mixture of analog and digital interfaces and support hundreds of simultaneous
users.
d) WAN switch: A multiport internetworking device used in carrier networks. These devices
typically switch traffic such as Frame Relay, ATM, or X.25 and operate at the data link layer
of the OSI reference model. Public switched telephone network (PSTN) switches may also
be used within the cloud for circuit-switched connections such as Integrated Services
Digital Network (ISDN)or analog dialup
e) Router: Provides internetworking and WAN access interface ports that are used to
connect to the service provider network. These interfaces may be serial connections or
other WAN interfaces. With some types of WAN interfaces, an external device such as a
DSU/CSU or modem (analog, cable, or DSL) is required to connect the router to the service
provider’s local point of presence (POP).
Page 64 of 142
f) Core router: A router that resides within the middle or backbone of the WAN rather than
at its periphery. To fulfil this role, a router must be able to support multiple
telecommunications interfaces of the highest speed in use in the WAN core, and it must be
able to forward IP packets at full speed on all those interfaces. The router must also support
the routing protocols being used in the core.
Step 1: Preparation
Note: Make certain you do have internet access directly via your modem or community
network.
Step 2: Connect your Network
Take C8 as an example. If there is no modem, regard your internet source as a modem, like
an ethernet cable through a wall.
(1) Turn off your Cable modem, C8 and computer.
(2) Connect the WAN port of C8 to the Cable modem with Ethernet cable.
(3) Connect your computer to any of the LAN ports (yellow one) of C8
Page 65 of 142
(4) Power on C8 and computer. Don’t power on the modem before logging into the router.
Page 66 of 142
Click Clone MAC Address to clone your PC’s MAC address to WAN MAC Address of the
router→Next.
Note:If your ISP provides Static IP,the WAN Connection Type you may choose Static IP and
put in the specific IP information from your ISP→Next.
Page 67 of 142
Step 7: Customize your own wireless network names and passwords for wireless 2.4GHz and
5GHz→Next.
Step 9: Click Test Internet Connection.If it is configured successfully, you will see the
message Success,then click Finish to close the Quick Setup.
Page 68 of 142
If the test is failed,please go Back to confirm the settings and try again.
Moreover, connect your computer directly to your modem and see whether you have internet access.
Step 10
Power cycle the cable modem and router
After the configurations, powering cycle your network can make your network work more
stable.
(1)Turn the cable modem off firstly, then turn your router and computer off, and leave them
off for about 2 minutes;
(2)Turn the router on firstly and wait about 1 minute, and then power on your computer.
(3)Turn the cable modem on, and wait till the modem works stable (All LED lights work
normally).
(4)Repeat the steps 1-3 above until you connect to the Internet.
Page 69 of 142
1.2 Static IP Configurations
A static IP address is an IP address that was manually configured for a device instead of one
that was assigned by a DHCP server.
Step 1. Log into the firewall. The default access to LAN is via https://192.168.10.1. Default username
is “admin” and password is “admin”.
Step 2.Go to Network > Ethernet > WAN1 and make sure that “DHCP Client” option is not enabled.
Page 70 of 142
Assign the required IP addresses to “wan_ip”, “wannet” and “wan_gw”.
Page 71 of 142
Step 5.After the configuration is done, click “Configuration” in main bar and select “Save and
Activate”. Then click OK to confirm. Wait for 15 sec. You will be automatically redirected to
the firewall’s LAN IP address. NOTE: If you do not re-login into the firewall within 30 sec, the
configuration is reverted to its previous state. The validation timeout can be adjusted under
System > Remote Management > Advanced Settings.
Page 72 of 142
Page 73 of 142
● Content/Topic 2 : Configuration of WAN protocols and technologies
1.1 Configuration of HDLC
HDLC is a layer two protocol that provides encapsulation method for serial link. Serial link
and Ethernet link both use different encapsulation methods for data transmission. Serial link
cannot carry the frame formatted with Ethernet encapsulation and vice versa Ethernet link
cannot carry the frame formatted through the Serial encapsulation. Ethernet encapsulation
method and protocols are basically specified in LAN technology. Serial protocols and
encapsulation methods are primary described in WAN technology. Router is used to connect
two different technologies. HDLC is an encapsulation method for serial link.
1.1 .1 How HDLC Protocol works
Suppose PC0 has some data for PC1. So it generated a data packet.
Since PC1 is not connected with LAN segment, network layer of PC0 will encapsulate
data packet with default gateway’s IP address.
Data link layer of PC0 will warp this IP packet in 802.3 header and trailer. Once
wrapped, it becomes frame.
Physical layer of PC0 will put this frame in wire.
Through switch this frame will be received in Router R0.
Router will de-encapsulate the frame in packet to find out the Layer 3 destination
address.
Page 74 of 142
Since destination address is connected with serial link, router will forward this frame
in serial interface.
Serial interface will re–encapsulate the frame with serial encapsulation protocol. In
our example it is HDLC.
After re-encapsulation this frame will be forwarded from serial interface.
This frame will be received in serial interface of Router R1.
R1 will de-encapsulate the frame in packet to find the Layer 3 destination address.
Since destination address is connected via FastEthernet, it will forward this packet in
FastEthernet interface.
FastEthernet Interface will re-encapsulate the packet in Ethernet frame.
After re-encapsulation this frame will be forwarded from FastEthernet interface
Through switch this frame will be received at PC1.
PC1 will receive this frame in exactly same format as it was packed by PC0 without
knowing how it makes it way to him.
1.1.2 Configure HDLC in Cisco Router
HDLC is the default encapsulation method on Cisco routers. Unless we have changed it with
other encapsulation method, there is no need to configure it. It’s already configured.
Suppose we have changed default encapsulation method with other methods such as PPP.
Now we are looking for a way to use HDLC again then we have to go through the following
two steps.
1.1.2.1Access serial interface
Protocols and encapsulation methods are Interface specific. We can use different protocol
and encapsulation method in different interfaces. For example if we have two serial
interfaces, we can use HDLC in one and PPP in another. So our first logical step is to access
the correct serial interface.
Suppose we want to change the encapsulation method of serial interface Serial 0/0/0 then
we will use following commands to access the serial interface.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Page 75 of 142
Router(config)#interface serial 0/0/0
Router(config-if)#
Set encapsulation
Now we are in serial interface mode, use following command to configure encapsulation
method to HDLC:
Router(config-if)#encapsulation hdlc
Router(config-if)#exit
Router(config)#
That’s all we need to do. Now HDLC encapsulation is enabled in serial interface Serial 0/0/0.
Verifying HDLC encapsulation
Since HDLC is the default encapsulation method for serial interfaces in Cisco Router, it will
not be listed in running configuration. It means we cannot use show running-
config command to verify the HDLC encapsulation. We have to use show interfaces
[Interface] command to view encapsulation type in interface.
Router#show interfaces serial 0/0/0
Serial0/0/0 is administratively down, line protocol is down (disabled)
Hardware is HD64570
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set, keepalive set (10 sec)
Last input never, output never, output hang never
Last clearing of "show interface" counters never
As output indicates encapsulation type is HDLC.
Troubleshooting HDLC encapsulation
We can use show ip interface brief and show interfaces [interface] commands to view the
status of serial interface.
Page 76 of 142
If there is some issue with HDLC implementation, protocol status will be down. There are
three possible reasons:
1. Remote side router is a Non-Cisco router.
2. Remote side is using other protocol such as PPP.
3. DCE device is not providing clock rate to DTE device.
1.2 PPP Protocol and Encapsulation method
1.2.1 Basic concepts of PPP Protocol
Page 77 of 142
Compression: - Through compression LCP increases overall data transmission speed
while saving bandwidth at the same time. It compression data at sending end and
decompress data at receiving end.
Error Detection: - LCP uses LQM (Link Quality Monitoring) tool to detect the
interface that is exceeding threshold error percentage. Once faulty interface is
identified, LCP will disable that interface and reroute the traffic from better route.
Looped Link Detection: - LCP uses magic number to detect looped link. Once looped
link is detected LCP will disable that interface and reroute the traffic over the
working link.
Multilink: - In this option multiple physical links are combined in a single logical
connection at layer three. For example if we have two 64Kbps lines then this option
can combine them in such a way that they appear as a single 128Kbps connection at
layer 3.
Call Back: - In this option remote side router will call back to calling router. For
example we have two routers; R1 and R2 with callback enabled. In this case, R1 will
connect with R2 and authenticate itself. Once authentication process is completed,
R2 will terminate the connection and then re-initiate the connection from its side.
This way R1 will be charged only for the data that is used during the authentication
process while R2 will be charged for remaining data transmission.
Page 78 of 142
second step, if user name and password match, remote router will authenticate originating
router otherwise authentication process will be failed. Following figure illustrate this
process in detail
In step one, R1 sends user name and password in clear text format to R2 which will
authenticate R1.
In step two, R2 will match received username and password with locally stored username
and password. If both credential match, R2 will assume that R1 is real R1. R2 will send back
an acknowledgment to R1 stating that it has passed authentication process and R2 is ready
for data transmission.
PAP authentication is only performed upon the initial link establishment. Once link is
established, no more sequential authentication are done for that particular session. PAP
sends user name and password in clear text format. Username and password are case
sensitive.
CHAP (Challenge Handshake Authentication Protocol)
CHAPS are used at initial start up and once link is established, sequential authentication are
performed to make sure that router is still communicating with same host. If any sequential
authentication is failed, connection will be terminated immediately.
CHAP authentication is a three steps process.
Page 79 of 142
Step1
Step2
Routers running CHAP need to maintain a local authentication database. This
database contains a list of all allowed hosts with their login credential.
R2 will scan this database to find out whether R1 is allowed to connect with it or not.
If no entry for a particular host is found in database then that specific host is not
allowed to connect with it. In such a case connection will be terminated at this point.
A database entry for R1 (with password) will confirm that R1 is allowed to connect
with it. R1’s password would be picked up for next process.
This random key with password will be passed in MD5 hashing function.
MD5 hashing function will produce a hashed value from given input (Random Key +
Password).
Step3
R1 will receive hashed value (Challenge) and a random key.
Page 80 of 142
R1 will pass received random key and locally stored password in MD5 hashing
function.
MD5 hashing function will produce a hashed value from given input (Random Key +
Password).
Now R1 will compare this hashed value (generated from MD5 hashed function) with
received hashed value from R2.
If both hashed value do not match, process will be terminated and connection will
be rejected.
If both hashed values (locally generated and received) match, R1 will assume that
password used by remote router (R2) must have been same as password used by
itself. Thus R2 is real R2 and permission for this connection can be granted.
CHAP uses one way hash algorithm (MD5) to generate a hashed value. This hashed value is
valid only for one time. So you need not to worry about those users who intentionally make
a copy of this hashed value for later use. In CHAP authentication actual password is never
sent across the link. So anybody tapping the wire will never be able to reverse the hash to
know the original password.
CHAP uses three way handshake process to perform the authentication. In CHAP protocol
actual password is never sent across the link. CHAP uses a hashed value for authentication
that is generated from MD5 hashed function. MD5 uses locally store password and a
random key to generate hashed value. This hashed value is valid only for one time.
Differences between PAP and CHAP authentication protocol
PAP CHAP
Username and password are sent Only username is sent across the link.
across the link.
Actual password is sent across the Actual password is never sent across the link.
link.
Password is sent in clear text Password is hashed with a random key through the
format. MD5 hashed function.
Page 81 of 142
It is a less secure authentication It is a secure authentication protocol. Since actual
protocol. Anyone tapping the wire password is never sent across the wire, no one can
can learn password. learn password from wire-tapping.
In above network two routers(R1 and R2) are connected with each other via serial link.
Serial interfaces are essentially configured with following configuration on both routers.
R1
Router>enable
Router#configure terminal
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
R2
Router>enable
Router#configure terminal
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 192.168.1.2 255.255.255.252
Page 82 of 142
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
At this time both routers are running default encapsulation in serial interface. HDLC is the
default encapsulation protocol in Cisco routers. Okay lets change default encapsulation to
PPP with following command.
R1
Router(config)#interface serial 0/0/0
Router(config-if)# encapsulation ppp
Router(config-if)#exit
Router(config)#
R2
Router(config)#interface serial 0/0/0
Router(config-if)# encapsulation ppp
Router(config-if)#exit
Router(config)#
Router(config)#interface serial 0/0/0 :- This command is used to enter in serial interface.
Encapsulation is interface specific. We can use different encapsulation protocols in different
interfaces. For example we can use PPP in serial 0/0/0 and HDLC in serial 0/0/1.
Router(config-if)# encapsulation ppp :- This command would set encapsulation protocol to
PPP.
Router(config-if)#exit :- This command is used to return back in global configuration mode.
Router(config)# :- This command prompt indicates that we are in global configuration
mode.
1.2.2.1 Configure PPP Authentication
PPP authentication requires two essential parameters:
Page 83 of 142
Router(config)#hostname R1
R1(config)#
R2
Router(config)#hostname R2
R2(config)#
R1
R1(config)#username R2 password test
R1(config)#
R2
R2(config)#username R1 password test
R2(config)#
Passwords assigned through the username [hostname of remote device] password
[password] command would be save in running configuration as clear text format and could
be viewed via show run command. To encrypt it use service password-encryption command
from global configuration mode. Username and password is case sensitive. Username is the
hostname of remote router that will connect with this router. Remote routers must also be
configured with username and password. Password must be same on both routers.
Configure PPP Protocol PAP Authentication
Page 84 of 142
To configure PAP authentication use following commands on both routers
R1
R1(config)#interface serial 0/0/0
R1(config-if)#encapsulation ppp
R1(config-if)#ppp authentication pap
R1(config-if)#exit
R1(config)#
R2
R2(config)#interface serial 0/0/0
R2(config-if)#encapsulation ppp
R2(config-if)#ppp authentication pap
R2(config-if)#exit
R2(config)#
Configure PPP Protocol CHAP Authentication
To configure CHAP authentication use following commands on both routers
R1
R1(config)#interface serial 0/0/0
R1(config-if)#encapsulation ppp
R1(config-if)#ppp authentication chap
R1(config-if)#exit
R1(config)#
R2
R2(config)#interface serial 0/0/0
R2(config-if)#encapsulation ppp
R2(config-if)#ppp authentication chap
R2(config-if)#exit
R2(config)#
Configure Both CHAP and PAP in same link
To configure both CHAP and PAP in same link use following commands on both routers
R1
Page 85 of 142
R1(config)#interface serial 0/0/0
R1(config-if)#encapsulation ppp
R1(config-if)#ppp authentication chap ppp
R1(config-if)#exit
R1(config)#
R2
R2(config)#interface serial 0/0/0
R2(config-if)#encapsulation ppp
R2(config-if)#ppp authentication chap ppp
R2(config-if)#exit
R2(config)#
If we use both methods on the same link as shown above then only the first method will be
used in authentication process. Second method will be used only if first method fails. Thus
second method will work as backup method.
Verifying PPP Protocol implementation
We can use show interface [interface] command to verify the PPP implementation.
R1#show interface serial 0/0/0
Serial0/0/0 is up, line protocol is up
Hardware is HD64570
Internet address is 192.168.1.1/30
MTU 1500 bytes, BW 64 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set, keepalive set
[Output omitted]
As output indicates encapsulation is set to PPP in this interface.
Page 86 of 142
In above example its “Serial 0/0/0 is up, line protocol is down” which indicates that physical
layer is working properly but there is some issue in data link layer configuration.
Next, notice the states of LCP, IPCP and CDPCP. A Closed state for these indicates that
something is wrong with LCP setup process, causing data link layer to fail. In rest of this
tutorial I will explain some common causes for data link failure.
Once you identify the problem, it can be fixed easily. Simply reconfigure the one end’s
interface to match with other end’s encapsulation method.
Once you identify the problem, it can be fixed easily. Simply reconfigure the one end’s
interface to match with other end’s encapsulation method.
Mismatched IP configuration
This problem is not directly associated with PPP configuration but can be tricky one question
in exam. This problem cannot be spotted from show interface [interface] command as the
output of this command will show “Serial 0/0/0 is up, line protocol is up” that makes you
assume that everything is fine and operational at interface level. But when you try to ping
remote router it gets fail. This is because PPP, HDLC and Frame Relay are layer 2 protocols
Page 87 of 142
and they don’t care about layer 3 configuration (IP Configuration). So even link is up, you
cannot transfer the IP packets.
To fix this problem configure IP addresses in both ends from same subnet.
Page 88 of 142
R1: Se0/0/0 CHAP: Using hostname from configured hostname
R1: Se0/0/0 CHAP: Using password from AAA
R1: Se0/0/0 CHAP: O RESPONSE id 5 len 23 from "R1"
R1: Se0/0/0 PPP: Sent CHAP LOGIN Request
R1: Se0/0/0 PPP: Received LOGIN Response PASS
R1: Se0/0/0 CHAP: O SUCCESS id 5 len 4
R1: Se0/0/0 CHAP: I SUCCESS id 5 len 4
But if something wrong during authentication process output would look like this:
To fix this problem configure username and password in proper way. Remember that
username and password are case sensitive.
Page 89 of 142
Another thing that you should notice is authentication type that must be same in both ends.
If you configure one end to use PAP while another end to use CHAP then that link would
never work.
To fix this problem change authentication type in one end to match with other end.
That’s all for this part. In next part I will explain basic concepts of frame really in detail with
examples.
1.3 Frame Relay protocol
1.3.1 Basic concept of Frame Relay
basic concepts of Frame Relay step by step in detail with examples including Frame Relay
fundamental, Frame Relay Congestion Control method and Frame Relay Terminology (VC,
PVC, SVC, DTE, DCE, DE, Access link, LMI types, LMI status enquiry, DLCI numbers, FECN,
BECN, Access rate and CIR).
Frame Relay is one of the most popular WAN service deployed over the past decade. Even
though several advanced technologies (such as VPN, ATM) are available today, Frame Relay
still rocks and will be in near future due to its features, benefits and lower cost in
comparison with other point to point wan services. For example have look on following
figure that illustrates a network with simple point to point leased line connection.
Page 90 of 142
There are four routers in this network. To connect these routers with each other, total six
leased lines and three serial interfaces on each router are used. We can use following
formula to figure out how many connections are required:-
Page 91 of 142
Frame Relay VC, PVC and SVC
In Frame Relay terminology virtual connection lines are known as Virtual Circuits (VCs).
There are two types of VCs; PVCs and SVCs.
Differences between Frame Relay PVCs and Frame Relay SVCs
Frame Relay PVCs (Permanent Frame Relay SVCs (Switched Virtual Circuits)
Virtual Circuits)
PVC is just like a leased line that is SVC is just like a telephone connection that is
once configured will stay there until dynamically built whenever we have data to
we manually reconfigure it. transmit and once transmission is over it will be
terminated.
If we have regular data for If we have periodical data for transmission then SVC
transmission then PVC is the best is the right choice.
choice.
PVCs need a lot of manual SVCs need less configuration in comparison with
configuration. PVCs.
Once PVC is built there is no delay Since SVC is built each time whenever we send data,
before data transmission. therefore a small delay before data transmission is
expected.
Whether we use it or not, we have to We need to pay only when we actually use it.
pay for entire billing cycle.
SVC is not tested in any CCNA level exam. So I am not going to include it in rest of the article.
After this wherever VC or PVC is referred please take that for PVC only.
Frame Relay Network Type
Page 92 of 142
A frame relay network is considered fully meshed when all sites (routers) are connected
with each other via direct link. When all sites do not have direct link with each other then it
would be considered as partially meshed frame relay network.
Command Description
Router(config-if)#frame-relay Used to set LMI type. If router is running Cisco ISO 11.2 or
lmitype {ansi | cisco | q933a} higher, this command is optional. As router will
automatically detect the correct LMI type.
Page 93 of 142
Router(config-if)#no frame- Used to Turn off inverse ARP. If we turn off the inverse
relay inverse arp ARP, we have to map remote IP and local DLCI statically.
Router#show frame-relay pvc Used to view the status of all PVCs configured
Router#show frame-relay lmi Displays LMI statistics including types and exchanged
messages
Router#clear frame-relay inarp Reset map table and Clears all Inverse ARP entries
R1
Router>enable
Router#configure terminal
Router(config)#interface serial 0/0/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#frame-relay interface-dlci 100
Router(config-if)#frame-relay lmi-type ansi
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#exit
Router#
R2
Router>enable
Router#configure terminal
Router(config)#interface serial 0/0/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip address 192.168.1.2 255.255.255.0
Router(config-if)#frame-relay interface-dlci 101
Router(config-if)#no shutdown
Router(config-if)#exit
Page 94 of 142
Router(config)#exit
Router#
Let’s understand above configuration step by step. As we know, routers allow us to run
different WAN services on different interfaces. So our first logical objective is to identify the
correct interface. As figure shows interface serial 0/0/0 is assigned for frame relay on both
routers. To configure Frame Relay on this interface we need to enter in interface mode. First
three commands in above configuration are used for this purpose.
enable :- This command is used to enter in privileged exec mode.
configure terminal :- This command is used to enter in global configuration mode.
interface serial 0/0/0 :- This command is used to enter in interface mode.
In Cisco routers default encapsulation is set to HDLC. We cannot use Frame Relay with
default encapsulation. Next command changes this encapsulation.
Router(config-if)#encapsulation frame-relay :- This command will change default
encapsulation method to Frame Relay.
Next command assigns IP address in interface.
Router(config-if)#ip address 192.168.1.1 255.255.255.0:- This command assign IP address in
Serial 0/0/0 of R1.
Router(config-if)#ip address 192.168.1.2 255.255.255.0 :- This command assign IP address
in Serial 0/0/0 of R2.
Next command assigns DLCI value in interface.
Router(config-if)#frame-relay interface-dlci 100 :- This command assigns DLCI value 100 in
Serial interface of R1.
Router(config-if)#frame-relay interface-dlci 101 :- This command assigns DLCI value 101 in
Serial interface of R2.
Next command sets LMI option in interface. Until we change LMI option with next command
default LMI option is set to Cisco (in Cisco routers).
Router(config-if)#frame-relay lmi-type ansi :- This command will change default LMI option
to ANSI.
Have you notice ? we did not run this command in R2. Since LMI option [Cisco] that we got
from provider matches with the default (Cisco) setting, so there is no need to run this
command in R2.
Page 95 of 142
By default all interfaces on router are disabled. We need to enable them before they can
communicate with other.
Router(config-if)#no shutdown :- This command will enable the Serial interface
You configure DSL connections in much the same way you configure ISDN or modem
connections. DSL connections can be configured as switched or nailed PPP, MP, or MPP, or
as Frame Relay-encapsulated connections. You can also use your existing authentication
methods, such as RADIUS, to authenticate DSL users, by using PPP protocols in conjunction
with PAP or CHAP. You can do this either when the units are first turned on or by setting an
inactivity timer.
Any ISDN TA or router (such as an Ascend Pipeline) that supports ISDN BRI (2B1Q) signaling
can be connected over an IDSL connection. ADSL and SDSL connections require Ascend DSL
Pipe units on the remote end.
DSL connections require the following general configuration on the MAX TNT:
In addition to standard routing connections, you can configure the following DSL-specific
capabilities:
A DSL physical link is always up, but a PPP session can be established and terminated based
on data activity, just as it is for ISDN or PSTN calls. Each PPP session initiates negotiations,
followed by authentication and accounting. Switched connections can provide per session
authentication as well as accounting information typically used for client billing.
Page 96 of 142
From the service provider perspective, a DSL connection is handled exactly like an ISDN or
PSTN call. The MAX TNT checks the Answer-Defaults profile, applies authentication
methods, and establishes the PPP session. After some inactivity PPP session is dropped,
again generating accounting information. DSL Pipe units initiate all switched ADSL and SDSL
connections and the MAX TNT handles them as regular incoming PPP calls. Note that Frame
Relay connections must be nailed.
You configure the DSL Pipe for a switched connection in a similar way to other Pipeline
switched connections, with the following important differences:
Set the Chan Usage parameter in the Configure profile to Switch/Unused (for ADSL or SDSL
connections) or Switch/Switch (for IDSL connections)
Set the Dial # parameter in the Configure profile to the DSL port number, which in the case
of a single DSL Pipe is always 1.
To configure a switched connection on the MAX TNT for an incoming connection from a DSL
Pipe, you must set the Call-Type parameter to Off in the Connection profile for the DSL Pipe.
For example:
admin> read connection dslpipe-1
CONNECTION/dslpipe-1 read
admin> set telco call-type = off
admin> write
CONNECTION/dslpipe-1 read
For more information about configuring switched connections on the MAX TNT, see
the MAX TNT Network Configuration Guide.
Configuring nailed connections
In a nailed connection, the MAX TNT and the remote unit always assume the connection is
up and do not attempt to verify the line is operational.
A nailed connection does not record accounting or authentication information after the
session is established and therefore cannot be used to bill for DSL service as if it were a call
on an ISDN network or the PSTN.
Nailed connections are typically used for Frame Relay connections, but PPP can also be
used. Voice calls are not supported over a nailed connection.
You specify whether a ADSL or SDSL connection is nailed by:
Specifying a nailed group number in the ADSL or SDSL profile
Page 97 of 142
Setting Call-Type to FT1 in the Connection profile for the nailed connection
You specify whether an IDSL connection is nailed by:
Specifying a nailed group number in the IDSL profile
Setting Channel-Usage to Nailed-64-Channel in the IDSL profile
Setting Call-Type to FT1 in the Connection profile for the nailed connection
You configure the DSL Pipe for a nailed connection in a similar way to other Pipeline nailed
connections:
In the Configure profile, set Chan Usage to Leased/Unused
In the Connection profile for the MAX TNT, set Call Type to Nailed in the Telco
Options submenu
In the Connection profile for the MAX TNT, specify a Group number in the Telco
Options submenu
DSL configurations, includes:
Page 98 of 142
Figure : IDSL connection with a Pipeline
Page 99 of 142
4. Enable IP routing for this Connection profile:
admin> write
1. Read the IDSL profile the remote user is connected to. For example:
admin> read idsl {1 7 18}
IDSL/{ shelf-1 slot-7 18 } read
4. Specify the nailed group. This group is referenced in the Connection profile for the
remote device so the MAX TNT knows which interface to use for the connection:
admin> set nailed-group = 10
5. Configure the second channel as nailed and assign it the same group number. For
example:
admin> list .. 2
[in IDSL/{ shelf-1 slot-7 18 }:line-interface:channel-con +
channel-usage = switched-channel
nailed-group = 0
admin> set channel-usage = nailed-64-channel
admin> set nailed-group = 10
1. Enter the address of the Gateway on the local LAN to the remote network.
set gateway-address = 192.1.1.2
5. Verify that IP routing is enabled (the default) for this Connection profile:
admin> set ip-routing-enabled = yes
6. Verify that VJ header prediction is not enabled for this Connection profile:
admin> set vj-header-prediction = no
10. Specify the password the MAX TNT expects to receive from the DSLPipe:
admin> set recv-password = pap
13. Specify the nailed group to use for this Connection profile:
admin> set nailed-groups = 73
1.4Configuration of FTTH
Fiber to the Home or simply FTTH is a technology that uses optical fiber directly from the
central point to the residential premises (as shown in the following image). It provides
uninterrupted high-speed internet service. Here, “H” includes both home and small
business.
Very high bit rate digital subscriber loop (VDSL) supports a maximum bit rate of 55
bps. VDSL2 has better QoS and better SNR.
ADSL (asymmetric digital subscriber line) supports a maximum bit rate of 8Mbps,
however ADSL2 can go up to 12Mbps.
SHDSL stands for symmetric high bit rate digital subscriber line. The larger the
diameter of the telephone, the longer the distance it could reach. The transmission
rate depends on the diameter of the telephone wire.
Fibre to the Premises (FTTP, or FTTH - Fibre to the Home) is a broadband technology which
can provide very fast internet speeds.
Fibre to the Premises means that the fibre broadband internet connection from the local
exchange is connected to the router in your home, which is much faster than the old copper
telephone line used by many other broadband services.
The result is you can enjoy very high speeds of 1Gbps (gigabits per second) or more. Though
FTTP can also deliver lower speeds, which is useful if very fast fibre is beyond your budget,
or not required, but might be something you'll use later.
Step 1:
locate the nbn™ FTTP Network Termination Device (NTD)
Find the indoor nbn™ FTTP Network Termination Device (NTD) in your home. This will
usually be installed in a garage but may be located in an odd location such as a wardrobe,
cupboard or underneath a staircase. Ensure you check your entire home for the NTD
including any unusual places that you may not expect.
The nbn™ Network Termination Device (NTD) may be installed without a battery backup
unit (as shown above) or with an optional battery backup unit. The image below shows the
nbn™ Network Termination Device (NTD) installed alongside a battery backup unit. Please
note that the battery backup adds little value to an nbn™ FTTP service. If your power is cut,
your nbn™ NTD unit will continue to run for a limited time on the battery backup, but your
wireless modem/router will not be powered, and any associated services such as a VoIP
phone service will also stop working.
Ensure that the included power cable from the power port on the back of the FTTP Network
Termination Device (NTD) is plugged in and secure. Plug the other end of the power cable
into a power wall outlet in your home and switch the powerpoint on.
After a few minutes, you should notice the POWER and OPTICAL lights on the front of the
NTD turn solid green. If you have a battery backup unit installed, the ALARM button may
also be green. If the optical light on your nbn™ FTTP NTD remains red or is off,
please contact our support team for further troubleshooting.
Plug the other end of this Ethernet cable into the WAN port on your modem/router. This
may also be labelled as INTERNET, WAN/LAN or FIBRE. The Ethernet cable is larger than a
telephone cable. DO NOT use the telephone cable to plug in your modem/router to the
nbn™ FTTP Network Termination Device (NTD).
Step 4:
Here are free network benchmarking tools that can be used to test your network speed
between computers to make sure the network is running at the speeds you expect.
LAN Speed Test was designed from the ground up to be a simple but powerful tool for
measuring file transfer, hard drive, USB Drive, and Local Area Network (LAN) speeds (wired
& wireless). First, you pick a folder to test to. This folder can be on a local drive or USB drive,
etc. to test the drive speed, or a shared folder on your network to test your network speed.
LANBench
LANBench is a simple LAN / TCP Network benchmark utility. It is designed for testing
network performance between two computers and is based on Winsock 2.2. LANBench
NetIO-GUI
NetIO-GUI is a Windows frontend for the multiplatform command line utility ‘netio’. It
measures ICMP respond times and network transfer rates for different packet sizes and
protocols. All results are stored in a SQLite database file and can easily be compared. NetIO-
GUI is preferred to rate the quality of peer-to-peer connections like VPN.
LO 2.3 – Configure and verify a site to site VPN
● Content/Topic 1 : Description of VPN(Virtual Private Network)
1. Introduction to VPN (Virtual Private Network)
1. 1 Definition of VPN (Virtual Private Network)
VPN is a Virtual Private Network that allows a user to connect to a private network over the
Internet securely and privately.
VPN creates an encrypted connection, known as VPN tunnel, and all Internet traffic and
communication is passed through this secure tunnel. Thus, keeping the user data secure and
private.
1.2 Types of VPN
There are two basic VPN types which are: .
Remote access VPN allows a user to connect to a private network and access its
services and resources remotely. The connection between the user and the private
network happens through the Internet and the connection is secure and private.
Remote Access VPN is useful for business users as well as home users.
Home users, or private users of VPN, primarily use VPN services to bypass regional
restrictions on the Internet and access blocked websites. Users conscious of Internet
security also use VPN services to enhance their Internet security and privacy.
A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in the
corporates.
When multiple offices of the same company are connected using Site-to-Site VPN
type, it is called as Intranet based VPN.
When companies use Site-to-site VPN type to connect to the office of another
company, it is called as Extranet based VPN.
1.3.5 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN connection
where the web browser acts as the client and user access is restricted to specific
applications instead of entire network.
SSL and TLS protocol is most commonly used by online shopping websites and service
providers. Web browsers switch to SSL with ease and with almost no action required from
the user, since web browsers come integrated with SSL and TLS. SSL connections have https
in the beginning of the URL instead of http.
1.3.6 Secure Shell (SSH)
Secure Shell or SSH creates the VPN tunnel through which the data transfer happens and
also ensures that the tunnel is encrypted. SSH connections are created by a SSH client and
data is transferred from a local port on to the remote server through the encrypted tunnel.
(1) Layer 2 tunneling protocol (data link layer): Includes Point-to-Point Tunneling Protocol (PPTP),
Layer 2 Forwarding Protocol (L2F), Layer 2 Tunneling Protocol (L2TP), and Multi-Protocol Label
Switching (MPLS). ), and so on.
(2) Layer 3 tunneling protocol (network layer): includes Generic Routing Encapsulation Protocol
(GRE) and IP Security (IPSec), which are the two most popular Layer 3 VPNs.
(3) Session layer tunneling protocol: Socks are in the session layer of the OSI model. The Secks4
protocol, which provides a firewall that does not require authentication for client-server programs
based on TCP (not including UDP) such as TELNET, FTP, HTTP, WAIS, and GOPHER. A VPN tunnel
without encryption authentication is established. The Socks5 protocol extends Socks4 to support
IPv4, domain name resolution, and IPv6 as defined in the secure authentication scheme specified by
the UDP and TCP frameworks, and in the address resolution scheme.
(4) Application layer tunneling protocol: Secure Socket Layer (SSL) belongs to the application layer
tunneling protocol. It is widely used in web browsers and web server programs. Provide peer-to-peer
authentication and encryption of application data.
1.5 Classification based on trust level
Intranet based VPN: When several offices of the same company are connected using
Site-to-Site VPN type, it is called as Intranet based VPN.
Extranet based VPN: When companies use Site-to-site VPN type to connect to the
office of another company, it is called as Extranet based VPN.
A remote access virtual private network (VPN) enables users who are
working remotely to securely access and use applications and data that reside in
the corporate data center and headquarters, encrypting all traffic the users send and
receive.
In a Layer 3 VPN, the routing occurs on the service provider’s routers. Therefore, Layer 3
VPNs require more configuration on the part of the service provider, because the service
provider’s PE routers must store and process the customer’s routes.
Phase 1 Phase creates the first tunnel, which protects later ISAKMP negotiation messages.
Phase 2 creates the tunnel that protects data. IPSec then comes into play to encrypt the
data using encryption algorithms and provides authentication, encryption and anti-replay
services.
IPSec VPN Requirements
To help make this an easy-to-follow exercise, we have split it into two steps that are
required to get the Site-to-Site IPSec VPN Tunnel to work.
These steps are:
1) Configure ISAKMP (ISAKMP Phase 1)
2) Configure IPSec (ISAKMP Phase 2, ACLs, Crypto MAP)
Practical example:
The final step is to apply the crypto map to the outgoing interface of the router. Here, the
outgoing interface is FastEthernet 0/1.
R1(config)# interface FastEthernet0/1
R1(config- if)# crypto map CMAP
Note that you can assign only one crypto map to an interface.
As soon as we apply crypto map on the interface, we receive a message from the router
that confirms isakmp is on: “ISAKMP is ON”.
At this point, we have completed the IPSec VPN configuration on the Site 1 router.
We now move to the Site 2 router to complete the VPN configuration. The settings for
Router 2 are identical, with the only difference being the peer IP Addresses and access lists:
R2(config)# crypto isakmp policy 1
R2(config-isakmp)# encr 3des
R2(config-isakmp)# hash md5
R2(config-isakmp)# authentication pre-share
R2(config-isakmp)# group 2
R2(config-isakmp)# lifetime 86400
R2(config)# crypto isakmp key firewallcx address 1.1.1.1
R2(config)# ip access-list extended VPN-TRAFFIC
R2(config-ext-nacl)# permit ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255
R2(config)# crypto ipsec transform-set TS esp-3des esp-md5-hmac
R2(config)# crypto map CMAP 10 ipsec-isakmp
R2(config-crypto-map)# set peer 1.1.1.1
R2(config-crypto-map)# set transform-set TS
R2(config-crypto-map)# match address VPN-TRAFFIC
R2(config)# interface FastEthernet0/1
R2(config- if)# crypto map CMAP
2.2 Establishing and Verifying the IPSec VPN Tunnel
Page 126 of 142
To verify the VPN Tunnel, use the show crypto session command:
R1# show crypto isakmp sa
Crypto session current status
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 1.1.1.2 port 500
IKE SA: local 1.1.1.1/500 remote 1.1.1.2/500 Active
IPSEC FLOW: permit ip 10.10.10.0/255.255.255.0 20.20.20.0/255.255.255.0
Other commands used to verify IPSec VPN Tunnel
R1#show crypto isakmp sa
R1#show crypto isakmp policy
R1#show crypto map
R1=show crypto ipsec sa
LO 2.4 – Troubleshoot WAN Network
● Content/Topic 1: Troubleshoot WAN network
Network troubleshooting is the collective measures and processes used to identify, diagnose
and resolve problems and issues within a computer network. It is a systematic process that
aims to resolve problems and restore normal network.
Tools to troubleshoot WAN connectivity issues
a)Ping
The most commonly used network tool is the ping utility. This utility is used to provide a
basic connectivity test between the request host and destination host.
b)Tracert/traceroute
Typically, once the ping utility has been used to determine basic connectivity can be used to
determine more specific information about the path to the destination host including the
route the packet takes and response time of these intermediate hosts.
VPN Verification
To test connectivity with a host on a network or internetwork, use the PING utility.
o For Windows XP: Click Start, select Run, type cmd and press Enter or
select OK button
o For Windows Vista and Windows 7: type cmd into the Start menu search
box and select it from the Programs list that appears OR if you have the Run
option enabled on your Start Menu, then click Start, select Run,
type cmd and press Enter or select OK button.
A response of four lines, each with a time (TTL=) response indicates the server is
reachable.
A second connectivity test is TRACERT which traces the route to the target computer
and returns a list of routers through which your request travels to reach the
destination.
To use TRACERT:
1. Open a command prompt
o For Windows XP: Click Start, select Run, type cmd and press Enter or
select OK button
o For Windows Vista and Windows 7: type cmd into the Start menu search
box and select it from the Programs list that appears OR if you have the Run
option enabled on your Start Menu, then click Start, select Run,
type cmd and press Enter or select OK button.
The default settings for TRACERT will test over a maximum of 30 hops.
If your TRACERT uses all 30 hops and receives many responses of * rather than a
time in ms (milliseconds) at each hop, you can expect communication with the
target computer to be inefficient.
To pipe the TraceRT to a log file, from the command prompt, type
TRACERT servername > C:\log.txt
or
TRACERT serverIP
where servername is the name of the server or serverIP is the IP address of the
server with which you want to communicate.
Before sending requests to Universal API, a ping request is recommended to ensure that
there is proper network connectivity and application operability.
The ping request has a single payload of a string and can be used to make sure the method
you have chosen for generating SOAP requests is fully compatible with our system. This
request is more than a network ping in that it is handled by the application to ensure that it
is running and responding properly. The ping request can also be used to test infrastructure
and network components because the length of the request and response message can be
easily controlled. Upon approval, it can also be used to perform load testing of these
components.
Test and Verify IKE Configuration
Test and verify IKE configuration on the PIX Firewall with the commands in Table below:
Network monitoring systems include software and hardware tools that can track various
aspects of a network and its operation, such as traffic, bandwidth utilization, and uptime.
These systems can detect devices and other elements that comprise or touch the network,
as well as provide status updates.
WAN Monitoring Tools & Software
There are a number of simple, easy-to-use tools for monitoring WAN links. As most network
managers know, the ping command on a Windows or UNIX computer measures the “round
trip” latency across a WAN link by “pinging” a device or computer at the far end of the link
Monitoring WAN latency
In a network, latency measures the time it takes for some data to get to its destination
across the network. It is usually measured as a round trip delay - the time taken for
information to get to its destination and back again.
Testing network latency can be done by using ping, traceroute, or My TraceRoute (MTR)
tool. More comprehensive network performance managers can test and check
latency alongside their other features.
Restore the configuration of WAN devices to its factory default settings
If the router freezes, or if the router does not function well, then a restart option should be
considered. A restart clears the processes of the device, but does not delete the settings. In
the case of a device malfunction, or if you forget the login credentials of the device, then
you may want to reset the system to its factory default settings. When the device is reset to
factory defaults, settings on the device are erased and the router is configured to its default
configurations. You can reset to factory defaults or restart the device through a physical
button on the device, or through the web configuration utility.
Troubleshooting of IP configurations issues
The first step in the troubleshooting process is to check the TCP/IP configuration. The
easiest way to do this is to open a Command Prompt window and enter the IPCONFIG /ALL
command. Windows will then display the configuration results.
Unable to browse the Web or use email? Here are a few tips to help you find the root of the
problem.
First, let’s look at the basic tests and checks to perform. Then, we will look at the most
frequent problems Finally, we will look at the error codes that Windows generates when
your modem is connected directly to your computer, as well as how to resolve them.
Base test
Restart your computer and the DSL modem. Then, try to go to some websites or use your
email account. If both web browsing and email are still not working, follow these steps. If
your computer is giving you an error code, go directly to the solution section for that error
code.
Tests to perform on the modem and the information it provides
1. Make sure that every device that is connected to a phone line, for example, a cordless or
corded telephone, an answering machine, a fax machine or a satellite receiver, has its
own filter. Filters direct the device’s signal to the correct frequency on the land line, thus
eliminating interference with the modem.
There are three connectors on the DSL modem. Make sure they are properly plugged in
and there is no gap between the outlet and the connector. Check these three
connectors:
Network port (RJ45) for plugging in a network cable to the computer or router.
3. The modem’s indicator lights help you make an initial diagnosis. This is what the lights
mean:
POWER — On when the modem is plugged into an electrical outlet using the power
adapter.
ETHERNET — On when a device such as a computer or router is connected to the
network port (ETH) on the modem, and the device is operating properly.
DSL — On when the modem is connected to the network. This light flashes when the
modem turns on, then stops flashing and stays on when the modem is connected to
the network.
INTERNET — On when username and password have been authenticated.
ACTIVITY — Lights up intermittently, when the modem is transferring data.
5. First, make sure that the « DSL » light is on and is not flashing.
6. If the « DSL» light is on:
1. Make sure that the network cable (RJ-45) is properly connected from the modem’s
« Ethernet » port to the « blue Internet » port on the gateway.
2. Also make sure that the network cable (RJ-45) is properly connected from the
« yellow Ethernet » port on the gateway to your computer’s network card.
2. Also make sure that the telephone line connected to the modem is not plugged
into an extension. It should be no more than six feet (approximately three metres)
long.
3. Make sure that there are no splitters (Y connectors) between the DSL modem and
the telephone jack.
4. Make sure that the modem does not have a filter on it.
5. Try plugging the modem into another telephone jack. The DSL modem can get a
signal even if no computer is connected to it. So, you can test the modem in
various jacks without moving your computer. Does the DSL light stay on in other
jacks or outlets? If so, there may be a problem with the building’s wiring. Contact
technical support for more information.
6. Test it with all of your phones, fax machines, satellite receivers and answering
machines unplugged. A defective device or filter can interfere with the signal.
Unplugging everything except the modem is an easy way of checking this! If you
unplug all of your devices and the DSL light remains on and is not flashing, plug the
devices in one at a time to determine which one is defective.
7. If the « DSL » light is off or flashing after several tries with all other devices
unplugged, contact ORICOM INTERNET technical support.
Contains accurate, up-to-date records of the hardware and software used in a network. The
network configuration table should provide the network engineer with all the information
necessary to identify and correct the network fault.
Regular network configuration backup is one of the compulsory measures to lessen time of
net standstill. Network config backup will help you recover the net quickly in case of physical
failure of the device and in case of errors, caused by system administrators' mistakes.
LO 3.2 – Documentation of all logs issues and action taken for future reference
Company/Technician Address
PO BOX :
Company/Technician office
Location:
Customer Address
Customer Name:
PO BOX :
Logs issues :
Observations /Recommendations:
Customer Verification
Names:
Signature /stamp
Date:
Name:
Signature/stamp
Date:
Cisco Systems, I. (2000, January 01). Cisco Systems, Inc. Retrieved July 18, 2020, from
https://www.cisco.com/: https://www.cisco.com/c/en/us/support/docs/cloud-systems-
management/configuration-