BGP OSPF Questions: Difference between revisions

Line 492:
= Switching =
 
commands== Commands for switching ==
 
* Note - Layer 2 header contains source mac, des mac, ether type, ether type fields tells the process next layer 3 protocol like ipv4, ipv6.
sh int fa0/1 switchport ( trunk, access, administrative mode )
sh int trunk ( ports which are trunk )
sh spanning tree vlan 1 ( to check wheather traffic is forwaded in spanning tree )
 
* If we have layer 2 ether channel then if we do sh spanning tree output it should show individual port channel group in output rather than individually phsyical links else we have issue.
Note -Layer 2 header contains source mac ,des mac ,ether type ,ether type fields tells the process next layer 3 protocol like ipv4 ,ipv6.
* On the switch we have root port and designate port, all the traffic from root port will be forwaded towards root bridge.
* If the two switches are in differnt VTP domain, as long as they have trunking set between them is correct they will not effect the broadcast domain -Good
 
* Two ways to change priorty for root bridge
sh int fa0/1 switchport ( trunk ,access ,administrative mode )
spaniing tree vlan 2 root primary
spanning tree vlan 2 priorty lesser than 32768
 
* In spanning tree one of election for root port on non route bridge is based path cost that is local to interface
sh int trunk ( ports which are trunk )
* In 3560 swicth by default PVST+ is enabled
 
 
* Auto -Auto -results in access port
sh spanning tree vlan 1 ( to check wheather traffic is forwaded in spanning tree )
* access mode-Dynamic desirable -Access port
* tunk with nonnegotiate ---auto -Because switch on left side is not sending DTP frames.
 
* Best practises of truking -mode trunk and non negotiate, Trunk negotaition are done on DTP when using DTP both the ends should in same VTP domain
if we have layer 2 ether channel then if we do sh spanning tree output it should show individual port channel group in output rather than individually phsyical links else we have issue .
* When frame traverse the trunk link it is marked over truking protocol and on receiving end VID is removed before sending to access link
 
== ISL and 802.1Q ==
on the swicth we have root port and designate port ,all the traffic from root port will be forwaded towards root bridge .
 
* ISL -encapulsate entire frame, it dos not native vlan traffic, orginal frame unmodifed, ISL adds 26 byts header and 4 bytes trailer.range of isl 1-1024.
if the two switches are in differnt VTP domain, as long as they have trunking set between them is correct they will not effect the broadcast domain -Good
* 802.1Q-insert 4 byte tag, does not tag the frame that belong to native vlan, additonal tag includes priroty field, extending qos support, 4096 Vlans, 1-4096.
 
* Inorder to maintain identical information of vlan database, VLAN information is propagatd over trunk links in same VTP domain, VTP information is advertized over trunk links only.
* VTP is layer 2 messaging protocol. Three version of VTP (1,2,3).
* Limitaion of VTP version 1,2 - extended VLAN funstionality was only used in when switch is configured in transparent mode, so the VTP version 3 is used.
 
Server mode - create, del, modify, send and forward advertizements, syn vlan database, store information in nvram
two ways to change priorty for root bridge
Transparent mode - create, del, modify local Vlan, forward advertizements, no syn vlan database, store information in nvram
Client mode - cannot create, del, modify vlans, forward advertizements, syn vlan database, do not store information in nvram.
 
Important: when ver new switch is added make sure its configration revision is less than any other swiches in VTP doamin else if it is high then it will erase all the vlan information of server and client
spaniing tree vlan 2 root primary
to protect that either add switch in transpanrent mode or in differnt domain.
 
* For VTP configration requires VTP domain ,password ,VTP mode on each switch .sh VTP status or VTP counters.
spanning tree vlan 2 priorty lesser than 32768
* VTP pruning -used to remove unnessary flooding of brodcast traffic on the network.
 
== STP ==
 
* STP-is used to avoid unwanted loops in the environment.
In spanning tree one of election for root port on non route bridge is based path cost that is local to interface
* STP created one refernce point in n/w that is called root of tree ,based on rerfernce point decides whether there is redundant path in the n/w
 
* Layer 2 forwading -By default CAM table entries got aged out every 300 sec
 
* We can also create static mac address table entry in cam - command ( mac-address-table static mac-address VLAN id interface type )
in 3560 swicth by default PVST+ is enabled
 
 
 
 
AUto -Auto -results in access port
access mode-Dynamic desirable -Access port
tunk with nonnegotiate ---auto -Becuase switch on left side is not sedning DTP frames.
 
 
BEst practises of truking -mode trunk and non negotiate ,Trunk negotaition are done on DTP when using DTP both the ends should in same VTP domain
 
 
when frame traverse the trunk link it is marked over truking protocol and on receiving end VID is removed before sending to access link
 
ISL and 802.1Q
 
ISL -encapulsate entire frame ,it dos not native vlan traffic ,orginal frame unmodifed ,ISL adds 26 byts header and 4 bytes trailer.range of isl 1-1024
 
802.1Q-insert 4 byte tag ,does not tag the frame that belong to native vlan ,additonal tag includes priroty field ,extending qos support ,4096 VLans,1-4096
 
 
inorder to maintain identical information of vlan database ,VLAn information is propagatd over trunk links in same VTP domain ,VTP information is advertized over trunk links only .
 
VTP is layer 2 messaging protocol.three version of VTP (1,2,3)
 
Limitaion of VTP version 1 ,2 -extended VLan funstionality wasonly used in when switch is configured in trasnsparent mode ,so the VTP version 3 is used .
 
 
Server mode -create ,del ,modify ,send and forward advertizements ,syn vlan database ,store information in nvram
 
transparent mode -`create ,del ,modify local Vlan ,forward advertizements,no syn vlan database, store information in nvram
 
client mode -- canot create ,del ,modify vlans ,forward advertizements,syn vlan database,do not store information in nvram.
 
Important -when ver new switch is added make sure its configration revision is less than any other swiches in VTP doamin else if it is high then it will erase all the vlan information of server and client
to protect that either add switch in transpanrent mode or in differnt domain .
 
 
for VTP configration requires VTP domain ,password ,VTP mode on each switch .sh VTP status or VTP counters.
 
 
VTP pruning -used to remove unnessary flooding of brodcast traffic on the network.
 
 
STP-is used to avoid unwanted loops in the environment .
 
STP created one refernce point in n/w that is called root of tree ,based on rerfernce point decides whether there is redundant path in the n/w
 
 
Layer 2 forwading -By default CAM table entries got aged out every 300 sec
 
We can also create static mac address table entry in cam - command ( mac-address-table static mac-address VLAN id interface type )
 
 
Line 616 ⟶ 584:
spannin tree vlan vlan id port priority
 
== RSTP ==
 
RSTP have rapid convergence time ( discadring ,listening ,forwading )
Line 628 ⟶ 597:
 
 
== HSRP/VRRP/GLBP ==
 
* HSPR-Provide redudancy of the gateways ,HSRP exchange the HSRP hello message on 224.0.0.2
* VRRP-In VRRP we can use real ip add of router as virtual address, IEE standard,router with highestest priorty is master router and other acts a back and VRRP messages are send on multicast address 224.0.0.18 ,Default interval is 1 second and preemtion is enabled by default.
 
* GLBP -uses concept of AVG and one router act as primary while other act as backup ,AVG assign virtual macs to AVF,and it is AVF's which forwrd the packets based on virual mac's assgin by AVG.,
* GLBP communicate over hello packets send every 3 seconds on multicast address (224.0.0.102),GLBP suppots up to 1024 vrtual routers.
 
VRRP-In VRRP we can use real ip add of router as virtual address ,IEE standard,router with highestest priorty is master router and other acts a back and VRRP messages are send on multicast address 224.0.0.18 ,Default interval is 1 second and preemtion is enabled by default .
 
== MST ==
* This table shows the support of MST in Catalyst switches and the minimum software required for that support.
 
Catalyst Platform MST with RSTP -- (12.1 or higher )
GLBP -uses concept of AVG and one router act as primary while other act as backup ,AVG assign virtual macs to AVF,and it is AVF's which forwrd the packets based on virual mac's assgin by AVG.,
Catalyst 2900 XL and 3500 XL Not Available
 
Catalyst 2950 and 3550 Cisco IOS\AE 12.1(9)EA1
GLBP communicate over hello packets send every 3 seconds on multicast address (224.0.0.102),GLBP suppots up to 1024 vrtual routers.
Catalyst 3560 Cisco IOS 12.1(9)EA1
 
Catalyst 3750 Cisco IOS 12.1(14)EA1
 
Catalyst 2955 All Cisco IOS versions
 
Catalyst 2948G-L3 and 4908G-L3 Not Available
This table shows the support of MST in Catalyst switches and the minimum software required for that support.
Catalyst 4000, 2948G, and 2980G (Catalyst OS (CatOS)) 7.1
 
Catalyst Platform4000 MSTand with4500 RSTP(Cisco IOS) -- (12.1(12c)EW or higher )
Catalyst 2900 XL5000 and 3500 XL5500 Not Available
Catalyst 29506000 and 35506500 Cisco(CatOS) IOS\AE 127.1(9)EA1
Catalyst 35606000 and 6500 (Cisco IOS) 12.1(911b)EX, 12.1(13)E, 12.2(14)EA1SX
Catalyst 3750 Cisco IOS 12.1(14)EA18500
Catalyst 2955 All Cisco IOS versions
Catalyst 2948G-L3 and 4908G-L3 Not Available
Catalyst 4000, 2948G, and 2980G (Catalyst OS (CatOS)) 7.1
Catalyst 4000 and 4500 (Cisco IOS) 12.1(12c)EW
Catalyst 5000 and 5500 Not Available
Catalyst 6000 and 6500 (CatOS) 7.1
Catalyst 6000 and 6500 (Cisco IOS) 12.1(11b)EX, 12.1(13)E, 12.2(14)SX
Catalyst 8500
 
 
== Spaning tree features ==
Spaning tree features that helps in reducing covergence time
 
1 . Portfast -used for access layer ports ,Ports directyly transtion to forwading state with out going to lisening and learing states .
 
2. uplink fast -is used in case of one of uplink goes down ,root port and alternate port forms uplink group ,if the root port goes down alternate port directyly transtion to forwading state with out going to lisening and learing states .
 
 
3. backbone fast -In case of indirect link failure ,switch on where backbone fast is enabled receice inferior BPD's from Desiganting switch anouncing it self as root bride ,On revceving the inferior BPDUS it will expire the max aga time imidiatlly and reconverge the toplogy.Backbone fast helps in optimisation of max-age timer,should be implemented globally .
Line 670 ⟶ 635:
 
 
== PAGP ==
* auto: Places a port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This setting minimizes the transmission of PAgP packets. This mode is not supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel).
----
auto
Places a port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This setting minimizes the transmission of PAgP packets. This mode is not supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel).
 
* desirable: Places a port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This mode is not supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel).
desirable
 
Places a port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This mode is not supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel).
 
== CISCO 3750 Stacking ==
 
* All stack members are eligible stack masters. If the stack master becomes unavailable, the stack members that remain participate in the election of a new stack master from among themselves
--------------------------------------------------------------------------------------------------
* Switches should have same ios for stack memeber to be fully functional ,if there is major version misimatch then switch will not join the stack however if there is minor version mismacth it will upgrade the switch to become fully functional.
* The default stack member number of a 3750 switch is 1. When it joins a switch stack, its default stack member number changes to the lowest available member number in the stack. Stack members in the same switch stack cannot have the same stack member number. Every stack member, which includes a standalone switch, retains its member number until you manually change the number or unless the number is already used by another member in the stack.
 
== Provisioning of switch ==
 
CISCO 3750 STacking
 
 
All stack members are eligible stack masters. If the stack master becomes unavailable, the stack members that remain participate in the election of a new stack master from among themselves
 
 
Switches should have same ios for stack memeber to be fully functional ,if there is major version misimatch then switch will not join the stack however if there is minor version mismacth it will upgrade the switch to become fully functional.
 
 
The default stack member number of a 3750 switch is 1. When it joins a switch stack, its default stack member number changes to the lowest available member number in the stack. Stack members in the same switch stack cannot have the same stack member number. Every stack member, which includes a standalone switch, retains its member number until you manually change the number or unless the number is already used by another member in the stack.
 
Provisioning of switch -
 
You can use the offline configuration feature to provision (to supply a configuration to) a new switch before it joins the switch stack. In advance, you can configure the stack member number, switch type, and interfaces associated with a switch that are not currently part of the stack. The configuration that you create on the switch stack is called the provisioned configuration. The switch that is added to the switch stack and that receives this configuration is called the provisioned switch.
Line 706 ⟶ 657:
Remove switch from stack-no switch 2 provision ws-c3750-48ts
 
== Spaning tree security features ==
 
 
-------------------------------------------------------------------------------------------------
Spaning tree security features :
 
== Spanning Tree enhancements ==
 
 
Spanning Tree enhancements.
 
Line 749 ⟶ 697:
IP source guard ( layer 2 port ,Dyanmic arp inspection is for arp spoofing .
 
== VLAN ==
 
* Create a broadcast domain,PVlan allows splitting the domain into multiple isolated subdomains.
* Private Vlans - Promicious, Community, Isolated
* Promiciuos - Carry traffic for all the pvlans
 
* Community Vlan - Can only talk to ports in same community vlan and its promiciuos port
* Isolated - Can only talk to promicious port
* Primary VLAN - The primary VLAN carries traffic from the promiscuous ports to the host ports, both isolated and community, and to other promiscuous ports.
* For low end switches, there is command switchport mode protected act simmlar to isloated vlan, all those ports configured for protected donot talk to each other. Usually, ports configured as protected are also configured not to receive unknown unicast (frame with destination MAC address not in switch's MAC table) and multicast frames flooding for added security.
 
== Configure ==
 
Vlan 1000
Private vlan primary
 
vlan 1012
VLan -create a broadcast domain,PVlan allows splitting the domain into multiple isolated subdomains .
private vlan community
 
vlan 1013
private vlan ISolated
 
vlan 1000
private vlan association 1012,1013.
 
Private Vlans _ Promicious , Cummunity , Isolated
 
== Configure ports ==
Promiciuos -Carry traffic for all the pvlans
 
 
community vlan -Can only talk to ports in same community vlan and its promiciuos port
 
Isolated -Can only talk to promicious port
 
Primary VLAN\97 The primary VLAN carries traffic from the promiscuous ports to the host ports, both isolated and community, and to other promiscuous ports.
 
 
for low end switches ,there is command switchport mode protected act simmlar to isloated vlan ,all those ports configured for protected donot talk to each other .Usually, ports configured as protected are also configured not to receive unknown unicast (frame with destination MAC address not in switch\92s MAC table) and multicast frames flooding for added security.
 
Configure -
 
Vlan 1000
Private vlan primary
 
vlan 1012
private vlan community
 
vlan 1013
private vlan ISolated
 
 
vlan 1000
private vlan association 1012,1013.
 
 
configure ports
 
1 int fa0/1
swicth port private-vlan 1000,1012 -each host port is member of two vlans .
switch port private-vlan host
 
1. int fa0/1
swicth port private-vlan 1000,1012 -each host port is member of two vlans .
switch port private-vlan host
 
2. int fa0/2
switch port private-vlan 1000,1013 -isolocated port
switch port private-vlan host
 
3. int vlan 1000
private vlan mapping 1012,1013 -promciuos port
 
 
 
 
 
 
This example shows how to associate community VLANs 100 through 103 and isolated VLAN 109 with primary VLAN 5:
 
switch# configure terminal
switch(config)# vlan 5
switch(config-vlan)# private-vlan association 100-103, 109
 
 
This example shows how to configure the Ethernet port 1/12 as a host port for a private VLAN and associate it to primary VLAN 5 and secondary VLAN 101:
 
switch# configure terminal
switch(config)# interface ethernet 1/12
switch(config-if)# switchport mode private-vlan host
switch(config-if)# switchport private-vlan host-association 5 101
 
* This example shows how to associate community VLANs 100 through 103 and isolated VLAN 109 with primary VLAN 5:
switch# configure terminal
switch(config)# vlan 5
switch(config-vlan)# private-vlan association 100-103, 109
 
* This example shows how to configure the Ethernet port 1/12 as a host port for a private VLAN and associate it to primary VLAN 5 and secondary VLAN 101:
switch# configure terminal
switch(config)# interface ethernet 1/12
switch(config-if)# switchport mode private-vlan host
switch(config-if)# switchport private-vlan host-association 5 101
 
= Layer 2 COS =