CCNP Course Institute in Delhi

Friday, April 20, 2012

6 weeks Summer Training Institute in Gurgaon India, Summer Training in Networking


Summer Training/Industrial Training/Summer Internship

Network Bulls is Best Institute for Cisco CCNA, CCNA Security, CCNA Voice, CCNP, CCNP Security/CCSP and CCIE R&S/Security course/certifications Training in India. Network Bulls is a Networking Training and Network Consultancy company. Network Bulls offer Summer Trainings and Summer Internship programs for Btech BE and BCA Candidates. There are different programs for Summer Training Candidates. Those who are willing to take Six weeks summer training, they can join CCNA course as their training. We provide Projects on Real Cisco Networks. This would be a Project Based Industrial/Summer Training, which will be held in Delhi NCR region in Gurgaon.
Network Bulls has Biggest Cisco networking Training labs in North India. Students must visit Network Bulls and compare the labs with other training companies.
Network Bulls has a team of CCIE Certified Trainers and Dual CCIE Trainers.
We offer 24x7 labs Facility, as students can stay in nights for practice on real routers and switches.
During Summer Training programs, students will get 24x7 Lab access and project on real devices. Students will get a chance to implement a real Network and to troubleshoot on a Network topology. After their Networking Training in Summer Training or Industrial Training, students will get Training Certificate, Project certificate, Experience Letter and Awards to best candidates.

6/Six Weeks Summer Training in networking options:
Courses
CCNA
MCSE
MCITP
CCNA Sec
Linux
CEH
Training Fee
Rs 7,000/-
Rs 10,000/-
Rs 12,000/-
Rs 9,000/-
Rs 12,000/-
Rs 8,000/-



Tuesday, December 14, 2010

Using the SDM to Manage the Flash Memory India's Best Cisco CCIE Security Training Institute in Delhi Gurgaon

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192

I was going to call this section “Using SDM to Upgrade/Restore/Back Up the IOS on Your
Router,” but the SDM allows management of all the files in flash memory (as well as NVRAM),
not just the IOS. It can be an easier method of flash file management, but for what it’s worth,
you won’t find it safer to do it this way. It is a way to manage your files though. Let’s check it out.
I mention “safer methods” a lot in this chapter. Clearly, I’ve caused myself
some serious pain not being careful enough when working in flash memory!
I cannot tell you enough—pay attention when messing around with flash
memory!
I’m going to connect to my other 1841 router (named R3) and upgrade that IOS using the
SDM. Let’s connect and see what’s in flash. Looking at the first screen, we can see that IP is
the only feature available and that Firewall, VPN, IPS, and NAC are “X’d” out. Let’s fix that!
284 Chapter 5 Managing a Cisco Internetwork
The next screen shows how to open the file management for flash. Chose File File
Management.
At this point, the screen shows all the files in flash, and we can see that we have the
“ipbase” IOS.
Backing Up and Restoring the Cisco IOS 285
Click Load File from PC on the top of the screen to add a new file. When I tried to load the
new IOS, I received the message shown in the next screen shot.
I clicked OK, tried to delete the existing file, and then received this message.
I chose yes, and then looked at the File Management window again to verify that the file
was deleted.
286 Chapter 5 Managing a Cisco Internetwork
I then chose Load File from PC again and the file started uploading into flash memory.
Woo-hoo—finally, success!
After rebooting, we can see that IP, Firewall, VPN, IPS, and NAC are all available with this
new IOS!
Backing Up and Restoring the Cisco Configuration 287
One of the brilliant features of the ISR routers is that they use the physical
flash cards that are accessible from the front or back of any router. You can
pull these flash cards out, put them in an appropriate slot in your PC, and the
card will show up as a drive. You can then add, change, and delete files. Just
put the flash card back in your router and power up—instant upgrade. Nice!
Backing Up and Restoring
the Cisco Configuration
Any changes that you make to the router configuration are stored in the running-config file. And
if you don’t enter a copy run start command after you make a change to running-config, that
change will go poof if the router reboots or gets powered down. So you probably want to make
another backup of the configuration information just in case the router or switch completely dies
on you. Even if your machine is healthy and happy, it’s good to have a copy for reference and
documentation reasons.
In the following sections, I’ll describe how to copy the configuration of a router to a TFTP
server and how to restore that configuration.
Backing Up the Cisco Router Configuration
To copy the router’s configuration from a router to a TFTP server, you can use either the copy
running-config tftp or the copy startup-config tftp command. Either one will back up the
router configuration that’s currently running in DRAM or that’s stored in NVRAM.
Verifying the Current Configuration
To verify the configuration in DRAM, use the show running-config command (sh run for
short) like this:
Router#show running-config
Building configuration...
Current configuration : 776 bytes
!
version 12.4
The current configuration information indicates that the router is running version 12.4 of
the IOS.
288 Chapter 5 Managing a Cisco Internetwork
Verifying the Stored Configuration
Next, you should check the configuration stored in NVRAM. To see this, use the show
startup-config command (sh start for short) like this:
Router#show startup-config
Using 776 out of 245752 bytes
!
version 12.4
The second line shows you how much room your backup configuration is using. Here,
we can see that NVRAM is 239KB (again, memory is easier to see with the show version
command when you’re using an ISR router) and that only 776 bytes of it are used.
If you’re not sure that the files are the same and the running-config file is what you want
to use, then use the copy running-config startup-config. This will help you verify that
both files are in fact the same. I’ll go through this with you in the next section.
Copying the Current Configuration to NVRAM
By copying running-config to NVRAM as a backup, as shown in the following output, you’re
assured that your running-config will always be reloaded if the router gets rebooted. In the
new IOS version 12.0, you’re prompted for the filename you want to use:
Router#copy running-config startup-config
Destination filename [startup-config]?[enter]
Building configuration...
[OK]
Router#
The reason the filename prompt appears is that there are now so many options you can use
when using the copy command:
Router#copy running-config ?
archive: Copy to archive: file system
flash: Copy to flash: file system
ftp: Copy to ftp: file system
http: Copy to http: file system
https: Copy to https: file system
ips-sdf Update (merge with) IPS signature configuration
null: Copy to null: file system
nvram: Copy to nvram: file system
rcp: Copy to rcp: file system
running-config Update (merge with) current system configuration
scp: Copy to scp: file system
startup-config Copy to startup configuration
Backing Up and Restoring the Cisco Configuration 289
syslog: Copy to syslog: file system
system: Copy to system: file system
tftp: Copy to tftp: file system
xmodem: Copy to xmodem: file system
ymodem: Copy to ymodem: file system
We’ll go over the copy command again in a minute.
Copying the Configuration to a TFTP Server
Once the file is copied to NVRAM, you can make a second backup to a TFTP server by using
the copy running-config tftp command (copy run tftp for short), like this:
Router#copy running-config tftp
Address or name of remote host []?1.1.1.2
Destination filename [router-confg]?todd-confg
!!
776 bytes copied in 0.800 secs (970 bytes/sec)
Router#
In the preceding example, I named the file todd-confg because I had not set a hostname
for the router. If you have a hostname already configured, the command will automatically use
the hostname plus the extension -confg as the name of the file.
Restoring the Cisco Router Configuration
If you’ve changed your router’s running-config file and want to restore the configuration to
the version in the startup-config file, the easiest way to do this is to use the copy startupconfig
running-config command (copy start run for short). You can also use the older
Cisco command config mem to restore a configuration. Of course, this will work only if you
first copied running-config into NVRAM before making any changes!
If you did copy the router’s configuration to a TFTP server as a second backup, you can
restore the configuration using the copy tftp running-config command (copy tftp run
for short) or the copy tftp startup-config command (copy tftp start for short), as
shown here (the old command that provides this function is config net):
Router#copy tftp running-config
Address or name of remote host []?1.1.1.2
Source filename []?todd-confg
Destination filename[running-config]?[enter]
Accessing tftp://1.1.1.2/todd-confg...
Loading todd-confg from 1.1.1.2 (via FastEthernet0/0): !
[OK - 776 bytes]
776 bytes copied in 9.212 secs (84 bytes/sec)
Router#
290 Chapter 5 Managing a Cisco Internetwork
*Mar 7 17:53:34.071: %SYS-5-CONFIG_I: Configured from
tftp://1.1.1.2/todd-confg by console
Router#
The configuration file is an ASCII text file, meaning that before you copy the configuration
stored on a TFTP server back to a router, you can make changes to the file with any text editor.
Last, notice that the command was changed to a URL of tftp://1.1.1.2/todd-config.
This is the Cisco IOS File System (IFS)—as discussed earlier—and we’ll use that to back up and
restore our configuration in a minute.
It is important to remember that when you copy or merge a configuration
from a TFTP server to a router’s RAM, the interfaces are shut down by default
and you must manually go and enable each interface with the no shutdown
command.
Erasing the Configuration
To delete the startup-config file on a Cisco router, use the command erase startup-config,
like this:
Router#erase startup-config
Erasing the nvram filesystem will remove all configuration files!
Continue? [confirm][enter]
[OK]
Erase of nvram: complete
*Mar 7 17:56:20.407: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
Router#reload
System configuration has been modified. Save? [yes/no]:n
Proceed with reload? [confirm][enter]
*Mar 7 17:56:31.059: %SYS-5-RELOAD: Reload requested by console.
Reload Reason: Reload Command.
This command deletes the contents of NVRAM on the router. If you type reload at privileged
mode and say no to saving changes, the router will reload and come up into setup mode.
Using the Cisco IOS File System to Manage
Your Router’s Configuration (Cisco IFS)
Using the old, faithful copy command is still useful and I recommend it. However, you still
need to know about the Cisco IFS. The first thing we’ll do is use the show file command to
see the contents of NVRAM and RAM:
R3#show file information nvram:startup-config
nvram:startup-config:
Backing Up and Restoring the Cisco Configuration 291
type is config
R3#cd nvram:
R3#pwd
nvram:/
R3#dir
Directory of nvram:/
190 -rw- 830 <no date> startup-config
191 ---- 5 <no date> private-config
192 -rw- 830 <no date> underlying-config
1 -rw- 0 <no date> ifIndex-table
196600 bytes total (194689 bytes free)
There really are no other commands that actually show us the contents of NVRAM. However,
I am not sure how helpful it is to see them either. Let’s look at the contents of RAM:
R3#cd system:
R3#pwd
system:/
R3#dir ?
/all List all files
/recursive List files recursively
all-filesystems List files on all filesystems
archive: Directory or file name
cns: Directory or file name
flash: Directory or file name
null: Directory or file name
nvram: Directory or file name
system: Directory or file name
xmodem: Directory or file name
ymodem: Directory or file name
<cr>
R3#dir
Directory of system:/
3 dr-x 0 <no date> lib
33 dr-x 0 <no date> memory
1 -rw- 750 <no date> running-config
2 dr-x 0 <no date> vfiles
Again, not too exciting. Let’s use the copy command with the Cisco IFS to copy a file from
a TFTP host to RAM. First, let’s try the old command config net that was used for the last
10 years or so to accomplish this same feat:
R3#config net
Host or network configuration file [host]?[enter]
292 Chapter 5 Managing a Cisco Internetwork
This command has been replaced by the command:
'copy <url> system:/running-config'
Address or name of remote host [255.255.255.255]?
Although the command tells us that it has been replaced with the new URL command, the
old command will still will work. Let’s try it with the Cisco IFS:
R3#copy tftp://1.1.1.2/todd-confg system://running-config
Destination filename [running-config]?[enter]
Accessing tftp://1.1.1.2/todd-confg...Loading todd-confg from 1.1.1.2
(via FastEthernet0/0): !
[OK - 776 bytes]
[OK]
776 bytes copied in 13.816 secs (56 bytes/sec)
R3#
*Mar 10 22:12:59.819: %SYS-5-CONFIG_I: Configured from tftp://1.1.1.2/toddconfg
by console
I guess we can say that this was easier than using the copy tftp run command—Cisco says
it is, so who am I to argue? Maybe it just takes some getting used to. Let’s see if we can make
this a bit easier by connecting to our router through HTTP or HTTPS and using the SDM to
manage our configuration files.
Using the SDM to Back Up/Restore and
Edit the Router’s Configuration
Honestly, there really isn’t anything special about how the SDM handles configurations on a
router. Basically, if you were to telnet to a router, perform a show run, and copy this output
to a text file on your PC, you’ve just performed (more or less) what SDM and its configuration
management tools can do. But this is still a less-confusing way to manage files than doing so
through the Cisco IFS.
Why? Well, what’s easier about using the SDM rather than the copy command we covered
earlier in this chapter is that no TFTP host is needed. By using the SDM, you can http or https
to a router and keep all files local on your PC instead of having to configure a TFTP host. As
I mentioned in Chapter 4, SDM is best used for advanced configurations like security, IPS,
QOS, and NAT. As you can tell by now, I am a command-line interface (CLI) guy. What can
I say? Old habits die hard!
Let’s take a quick look at how the SDM can back up and restore your configuration from
your host. From the main menu, choose File Write to Startup Config to back up your configuration
to NVRAM.
Backing Up and Restoring the Cisco Configuration 293
Then choose File Save Running Config to PC.
294 Chapter 5 Managing a Cisco Internetwork
One last option for managing your files is to use the Configuration Management screens
under Additional Tasks.
The Config Editor allows you to change the running-config, but before it will let you do that,
you have to agree that you can screw up your router’s configuration and that this is okay with you!
Backing Up and Restoring the Cisco Configuration 295
It’s best to select the Save Running Configuration check box. You can then choose to
import the file from RAM or from your PC.
Last, from Configuration Management, you can choose Reset to Factory Default. This will
place the HTTPS management back on the router.
296 Chapter 5 Managing a Cisco Internetwork
As you can see, there are many different ways to screw up, umm, I mean, change the files
in flash, NVRAM, and even RAM. Practice on the SDM demo I showed you in Chapter 4, or
try to borrow a friend’s router. (You don’t want to practice these commands on your own
router, do you?)

Using the Cisco IOS File System (Cisco IFS) Best Cisco CCSP Bootcamp Training in Delhi Gurgaon

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192

Cisco has created a file system called Cisco IFS that allows you to work with files and directories
just as you would from a Windows DOS prompt. The commands you use are dir, copy,
more, delete, erase or format, cd and pwd, and mkdir and rmdir.
Backing Up and Restoring the Cisco IOS 279
Working with IFS gives you the ability to view and classify all files—even those on remote
servers. And you definitely want to find out if an image on one of your remote servers is valid
before you copy it, right? You also need to know how big it is—size matters here! It’s also a
really good idea to take a look at the remote server’s configuration and make sure it’s all good
before loading that file on your router.
It’s very cool that IFS makes the file system user interface universal—it’s not platform specific
anymore. You now get to use the same syntax for all your commands on all of your routers, no
matter the platform!
Sound too good to be true? Well, it kind of is because you’ll find out that support for all commands
on each file system and platform just isn’t there. But it’s really no big deal since various file
systems differ in the actions they perform; the commands that aren’t relevant to a particular file system
are the very ones that aren’t supported. Be assured that any file system or platform will fully
support all the commands you need to manage it.
Another cool IFS feature is that it cuts down on all those obligatory prompts for a lot of the
commands. If you want to enter a command, all you have to do is type all the necessary info
straight into the command line—no more jumping through hoops of prompts! So, if you want
to copy a file to an FTP server, all you’d do is first indicate where the desired source file is on
your router, pinpoint where the destination file is on the FTP server, determine the username
and password you’re going to use when you want to connect to that server, and type it all
in on one line—sleek! And for those of you resistant to change, you can still have the router
prompt you for all the information it needs and enjoy entering a more elegantly minimized version
of the command than you did before.
But even in spite of all this, your router might still prompt you—even if you did everything
right in your command line. It comes down to how you’ve got the file prompt command
configured and which command you’re trying to use. But no worries—if that happens, the
default value will be entered right there in the command, and all you have to do is hit Enter
to verify the correct values.
IFS also lets you explore various directories and inventory files in any directory you want.
Plus, you can make subdirectories in flash memory or on a card, but you only get to do that
if you’re working on one of the more recent platforms.
And get this—the new file system interface uses URLs to determine the whereabouts of a
file. So just as they pinpoint places on the Web, URLs now indicate where files are on your
Cisco router, or even on a remote file server! You just type URLs right into your commands
to identify where the file or directory is. It’s really that easy—to copy a file from one place to
another, you simply enter the copy source-url destination-url command—sweet! IFS
URLs are a tad different than what you’re used to though, and there’s an array of formats to
use that vary depending on where, exactly, the file is that you’re after.
We’re going to use Cisco IFS commands pretty much the same way that we used the copy
command in the IOS section earlier:
For backing up the IOS
For upgrading the IOS
For viewing text files
280 Chapter 5 Managing a Cisco Internetwork
Okay—with all that down, let’s take a look at the common IFS commands available to us
for managing the IOS. I’ll get into configuration files soon, but for now I’m going to get you
started with going over the basics used to manage the new Cisco IOS.
dir Same as with Windows, this command lets you view files in a directory. Type dir, hit
Enter, and by default you get the contents of the flash:/ directory output.
copy This is one popular command, often used to upgrade, restore, or back up an IOS. But
as I said, when you use it, it’s really important to focus on the details—what you’re copying,
where it’s coming from, and where it’s going to land.
more Same as with Unix, this will give you a text file and let you look at it on a card. You
can use it to check out your configuration file or your backup configuration file. I’ll go over
it more when we get into actual configuration.
show file This command will give you the skinny on a specified file or file system, but it’s
kind of obscure because people don’t use it a lot.
delete Three guesses—yep, it deletes stuff. But with some types of routers, not as well as
you’d think. That’s because even though it whacks the file, it doesn’t always free up the space
it was using. To actually get the space back, you have to use something called the squeeze
command too.
erase/format Use these with care—make sure that when you’re copying files, you say no to
the dialog that asks you if you want to erase the file system! The type of memory you're using
determines whether you can nix the flash drive or not.
cd/pwd Same as with Unix and DOS, cd is the command you use to change directories. Use
the pwd command to print (show) the working directory.
mkdir/rmdir Use these commands on certain routers and switches to create and delete
directories—the mkdir command for creation and the rmdir command for deletion. Use the
cd and pwd commands to change into these directories.
Using the Cisco IFS to Upgrade an IOS
Let’s take a look at some of these Cisco IFS commands on my ISR router (1841 series) with a
hostname of R1.
We’ll start with the pwd command to verify our default directory and then use the dir command
to verify the contents of the default directory (flash:/):
R1#pwd
flash:
R1#dir
Directory of flash:/
1 -rw- 13937472 Dec 20 2006 19:58:18 +00:00 c1841-ipbasemz.
124-1c.bin
2 -rw- 1821 Dec 20 2006 20:11:24 +00:00 sdmconfig-18xx.cfg
3 -rw- 4734464 Dec 20 2006 20:12:00 +00:00 sdm.tar
Backing Up and Restoring the Cisco IOS 281
4 -rw- 833024 Dec 20 2006 20:12:24 +00:00 es.tar
5 -rw- 1052160 Dec 20 2006 20:12:50 +00:00 common.tar
6 -rw- 1038 Dec 20 2006 20:13:10 +00:00 home.shtml
7 -rw- 102400 Dec 20 2006 20:13:30 +00:00 home.tar
8 -rw- 491213 Dec 20 2006 20:13:56 +00:00 128MB.sdf
9 -rw- 1684577 Dec 20 2006 20:14:34 +00:00 securedesktopios-
3.1.1.27-k9.pkg
10 -rw- 398305 Dec 20 2006 20:15:04 +00:00 sslclient-win-
1.1.0.154.pkg
32071680 bytes total (8818688 bytes free)
What we can see here is that we have the basic IP IOS (c1841-ipbase-mz.124-1c.bin).
Looks like we need to upgrade our 1841. You’ve just got to love how Cisco puts the IOS type
in the filename now! First, let’s check the size of the file that’s in flash with the show file command
(show flash would also work):
R1#show file info flash:c1841-ipbase-mz.124-1c.bin
flash:c1841-ipbase-mz.124-1c.bin:
type is image (elf) []
file size is 13937472 bytes, run size is 14103140 bytes
Runnable image, entry point 0x8000F000, run from ram
With a file that size, the existing IOS will have to be erased before we can add our new IOS file
(c1841-advipservicesk9-mz.124-12.bin); it’s over 21MB. We’ll use the delete command,
but remember, we can play with any file in flash memory and nothing serious happens until we
reboot—that is, if we made a mistake. So obviously, and as I pointed out earlier, we need to be
majorly careful here!
R1#delete flash:c1841-ipbase-mz.124-1c.bin
Delete filename [c1841-ipbase-mz.124-1c.bin]?[enter]
Delete flash:c1841-ipbase-mz.124-1c.bin? [confirm][enter]
R1#sh flash
-#- --length-- -----date/time------ path
1 1821 Dec 20 2006 20:11:24 +00:00 sdmconfig-18xx.cfg
2 4734464 Dec 20 2006 20:12:00 +00:00 sdm.tar
3 833024 Dec 20 2006 20:12:24 +00:00 es.tar
4 1052160 Dec 20 2006 20:12:50 +00:00 common.tar
5 1038 Dec 20 2006 20:13:10 +00:00 home.shtml
6 102400 Dec 20 2006 20:13:30 +00:00 home.tar
7 491213 Dec 20 2006 20:13:56 +00:00 128MB.sdf
8 1684577 Dec 20 2006 20:14:34 +00:00 securedesktop-ios-3.1.1.27-k9.pkg
9 398305 Dec 20 2006 20:15:04 +00:00 sslclient-win-1.1.0.154.pkg
22757376 bytes available (9314304 bytes used)
282 Chapter 5 Managing a Cisco Internetwork
R1#sh file info flash:c1841-ipbase-mz.124-1c.bin
%Error opening flash:c1841-ipbase-mz.124-1c.bin (File not found)
R1#
So with the above commands, I deleted the existing file and then verified the deletion by
using both the show flash and show file commands. Let’s add the new file with the copy
command, but again, I’m going to make sure I’m careful because this doesn’t make it safer
than the first method I showed you earlier:
R1#copy tftp://1.1.1.2//c1841-advipservicesk9-mz.124-12.bin/ flash:/
c1841-advipservicesk9-mz.124-12.bin
Source filename [/c1841-advipservicesk9-mz.124-12.bin/]?[enter]
Destination filename [c1841-advipservicesk9-mz.124-12.bin]?[enter]
Loading /c1841-advipservicesk9-mz.124-12.bin/ from 1.1.1.2 (via
FastEthernet0/0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[output cut]
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 22103052 bytes]
22103052 bytes copied in 72.008 secs (306953 bytes/sec)
R1#sh flash
-#- --length-- -----date/time------ path
1 1821 Dec 20 2006 20:11:24 +00:00 sdmconfig-18xx.cfg
2 4734464 Dec 20 2006 20:12:00 +00:00 sdm.tar
3 833024 Dec 20 2006 20:12:24 +00:00 es.tar
4 1052160 Dec 20 2006 20:12:50 +00:00 common.tar
5 1038 Dec 20 2006 20:13:10 +00:00 home.shtml
6 102400 Dec 20 2006 20:13:30 +00:00 home.tar
7 491213 Dec 20 2006 20:13:56 +00:00 128MB.sdf
8 1684577 Dec 20 2006 20:14:34 +00:00 securedesktop-ios-3.1.1.27-k9.pkg
9 398305 Dec 20 2006 20:15:04 +00:00 sslclient-win-1.1.0.154.pkg
10 22103052 Mar 10 2007 19:40:50 +00:00 c1841-advipservicesk9-mz.124-12.bin
651264 bytes available (31420416 bytes used)
R1#
We can check the file information as well with the show file command:
R1#sh file information flash:c1841-advipservicesk9-mz.124-12.bin
flash:c1841-advipservicesk9-mz.124-12.bin:
type is image (elf) []
file size is 22103052 bytes, run size is 22268736 bytes
Runnable image, entry point 0x8000F000, run from ram
Remember that the IOS is expanded into RAM when the router boots, so the new IOS will
not run until you reload the router. So now let’s take a look at how to use the Cisco SDM to
upgrade a router’s IOS.
Backing Up and Restoring the Cisco IOS 283
I really recommend that you play with the Cisco IFS commands on a router
just to get a good feel for them because, as I’ve said, they can definitely give
you some grief at first!

Backing Up and Restoring the Cisco IOS Best Cisco CCSP Bootcamp Training Institute in Delhi Gurgaon

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192

Before you upgrade or restore a Cisco IOS, you really should copy the existing file to a TFTP
host as a backup just in case the new image crashes and burns.
And you can use any TFTP host to accomplish this. By default, the flash memory in a router
is used to store the Cisco IOS. In the following sections, I’ll describe how to check the amount
of flash memory, how to copy the Cisco IOS from flash memory to a TFTP host, and how to
copy the IOS from a TFTP host to flash memory.
You’ll learn how to use the Cisco IFS and SDM to manage your IOS files after
first learning how to manage them with a TFTP host.
But before you back up an IOS image to a network server on your intranet, you’ve got to
do these three things:
Make sure you can access the network server.
Ensure that the network server has adequate space for the code image.
Verify the file naming and path requirement.
And if you have a laptop or workstation’s Ethernet port directly connected to a router’s
Ethernet interface, as shown in Figure 5.1, you need to verify the following before attempting
to copy the image to or from the router:
FIGURE 5 . 1 Copying an IOS from a workstation to a router
TFTP server software must be running on the administrator’s workstation.
The Ethernet connection between the router and the workstation must be made with a
crossover cable.
The workstation must be on the same subnet as the router’s Ethernet interface.
The copy flash tftp command must be supplied the IP address of the workstation if
you are copying from the router flash.
And if you’re copying “into” flash, you need to verify that there’s enough room in flash
memory to accommodate the file to be copied.
Verifying Flash Memory
Before you attempt to upgrade the Cisco IOS on your router with a new IOS file, it’s a good
idea to verify that your flash memory has enough room to hold the new image. You verify the
Console
E0
276 Chapter 5 Managing a Cisco Internetwork
amount of flash memory and the file or files being stored in flash memory by using the show
flash command (sh flash for short):
Router#sh flash
-#- --length-- -----date/time------ path
1 21710744 Jan 2 2007 22:41:14 +00:00 c2800nm-advsecurityk9-mz.124-12.bin
[output cut]
32989184 bytes available (31027200 bytes used)
The ISR router above has 64MB of RAM, and roughly half of the memory is in use.
The show flash command displays the amount of memory consumed by
the current IOS image and tells you if there’s enough room available to hold
both current and new images. You should know that if there’s not enough
room for both the old image and the new image you want to load, the old
image will be erased!
The amount of flash is actually easier to tally using the show version command on the
ISR routers:
Router#show version
[output cut]
Cisco 2811 (revision 49.46) with 249856K/12288K bytes of memory.
Processor board ID FTX1049A1AB
2 FastEthernet interfaces
4 Serial(sync/async) interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)
You can see that the amount of flash shows up on the last line. By averaging up, we get the
amount of flash to 64MB.
Notice that the filename in this example is c2800nm-advsecurityk9-mz.124-12.bin. The
main difference in the output of the show flash and show version commands is that the show
flash command displays all files in flash and the show version command shows the actual
name of the file that the router is using to run the router.
Backing Up the Cisco IOS
To back up the Cisco IOS to a TFTP server, you use the copy flash tftp command. It’s
a straightforward command that requires only the source filename and the IP address of the
TFTP server.
Backing Up and Restoring the Cisco IOS 277
The key to success in this backup routine is to make sure you’ve got good, solid connectivity
to the TFTP server. Check this by pinging the TFTP device from the router console
prompt like this:
Router#ping 1.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout
is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max
= 4/4/8 ms
The Packet Internet Groper (Ping) utility is used to test network connectivity, and
I use it in some of the examples in this chapter. I’ll be talking about it in more
detail in the section “Checking Network Connectivity and Troubleshooting” later
in the chapter.
After you ping the TFTP server to make sure that IP is working, you can use the copy
flash tftp command to copy the IOS to the TFTP server as shown next:
Router#copy flash tftp
Source filename []?c2800nm-advsecurityk9-mz.124-12.bin
Address or name of remote host []?1.1.1.2
Destination filename [c2800nm-advsecurityk9-mz.124-12.bin]?[enter]
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!
21710744 bytes copied in 60.724 secs (357532 bytes/sec)
Router#
Just copy the IOS filename from either the show flash or show version command and
then paste it when prompted for the source filename.
In the preceding example, the contents of flash memory were copied successfully to the
TFTP server. The address of the remote host is the IP address of the TFTP host, and the source
filename is the file in flash memory.
The copy flash tftp command won’t prompt you for the location of any file
or ask you where to put the file. TFTP is just a “grab it and place it” program
in this situation. This means that the TFTP server must have a default directory
specified or it won’t work!
278 Chapter 5 Managing a Cisco Internetwork
Restoring or Upgrading the Cisco Router IOS
What happens if you need to restore the Cisco IOS to flash memory to replace an original file
that has been damaged or if you want to upgrade the IOS? You can download the file from
a TFTP server to flash memory by using the copy tftp flash command. This command
requires the IP address of the TFTP host and the name of the file you want to download.
But before you begin, make sure the file you want to place in flash memory is in the default
TFTP directory on your host. When you issue the command, TFTP won’t ask you where the
file is, so if the file you want to use isn’t in the default directory of the TFTP host, this just
won’t work.
Router#copy tftp flash
Address or name of remote host []?1.1.1.2
Source filename []?c2800nm-advsecurityk9-mz.124-12.bin
Destination filename [c2800nm-advsecurityk9-mz.124-12.bin]?[enter]
%Warning:There is a file already existing with this name
Do you want to over write? [confirm][enter]
Accessing tftp://1.1.1.2/c2800nm-advsecurityk9-mz.124-12.bin...
Loading c2800nm-advsecurityk9-mz.124-12.bin from 1.1.1.2 (via
FastEthernet0/0):
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 21710744 bytes]
21710744 bytes copied in 82.880 secs (261954 bytes/sec)
Router#
In the above example, I copied the same file into flash memory, so it asked me if I wanted
to overwrite it. Remember that we are “playing” with files in flash memory. If I had just corrupted
my file by overwriting it, I won’t know until I reboot the router. Be careful with this
command! If the file is corrupted, you’ll need to do an IOS restore from ROM monitor mode.
If you are loading a new file and you don’t have enough room in flash memory to store both
the new and existing copies, the router will ask to erase the contents of flash memory before
writing the new file into flash memory.
A Cisco router can become a TFTP server host for a router system image
that’s run in flash memory. The global configuration command is tftpserver
flash: ios_name.

Boot System Commands CIsco CCNA Bootcamp Training Institute In Delhi

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192


Did you know that you can configure your router to boot another IOS if the flash is corrupted? Well,
you can. In fact, you just might want all your routers to boot from a TFTP host each time anyway
because that way, you’ll never have to upgrade each router individually. This may be a smooth way
to go because it allows you to just change one file on a TFTP host to perform an upgrade.
There are some boot commands you can play with that will help you manage the way
your router boots the Cisco IOS—but remember, we’re talking about the router’s IOS here,
not the router’s configuration!
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#boot ?
bootstrap Bootstrap image file
config Configuration file
host Router-specific config file
network Network-wide config file
system System image file
274 Chapter 5 Managing a Cisco Internetwork
The boot command truly gives you a wealth of options, but first, I’ll show you the typical
settings that Cisco recommends. So let’s get started—the boot system command will allow
you to tell the router which file to boot from flash memory. Remember that the router, by
default, boots the first file found in flash. You can change that with the following commands:
Router(config)#boot system ?
WORD TFTP filename or URL
flash Boot from flash memory
ftp Boot from a server via ftp
mop Boot from a Decnet MOP server
rcp Boot from a server via rcp
rom Boot from rom
tftp Boot from a tftp server
Router(config)#boot system flash c2800nm-advsecurityk9-mz.124-12.bin
The above command configures the router to boot the IOS listed in it. This is a helpful command
for when you load a new IOS into flash and want to test it, or even when you want to totally
change which IOS is loading by default.
The next command is considered a fall-back routine, but as I said, you can make it a permanent
way to have your routers boot from a TFTP host. Personally, I wouldn’t necessarily
recommend doing this (single point of failure); I’m just showing you that it’s possible:
Router(config)#boot system tftp ?
WORD System image filename
Router(config)#boot system tftp c2800nm-advsecurityk9-mz.124-12.bin ?
Hostname or A.B.C.D Address from which to download the file
<cr>
Router(config)#boot system tftp c2800nm-advsecurityk9-mz.124-12.bin 1.1.1.2
Router(config)#
As your last recommended fall-back option—the one to go to if the IOS in flash doesn’t
load and the TFTP host does not produce the IOS—load the mini-IOS from ROM like this:
Router(config)#boot system rom
Router(config)#do show run | include boot system
boot system flash c2800nm-advsecurityk9-mz.124-12.bin
boot system tftp c2800nm-advsecurityk9-mz.124-12.bin 1.1.1.2
boot system rom
Router(config)#
To sum this up, we now have Cisco’s suggested IOS backup routine configured on our
router: flash, TFTP host, ROM.

Cabling the Wide Area Network Best Cisco CCNA Voice Bootcamp Training in Gurgaon Delhi

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192

There are a couple of things that you need to know in order to connect your WAN. For starters,
you’ve got to understand the WAN Physical layer implementation provided by Cisco, and
you must be familiar with the various types of WAN serial connectors.
Cisco serial connections support almost any type of WAN service. The typical WAN connections
are dedicated leased lines using HDLC, PPP, Integrated Services Digital Network
(ISDN), and Frame Relay. Typical speeds run at anywhere from 56Kbps to 45Mbps (T3).
Which of the Listed WAN Services Is the Best?
You are a network administrator in San Francisco for Acme Corporation and you need to
install a remote connection. Which one do you use?
A leased line is almost always the choice if money is no object. But in today’s economy, cost
is usually a consideration. Services such as Frame Relay are hugely popular.
One of the newer WAN services that Cisco doesn’t list as a WAN service in the CCENT INTRO
objectives is a wireless connection. You can get from 1Mbps to over 50Mbps+, depending on
the service, and it actually works too! For the speed you get, it is relatively inexpensive. If you
want to connect two buildings together, then you should consider a wireless solution. Of
course, Cisco handily sells everything you need to do this—and at a pretty decent price compared
to a wired solution. You can even use a wireless solution for connecting your business
to the Internet.
Cabling the Wide Area Network
509
In the following sections, I’ll discuss the various types of connections and then move into
the nitty-gritty of the WAN protocols specified in the ICND1 (CCENT) objectives.
Serial Transmission
WAN serial connectors use
serial transmission
, which takes place one bit at a time over a
single channel.
Parallel transmission can pass at least 8 bits at a time, but all WANs use serial
transmission.
Cisco routers use a proprietary 60-pin serial connector that you must get from Cisco or a
provider of Cisco equipment. Cisco also has a new, smaller proprietary serial connection that
is about one-tenth the size of the 60-pin basic serial cable. This is called the “smart-serial,” for
some reason, and you have to make sure you have the right type of interface in your router
before using this cable connector. The type of connector you have on the other end of the cable
depends on your service provider or end-device requirements. The different ends available are
as follows:

EIA/TIA-232

EIA/TIA-449

V.35 (used to connect to a CSU/DSU)

X.21 (used in X.25)

EIA-530
Serial links are described in frequency or cycles per second (hertz). The amount of data that
can be carried within these frequencies is called
bandwidth
. Bandwidth is the amount of data
in bits per second that the serial channel can carry.
Figure 10.2 shows a typical router that has both Ethernet (AUI) and serial interfaces. The
serial interfaces can be used for a T1 connection, for example. The BRI is used for an ISDN
connection.
In order to connect a T1 to your serial interface, you must use a CSU/DSU, which we’ll
discuss next.
FIGURE 1 0 . 2
Router serial interfaces
510
Chapter 10
Introduction to Wide Area Networks
Data Terminal Equipment and Data
Communication Equipment
Router interfaces are, by default,
data terminal equipment (DTE)
, and they connect into
data
communication equipment (DCE)
—for example, a
channel service unit/data service unit
(CSU/DSU)
. The CSU/DSU then plugs into a demarcation location (demarc) and is the service
provider’s last responsibility. Most of the time, the demarc is a jack that has an RJ-45 (8-pin
modular) female connector located in a telecommunications closet.
You may have heard of demarcs if you’ve ever had the glorious experience of reporting a
problem to your service provider—they’ll always tell you that it tests fine up to the demarc and
that the problem must be the CPE, or customer premises equipment. In other words, it’s your
problem, not theirs.
Figure 10.3 shows a typical DTE-DCE-DTE connection and the devices used in the network.
FIGURE 1 0 . 3
DTE-DCE-DTE WAN connection
The idea behind a WAN is to be able to connect two DTE networks together through a
DCE network. The DCE network includes the area from the CSU/DSU, through the provider’s
wiring and switches, all the way to the CSU/DSU at the other end. The network’s DCE device
(CSU/DSU) provides clocking to the DTE-connected interface (the router’s serial interface).
As mentioned, the DCE network provides clocking to the router; this is the CSU/DSU. If
you have a nonproduction network and are using a WAN crossover type of cable and do not
have a CSU/DSU, then you need to provide clocking on the DCE end of the cable by using the
clock rate
command, as I discussed in Chapter 4.
Terms such as
EIA/TIA-232
,
V.35
,
X.21
, and
HSSI
(High-Speed Serial Interface)
describe the physical layer between the DTE (router) and DCE device
(CSU/DSU).
Clocking typically provided by DCE network to routers.
In non-production environments, a DCE network is not always present.
DCE
DTE
DTE
CSU/DSU CSU/DSU
High-Level Data-Link Control (HDLC) Protocol
511
High-Level Data-Link Control
(HDLC) Protocol
The High-Level Data-Link Control (HDLC) protocol is a popular ISO-standard, bit-oriented
Data Link layer protocol. It specifies an encapsulation method for data on synchronous serial
data links using frame characters and checksums. HDLC is a point-to-point protocol used on
leased lines. No authentication can be used with HDLC.
In byte-oriented protocols, control information is encoded using entire bytes. On the other
hand, bit-oriented protocols may use single bits to represent control information. Bit-oriented
protocols include SDLC, LLC, HDLC, TCP, IP, and others.
HDLC is the default encapsulation used by Cisco routers over synchronous serial links.
Cisco’s HDLC is proprietary—it won’t communicate with any other vendor’s HDLC implementation.
But don’t give Cisco grief for it—
everyone’s
HDLC implementation is proprietary.
Figure 10.4 shows the Cisco HDLC format.
FIGURE 1 0 . 4
Cisco HDLC frame format
As shown in the figure, the reason that every vendor has a proprietary HDLC encapsulation
method is that each vendor has a different way for the HDLC protocol to encapsulate multiple
Network layer protocols. If the vendors didn’t have a way for HDLC to communicate the different
layer 3 protocols, then HDLC would only be able to carry one protocol. This proprietary header
is placed in the data field of the HDLC encapsulation.
Let’s say you only have one Cisco router and you need to connect to a different vendor’s
router because your other Cisco router is on order. What would you do? You couldn’t use the
default HDLC serial encapsulation because it wouldn’t work. Instead, you would use something
like PPP, an ISO-standard way of identifying the upper-layer protocols. In addition, you
can check RFC 1661 for more information on the origins and standards of PPP.
Flag Address
• Each vendor’s HDLC has a proprietary data field to support multiprotocol environments.
• Supports only single-protocol environments.
Flag Address Control Data FCS Flag
Control Proprietary Data FCS Flag
Cisco HDLC
HDLC
512
Chapter 10
Introduction to Wide Area Networks
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) is a Data Link layer protocol that can be used over either asynchronous
serial (dial-up) or synchronous serial (ISDN) media. It uses the LCP (Link Control Protocol)
to build and maintain data link connections. Network Control Protocol (NCP) is used to allow
multiple Network layer protocols (routed protocols) to be used on a point-to-point connection.
Since HDLC is the default serial encapsulation on Cisco serial links and it works great, when
would you choose to use PPP? The basic purpose of PPP is to transport layer 3 packets across a
Data Link layer point-to-point link. It is nonproprietary, which means that if you don’t have all
Cisco routers, PPP would be needed on your serial interfaces—the HDLC encapsulation would
not work because it is Cisco proprietary. In addition, since PPP can encapsulate several layer 3
routed protocols and provide authentication, dynamic addressing, and callback, this may be the
encapsulation solution of choice for you over HDLC.
Figure 10.5 shows the protocol stack compared to the OSI reference model.
FIGURE 1 0 . 5 Point-to-point protocol stack
PPP contains four main components:
EIA/TIA-232-C, V.24, V.35, and ISDN The Physical layer international standards for
serial communication.
HDLC A method for encapsulating datagrams over serial links.
LCP A method of establishing, configuring, maintaining, and terminating the point-to-point
connection.
NCP A method of establishing and configuring different Network layer protocols. NCP is
designed to allow the simultaneous use of multiple Network layer protocols. Some examples
of protocols here are IPCP (Internet Protocol Control Protocol) and IPXCP (Internetwork
Packet Exchange Control Protocol).
Upper-layer Protocols
(such as IP, IPX, AppleTalk)
Physical layer
(such as EIA/TIA-232, V.24, V.35, ISDN)
Network Control Protocol (NCP)
(specific to each Network-layer protocol)
Link Control Protocol (LCP)
High-Level Data Link Control Protocol (HDLC)
OSI layer
3
2
1
Point-to-Point Protocol (PPP) 513
It is important to understand that the PPP protocol stack is specified at the Physical and
Data Link layers only. NCP is used to allow communication of multiple Network layer protocols
by encapsulating the protocols across a PPP data link.
Remember that if you have a Cisco router and a non-Cisco router connected
with a serial connection, you must configure PPP or another encapsulation
method, such as Frame Relay, because the HDLC default won’t work!
In the following sections, I’ll discuss the options for LCP and PPP session establishment.
PPP Session Establishment
When PPP connections are started, the links go through three phases of session establishment,
as shown in Figure 10.6.
FIGURE 1 0 . 6 PPP session establishment
Link establishment phase LCP packets are sent by each PPP device to configure and test the
link. These packets contain a field called Configuration Option that allows each device to see
the size of the data, the compression, and the authentication. If no Configuration Option field
is present, then the default configurations are used.
Authentication phase If required, either CHAP or PAP can be used to authenticate a link.
Authentication takes place before Network layer protocol information is read. It is possible
that link-quality determination may occur at this same time.
Network layer protocol phase PPP uses the Network Control Protocol (NCP) to allow multiple
Network layer protocols to be encapsulated and sent over a PPP data link. Each Network layer
protocol (e.g., IP, IPX, and AppleTalk, which are routed protocols) establishes a service with NCP.
PPP Authentication Methods
There are two methods of authentication that can be used with PPP links:
Password Authentication Protocol (PAP) The Password Authentication Protocol (PAP) is the
less secure of the two methods. Passwords are sent in clear text, and PAP is only performed upon
PPP Session Establishment
1. Link establishment phase
2. Authentication phase (optional)
3. Network layer protocol phase
Dial-up or
circuit-switched
network
514 Chapter 10 Introduction to Wide Area Networks
the initial link establishment. When the PPP link is first established, the remote node sends back
to the originating router the username and password until authentication is acknowledged.
That’s it.
Challenge Handshake Authentication Protocol (CHAP) The Challenge Handshake Authentication
Protocol (CHAP) is used at the initial startup of a link and at periodic checkups on
the link to make sure the router is still communicating with the same host. After PPP finishes
its initial link-establishment phase, the local router sends a challenge request to the remote
device. The remote device sends a value calculated using a one-way hash function called MD5.
The local router checks this hash value to make sure it matches. If the values don’t match, the
link is immediately terminated.
Configuring PPP on Cisco Routers
Configuring PPP encapsulation on an interface is a fairly straightforward process. To configure
it, follow these router commands:
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0
Router(config-if)#encapsulation ppp
Router(config-if)#^Z
Router#
Of course, PPP encapsulation must be enabled on both interfaces connected to a serial line
to work, and there are several additional configuration options available by using the help
command.
Configuring PPP Authentication
After you configure your serial interface to support PPP encapsulation, you can configure
authentication using PPP between routers. First set the hostname of the router if it’s not already
set. Then set the username and password for the remote router connecting to your router.
Here is an example:
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname RouterA
RouterA(config)#username RouterB password cisco
When using the hostname command, remember that the username is the hostname of the
remote router connecting to your router. And it’s case sensitive. Also, the password on both
routers must be the same. It’s a plain-text password that you can see with a show run command.
And you can encrypt the password by using the command service password-encryption.
You must have a username and password configured for each remote system you plan to connect
to. The remote routers must also be configured with usernames and passwords.
Point-to-Point Protocol (PPP) 515
After you set the hostname, usernames, and passwords, choose the authentication type,
either CHAP or PAP:
RouterA#config t
Enter configuration commands, one per line. End with CNTL/Z.
RouterA(config)#int s0
RouterA(config-if)#ppp authentication chap pap
RouterA(config-if)#^Z
RouterA#
If both methods are configured on the same line as is shown here, then only the first method
will be used during link negotiation—the second is a backup in case the first method fails.
See Hands-on Lab 10.1 for an example of PPP authentication.
Verifying PPP Encapsulation
Now that PPP encapsulation is enabled, let’s see how to verify that it’s up and running.
You can verify the configuration with the show interface command:
Pod1R1#sh int s0/0
Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 10.0.1.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 239/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set Keepalive set (10 sec)
LCP Open
Open: IPCP, CDPCP
[output cut]
Notice that the sixth line lists encapsulation as PPP and the next line shows that the LCP
is open, which means that it has negotiated the session establishment and is good! The eighth
line tells us the NCP is listening for the protocols IP and CDP.

Introduction to Wide Area Networks Best Cisco CCNA Bootcamp Training in Gurgaon Delhi

Network Bulls
www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192

So what is it that makes something a
wide area network (WAN)
instead of a local area
network (LAN)? Distance is the first thing that comes to mind, but these days, wireless
LANs can cover some serious turf! So is it bandwidth? Here again, in many places really
big pipes can be had for a price, so that’s not it either. Well, what then? Perhaps one of
the best ways to tell a WAN from a LAN is that you generally own a LAN infrastructure
but you lease a WAN infrastructure from a service provider.
I’ve already talked about a data link that you usually own (Ethernet), but now we’re going to
take a look at the data links you most often don’t own but instead lease from a service provider.
The key to understanding WAN technologies is to be familiar with the different WAN
terms and connection types often used by service providers to join your networks together.
Introduction to Wide Area Networks
505
There are many new WANs available today, but again, this chapter is focusing
on the Cisco ICND1 exam (CCENT) objectives only.
Defining WAN Terms
Before ordering a WAN service type, it would be a good idea to understand the following
terms, which are commonly used by service providers:
Customer premises equipment (CPE)
Customer premises equipment (CPE)
is equipment
that’s owned by the subscriber and located on the subscriber’s premises.
Demarcation point
The
demarcation location
is the spot where the service provider’s responsibility
ends and the CPE begins. It’s generally a device in a telecommunications closet owned
and installed by the telecommunications company (telco). The customer is responsible for cable
(extended demarc) from this box to the CPE, which is usually a connection to a CSU/DSU or
ISDN interface.
Local loop
The
local loop
connects the demarc to the closest switching office, called a
central office.
Central office (CO)
This point connects the customers to the provider’s switching network.
A
central office (CO)
is sometimes referred to as a
point of presence (POP)
.
Toll network
The
toll network
is a trunk line inside a WAN provider’s network. This network
is a collection of switches and facilities owned by the ISP.
It is important to familiarize yourself with these terms, as they are crucial to understanding
WAN technologies.
WAN Connection Types
A WAN can use a number of different connection types, and this section will provide you with an
introduction to the various types of WAN connections you’ll find on the market today. Figure 10.1
shows the different WAN connection types that can be used to connect your LANs (DTE) together
over a DCE network.
The following list explains the WAN connection types:
Leased lines
Typically, these are referred to as a
point-to-point connection
or dedicated connection.
A
leased line
is a pre-established WAN communications path from the CPE through
the DCE switch to the CPE of the remote site, allowing DTE networks to communicate at any
time with no setup procedures before transmitting data. When cost is no object, it’s really the
best choice. It uses synchronous serial lines up to 45Mbps. HDLC and PPP encapsulations are
frequently used on leased lines, and I’ll go over them with you in detail in a bit.
506
Chapter 10
Introduction to Wide Area Networks
FIGURE 1 0 . 1
WAN connection types
Circuit switching
When you hear the term
circuit switching
, think phone call. The big
advantage is cost—you pay only for the time you actually use. No data can transfer before an
end-to-end connection is established.
Circuit switching
uses dial-up modems or ISDN and is
used for low-bandwidth data transfers.
Packet switching
This is a WAN switching method that allows you to share bandwidth with
other companies to save money.
Packet switching
can be thought of as a network that’s designed
to look like a leased line yet the cost is more like the cost of circuit switching. There is a downside:
If you need to transfer data constantly, forget about this option. Just get yourself a leased line.
Packet switching will work well only if your data transfers are bursty in nature. Frame Relay and
X.25 are packet-switching technologies. Speeds can range from 56Kbps to T3 (45Mbps).
WAN Support
Cisco supports pretty much every WAN service available, and you can see this with the
encapsulation ?
command from any serial interface (your output may vary depending
on the IOS version you are running):
Router#
config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
int s0/0
Router(config-if)#
encapsulation ?
atm-dxi ATM-DXI encapsulation
Dedicated
Circuit-switched
Packet-switched
Synchronous serial
Asynchronous serial, ISDN
Synchronous serial
Telephone
company
Service
provider
Introduction to Wide Area Networks
507
bstun Block Serial tunneling (BSTUN)
frame-relay Frame Relay networks
hdlc Serial HDLC synchronous
lapb LAPB (X.25 Level 2)
ppp Point-to-Point protocol
sdlc SDLC
sdlc-primary SDLC (primary)
sdlc-secondary SDLC (secondary)
smds Switched Megabit Data Service (SMDS)
stun Serial tunneling (STUN)
x25 X.25
You cannot configure Ethernet or Token Ring encapsulation on a serial interface.
In this section, I will define the most prominent WAN protocols used today—Frame Relay,
ISDN, LAPB, LAPD, HDLC, PPP, and ATM. Usually, though, the only WAN protocols configured
on a serial interface these days (or for the exam) are HDLC, PPP, and Frame Relay.
Frame Relay
A packet-switched technology that emerged in the early 1990s,
Frame Relay
is
a Data Link and Physical layer specification that provides high performance. Frame Relay
is a successor to X.25, except that much of the technology in X.25 used to compensate for
physical errors (noisy lines) has been eliminated. Frame Relay can be more cost-effective than
point-to-point links and can typically run at speeds of 64Kbps up to 45Mbps (T3). Frame
Relay provides features for dynamic bandwidth allocation and congestion control.
ISDN
Integrated Services Digital Network (ISDN)
is a set of digital services that transmit
voice and data over existing phone lines. ISDN can offer a cost-effective solution for remote
users who need a higher-speed connection than analog dial-up links offer. ISDN is also a good
choice as a backup link for other types of links, such as Frame Relay or a T1 connection.
LAPB
Link Access Procedure, Balanced (LAPB)
was created to be a connection-oriented
protocol at the Data Link layer for use with X.25. It can also be used as a simple data link
transport. LAPB causes a tremendous amount of overhead because of its strict time-out and
windowing techniques.
LAPD
Link Access Procedure, D-Channel (LAPD)
is used with ISDN at the Data Link layer
(layer 2) as a protocol for the D (signaling) channel. LAPD was derived from the Link Access Procedure,
Balanced (LAPB) protocol and is designed primarily to satisfy the signaling requirements
of ISDN basic access.
HDLC
High-Level Data-Link Control (HDLC)
was derived from Synchronous Data
Link Control (SDLC), which was created by IBM as a Data Link connection protocol.
HDLC is a protocol at the Data Link layer, and it has very little overhead compared to
LAPB. HDLC wasn’t intended to encapsulate multiple Network layer protocols across the
same link. The HDLC header carries no identification of the type of protocol being carried
inside the HDLC encapsulation. Because of this, each vendor that uses HDLC has its own
way of identifying the Network layer protocol, which means that each vendor’s HDLC is
proprietary for its equipment.
508
Chapter 10
Introduction to Wide Area Networks
PPP
Point-to-Point Protocol (PPP)
is an industry-standard protocol. Because all multiprotocol
versions of HDLC are proprietary, PPP can be used to create point-to-point links
between different vendors’ equipment. It uses a Network Control Protocol field in the Data
Link header to identify the Network layer protocol. It allows authentication and multilink
connections and can be run over asynchronous and synchronous links.
ATM
Asynchronous Transfer Mode (ATM) was created for time-sensitive traffic, providing
simultaneous transmission of voice, video, and data. ATM uses cells instead of packets that
are a fixed 53 bytes long. It also can use isochronous clocking (external clocking) to help the
data move faster.
PPP and ATM can be configured on an asynchronous serial connection.
HDLC and Frame Relay cannot.