Você está na página 1de 212

Services in a Converged

WAN

Accessing the WAN – Chapter 1

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe how the Cisco Enterprise Composite
Model (ECNM) provides integrated services
over an Enterprise network.
ƒ Describe the key WAN technology concepts.
ƒ Identify the appropriate WAN technologies to
use when matching ECNM best practices with
typical enterprise requirements for WAN
communications.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe How ECNM Provides Integrated
Services over an Enterprise Network
ƒ Explain the purpose and function of WANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe How ECNM Provides Integrated
Services over an Enterprise Network
ƒ Describe the stages of business growth, the
corresponding business requirements for services and
how those requirements are reflected in the
Enterprise’s changing network topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe How ECNM Provides Integrated
Services over an Enterprise Network
ƒ Describe the problems with the Hierarchical Design
Model that Cisco's Enterprise Composite Model has
been designed to address

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe How ECNM Provides Integrated
Services over an Enterprise Network
ƒ Explain the purpose of Cisco Enterprise Architectures

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the Key WAN Technology
Concepts
ƒ Describe WAN functions in terms of the OSI Reference
Model

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the Key WAN Technology
Concepts
ƒ Describe the key WAN physical layer concepts for
network and Internet communications

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Describe the Key WAN Technology
Concepts
ƒ Describe the key WAN data link layer protocols used in
today’s Enterprise WAN networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe the Key WAN Technology
Concepts
ƒ Describe the switching technologies used for WANs in
an Enterprise setting

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Select the Appropriate WAN Technology to meet
ECNM Requirements
ƒ List the various options for connecting subscribers to
the WAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Select the Appropriate WAN Technology to meet
ECNM Requirements
ƒ Describe how Enterprises use leased line services to
provide a WAN connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Select the Appropriate WAN Technology to meet
ECNM Requirements
ƒ Describe the circuit switching options available to
provide a WAN connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Select the Appropriate WAN Technology to meet
ECNM Requirements
ƒ Describe the packet switching options available to
provide a WAN connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Select the Appropriate WAN Technology to meet
ECNM Requirements
ƒ List factors to consider when selecting a WAN
connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Summary

ƒ A WAN is defined as
A data communications network that operates beyond the
geographic scope of a LAN

ƒ WAN primarily operate on layer 1 & 2 of the OSI model


ƒ WAN technologies include
–Leased line
–ISDN
–Frame relay
–X.25
–ATM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Summary
ƒ Cisco Enterprise Architecture
–This is an expansion of the hierarchical model that further
divides the enterprise network into
•Physical areas
•Logical areas
•Functional areas

ƒ Selecting the appropriate WAN technology requires


considering some of the following:
–WAN’s purpose
–Geographic scope of WAN
–Traffic requirements
–If WAN uses a public or private infrastructure

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Point-to-Point Protocol
(PPP)

Accessing the WAN – Chapter 2

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the fundamental concepts of point-to-point serial
communication including TDM, demarcation point, DTE-DCE
functions, HDLC encapsulation, and serial interface
troubleshooting.
ƒ Describe PPP concepts including PPP layered architecture, PPP
frame structure, PPP session establishment, multiprotocol
encapsulation support, link control protocol (LCP), network
control protocol (NCP), and Internet Protocol Control Protocol
(IPCP).
ƒ Configure PPP on a serial interface including enabling PPP
encapsulation, verifying the PPP connection and troubleshooting
encapsulation problems.
ƒ Configure PPP authentication including explaining PAP and
CHAP authentication protocols, configuring PPP authentication
using PAP and CHAP, and troubleshooting PPP authentication
problems.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Describe the concept of serial communication as the
basis of WAN technologies

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Explain how two or more data streams are transported
across a single physical connection using TDM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Define the location of the demarcation point relative to
customer and service provider networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Explain the terms DTE and DCE with relative to the
location of devices in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Describe how high-level data link control (HDLC) uses
one of three frame types to encapsulate data

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Explain when and how to configure HDLC
encapsulation on a router

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Describe the Fundamental Concepts of
Point-to-Point Serial Communication
ƒ Describe the procedure to follow when troubleshooting
a serial connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe Point-to-Point Concepts
ƒ Describe PPP in terms of its use in WAN links

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Describe Point-to-Point Concepts
ƒ Describe the general function of each layer of PPP
architecture

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Describe Point-to-Point Concepts
ƒ Describe the purpose and format of each of the fields in
a PPP frame

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Describe Point-to-Point Concepts
ƒ Define the three phases of PPP session establishment

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Describe Point-to-Point Concepts
ƒ Explain the role of the LCP in PPP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Describe Point-to-Point Concepts
ƒ Describe the characteristics of NCP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure PPP on a Serial Interface
ƒ Describe how configuration options are communicated
in the LCP frame

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure PPP on a Serial Interface
ƒ Explain the purpose of the commands used to
configure and verify PPP connections

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure PPP on a Serial Interface
ƒ Explain the output of the show interfaces serial
command

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure PPP on a Serial Interface
ƒ Explain the output of the debug ppp command

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configuring PPP with Authentication
ƒ Differentiate between PAP and CHAP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configuring PPP with Authentication
ƒ Describe how to use PAP to authenticate a PPP
connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configuring PPP with Authentication
ƒ Describe how to use CHAP to authenticate a PPP
connection

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Configuring PPP with Authentication
ƒ Outline the PPP encapsulation and authentication
process on a flow chart

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Configuring PPP with Authentication
ƒ Explain how to configure a PPP connection with
authentication

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Configuring PPP with Authentication
ƒ Explain the output of the debug ppp authentication
command

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Summary

ƒ PPP is a widely used WAN protocol


ƒ PPP provides multi-protocol LAN to WAN connections
ƒ PPP session establishment – 4 phases
Link establishment
Link quality determination
Network layer protocol configuration negotiation
Link termination

ƒ WAN Encapsulation
–HDLC default encapsulation
–PPP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary
ƒ PPP authentication
–PAP
•2 way handshake
–CHAP
•3 way handshake
–Use debug ppp authentication to confirm authentication
configuration

ƒ PPP configuration
–Done on a serial interface

ƒ After PPP configuration, use show interfaces command


to display:
–LCP state
–NCP state

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Frame Relay

Accessing the WAN – Chapter 3

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the fundamental concepts of Frame Relay technology
in terms of Enterprise WAN services including Frame Relay
operation, Frame Relay implementation requirements, Frame
Relay maps, and LMI operation.
ƒ Configure a basic Frame Relay PVC including configuring and
troubleshooting Frame Relay on a router serial interface and
configuring a static Frame Relay map.
ƒ Describe advanced concepts of Frame Relay technology in
terms of Enterprise WAN services including Frame Relay sub-
interfaces, Frame Relay bandwidth and flow control.
ƒ Configure an advanced Frame Relay PVC including solving
reachability issues, configuring Frame Relay sub-interfaces,
verifying and troubleshooting Frame Relay configuration.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the Fundamental Concepts of Frame
Relay Technology
ƒ Describe how Frame Relay is used to provide WAN
services to the Enterprise

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the Fundamental Concepts of Frame
Relay Technology
ƒ Describe how Frame Relay uses virtual circuits to carry
packets from one DTE to another

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the Fundamental Concepts of Frame
Relay Technology
ƒ Explain how Frame Relay encapsulation works

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe the Fundamental Concepts of Frame
Relay Technology
ƒ Describe the types of topologies that are used for
implementing Frame Relay in different environments

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the Fundamental Concepts of Frame
Relay Technology
ƒ Describe how a router attached to a Frame Relay
network uses LMI status messages and inverse ARP
queries to map VCs to layer 3 network IP Addresses

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Configure a Basic Frame Relay PVC
ƒ Configure a basic Frame Relay PVC on a router serial
interface

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure a Basic Frame Relay PVC
ƒ Configure a static Frame Relay map

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe Advanced Concepts of Frame Relay
Technology
ƒ Explain the reachability issues associated with the
Frame Relay NBMA topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Describe Advanced Concepts of Frame Relay
Technology
ƒ Describe how to implement bandwidth control in the
Frame Relay technology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Describe Advanced Concepts of Frame Relay
Technology
ƒ Describe how to implement flow control in Frame Relay
technology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure an Advanced Frame Relay PVC
ƒ Explain the steps to configure point-to-point
subinterfaces on a physical interface

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure an Advanced Frame Relay PVC
ƒ Describe the commands used for verifying Frame Relay
operation

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure an Advanced Frame Relay PVC
ƒ Describe the steps for troubleshooting a Frame Relay
configuration

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Summary
ƒ Frame relay is the most widely used WAN technology
because it:
–Provides greater bandwidth than leased line
–Reduces cost because it uses less equipment
–Easy to implement

ƒ Frame relay is associated with layer 2 of the OSI model


and encapsulates data packets in a frame relay frame
ƒ Frame relay is configured on virtual circuits
–These virtual circuits may be identified by a DLCI

ƒ Frame relay uses inverse ARP to map DLCI to IP


addresses

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Summary

ƒ Configuring frame relay requires


–Enable frame relay encapsulation
–Configuring either static or dynamic mapping
–Considering split horizon problems that develop when multiple
VCs are placed on a single physical interface
ƒ Factor affecting frame relay configuration
–How service provider has their charging scheme set up
ƒ Frame relay flow control
–DE
–FECN
–BECN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Summary

ƒ The following commands can be used to help verify


frame relay configuration
–Show interfaces
–Show frame-relay lmi
–Show frame-relay pvc ###
–Show frame-relay map

ƒ Use the following command to help troubleshoot a


frame relay configuration
–Debug frame-relay lmi

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Enterprise Network
Security

Accessing the WAN – Chapter 4

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the general methods used to mitigate
security threats to Enterprise networks
ƒ Configure Basic Router Security
ƒ Explain how to disable unused Cisco router network
services and interfaces
ƒ Explain how to use Cisco SDM
ƒ Manage Cisco IOS devices

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Explain how sophisticated attack tools and open
networks have created an increased need for network
security and dynamic security policies

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Describe the most common security threats and how
they impact enterprises

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Describe the most common types of network attacks
and how they impact enterprises

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Describe the common mitigation techniques that
enterprises use to protect themselves against threats

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Explain the concept of the Network Security Wheel

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the General Methods used to Mitigate
Security Threats to Enterprise Networks
ƒ Explain the goals of a comprehensive security policy in
an organization

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure Basic Router Security
ƒ Explain why the security of routers and their
configuration settings is vital to network operation

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure Basic Router Security
ƒ Describe the recommended approach to applying Cisco
IOS security features on network routers

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure Basic Router Security
ƒ Describe the basic security measures needed to secure
Cisco routers

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Explain How to Disable Unused Cisco
Router Network Services and Interfaces
ƒ Describe the router services and interfaces that are
vulnerable to network attack

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Explain How to Disable Unused Cisco
Router Network Services and Interfaces
ƒ Explain the vulnerabilities posed by commonly
configured management services

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Explain How to Disable Unused Cisco
Router Network Services and Interfaces
ƒ Explain how to secure a router with the command-line
interface (CLI) auto secure command

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Explain How to Use Cisco SDM
ƒ Provide an overview of Cisco SDM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Explain How to Use Cisco SDM
ƒ Explain the steps to configure a router to use Cisco
SDM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Explain How to Use Cisco SDM
ƒ Explain the steps you follow to start SDM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Explain How to Use Cisco SDM
ƒ Describe the Cisco SDM Interface

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Explain How to Use Cisco SDM
ƒ Describe the commonly used Cisco SDM wizards

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Explain How to Use Cisco SDM
ƒ Explain how to use Cisco SDM for locking down your
router

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Manage Cisco IOS Devices
ƒ Describe the file systems used by a Cisco router

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Manage Cisco IOS Devices
ƒ Describe how to backup and upgrade a Cisco IOS
image

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Manage Cisco IOS Devices
ƒ Explain how to back up and upgrade Cisco IOS
software images using a network server

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Manage Cisco IOS Devices
ƒ Explain how to recover a Cisco IOS software image

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Manage Cisco IOS Devices
ƒ Compare the use of the show and debug commands
when troubleshooting Cisco router configurations

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Manage Cisco IOS Devices
ƒ Explain how to recover the enable password and the
enable secret passwords

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary
ƒ Security Threats to an Enterprise network include:
–Unstructured threats
–Structured threats
–External threats
–Internal threats

ƒ Methods to lessen security threats consist of:


–Device hardening
–Use of antivirus software
–Firewalls
–Download security updates

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Summary
ƒ Basic router security involves the following:
–Physical security
–Update and backup IOS
–Backup configuration files
–Password configuration
–Logging router activity

ƒ Disable unused router interfaces & services to minimize


their exploitation by intruders
ƒ Cisco SDM
–A web based management tool for configuring security
measures on Cisco routers

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary

ƒ Cisco IOS Integrated File System (IFS)


–Allows for the creation, navigation & manipulation of
directories on a cisco device

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Access Control Lists

Accessing the WAN – Chapter 5

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain how ACLs are used to secure a medium-size
Enterprise branch office network.
ƒ Configure standard ACLs in a medium-size Enterprise
branch office network.
ƒ Configure extended ACLs in a medium-size
Enterprise branch office network.
ƒ Describe complex ACLs in a medium-size Enterprise
branch office network.
ƒ Implement, verify and troubleshoot ACLs in an
enterprise network environment.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Describe the steps that occur in a complete TCP
conversation

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Explain how a packet filter allows or blocks traffic

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Describe how ACLs control access to networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Use a flow chart to show how ACLs operate

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Describe the types and formats of ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Explain how Cisco ACLs can be identified using
standardized numbering or names

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Describe where ACLs should be placed in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain How ACLs are Used to Secure a
Medium-Size Enterprise Branch Office Network
ƒ Explain the considerations for creating ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain why the order in which criteria statements are
entered into an ACL is important

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain how to configure a standard ACL

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to use wildcard masks with ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to apply a standard ACL to an interface

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain the process for editing numbered ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain how to create a named ACL

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to monitor and verify ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure Standard ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain the process for editing named ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure Extended ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Explain how an extended ACL provides more filtering
then a standard ACL

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure Extended ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to configure extended ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configure Extended ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to apply an extended ACL to an interface

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configure Extended ACLs in a Medium-
Size Enterprise Branch Office Network
ƒ Describe how to create named extended ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Describe Complex ACLs in a Medium-Size
Enterprise Branch Office Network
ƒ List the three types of complex ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Describe Complex ACLs in a Medium-Size
Enterprise Branch Office Network
ƒ Explain how and when to use dynamic ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Describe Complex ACLs in a Medium-Size
Enterprise Branch Office Network
ƒ Explain how and when to use reflexive ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Describe Complex ACLs in a Medium-Size
Enterprise Branch Office Network
ƒ Explain how and when to use time-based ACLs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Describe Complex ACLs in a Medium-Size
Enterprise Branch Office Network
ƒ Describe how to troubleshoot common ACL problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Implement, Verify and Troubleshoot ACLs
in an Enterprise Network Environment
ƒ Create, place and verify a standard/ extended ACL and
verify its placement.
ƒ Verify ACL’s functionality and troubleshoot as needed.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary
ƒ An Access List (ACL) is:
A series of permit and deny statements that are used to filter
traffic

ƒ Standard ACL
–Identified by numbers 1 - 99 and 1300 - 1999
–Filter traffic based on source IP address

ƒ Extended ACL
–Identified by number 100 -199 & 2000 - 2699
–Filter traffic based on
•Source IP address
•Destination IP address
•Protocol
•Port number

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Summary

ƒ Named ACL
–Used with IOS 11.2 and above
–Can be used for either standard or extended ACL

ƒ ACL’s use Wildcard Masks (WCM)


–Described as the inverse of a subnet mask
•Reason
–0 Æ check the bit
–1 Æ ignore the bit

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Summary

ƒ Implementing ACLs
–1st create the ACL
–2nd place the ACL on an interface
•Standard ACL are placed nearest the destination
•Extended ACL are placed nearest the source

ƒ Use the following commands for verifying &


troubleshooting an ACL
–Show access-list
–Show interfaces
–Show run

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Summary

ƒ Complex ACL
–Dynamic ACL
–Reflexive ACL
–Time based ACL

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Providing Teleworker
Services

Accessing the WAN – Chapter 6

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the enterprise requirements for providing
teleworker services
ƒ Explain how broadband services extend Enterprise
Networks including DSL, cable, and wireless
ƒ Describe how VPN technology provides secure
teleworker services in an Enterprise setting

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the Enterprise Requirements for
Providing Teleworker Services
ƒ Describe the benefits of teleworkers for business,
society and the environment.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the Enterprise Requirements for
Providing Teleworker Services
ƒ List remote connection technologies and describe
scenarios in which each would be implemented.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the Enterprise Requirements for
Providing Teleworker Services
ƒ Describe the key differences between private and
public network infrastructures

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain How Broadband Services extend
Enterprise Networks
ƒ Briefly describe how broadband services allow
teleworkers to use the Internet to connect to the
Enterprise WAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain How Broadband Services extend
Enterprise Networks
ƒ Describe how Enterprises use cable connectivity to
extend their reach

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain How Broadband Services extend
Enterprise Networks
ƒ Describe how Enterprises use DSL connectivity to
extend their reach

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain How Broadband Services extend
Enterprise Networks
ƒ Describe how Enterprises use broadband wireless
connectivity to extend their reach

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain How Broadband Services extend
Enterprise Networks
ƒ Describe how Enterprises defend themselves from
threats to wireless network security

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Explain the importance and benefits of VPN technology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Compare site-to-site VPNs to remote-access VPNs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Describe the hardware and software components that
typically make up a VPN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Describe the characteristics of secure VPNs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Describe the concept of VPN tunneling

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Describe the concept of VPN encryption

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Describe How VPN Technology Provides Secure
Teleworker Services in an Enterprise Setting
ƒ Describe the concept of IPsec Protocols

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Summary

ƒ Requirements for providing teleworker services are:


–Maintains continuity of operations
–Provides for increased services
–Secure & reliable access to information
–Cost effective
–Scalable

ƒ Components needed for a teleworker to connect to an


organization’s network are:
–Home components
–Corporate components

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Summary
ƒ Broadband services used
–Cable
• transmits signal in either direction simultaneously
–DSL
• requires minimal changes to existing telephone
infrastructure
• delivers high bandwidth data rates to customers
–Wireless
• increases mobility
• wireless availability via:
» municipal WiFi
» WiMax
» satellite internet

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary

ƒ Securing teleworker services


–VPN security achieved through using
•Advanced encryption techniques
•Tunneling
–Characteristics of a secure VPN
•Data confidentiality
•Data integrity
•authentication

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Implementing IP
Addressing Services

Accessing the WAN – Chapter 7

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Configure DHCP in an enterprise branch network
ƒ Configure NAT on a Cisco router
ƒ Configure new generation RIP (RIPng) to use IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Configure DHCP in an Enterprise Branch
Network
ƒ Describe the function of DHCP in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Configure DHCP in an Enterprise Branch
Network
ƒ Describe how DHCP dynamically assigns an IP
address to a client

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Configure DHCP in an Enterprise Branch
Network
ƒ Describe the differences between BOOTP and DHCP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Configure DHCP in an Enterprise Branch
Network
ƒ Describe how to configure a DHCP server

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Configure DHCP in an Enterprise Branch
Network
ƒ Describe how to configure a Cisco router as a DHCP
client

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Configure DHCP in an Enterprise Branch
Network
ƒ Explain how DHCP Relay can be used to configure a
router to relay DHCP messages when the server and
the client are not on the same segment

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure DHCP in an Enterprise Branch
Network
ƒ Describe how to configure a Cisco router as a DHCP
client using SDM

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure DHCP in an Enterprise Branch
Network
ƒ Describe how to troubleshoot a DHCP configuration

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure NAT on a Cisco Router
ƒ Describe the operation and benefits of using private
and public IP addressing

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure NAT on a Cisco Router
ƒ Explain the key features of NAT and NAT overload

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure NAT on a Cisco Router
ƒ Explain the advantages and disadvantages of NAT

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure NAT on a Cisco Router
ƒ Describe how to configure static NAT to conserve IP
address space in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure NAT on a Cisco Router
ƒ Describe how to configure dynamic NAT to conserve IP
address space in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure NAT on a Cisco Router
ƒ Describe how to configure NAT Overload to conserve
IP address space in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure NAT on a Cisco Router
ƒ Describe how to configure port forwarding

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure NAT on a Cisco Router
ƒ Describe how to verify and troubleshoot NAT and NAT
overload configurations

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Explain the need for IPv6 to provide a long-term
solution to the depletion problem of IP address

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Describe the format of the IPv6 addresses and the
appropriate methods for abbreviating them

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Explain the various methods of assigning IPv6
addresses to a device

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Describe the transition strategies for implementing IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Describe how Cisco IOS dual stack enables IPv6 to run
concurrently with IPv4 in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Describe the concept of IPv6 tunneling

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Describe how IPv6 affects common routing protocols,
and how these protocols are modified to support IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Explain how to configure a router to use IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Explain how to configure and verify RIPng for IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Configure New Generation RIP (RIPng) to
use IPv6
ƒ Explain how to verify and troubleshoot IPv6

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary

ƒ Dynamic Host Control Protocol (DHCP)


This is a means of assigning IP address and other configuration
information automatically.

ƒ DHCP operation
–3 different allocation methods
•Manual
•Automatic
•Dynamic
–Steps to configure DHCP
•Define range of addresses
•Create DHCP pool
•Configure DHCP pool specifics

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Summary

ƒ DHCP Relay
Concept of using a router configured to listen for DHCP
messages from DHCP clients and then forwards those
messages to servers on different subnets

ƒ Troubleshooting DHCP
–Most problems arise due to configuration errors
–Commands to aid troubleshooting
•Show ip dhcp
•Show run
•debug

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Summary
ƒ Private IP addresses
–Class A = 10.x.x.x
–Class B = 172.16.x.x – 172.31.x.x
–Class C = 192.168.x.x

ƒ Network Address Translation (NAT)


–A means of translating private IP addresses to public IP
addresses
–Type s of NAT
•Static
•Dynamic
–Some commands used for troubleshooting
•Show ip nat translations
•Show ip nat statistics
•Debug ip nat
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Summary

ƒ IPv6
–A 128 bit address that uses colons to separate entries
–Normally written as 8 groups of 4 hexadecimal digits

ƒ Cisco IOS Dual Stack


–A way of permitting a node to have connectivity to an IPv4 &
IP v6 network simultaneously

ƒ IPv6 Tunneling
–An IPV6 packet is encapsulated within another protocol

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Summary

ƒ Configuring RIPng with IPv6


1st globally enable IPv6
2nd enable IPv6 on interfaces on which IPv6 is to be enabled
3rd enable RIPng using either
ipv6 rotuer rip name
ipv6 router name enable

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Network
Troubleshooting

Accessing the WAN – Chapter 8

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Establish a network baseline
ƒ Describe troubleshooting methodologies and
troubleshooting tools
ƒ Describe the common issues that occur during WAN
implementation
ƒ Troubleshoot enterprise network implementation
issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Establish a Network Baseline
ƒ Explain the importance of network documentation

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Establish a Network Baseline
ƒ Describe the stages of the network documentation
process

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Establish a Network Baseline
ƒ Explain the purpose for measuring normal network
performance when creating a baseline

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Establish a Network Baseline
ƒ Describe the steps for establishing a network baseline

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Explain why a systematic method is the generally the
best approach to troubleshooting

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Describe how layered models, such as the OSI
reference model or TCP/IP model, are used for
troubleshooting

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Describe the three stages of the general
troubleshooting process

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Describe the three main methods for troubleshooting
network problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Describe the stages for gathering symptoms for
troubleshooting a network problem

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Describe Troubleshooting Methodologies
and Troubleshooting Tools
ƒ Describe the types of software and hardware tools that
are commonly used when troubleshooting networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe the fundamentals in WAN design and
communication

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe the steps for designing or modifying a WAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe the considerations for analyzing WAN traffic

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe the considerations for designing a WAN
topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe common WAN implementation issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Describe the Common Issues that Occur
During WAN Implementation
ƒ Describe the recommended steps for troubleshooting a
WAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Troubleshoot Enterprise Network
Implementation Issues
ƒ Explain how network diagrams are used for
troubleshooting

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Troubleshoot Enterprise Network
Implementation Issues
ƒ Describe how to troubleshoot network problems
occurring at the physical layer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Troubleshoot Enterprise Network
Implementation Issues
ƒ Describe how to troubleshoot network problems
occurring at the data link layer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Troubleshoot Enterprise Network
Implementation Issues
ƒ Describe how to troubleshoot network problems
occurring at the network layer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Troubleshoot Enterprise Network
Implementation Issues
ƒ Describe how to troubleshoot network problems
occurring at the transport layer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Troubleshoot Enterprise Network
Implementation Issues
ƒ Describe how to troubleshoot network problems
occurring in the application layers

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Summary
ƒ Network Baseline
How a network is expected to perform under normal conditions

ƒ Network documentation should include:


– Network configuration table
– End-system configuration table
– Network topology diagram

ƒ Planning for the 1st baseline


– Determine what type of data to collect
– Identify devices and ports of interest
– Determine baseline duration

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Summary

ƒ 3 stages of the troubleshooting process


–Gather symptoms
–Isolate problem
–Correct problem

ƒ 3 main methods for troubleshooting a network


–Bottom up
–Top down
–Divide & conquer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary

ƒ Software troubleshooting tools


–Cisco view
–Solar winds
–HP Open view

ƒ Hardware troubleshooting tools


–Network analysis mode
–Digital multi-meters
–Cable testers
–Network analyzer

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Summary

ƒ Common WAN implementation issues include


–QoS
–Reliability
–Security
–Latency
–Confidentiality
–Public or Private

ƒ Using a layered approach to troubleshooting aids in


isolating and solving the problem

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29

Você também pode gostar