Sie sind auf Seite 1von 40

Table of Contents

Theoretical Training ...................................................................................................................................... 2


Entry training ............................................................................................................................................ 2
Intermediate Training ............................................................................................................................. 18
Advanced Enterprise Solutions (Overview) ........................................................................................ 18
Link Aggregation ................................................................................................................................. 18
VLAN(Virutal Local Area Network) Principles ..................................................................................... 19
GARP and GVRP................................................................................................................................... 21
VLAN routing ....................................................................................................................................... 23
Wireless LAN Overview ....................................................................................................................... 23
Principle and Configuration of HDLC and PPP .................................................................................... 24
Frame Relay Principles ........................................................................................................................ 25
Principle and Configuration of PPPoE (Point-to-Point over Ethernet)................................................ 26
Network Address Translation (NAT) ................................................................................................... 27
Establishing Enterprise Radio Access Network Solutions ................................................................... 29
Access Control Lists (ACL) ................................................................................................................... 30
AAA (authentication, Accounting, Authorisation) .............................................................................. 31
Securing Data with IPSec VPN ............................................................................................................. 31
Generic Routing Encapsulation (GRE) ................................................................................................. 32
Simple Network Management Protocol (SNMP) ................................................................................ 33
eSight Network Management Solutions (Huawei solution) ............................................................... 34
Introducing IPv6 Networks.................................................................................................................. 34
IPv6 Routing Technologies .................................................................................................................. 34
IPv6 Application Services DHCPv6 ...................................................................................................... 34
Practical Training......................................................................................................................................... 34
Entry Training .......................................................................................................................................... 34
Intermediate Training ............................................................................................................................. 34
Lessons from the mock exams .................................................................................................................... 35
Multiple choice section ........................................................................................................................... 36
Theoretical Training
Entry training
Point-to-Point network

Wired or wireless

RG-45 cable

Network cables:

Coaxial:

-10Base2 maximum transmission distance 185m

-10Base5 maximum 500m

Or use bridges or boosters, repeaters to extend the distance. Finally use fibre optics others

Ethernet all 100m:

• 10Base-T
• 100Base-Tx
• 1000Base-T 4 pairs of category 5e twisted pair cable supports 1Ghz transmission speed

Fiber Optic

-10Base-F distance of 2000m 10mb/ps

-100Base-FX 100mb/ps

-1000Base-LX 316-50000m 1gb/ps single-mode does not work simultaneously

-1000Base-SX multi-mode supports simultaneous transmission

Serial

-RS-232 20000bps

-RS-422 RECOMMENDED 1200m

Broadcast domains

Sending to multiple from one place

Collision Domains

Place in a network where packets collide.


-Carrier Sense Multiple-Access Collision Detection or Collision Avoidance (CSMA/CD): Tells you
when not to send a packet

Duplex Modes (w.r.t point to point networks):

-Half duplex: You can only send or receive

-Full duplex: You can send and receive at the same time. Act as a server and client
simultaneously.

Layered Models- OSI

Encryption: Provide protection over the network to mitigate from hacking. Required key.

Application (protocol data units) and Presentation layer are unformatted

Physical layer – bits cables 0/1

Data linked layer: a frame, meta address

Network layer: packet network address

Transport layer uses segments TCP/IP

Session

Sender top to bottom Receiver bottom to top: Application, presentation, session, transportation,
network, data link, physical

Frame Formats

>=1536 0x0600 – ethernet 2

<=1500 (0x05DC) IEEE802.3

Frame check sequence: To check if the packet is complete or if there if it is fragmented. A packet is
1500/1536
2048 (0x0800) - IP

2054(0x0806) - ARP

MAC address are 48 bits (24bits OUI and 24bits organisation)

Huawei addresses are (

Representing a broadcast packet FF:FF:FF;FF:FF:FF

Multicast: Packets sent to unintended devices are dropped.

Carrier sense:

Carrier sense multiple access... Packets can be dropped, received or resent.

Layer 2

Just need a switch and the end device. A switch can establish a connection with only MAC Addresses.

Network layer:

IP packet (0x0800) length 60 bytes, source destination. Time to leave 255-0, packet dropped afterwards
at 0.

IP addresses (Private addresses):

-Class A 10.0.0.0 ~ 10.255(network).255.255 Multiple hosts. Check first that number ranges /8

-Class B /16

-Class C 192.0.0.0 - 223.0.0.2 for smaller networks /24

Class D

-Class E 240.-255.255.244.254 experimental

Private IP addresses are not linked to the internet.

E.G

Class C 192.168.1.0

Network 6

-First binary switch: 0110

-Network range/IP addresses

VLSM or classless inter domain routing.

IP Gateway
GIves us access to the.

Time to live:

If the packet gets to an unintended destination.

Internet Control Message Protocol ICMP

Reporting errors. Routing to test compatibility.

Broadcast messages as Unicast – unknown intended devices.

Investigating Unreachable devices.

ICMP Types

Echo request type=8 code = 0 multicast

Echo reply type=0 code=0 unicast

Every link is counted as a hop count and ads to the time required to send a message.

Address Resolution Protocol

Broadcast send, unicast reply.

Reverse address protocol operates on level 3

Proxy ARP takes longer because of connecting with the proxy gateway.

TCP Wired networks, conjunction control, monitoring packets. Three hand-way shake, security and
sharing of certificates. TCP is the best for safety. UDP. Doesn’t do floor control or three-way handshake.
Company usually wireless network. Wireless access point is linked to the wired connection so that
monitoring occurs on the main router, called traceback. Logs are maintained according to MAC address,
which are constant per devices.

Data forwarding scenarios

ARP to get the MAC address.

VRP (Versatile routing platform)

Multiple collisions.

Establishing connectivity to the Switch or router: Remotely, tele, or mini usb/console physically

Console Access Setup Procedures:

Bits per second 9600

Data bits 8

Party: None

Stop bits 1
Flow control none.

Correct Usage: COM3

Not recommended to autoconfigure

Navigating the CLI

CLI Clock settings

CLI Interfaces:

Allows remote access VTY (Virtual teletype terminal) 0-4 five times. Can be changed.

CLI interface configuration

LoopbacK? Assign IP addresses.

Viewing the file system / Updating the software

Cd, pwd, dir, more

To reboot, Type reboot.

There is one root bridge and following from there are non-root bridges or downstream bridges.

Redundancy is recommended however there may be broadcast storms. MAC instability. So, the
spanning tree protocol was introduced. To send the packet along the shortest path.

-Bridge ID (Bridge number and MAC ID): BPDU packet sent to the switches, returning switch
number and MAC address. Only if the bridge ID is the same, the path codes are used to determine the
shortest path according to the cable speed.

The smallest bridge ID is elected as the root bridge. The highest priority or election criteria. The MAC
address is the determinant.

BPDU (Bridge Protocol Data Unit) through STP (Spanning Tree Protocol) for bridges and switches:

-We are trying to control the management of data to avoid loops and broadcast storms. The
bridge facilitates communication.

-BPDU: A communication from the root to downstream switches to avoid loops.

-TCN BDPU: Goes from downstream roots to the upstream roots to better understand the
topology of the tree. A status call, these protocols are a notification and update the tree hierarchy. Hello
tree over 2 seconds. The TCN BPDU refreshes/responds every 30 seconds.

-This is done to mitigate the loops and broadcast storms.

-Criteria: MAC address and lowest bit


-To select the route bridge. Packets exist for 20seconds.

-Path Cost Standards: Faster and shortest data transmission

• 10 mbps path cost 1999


• 100 mbps path cost 199
• 1Gbps path cost 20
• 10Gbps path cost 2

Finally use the Port ID if the path IDs are equal

-Root port: From a designated port to downstream

-Designated port: Touching/attached to the root bridge

-Alternative port: not a designated or root port

Route Path Cost: In order to determine the shortest path that is loop free. The root bridge path
cost is always 0.

The highest port identifier (the lowest port number) represents the port assigned as the root
port with other ports defaulting to the alternative port role.

To propagate a Hello Timer (2 seconds) the upstream will propagate over 1 second. A maximum
ae timer by default represents a period of 20 seconds.

Root election process

Port role establishment process

Port state Transition SUMMARY

Root Failure:

When a switch is done it cannot send BPDU, so the switches reestablish the bridge root through
the Spanning Tree Protocol (STP). If the device fails

Indirect link failure:

If the port is down. The port table is relabeled. The alternative port is named as a designated
port as it cannot be communicated any other way in this circumstance. Full recovery of the STP
topology occurs after approximately 50 seconds.

Direct Root Failure:

Topology Change MAC instability

A converging spanning tree network. A MAC Address black hole is made

Port transition state:

Disabled, blocking and listening do not send.

STP Modes:
To further mitigate against loops, the switches are not all the same mode and must be
configured by the technician.

-mstp (multiple)

-rstp (rapid)

-stp

If the stp is a priority the priority refers to integers between 0 to 61440 in increments of 4096,
16 increments. With a default value of 32768.

If a legcy stp standard is use the path cost ranges between 1 to 200000

If IEEE 802.1D standard is used the path cost ranges from 1 to 65535

If the IEEE 802.1t standard is used the path cost is ranges from 1 to 200000000.

All root bridges must be designated. Root protection only applies while not an edge port or a
command of loop protection is enabled.

When a link fails: Bridge ID, Path cost, Port ID comparison.]

If a link fails update the MAC address table.

RSTP (Rapid spanning tree protocol)

Improvement on STP, backup

STP Weaknesses: Ensures loop-free network however has a slow network topography as changes occur.
Convergence timers (30-50 seconds). Regular service interuptions

RSTP: Employs a proposal and agreement process which allows for immediate negotiation of links to
take place, effectively removing the time taken for convergence-based timers to expire before spanning
tree convergence can occur. Proposal & Agreement, immediate negotiation. Each downstream switch
gradually begins to learn of the true root bridge and the path via which the root bridge can be reached.

RSTP port toles

Backup port role represents the backup for the path for the LAN segment in the direction leading away
from the root bride. An edge port directly connects to a terminal and no other, where redundant links
exist,

RSTP edge ports:


System not participating gin RSTP connect to the edge port. Edge ports do not receive BDPU and instanly
forward data.

Port states of RSTP

RST BPDU

-00 unknown

-01 Alternate/backup

-10 root port

-Designated port

Static route would have to be reconfigured manually should the route fail. Only use a static route for
small networks of few users.

The convergence of a RSTP follow on from STP. There is an additional port on the LAN side, the edge
port.

RST BDPU Proposal

All designated ports. One is a superior BPDU. When the BDPU is sent, not propagated downstream. The
edge port is connected to the computer.

RST BPDU Agreement

RSTP Converged Link

The downstream port is blocked, and synchronization occurs. RST BPDU sent back and forth.

Link/Root failure

After not receiving three consecutive Hello intervals, the agreement process is reinsitialised in order to
discover port roles for the LAN segment.

Link failure is noticed immediately, the address entries are flushed. An RST BPDU will negotiate the port
states as part of negotiation and agreement process - MAC Addresses are dropped and updated
No waiting, part of configuration settings. When an STP enabled device is added to an RSTP system it
reverts to STP.

Network Management Station (NMS)

The edge ports that are shut down by the switch can be manually started only by the network
administrator.

STP DPDU-protection command should be ued to enable BDPU protection and is confiugred globally
within the system view.

Distance Vector Routing protocfol (RIP)

Performance is slow, Hop count limit of 15

Loop prevention

Packet is df

RIP has 2 method Extent is UDP.

-Authentication

RIP version 2 is recommended, defauit 1

Does not use I{ adfe

Metric

OSPD

OSPF

For 4 devices

Request + Acknoledgenent X2

10 seconds

4 packets sent over 40 seconds is the limit

Point-to point 10 second interval 40 seconds to withdraw packets

30 second interval

Higher prioirty the better the network


Between 1 - 255 range to select designated and back up value. THe higher the number the better the
network. The higher the authorisation/prioritu on router the beter the network

OSPF metric: By default, the metric is 10 which can be changed as per user preference, there can be
alternative.

10/8*bandwidth

OSFP tree recommended

Shortest path algorithm with the potential

OSFFP Areas for one domain such as uni campus.

OSFP Authentication simply password

OSPF silent interface only receives updates

DHCP

Dynamically assign IP addresses to users.

Usually wireless

To assign an IP address

-Manual: Administrator visits the machine and the IP address assigned is physically

-Dynamic: Assign to specific machines the

-Dynamic however the address is reassigned regularly

DHCP messages

DISCOVER: CLient can locate DHCP server

OFFer: When available

REQUEST: Client sends request but a message broadcast is sent, it is unicast.

Reply is unicast
Once a user/machine leaves the IP address can be reassigned. Maximum of 24hrs usage of an IP
address. Notification to renew sent at 50% usage. Down to the minute and second.

Without the message sent you can be disconnected.

FTP

Used to transfer files from the server to the client. VRP operating system.

Both the client and server must use the same password otherwise they cannot communicate with each
other. Two port numbers used to exchange packets.

-20 – data control/connections between client and server

-21 – file transfer

Two transmission modes

-ASCII mode for text

-Binary mode for pictures/images

Telnet (VTY) with the limit to trials)

Protocol to connect remotely to manage devices

-Port 23

Authentication modes:

-none: Login without authentication

-AAA: AAA authentication

-Password: Authentication

For some you can determine if a change was made and by who

Basic Knowledge of IP Routing (Routing packets)

-AS (Autonomous Systems):

A clear method of sending the data.

E.g 2 LANs connected by a LAN. LAN a, LAN b, LAN c. Where LAN c is he link between LAN a,b.

Relying on the IP address a Router uses the routing table, compared to a switch which utilises
MAC Addresses. Routers are responsible for routing decisions because of the routing table. All network
nodes are included.
ROUTING Protocol: RIPv1, RIPv2, ARP

PRE: Preferences. A router selects the best path based on the highest preferences (smallest val)

Direct = 0 (a direct link)

RIP = 100

OSPF = 10

Static preference = 60

A router command; ‘display’ 10.1.1.0 = router A

Next hop is the next port I.e 20.1.1.2

Routing Decision – preferences

Select the lowest preference value. The protocol helps to decide.

Routing Decision – Metric/cost

The decision maker, the metric.

Routing table forwarding requirements

Inbound: Default gateway

Outbound: To the internet or other network

IP Static (manually, stationery, fixed) Routes

IP static route/path, a unique non-changing path, if unavailable or something changes it is down.

A static route can be assigned on serial links or on ethernet (data link layer) link/cable.

Configuring/creating a static route

[RTB] IP route-static 192.168.1.0 (router A/destination) 255.255.255.0 (subnet mask) 10.0.12.1


(next hop router B)

[RTB} (On router B) ip route-static 192.168.1.0 255.255.255.0 (Subnet mask) Serial 1/0/0

[RTB] ip route-static 192.168.1.0 24 Serial 1/0/0

Static Route load balancing

More than one static route to a destination. Which comes with additional cost, ISP.

Verifying static route load balancing

[RTB] ip route-static 192.168.1.0 255.255.255.0 10.0.12.1 + 2nd line is equivalent to

*[RTB] display ip routing-table

192.168.1.0/24 static 60 0 RD 10.0.12.1 GigabitEthernet 0/0/0 + 2 nd line


Floating static route check but the when a preference is assigned the route chosen might still be the
highest preference by default

Special case of default static route when a destination static route is unknown. Works on any unassigned
network:

[RTA] ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 preference of 60 by default. Can access any + verification

Display ip route-table:

0.0.0./0 static 60 0 RD 10.0.12.2 GigabitEthernet0/0/0

Distance Vector Routing with RIP – a dynamic routing protocol

Without a static route you are required to have a routing protocol saved on the routing table.

Small organisation

Simple to implement

RIP, according to the Bellman-Ford algorithm, operates a n interior gateway protocol

Principle Behavior

Route advertisements periodically

Only carry best route info

Metric number is important

A hope limit of 15 hops to prevent infinite forwarding/loops.

Hops represent a metric of 1

When a network fails the next best route might have loops, the routers learn among themselves. The
metric cap can be changed.

Through the use of split horizons we can prevent loops.

Split horizon:

A route that is down and learnt on an interface cannot be advertised on the same to prevent
loops.

Enabled by default except on NBMA

Loop prevention-poisoned reverse:

Has additional overheads, the routing message size is increased because of advanced
notifications as the routing table is updated.

Allows the speed of erroneous routes to be timed out to become instantaneous.

On Huawei AR2200 series router split horizon and poisoned reverse cannot be applied at the same time,
poison reverse is preferred and enabled.
Loop prevention-triggered update

Updates of the routing table are sent periodically.

RIP extension authentication (RIPv2)

Additional security fixtures. Process of security comparison.

Malicious packets are filtered.

Plaintext is not completely secure.

If the router is not configured for RIP version 2 authentication it reverts back to RIP version 1
and discards authenticated RIPv2 messages.

RIP load balancing

In case of link being down

RIP network advertisement

[RTA] rip

[RTA-rip-1] version 2

[RTA-rip-1] network 10.0.0.0

RIP metricin/out

Supports manipulation of metrics.

Metricin: Change takes effect

Metricout: Changes do not apply

*Command:

[RTC] interface GigabitEthernet 0/0/0

[RTC-GigabitEthernet0/0/0] rip metricin 2

RIP output: Outbound interface

RIP inbound: Inbound interface

*[RTA-GigabitEthernet0/0/0] undo rip output: restrict advertisement. Update message cease to


be forwarded out of the given interface. Usable where an enterprise does not want to share its internal
routes to an external network via the interface.

*[RTA-rip-1]silent-interface GigabitEthernet 0/0/1 receive no advertisement

OSPF (Open Shortest Path First)

Minimal routing traffic


Rapid convergence

Scalable

Accurate route metrics

Configure on ethernet

Configure on serial but defaulted to point-to-point type

Configure as High-level data link control (HDLC) -data link layer OSI model

IP address on the network layer

OSPF can operate on multiaccess network that does not support broadcast.

Designated Router are implemented by NBMA (Non-broadcast multi access) act as an access
point with backup routers (neighbor(not BDR-backup designated router) or adjacent(linked to
neighbour))

Link State Establishment: Each router transitions between neighbour and adjacent state.

Each router according to LSA has its own individual unique LSDB

DR election process: Priority set at 1. If priority of 0 then it doesn’t participate in the election. Highest
priority becomes the Designated Router (sends advertisements for efficiency)

Cost metric formula 10^8/bandwidth

By using the bandwidth, the metric accuracy is improved

A link state protocol, uses LSA (link state advertisement) the information is LSA saved on the LSDB (link
state database) on the routing table.

Router ID is 32-bit used to identify each router running OSPF protocol

If a logical interface has been configured the Router ID is the highest configured logical interfaces IP
address

OSPF areas-single area

As the network grows, Area 0 is recommended but can be assigned

Multi area

Allows an OSPF to compartmentalise based on a link state database that is identical for an area
while granting information on destination of the OSPF domain

Default Process id 1

Selects the lowest router ID

[RTA-ospf-1-area-0.0.0.0]network 192.168.1.0 0.0.0.255


The network to be advertised.

OSPF authentication

Once advertisement is concluded, security can be incorporated

[RTA-GigabitEthernet0/0/0]ospf authentication-mode md5 1 huawei

OSPF silent interface

Prevent an interface from forming neighbor relationships with peers (sharing its router table)

DR and BDR use the multicast address 224.0.0.6

DHCP address acquisition

Discover (broadcast)

Offer (unicast)

Request (broadcast)

ACK (unicast)

DHCP lease renewal request (unicast)

DHCP interface pool configuration

Dhcp select interface

Dhco server dns-list 10.1.1.2

Dhcp server excluded-ip-address 10.1.1.2 ***excluded the Ip address of the DNS IP address
server

Exclude the gateway IP address as it is used by everyone as an entry.

DHCP global pool configuration

Dhcp enable

[Huawei-ip-pool-pool2]network 10.2.2.0 mask 24

[Huawei-ip-pool-pool2]gateway-list 10.2.2.1

[Huawei-ip-pool-pool2]lease day 1

[Huawei-ip-pool-pool2]quit

[Huawei-GigabitEthernet0/0/1]dhcp select global

FTP protocol
Sending files

E.g Updating operating system

Telnet protocol principel

Remote access for large organisations

Security, ssh

Telnet client and telnet server

Password vty 0 4

Gateway vs next hop (address)

Switches have a gateway only if it is layer 3 separating full access to private access. On a router,
its port assigned Ip address

Default gateway: IP address door taking your from one subnet to another.

Layer 2 switch have are not gateways they use MAC addresses and are on the same LAN

VLANs isolate into sub interfaces - datalink layer

Next hop is a link for a specific device to another port.

Intermediate Training
Huawei enterprise solutions for performance, scalability, reliability, security and management

Advanced Enterprise Solutions (Overview)


Expanding Enterprise Networks
Telecoms Solutions for Enterprise Networks
Enterprise Network Efficiency
Enterprise Network Security
Network and application

Enterprise Network Management


Monitoring through eSight. Remote, such as with wire shark.

Next Generation Enterprise Networks


Private, public and hybrid cloud.

Link Aggregation
Optimizing the throughput of data, link aggregation enables the binding of multiple physical interfaces
into a single logical pipe. (Performance, scalability, reliability)
Link Aggregation
Provides for increased bandwidth, enhanced reliability and support of load balancing.

Application in the Enterprise Network


Where is demand for data transmission the highest. Point of departure to foreign destination,

Like Aggregation Modes


on the LACP on a link aggregation

Data Flow Control


Speed 1000.

Frames with the same source MAC addresses are transmitted over the same physical link

Frames with the same destination....

….

….

...

L2 Link Aggregation Configuration


L3 Link Aggregation Configuration
Transition the trunk from 2nd layer to the 3rd layer

Use undo port switch, then an IP address can be assigned to the interface.

Displaying Aggrgation
….

VLAN(Virutal Local Area Network) Principles


For safety, put it on a separate VLAN.

Manage the large network by dividing into subnetworks.

Improve the manageability

LAN Limitation
VLAN Technology
Enable logical isolation of network traffic

At the data link layer.

Created on switches same OSI model layer as switches.

VLAN Frame Format


VLAN tag contains Tag Protocol Identifier (TPID)-IEEE 802.1Q tag format and Tag Control Information
(TCI) to carry data. Priority Code Point is a form of traffic classification field that is used to differentiate
forms of traffic. Classification such as voice, video, data, etc. Show as a 3 bit value (0-7) understood on
gerneral 802.1Q class of service (COS).

Drop Eligibility Criteria (DEI) such as true or false bit. determines eligiblity to discard data.

Link Types
Trunk: Backbone for the transmission of VLAN traffic. Difference between switches

Access: Between and end system and a swtich device participating in VLAN tagging.

Port VLAN ID
You can set each VLAN to accept default VLAN for the interface to be recognised as the Port VLAN ID
(PVID). This deter,mines the behaviour that is applied to any frames being received or transmitted.

Port Types – Access


Access ports associated with access links and frames being transmitted from an interface are assigned
VLAN tag that is equal to the Port VLAN ID (PVID).

if a tag and PVID vary the frame is not forwarded and discarded. A untagged fram is forwarded to the
interface of the switch to all other destinations to be understood

Port types –Trunk


Decides what is transmitted. Trunk port associated with the trunk links, the PVID identifies VLAN frames
requried to carry a VLAN tag before forwarding. If it has the PVID it can travel otherwise VLAN tag must
be included

Port Types – Hybrid


Hybrrd ports are either tagged or untagged. VLAN communication is managed port by port. A trunk port
is not connected to a machine but a switch.

Hybrid ports Represent the default for Huawei devices. If it is tagged the PVID allows it to travel. If it is
untagged it must be in the access area to be transmitted. If it is on the trunk it must be tagged to travel.
A tag must be added by the port which received an untagged frame from an end system.

Hybrid ports something about tags corresponding to a PVID

VLAN Assignment Methods


Port based e.g. G0/0, g0/0/7

MAC Address 00:01:02:03:04:AA,

IP based subnet 10.0.0.1

Protocol based e.g. IP, IPX

Policy based10.0.1, g0/07, 00:01:02:04:AA

Creating a VLAN
VLAN range 1-4094.

VLAN batch (each host)


All ports are associated with VLAN 1 as the default

Setting the port Link type


0/0/1 the layer for trunks: tagged

0/0/5 trunk access: untagged

All Huawei switches are Hybrid Look at the image for the switch.

Creating VLANs
vlan <ID>

port <location>

port link type <access/trunk>

Forwarding over the Trunk


port link-type trunk

port trunk pvid vlan 10

port trunk allow-pass vlan 2 3 #forwarding over the trunk

Access untagged, link down(inactive) as it as it is unspecified

Access untagged, link up(active), specified... it was added to the trunk

Configuring Hybrid Port


[SWA.....0/0/5]

Voice VLAN Application


voice-vlan 2 enable …..(required)

mode auto: to add the port or not

voice-vlan mac-address <mac-address>

Associated with voice VLAN based on the Organisationallu Unique identifer (OUI)

GARP and GVRP


The VLAN organising themselves as though they were routers (network layer 2), this is however the
datalink layer 2. For implementation and removal of

Generic Attribute Registration Protocol (GARP)


An architecture for the registration, deregistration and propagation of attributes between switches is
enabled. GARP is employed by GVRP - the shell, the virtual machine.

PDU (Protocol Data Unit) are sent from GARP and use multicast MAC address 01:20-C2-00-00-21.

Events between switches:

0: LeaveAll event

1: JoinEmpty event
2: JoinIn event

3: LeaveEmpty event

4: LeaveIn event

5: Empty event

Attrbute events – Join Message


Allows the device to join the attributes. Either:

JoinEmpty: Unregistered

JoinIn: Declared a registered attribute

Attribute events - leave message


Trying to deregister what has been registered.

LeaveIn:

LeaveEmpty:

Attribute events – Leave All message

GVRP
Registration modes
VLAN Types:

Static (Manually for registration)

Dynamic (Automatically for registration)

Registration modes:

Fixed: Only sends declaration static registration

Normal: Permits static and dynamic VLANs

Forbidden: The GVRP interface is disabled from dynamically registering and


deregistering VLANs except for VLAN 1 – default Huawei router

Enabling GVRP
Command gvrp is used to enable GVRP once the interface has neem configured to operate as part of
VLAN.

port trunk allow-pass vlan all

gvrp registration fixed/normal

[SWA]display gvrp status … “GVRP is enabled”


VLAN routing
VLAN Disadvantages
Forbidden access

VLAN Routing
VLAN frames are routed over a trunk link for port conservation.

VLAN routing features


2 IP addresses however one IP address is virtual – sub interface

VLAN Routing Config


**[SWA]vlan batch 2 3

[SWA]port link-type access

[SWA]port trunk allow-access all**

[RTA] interface GigabitEthenet0/0/0/1.1... Creating the sub interface

[RTA-GigabitEthernet0/0/1.1]dotlq terminate vid 2

performs port receiving VLAN packet will remove the VLAN tag from the fram and forward the
packet via layer 3 routing

[RTA-GigabitEthernet0/0/1.1]arp broadcast enable

Applied to each logical interface, if it remains disabled on the sub-interface the router will
discard packets!!

*** learn the sequence of all commands****

L3 Switch based VLAN routing


VLANIF (VLAN interfaces) are used by each VLAN as a route gateway.

Benefit over router:

Forwarding VLAN traffic with minimum delay.

Known as line speed forwarding

VLAN Gateway assigned

Wireless LAN Overview


Development of WLAN
Wireless Local Area Network Evolution
Fixed network

802.11a/b 54 MBps 2.4GHz

802.11n 600Mbps 2.4-5GHz


802.11 ac >1 Gbps 5GHz

BYOD

Wireless coverage
Wireless LAN solutions
Wireless LAN security
Principle and Configuration of HDLC and PPP
Point-to-point : Data link layer 2

Frame relay : Data link layer 2

HDLC : Data layer 2

Serial Signaling
Connect via ethernet or serial link

Synchrnoous access

Asynchrnonouos access

THe HDLC (High Level Data Link Control) Protocol


Supports both

Basic Config of HDLC


[RTA[ interface serial 1/0/0

[RTA] link-protocoo hdlc

[RTA] ip address 10.0.1.1 30

Assigning Unnumbered Addresses in HDLC


IP addresses can be borrowed from other interfaces in order to establish connectivity I.e. Eduroam

ISP provides links occasionally.

Config validation
[RTA] display ip interface brief

PPP protocol Application


A multiprotocol standard used as with HDLC to define the link layer operation over a serial medium.

Encapsulates and transmits network layer packets over point-to-point (P2P) over full-duplex
synchronous and asynchronous links. Built on Serial Line Internet Protocol (SLIP).

Frame relay (FR) only supports synchronous links – such as with Banks that are standalone.

Components of PPP
PPP encapsulation method: ….

Link Control protocol: …

Network Control Protocol: ….


PPP Frame:
LCP packets, NCP packets...

Packet types used in LCP negotiation

Configure Request

Configure-Acknolodgement

Configure-Nak, unaccepted configuration options

Configure-Reject

Common Link Parameters of LCP Negotiation


Maximum Receive Unit

Authenticaton protocol

Magic Number

PPP Basic Configuration


[RTA] interface serial 0/0/0

[RTA serial ] protocol PPP

PPP Authentication Mode – PAP

PPP Authentication Mode – CHAP (Challenge handshake authentication protocol)


Configuring PAP Authentication
Less secure than CHAP (encryption based) as it is plaintext

[RTA] aaa

[RTA-aaa] local-user huawei password: cipher huawei123

AAA: Authentication, Acknowledge

Frame Relay Principles


Frame relay networks comprise of Data terminal equipment (DTE) and Data circuit terminating
equipment(DCE).

DTE is at the edge of the customer network

LMI Negotiation Process


LMI protocol one link can negotiate with the frame relay switch

Inverse ARP Neogtiation Process


Main function to resolve the IP address of the remote device that is connected to every virtual circuit.
(VC). If protocol address of the remote device connected to the VC is known, the mapping between the
remote protocol address and DLCI can be created on the local end, which can avoid configuring the
address mapping manually.

Frame Relay & Split Horizon


Split Horizon: Prevents data received on an interface from being forwarded out of the same
physical interface.

Frame relay sub-interfaces


Apply a logical sub-interface to a single physical interface. Two types:

Point-to-Point: Connect a single remote device. The peer address is identified

Point-to-Multipoint: Used to connect multiple remote devices, each PVC will map the protocol
address of its connected remote device. Different PVCs can reach different remote devices.

The address mapping must be configured manually, or dynamically set up through the Inverse address
resolution protocol(InARP)

Frame Relay Config –Dynamic Mapping


You need InArp – Inverse Address Resolution Protocol, Need a linked layer ptocol type. The interface on
the custome side must be DTE on the edge. . This is by default on Huawei ARG3 series routers, set to
DTE.

To allow the dynamic mapping to cocur the fr in arp command is applied.

***See Syntax***

Using the fr Inarp it is possible to discover all permanent virtual circuits (PVC) associated with the local
interface

Frame Relay Configuration –Static Mapping


The fr map ip [des-addr [mask] dlci-numer] configures a static mapping by associating the protocol
address.

This config helps upper layer protocols locate a peer device based on the protocol address o f the peer
device.

READ rules

Need DLCI number.

Simple methods to transmit and exchange data.

Principle and Configuration of PPPoE (Point-to-Point over Ethernet)


Fiber is possible.

Digital Subscriber Lines


Old tech, dial-up,

BRAS (Broadband Remote Access Server)


PPPoE Application in DSL
No security, no authentiation

PPPoE Protocol Packets:


PADI: Active Discovery Initiative Packet

PADO:

PADR:

PADS:

PADT:

Padi, Pado, Padr needed to open a connection.

PADT to close the connection

PPPoE session Establishment Protocol


PADI to all to determine who needs the data.

PADO sent back,

If no response is received, PADR sent to the address that is relevant

PADS is the session to be open.

PADT: The session is over terminate the session

Configuring A PPP Dialer interface


Old reliable. Three steps:

Dial-up interface

Network Address Translation (NAT)


Private & Public Networks
NAT behaviour
Uses the established boundary of the gateway router to identify network domains for translation.
Separates public from private.

A NAT must be able to create a mapping table within the gateway to allow the gateway to allow the
gateway to determine as to which private network destination address a packet received from the
public network should be sent, again requiring address translation to be performed along the return
path

Static NAT
Represents a one –to-one (1 IP address) mapping of static NAT that is manually configured by the
administrator
Dynamic NAT
Works on the principle of an address pool. Internal end systems wishing to forward traffic to a public
network can associate with a public address from an address pool.

Network Address port translation (NAPT)


Security reason. Internals ports should not be available externally. Hide the IP address and the port
numbers. The ISP provides public port numbers in lieu of the private individuals port number. More like
dynamic.

Easy IP
The WAN interfaces address used as a single public address for all internal users, with port numbers
used to distinguish sessions. Create an Easy IP through a dial-up to receive a temporary public IP address
received by the outbound interface. Small scale enterprises.

NAT Internal Server


E.g. Accessing the UCT/WITs server externally

External sources can reach internal addresses.

Mapping of both the IP address and port number is performed.

Mapping occurs.

Static NAT Config


[RTA]interface GigabitEthernet0/0/1 …. Inbound, default gateway

[RTA-GigabitEthernet0/0/1]ip address 19.2.168.1.254 24 ….

[RTA] interface Serial1/0/0

[RTA-Serial1/0/1]ip address 200.10.10.1 24

[RTA]nat static global 200.10.10.5 inside 192.168.1.1 .... invoking NAT static

[RTA} display nat static

...

Netmask: 255.255.255.255

Dynamic NAT Config


[RTA]nat address-group 1 200.10.10.11 200.10.10.16 …. pool of IP addresses

[RTA]acl 2000 …. Access Control List (ACL)

[RTA-acl-basic-2000]rule 5 permit source 192.168.1 0 0.0.255 (subnet)

[RTA-acl-basic-2000]quit
[RTA-Serial1/0/0]nat outbound 2000 address-group 1 no-pat

We have ACL (Access Control List) 2000

Rule 5, 10, 15

outbound – we request their port numbers and IP addresses, belongs to address group 1

no-pat : No port address translation

Easy IP Configuration
Very similar to dynamic, rely on the creation of an access control list for defining address range to which
to translate. Perform the nat outbound command.

NAT Internal Server Configuration


[RTA] nat server protcol tcp global. 200.10.10.5 www inside 192.168.1.1 8080

Establishing Enterprise Radio Access Network Solutions


Wireless WAN Overview (WWAN)
Mobile station (MS) or User Equipment (UE) to communicate. On 3G (UMTS) and 4G (LTE)

Wireless WAN and the Enterprise Network


Security, reliability

Enterprise Wireless WAN Solution


Failover solutions for 2G and 3G... If 2G is down you seamlessly transfer to 3G vice versa

Establishing the 3G Network


3G network parameters are defined on the cellular interface. Create the interface, known as

[Huawei] \interface cellular. 0/0/0

ip address ppp-negotiate

prof

Setting the dial control center


Dial Control Center is implemented. The dialer-rule command inititiates the dialer-rule view where the
rules are defined to enable IPv4 –32 bits- to carry over the interface. Dialer-rule number (E.g. +27 ZAR).

Configure NAT Role & Static Route


[Huawei]acl number 3002

[Huawei-acl-adv-3002]acl <5,10,15> permit ip source 192.168.1.0 0.0.0.255

[Huawei-acl-adv-3002]quit

[Huawei]interface cellular 0/0/0

[Huawei0cellular0/0/0]nat outbound 3002

[Huawei-cellular0/0/0]quit
[Huawei]ip route-static 0.0.0.0 cellular 0/0/0

Access Control Lists (ACL)


IPv4 –32 bits security but bulky.

IPv6-128 bits due to increased security, however it is streamlined and incorporated making it less bulky

Monitoring (performance) and Security.

ACL: For better management and filtering of traffic as part of security.

Filtering Restricted Traffic


ACL is a mechanism that implements access control for a system resource by listing the entities based on
parameters (rules) to permit access to the resource.

Filtering Interesting Traffic


ACL Types
Basic

Value Range: 2000-2999

Parameter: Source IP

Advanced

Value Range: 3000-3999

Parameter: Source & Destination IP, Protocol, Source & Destination port

Layer 2 ACL

Value Range: 4000-49999

Parameter: MAC Address

Can all be applied on AR2200 series routers

Packet filtering parameters vary for each ACL types

ACL Rule Management


Rules increment 5 -> 10-> 15-> 20

Basic ACL
[RTA-acl-basic-2000]rule deny source 192.168.1.0 0.0.0.255

[RTA-acl-basic-2000[rule permit source 192.168.2.0 0.0.0.255

[RTA]interface GigabitEthernet 0/0/0

[RTA-GigabitEthernet0/0/0]traffic-filter outbound acl 2000

Advanced ACL
[RTA]acl 3000
[RTA-acl-adv-3000]rule deny tcp source 192.168.1.0 0.0.0.255 desination 172.16.10.1 0.0.0.0
destination-port eq 21 … FTP ports 20 or 21

[RTA-acl-adv-3000]rule deny ip source 192.168.2.0 0.0.0.255 destination 172.16.10.2 0.0.0.0 ..default


route, all IPv4 addresses on the local machine

[RTA-GigabitEthernet0/0/1]traffic-filter inbound acl 3000

ACL Application –NAT (Network Address Translation)


You can apply ACL on NAT

AAA (authentication, Accounting, Authorisation)


Authentication
You must be authenticated to communicate

Accounting
AAA Local Config
Both must have the same user name and password

Securing Data with IPSec VPN


The methods of securing your environment.

IPSec – network layer 3

A SA (Security Association) is shared in a single direction

Two modes:

IPSec Transport Mode:

IPSec Tunnel Mode: More secure

Reachability

Identify interesting traffic

Establish IPSec Proposal

Create IPSec Policy

Apply Policy to Interface

IPSec VPN Configuration


...

Required network layer communication for an IPSec VPN. An advanced ACL is needed to determine the
protocols, ports and ip addresses.

E.g. use authentication algorithms [md5 | sha1 | sha2-256 | sha 2-384 | ….]
The sha* must correlate between devices that are to communicate.

IPSec Policy Creation


IPSec Policy defines parameters for establishing IPSec SA:

Policy-name

seq-number (1-15)

Multiple IPSec policies with the same IPSec policy name constitute an IPSec policy group. The IPSec
policy gorup contains a maximum of 16 IPSec policies. The smalledst IPSec sequence number has the
highest priority. The group must be applied to an interface

The Tunnel local and Tunnel remote have links that determine where the tunnel starts and ends.

The SPI (Source Parameter Index)

The Inbound SPI must be the same as the outbound SPI, the number

Finally, authentication key must be defined as inbound and outbound, they must be the same

IPSec policy Creation


[RTA]ipsec policy P1 10 manual

[RTA-ipsec-policy-manual-P1-10]security acl 3001


...

Applying policies to interfaces


IPSec Policy Verification

Generic Routing Encapsulation (GRE)


GRE Application
Supports encapsulation of protocols over other protocols: supports multiple protocols simultaneously.

Enables routing between remote and disparate networks.

Can be implemented on tunneling. Less secure. Ideal to implement GRE tunnel and IPSec VPN

IPSec VPN (Virtual Private Network) support for GRE (Generic Routing Encapsulation)
GRE Keepalive
,,,

GRE Configuration
Simple Network Management Protocol (SNMP)
Management solutions widely used in TCP/IP networks. Adaptation of SGMP protocol, forms the basis
for common network management throughout the system. SNMP is effectively a communication
medium between the network elements and the network adminstrator/(NMS).

Network Management Station (NMS) relies on SNMP to define sources for network information.

SNMP relays reports in the form of trap messages to the NMS so that the station can obtain network
status in near real time. This allows the network administrator to quickly act on system discrepancies
and failures.

SNMP is used to manage:

Software:

Applications

User Accounts

Write/read permissions (licenses)

Hardware:

Workstations

Servers

Network cards

Routing devices

Switches

SNMP Architecture
The network management station (NMS) has network management requests that it makes know to the
elements; hosts, gateways, terminal servers etc. The management agent resides on the network
element in order to Retrieve/get or alter/set vaiables.

NMS associates with the management agent on each of the network elements that perform NMS
designed functions composing the MIB (Management Information Base) objects.

SNMP messages of IP require UDP

MIB Objects
Specifies the variables to be maintained by each network element. These variables are queried and set
by the management process.

The SNMP MIB has the same tree structure as the DNS (Domain Name System) with the top objects:

ISO

ITU-T (CCITT)

Joint organisation branch


V1;

Version2: Security upgrade

Version 3:

eSight Network Management Solutions (Huawei solution)


Monitors each component

Traffic

Introducing IPv6 Networks

IPv6 Routing Technologies

IPv6 Application Services DHCPv6

Practical Training
Entry Training
..

//

Intermediate Training
..
Lessons from the mock exams
Loopback address 127.0.0.1

VLAN 12 bits

Huawei switch forwarding delay: 0.15 seconds

ICMP protocol is applied to the network layer

ID of the Backbone OSFP = area 0

OSI Model layer:

-Application

-Presentation

-Session

-Transportation

-Network

-Data link

-Physical

TCP/IP Model Layers:

-Application, sessio, presentation

-Transport

-Network

-Data link

OSFP uses SPF (Shortest Path First) algorithm to calculate the shortest route

Link state routing protocol = OSPF (Open Shortest First Protocol)

Repeaters, hubs, network interface cards, cables and connector operate on the Physical layer

Maximum hop count RIP

DNS port number 53

Two others will either exchange LSA or send Hello packet to each other due to the existence of DR in
Broadcast network of OSPF

A static route can be neither configured manually by a network administrator nor generated
automatically.

When a network condition changes a static route canNOT be rectified automatically without
reconfiguration by the network administrator
Root bridges provide root ports and designated, alternative ports

Routing information Protocol (RIP) is NOT available in the RIPv2, RIPv2 and RIPv3 versions

When a trunk port receives an untagged frame, the switch will NOT drop the frame

One router forwards the packets according to the routing table on itself without considering the routing
table of any neighbour routers

A trunk port does not always send tagged frames to the peer equipment.

Each router only knows how to forward the packet to the net hop IP address. It doesn’t know the end to
end forwarding path. This type of forwarding is called Hop by Hop forwarding

OSFP version specific to the IPv6 technology = OSPFv3

The IP protocol is unreliable and connectionless orientated.

The subnet mask of a class A address is 255.255.240.0 has 12 bits

When a node transmits data over a network medium, the data is transmitted to all the nodes on the
network. The topology used is BUS

A router runs OSFP and its interface serial 0 and IP address 10.0.0.1/30 belongs to the backbone area.
The command used to enable OSFP on this interface is = [Quidway-osfp –1area-0.0.0.0]network
10.0.0.0 0.0.0.3

Switch –A and Switch-B are configured with ports in VLAN for deparments. Each VLAN contains 20 users.
Only 5 subnets are required.

Multiple choice section


The functions of all seven layers of the OSI reference model

-The email server

-network management server.

Access ports:

-Belong to only one VLAN

-Are used for connection between switches and PC’s

Data link layer has two sub-layers:

-MAC sub-layer

-LLC sub-layer

RIP (Routing information protocol):

-User can specify the route preference of RIP higher than that of static routes
-If the route calculated by other routing protocol which is imported by RIP does not specify the
cost value, the cost value will be set as 1 by default

Routed protocols:

-IP

-OSPF (Open shortest path first)

VLAN interfaces:

-A virtual interface is required to be created for VLAN if we want to assign an IP address for that
VLAN

-VLAN interface number must be the same as the VLAN ID

If two static routes are configured to the route 10.1.1.1/32. If one does not have a value for the
preference_value parameter and the other static route is assigned with 100 for the preference_value
parameter

-The route not assigned a preference_value parameter will function as the working route

-A static route supports route backup

Functions of a router:

-Check the destination address in a datagram

-Discover possible routes

-Verify and maintain route information

Packet filtering firewall filters packet based on quintuplet. Components of quintuplet:

-IP address

-Protocol number

-Port number

Protocols used for file transfer:

-FTP

-TFTP

Standards defined by IEEE to regulate the implementation of VLAN between switches

OSPF takes the precedence to select the biggest IP address of all the loopback addresses as a router ID
unless you specify a router ID manually.

The frame is the PDU that resides at the data link layer

EUI-64 used to configure IPv6


ICMP used to ping test sending a series of packets

DD packets are used to describe LSDBs

STP interface states:

-Blocking

-Listening

-Learning

-Forwarding

-Disabled

Interior Gateway Protocol (IGP):

Route Information Protocol uses the hop count to determine the value cost

IP address consists of: Network address, Host address, subnet field, non-default masks, default subnet
mask

CHAP (Challenge-Handshake authentication protocol):

-Verify remote clients

-Challenge packet

-Response packet

-Success packet

-Failure packet

Link aggregation benefits:

-Increased bandwidth (the capacity of multiple links is combined into one logical link

-Automatic failover

-Failback (The traffic from a failed link is automatically switched over to other working links

ESight is supported by SNMPv1, SNMPv2c and SNMPv3

DHCP offer packet can carry more than one DNS server address

After a fault occurs in a network, a static route canNOT be rectified automatically and the network
administrator is needed to reconfigure.

(RIP) Routing Information Protocol is not available in RIPv1, RIPv2 and RIPv3 versions

On Huawei switches you can run the VLAN batch command to create multiple VLANs in batches

HDLC is ISO standard link layer protocol and it is used to encapsulate data transmitted on asynchronous
link
One of the significant features of the PPP protocol is the authentication function. With this function, the
two ends of a link can negotiate with each other to use which authentication protocol and then perform
authentication. A PPP connection is established only when the authentication is successful.

When you configure Frame Relay on Quidway routers, you can configure inverse ARP instead of static
address mapping because the function of inverse ARP is to provide dynamic address mapping.

The operation deleting the configuration files saved in the storage devices will become effective after
rebooting the router.

Frame relay point-to-multipoint sub-port canNOT connect multiple remote nodes together through a
PVC

ICMP protocol is applied to the Network Layer

Protocols can dynamically register VLAN information:

-MVRP (Multiple VLAN registration Protocol) sends PDU (protocol data unit)

-MRP (Multiple Registration Protocol)

-GARP (Generic Attribute Registration Protocol))

ARP (Address Resolution Protocol) performs required IP routing. It finds the hardware address (MAC
address) from the IP address. ARP maintains a cache table of MAC addresses mapped to IP addresses.

HDLC is NOT ISO standard link layer protocol and it is used to encapsulated data transmitted on
asynchronous link.

The standard defined by IEEE to regulate the implementation of VLAN between switches is 802.1Q

A switch supporting 802.1Q protocol can support a maximum number of 4096 VLANs

ESight is not only for Huawei

When two routers synchronise their LSDBs they use DD packets to describe their LSDBs

IGP(Internal gateway protocol) is the protocol which is used for asynchronous systems

OSPF takes the precedence to select the IP address of all loopback port addresses as a router ID unless
you specify a router ID

Hop count is the parameter used by RIP to calculate the value of cost

On Huawei switches running STP, the default value of forward delay is 15 seconds

The broadcast MAC address is FF:FF:FF:FF:FF

To release the IP address assigned by the DHCP server on Windows XP, command IPconfig/release

IPv6 is 128 bits, processed in order

The protocols that can be used for file transfer is FTP and TFTP

CHAP packets:
Challenge

Response

Success

Failure

Das könnte Ihnen auch gefallen