day 5 - switching and wireless

131
Understandin g LAN Switching

Upload: charu-mathur

Post on 21-Jul-2016

6 views

Category:

Documents


1 download

DESCRIPTION

DAY 6 - IPV6, VPN

TRANSCRIPT

Page 1: Day 5 - Switching and Wireless

Understanding LAN Switching

Page 2: Day 5 - Switching and Wireless

1-2Networking Fundamentals © 2009, Velocis Systems

Switch

• It breaks the Collision Domain

• It takes the packet and forwards to destined port without any modification.

• It increases bandwidth of the network.

• Multiple devices can be connected to each interface.

Page 3: Day 5 - Switching and Wireless

1-3Networking Fundamentals © 2009, Velocis Systems

Collision Domain

• All the computers which are physically connected together and their frames can collide with each other are part of a single Collision Domain.

Page 4: Day 5 - Switching and Wireless

1-4Networking Fundamentals © 2009, Velocis Systems

Hubs

Ethernet 10

One device sending at a time

Hub

All nodes share 10 Mbps

• Ethernet concentrator• Works at physical layer 1

Page 5: Day 5 - Switching and Wireless

1-5Networking Fundamentals © 2009, Velocis Systems

Collisions: Issues

• Sluggish network response

• Increasing user complaints

CRASHCRASH

Hub

• “I could have walked to Finance by now.”

• “I knew I should have stayed home.”

• “File transfers take forever.”

• “I’m waiting all the time.”

Page 6: Day 5 - Switching and Wireless

1-6Networking Fundamentals © 2009, Velocis Systems

Hub-Based LANs

• Shared resources• Desktop connections wired to

centralized closets• Poor security within shared

segments• Routers provide scalability• Groups of users determined

by physical location

10BaseTHub

10BaseTHub

Page 7: Day 5 - Switching and Wireless

1-7Networking Fundamentals © 2009, Velocis Systems

Switching Technology

• To understand Switching Technology we need to understand the following :

– Layer 2 Switching

– Address Learning

– Forward/Filtering Decisions

– Loop Avoidance

– LAN Switch Types

Page 8: Day 5 - Switching and Wireless

1-8Networking Fundamentals © 2009, Velocis Systems

Switches—Layer 2

Ethernet Switch

Each Node has 10 Mbps

BackboneSwitched Ethernet 10

Multiple devices sending at the same time

Page 9: Day 5 - Switching and Wireless

1-9Networking Fundamentals © 2009, Velocis Systems

Switches versus Hubs

Ethernet 10

One device sending at

a time

Hub

All nodes share 10 Mbps

Ethernet Switch

Each node has 10 Mbps

Backbone Switched Ethernet 10

Multiple devices sending at the

same time

Page 10: Day 5 - Switching and Wireless

© 2009, Velocis Systems

LAN Switching Basics

Page 11: Day 5 - Switching and Wireless

1-11Networking Fundamentals © 2009, Velocis Systems

Layer 2 Switching

• This is hardware based switching• It uses MAC address to filter the network.• To build Filter Table, it uses ASICs (Application-

specific Integrated Circuits)• It is like Multiport bridge.• Layer 2 switches do not look at the Network layer

header and hence faster.• Based on hardware address it decides whether to

forward the packet or drop it.

Page 12: Day 5 - Switching and Wireless

1-12Networking Fundamentals © 2009, Velocis Systems

• Layer 2 Switching provides the following:

– Wire speed • Layer 2 switch is considered faster because

no modification in the packet.– Low Latency

• Because the switching is faster

Layer 2 Switching

Page 13: Day 5 - Switching and Wireless

1-13Networking Fundamentals © 2009, Velocis Systems

LAN Switching Basics

• Enables dedicated access

• Eliminates collisions and increases capacity

• Supports multiple conversations at the same time

Page 14: Day 5 - Switching and Wireless

1-14Networking Fundamentals © 2009, Velocis Systems

Functions of Switchat Layer 2

• There are three main functions at Layer2

– Address Learning

– Forward / Filter Decisions

– Loop Avoidance

Page 15: Day 5 - Switching and Wireless

1-15Networking Fundamentals © 2009, Velocis Systems

Address Learning

• Switches and Bridges remember the source address of each frame received on an interface and enter this information into MAC database.

– Whenever switch receives a packet it makes an entry of the source address and sends a broadcast for destination.

- The destination machine then responds to broadcast and switch receives a packet from destination.

– Switch again makes entry for the destination machine’s hardware address.

– Using this method Switch maintains a table stating that which hardware address is available at which port.

Page 16: Day 5 - Switching and Wireless

1-16Networking Fundamentals © 2009, Velocis Systems

Switching Table

Page 17: Day 5 - Switching and Wireless

1-17Networking Fundamentals © 2009, Velocis Systems

Forward / Filter Decisions

• When a frame is received on an interface, the switch looks at the destination hardware address and finds the exit interface in the MAC database.– When a frame is reached to the switch the destination port

is checked in MAC database to find out the exit interface.

• If found the packet will be forwarded to the mentioned port

• If not found the Broadcast is sent on all the ports and the exit port for this particular address is determined.

Page 18: Day 5 - Switching and Wireless

1-18Networking Fundamentals © 2009, Velocis Systems

Broadcast / Unicast

• When packets are sent to a specific machine that is called Unicast. –It always knows the destination address

• When packets are sent to all that is called Broadcast. –It the destination address will be all 1s.

Page 19: Day 5 - Switching and Wireless

1-19Networking Fundamentals © 2009, Velocis Systems

A C

B

2

4

1

10 Mbps

10 Mbps

LAN Switch Operation

• Forwards packets based on a forwarding table– Forwards based on the MAC (Layer

2) address

• Operates at OSI Layer 2• Learns a station’s location by

examining source address

– Sends out all ports when destination address is broadcast, or unknown address

– Forwards when destination is located on different interface

Interface

Stat

ions

1 2 3 4

3Data from A to B

Page 20: Day 5 - Switching and Wireless

1-20Networking Fundamentals © 2009, Velocis Systems

A C

B

2

4

1

10 Mbps

10 Mbps

LAN Switch Operation

• Forwards packets based on a forwarding table– Forwards based on the MAC (Layer

2) address

• Operates at OSI Layer 2• Learns a station’s location by

examining source address

– Sends out all ports when destination address is broadcast, or unknown address

– Forwards when destination is located on different interface

Interface

Stat

ions

1 2 3 4A X

3

Page 21: Day 5 - Switching and Wireless

1-21Networking Fundamentals © 2009, Velocis Systems

A C

B

2

4

1

10 Mbps

10 Mbps

LAN Switch Operation

• Forwards packets based on a forwarding table– Forwards based on the MAC (Layer

2) address

• Operates at OSI Layer 2• Learns a station’s location by

examining source address

– Sends out all ports when destination address is broadcast, or unknown address

– Forwards when destination is located on different interface

Interface

Stat

ions

1 2 3 4A X

3Data from A to B

Data from

A to B

Dat

a fr

om A

to B

Page 22: Day 5 - Switching and Wireless

1-22Networking Fundamentals © 2009, Velocis Systems

A C

B

2

4

1

10 Mbps

10 Mbps

LAN Switch Operation

• Forwards packets based on a forwarding table– Forwards based on the MAC (Layer

2) address

• Operates at OSI Layer 2• Learns a station’s location by

examining source address

– Sends out all ports when destination address is broadcast, or unknown address

– Forwards when destination is located on different interface

Interface

Stat

ions

1 2 3 4A X

3

B X

Dat

a fr

om B

to A

Page 23: Day 5 - Switching and Wireless

1-23Networking Fundamentals © 2009, Velocis Systems

A C

B

2

4

1

10 Mbps

10 Mbps

LAN Switch Operation

• Forwards packets based on a forwarding table– Forwards based on the MAC

(Layer 2) address

• Operates at OSI Layer 2• Learns a station’s location

by examining source address– Sends out all ports when

destination address is broadcast, or unknown address

– Forwards when destination is located on different interface

Interface

Stat

ions

1 2 3 4A XB X

3Data from B to A

Page 24: Day 5 - Switching and Wireless

1-24Networking Fundamentals © 2009, Velocis Systems

LAN Switch Types

• Switching type basically effects the Latency and the reliability of your network.

• There are three Switching Types:

– Store and Forward

– Cut-through

– Fragment free

Page 25: Day 5 - Switching and Wireless

1-25Networking Fundamentals © 2009, Velocis Systems

Store and Forward

• It is default in Switches• In this method the entire data is first stored, processed

for errors, if it is found error free, it is forwarded otherwise returned.

• Uses CRC for error checking.• Latency is high in this case but it is extremely reliable.

– Latency : Time involved in sending the data from one node to another.

Page 26: Day 5 - Switching and Wireless

1-26Networking Fundamentals © 2009, Velocis Systems

Cut-Through

• Cut-Through switching is the fastest one, because it does not check for errors.

• It does not store data and process for error.

• It just reads the destination address and forwards it.

• It begins to forward the frame as soon as it reads the destination address and determines the outgoing interface.

• It has Lowest Latency and not reliable.

• Hence it is also called Wire Speed Switching.

Page 27: Day 5 - Switching and Wireless

1-27Networking Fundamentals © 2009, Velocis Systems

Fragmentfree (Modified Cut-Through)

• It provides us both Low latency as well as Speed.

• It is a modified form of Cut Through switching.

• It reads the first 64 bytes and then forwards.

– It checks 64 bytes because most of the errors occur in these bytes only. If first 64 bytes are error free Fragment Free Switching considers entire data error free.

• If there is any error in first 64 bytes the packet will be dropped or else forwarded.

• It provides better reliability than the Cut-through with almost same Latency as in Cut through.

Page 28: Day 5 - Switching and Wireless

1-28Networking Fundamentals © 2009, Velocis Systems

Loop Avoidance

• If multiple connections between switches are created for redundancy, network loops can occur. – Most commonly networks are implemented with

redundant links for fault tolerance purpose.

– These multiple links may cause loops and broadcast storm

– In a switched network some scheme should be implemented to avoid these loops.

– The Spanning-Tree Protocol (STP) is used to stop network loops and allow redundancy.

Page 29: Day 5 - Switching and Wireless

© 2009, Velocis Systems

Understanding Spanning-tree

protocol(802.1d)

Page 30: Day 5 - Switching and Wireless

1-30Networking Fundamentals © 2009, Velocis Systems

How does Loop occur

Page 31: Day 5 - Switching and Wireless

1-31Networking Fundamentals © 2009, Velocis Systems

Loop Occurring

• In this scenario if no loop avoidance scheme is implemented the switch will generate a broadcast storm.

• A device can receive multiple copy of same frames.

• The MAC address table will be continuously updated and the table itself will be confused, because frames will be received from more than one link. This is called “thrashing” MAC Table.

• This is how loops within other loop will be generated and no switching will be performed in the network.

Note : Spanning Tree Protocol is designed to solve this problem.

Page 32: Day 5 - Switching and Wireless

1-32Networking Fundamentals © 2009, Velocis Systems

Spanning-Tree Protocol

• The main function of STP is to maintain a loop free network.

– Originally STP was created by DEC

– It was modified by IEEE and was published in 802.1d specification.

– All CISCO switches run on IEEE802.1d version of STP

Page 33: Day 5 - Switching and Wireless

1-33Networking Fundamentals © 2009, Velocis Systems

How STP Works

• STP continuously monitors the network for a failure or addition of a link, switch or bridge.

• Whenever there is a change in topology, it reconfigures switch or bridge to avoid a total loss of connectivity or creation of new loops.

• STP is by-default enabled in Catalyst switches.

• STP provides a loop-free network by following:

– Electing a Root Bridge

– Root Port for a Non-root Bridge

– Designated port for Each Segment

Page 34: Day 5 - Switching and Wireless

1-34Networking Fundamentals © 2009, Velocis Systems

Bridge ID

• Bridge ID is used to determine the Root Bridge .• The Bridge ID is 8 bytes long.• Bridge ID includes the priority and the MAC Address of the device.• All devices running IEEE STP version has 32,768 as priority value.• To Determine Bridge ID the Priorities and MAC address are combined.

–If two switches / Bridges have the same priority then MAC Address is used to determine Bridge ID.

Eg. If switch A with MAC ID 0000.0c00.1111.1111 and switch B with MAC IS 0000.0c00.2222.2222 have the same priority then switch A will become the Root Bridge.

Page 35: Day 5 - Switching and Wireless

1-35Networking Fundamentals © 2009, Velocis Systems

Electing Root Bridge

• In one Broadcast Domain only one Bridge is designated as Root Bridge.

• All Ports on the Root Bridge are in Forwarding State and are called Designated Port.

• All ports in forwarding state can send and receive traffic.• Bridge ID is used to determine the Root Bridge.• Bridge ID includes the priority and the MAC Address of

the device.

Page 36: Day 5 - Switching and Wireless

1-36Networking Fundamentals © 2009, Velocis Systems

Root Port for a Non-root Bridge

• The Root Port is the lowest cost path from a Non-Root Bridge to the Root Bridge.– Spanning Tree Path Cost is an accumulated cost based on

bandwidth. • More Bandwidth - Less Cost• In the event that the cost is the same then the deciding

factor would be the lowest port no.

• Root Ports are in forwarding state.

Page 37: Day 5 - Switching and Wireless

1-37Networking Fundamentals © 2009, Velocis Systems

Designated Port

• There will be one Designated Port in one Segment.

• Designated Port is selected on the bridge that has the lowest cost path to Root Bridge.

• Designated Port is in the forwarding state.

– Non-designated Ports are normally in the blocking state to break the loop topology. That means the Spanning Tree is preventing it from forwarding traffic.

Page 38: Day 5 - Switching and Wireless

1-38Networking Fundamentals © 2009, Velocis Systems

Spanning Tree Path Cost

• Spanning Tree Path Cost is an accumulated total path cost based on the bandwidth of all the links in the path. Table shows some of the path costs specified in IEEE 802.1d specification

Link Speed Cost (Revised IEEE Cost (Previous IEEESpecification) Specification)

10 Gbps 2 1 1 Gbps 4 1100 Mbps 19 10 10 Mbps 100 100

Page 39: Day 5 - Switching and Wireless

1-39Networking Fundamentals © 2009, Velocis Systems

Spanning Tree Example

Find out the following:•What is the Root Bridge?•What are the Designated, Nondesignated and Root Ports?•What are the Forwarding and Blocking Ports?

Switch ZMAC 0c0011110000Default Priority 32768

Switch XMAC 0c0011111100Default Priority 32768

Switch YMAC 0c0011111111Default Priority 32768

Port 1

Port 0

100BaseT

100BaseTPort 0

Port 1

Port 0

Page 40: Day 5 - Switching and Wireless

1-40Networking Fundamentals © 2009, Velocis Systems

Lets verify the answers

• Root Bridge: Switch Z, Because it has the lowest bridge ID (priority and MAC address)

• Root Port: Port 0 of Switches X and Y because it is the lowest-cost path to the root.

• Designated Port: Port 0 of Switch Z. All ports on the root are designated ports. Port 1 of Switch X is a designated port. Because both Switch X and SwitchY have the same path cost to the Root Bridge, the designated port is selected to be on switch X because it has a lower bridge ID than Switch Y.

• Blocking: Port 1 of Switch Y. The nondesignated port on the segment.

• Forwarding: All designated ports and root ports are in the forwarding state.

Page 41: Day 5 - Switching and Wireless

© 2009, Velocis Systems

VIRTUAL LANs

Page 42: Day 5 - Switching and Wireless

1-42Networking Fundamentals © 2009, Velocis Systems

• In layer 2 switched network, broadcast packet transmitted arrives at every device on the network , whether intended or not for that device. One broadcast domain within a switch

Flat Network

Page 43: Day 5 - Switching and Wireless

1-43Networking Fundamentals © 2009, Velocis Systems

Drawback of Layer 2 Switched Network

• Larger the number of Devices and Users, the more broadcasts and packets are to be handle by each device

The Solution is VLAN

Page 44: Day 5 - Switching and Wireless

1-44Networking Fundamentals © 2009, Velocis Systems

VLAN

UNDERSTANDING VIRTUAL LOCAL AREA NETWORKS (VLANS)

Page 45: Day 5 - Switching and Wireless

1-45Networking Fundamentals © 2009, Velocis Systems

VLAN

• We create VLANs in order to address these issues.

• A VLAN is a logical broadcast domain that can span multiple physical LAN segments.

• VLANs provide segmentation and organizational flexibility.

• You can design a VLAN structure that lets you group stations that are segmented logically by functions, project teams, and applications without regard to the physical location of the users.

Page 46: Day 5 - Switching and Wireless

1-46Networking Fundamentals © 2009, Velocis Systems

VLANS CONTINUED…

• Ports in a VLAN share broadcasts; ports in different VLANs do not. Containing broadcasts in a VLAN improves the overall performance of the network.

• A VLAN can exist on a single switch or span multiple switches. VLANs can include stations in a single building or multiple-building infrastructures.

Page 47: Day 5 - Switching and Wireless

1-47Networking Fundamentals © 2009, Velocis Systems

VLAN Definition

• VLAN is defined as logical grouping of network resources & Users connected to predefined ports on a Switch, defined by An Administrator.

Page 48: Day 5 - Switching and Wireless

1-48Networking Fundamentals © 2009, Velocis Systems

• VLANs are used to create smaller broadcast domain within a switch.

• A Single VLAN is treated as a separate subnet or broadcast domain.

VLAN

Page 49: Day 5 - Switching and Wireless

1-49Networking Fundamentals © 2009, Velocis Systems

VLANS SPANNING MULTIPLE SWITCHES

Page 50: Day 5 - Switching and Wireless

1-50Networking Fundamentals © 2009, Velocis Systems

Virtual LANs

• VLANs help manage broadcast domain

• LAN switches and network management software provide a mechanism to create VLANs

• A VLAN also lets you group ports on a switch so that you can limit unicast, multicast, and broadcast traffic flooding.

Server Farm

VLAN 1VLAN 2VLAN 3

Page 51: Day 5 - Switching and Wireless

1-51Networking Fundamentals © 2009, Velocis Systems

VLAN Benefits

• Reduced administrative costs– Simplify moves, adds, and changes

• Efficient bandwidth utilization– Better control of broadcasts

• Improved network security – Separate VLAN group for high-security users– Relocate servers into secured locations

• Scalability and performance– Micro segment with scalability– Distribute traffic load

Page 52: Day 5 - Switching and Wireless

1-52Networking Fundamentals © 2009, Velocis Systems

Flexibility and Scalability

• Layer 2 Switches only read Frames for filtering, which causes it to forward all Broadcasts.

So, creating VLAN, means creating more Broadcast Domains.• Assigning Switch ports or users to VLAN groups on a switch, you

have the option to add selected users in the broadcast domain.

This stops Broadcast Storms caused by faulty Network Interface Card (NIC) or applications.

• VLAN can be kept on multiplying in order to efficiently utilize the bandwidth.

Page 53: Day 5 - Switching and Wireless

1-53Networking Fundamentals © 2009, Velocis Systems

• In case of Inter-VLAN communication, restriction are implemented on the router.

• Restriction can also be placed on the Hardware address.

Contd..

Page 54: Day 5 - Switching and Wireless

1-54Networking Fundamentals © 2009, Velocis Systems

Static VLAN

• This is the basic and most secure type for creating VLAN.

• Port assignment associated with a VLAN is maintained until and unless modified by the Administrator.

• This type of VLAN configuration is easy to Setup and Monitor.

Page 55: Day 5 - Switching and Wireless

1-55Networking Fundamentals © 2009, Velocis Systems

VLAN RANGES

• Normal VLANS (1 – 1005)

• Extended VLANS ( 1006 – 4094)

• VLAN 1 is the CISCO default

Page 56: Day 5 - Switching and Wireless

1-56Networking Fundamentals © 2009, Velocis Systems

VLAN Identification

• VLAN can span multiple connected switches.

• Switches must keep a track of Frames and which VLAN, these Frame belong to.

• Frame Tagging performs this function.

Page 57: Day 5 - Switching and Wireless

1-57Networking Fundamentals © 2009, Velocis Systems

VLAN TRUNKING

Page 58: Day 5 - Switching and Wireless

1-58Networking Fundamentals © 2009, Velocis Systems

VLAN identification modes

• TO identify which frames belongs to which VLAN, VLAN identification is required.

• Two Types of trunking methods are used:-

1) ISL

2) 802.1q

Page 59: Day 5 - Switching and Wireless

1-59Networking Fundamentals © 2009, Velocis Systems

Inter-Switch Link (ISL)

• Proprietary to Cisco Switches

• Used for Fast Ethernet and Gigabit Ethernet links only

Page 60: Day 5 - Switching and Wireless

1-60Networking Fundamentals © 2009, Velocis Systems

Inter-Switch Link (ISL) Protocol

• ISL is an external tagging process, which means the original frame is not altered but encapsulated with a new 26 byte ISL header.

• It also adds a second 4 byte FCS field at the end of the frame.

Page 61: Day 5 - Switching and Wireless

1-61Networking Fundamentals © 2009, Velocis Systems

Drawback

• As the frame is encapsulated with information, only ISL devices can read it.

• It makes the frame heavy as it crosses the actual allowable MTU size.

Page 62: Day 5 - Switching and Wireless

1-62Networking Fundamentals © 2009, Velocis Systems

IEEE 802.1q

• Created by IEEE as standard method for Frame Tagging.

• It inserts a field into Frame to identify the VLAN.

• When trunking between Cisco Switches link and different brand of Switch, it is mandatory to use 802.1q for the trunk to work.

Page 63: Day 5 - Switching and Wireless

1-63Networking Fundamentals © 2009, Velocis Systems

IEEE 802.1q

• In this method of tagging a 4 byte field is added inside the frame itself for the identification of the VLAN.

Page 64: Day 5 - Switching and Wireless

1-64Networking Fundamentals © 2009, Velocis Systems

Types of Links in Switched environment

Access Links :• Device attached to these links are unaware of VLAN

membership.• VLAN information from the frame are remove before it is set

to an access link device.• Access link devices are not capable of communicating to

device outside the VLAN unless the packet is routed through a router.

Page 65: Day 5 - Switching and Wireless

1-65Networking Fundamentals © 2009, Velocis Systems

Trunk Links

• A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch.

• Ethernet trunks carry the traffic of multiple VLANs over a single link and allow you to extend the VLANs across an entire network.

• Cisco supports IEEE 802.1Q for FastEthernet and Gigabit Ethernet interfaces.

Page 66: Day 5 - Switching and Wireless

1-66Networking Fundamentals © 2009, Velocis Systems

VLAN Configuration

• Global ModeSwitch# configure terminal Switch(config)# vlan 3 Switch(config-vlan)# name Vlan3Switch(config-vlan)# exit Switch(config)# end

Page 67: Day 5 - Switching and Wireless

1-67Networking Fundamentals © 2009, Velocis Systems

VLAN Implementation Commands

• Configuring VLANs

Switch (config) # vlan 101

Switch (config-vlan) # switchport mode access

Switch (config-vlan) # switchport access vlan 101

• Verifying VLANs

Switch # show interfaces

Switch # show vlan brief

Page 68: Day 5 - Switching and Wireless

1-68Networking Fundamentals © 2009, Velocis Systems

Configuring an Access VLAN

Switch(config)# vlan vlan_id

Create a VLAN.

Switch(config-vlan)# name vlan_name

Provide a VLAN name.

Switch(config-if)# switchport mode access

Place the switch port into access mode.

Switch(config-if)# switchport access vlan vlan_id

Associate the access switch port with a VLAN.

Page 69: Day 5 - Switching and Wireless

1-69Networking Fundamentals © 2009, Velocis Systems

Virtual Trunking Protocol (VTP)

• Allows Administrator to add, delete, and rename VLAN, which are further propagated to all Switches (automatically).

• VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the additions, deletions, and name changes of VLANs across networks.

• It is Cisco Propriety

Page 70: Day 5 - Switching and Wireless

1-70Networking Fundamentals © 2009, Velocis Systems

Benefits of VTP

• Consistent VLAN configuration across all switches in the network.

• Accurate tracking and Monitoring of VLANs.

• Dynamic reporting of adding VLAN to all Switches.

• Plug and Play VLAN adding.

Page 71: Day 5 - Switching and Wireless

1-71Networking Fundamentals © 2009, Velocis Systems

• VLAN administration and configuration protocol– Reduces VLAN setup and

administration– Eliminates configuration errors

such as duplicate VLAN names – Decreases network manager’s

time adding and managing VLANs

Virtual Trunk Protocol (VTP)

ATMFabric

VLAN 2

VLAN 1

ISL

LANE

ISL

LANE

LANE

802.1Q

Page 72: Day 5 - Switching and Wireless

1-72Networking Fundamentals © 2009, Velocis Systems

VTP DOMAIN

• VTP works in a Domain.

• A VTP Domain is one switch or several interconnected switches sharing the same management domain.

• By default, a Cisco Catalyst switch is in the no-management-domain state until you configure a management domain

• Configurations made to a VTP server are propagated across trunk links to all theconnected switches in the network.

Page 73: Day 5 - Switching and Wireless

1-73Networking Fundamentals © 2009, Velocis Systems

Page 74: Day 5 - Switching and Wireless

1-74Networking Fundamentals © 2009, Velocis Systems

VTP MODES

VTP operates in one of three modes:

1) Server

2) Client

3) Transparent

Page 75: Day 5 - Switching and Wireless

1-75Networking Fundamentals © 2009, Velocis Systems

Server Mode

• The default VTP mode is server mode.

• Can create, modify, or delete VLANs and Propagates to all the switches in the Domain.

• A VTP server synchronizes its VLAN database file with other VTP servers and clients.

Page 76: Day 5 - Switching and Wireless

1-76Networking Fundamentals © 2009, Velocis Systems

Client Mode

• Cannot Create, modify or delete VLANs.

• Forwards VTP Advertisements.

• A VTP client synchronizes its database with other VTP servers and clients.

Page 77: Day 5 - Switching and Wireless

1-77Networking Fundamentals © 2009, Velocis Systems

Transparent mode

• Can Create, modify or delete VLANs.

• When you change the VLAN configuration in VTP transparent mode, the change affects only the local switch and does not propagate to other switches in the VTP domain.

• It forwards VTP Advertisements that it gets within the domain.

• Does not synchronize its database

Page 78: Day 5 - Switching and Wireless

1-78Networking Fundamentals © 2009, Velocis Systems

VTP OPERATION

• VTP advertisements are flooded throughout the management domain.

• VTP advertisements are sent every 5 minutes or whenever VLAN configurations change.

• A configuration revision number is included in each VTP advertisement.

• A higher configuration revision number indicates that the VLAN information being advertised is more current than the stored information.

Page 79: Day 5 - Switching and Wireless

1-79Networking Fundamentals © 2009, Velocis Systems

CONFIGURATION REVISION NUMBER

• One of the most critical components of VTP is the configuration revision number.

• Each time a VTP server modifies its VLAN information, the VTP server increments theconfiguration revision number by one.• VTP Server then sends the advertisement with the new revision number.• If a higher revision number is found in the received advertisement, it is overwritten with the current VLAN configuration.

Page 80: Day 5 - Switching and Wireless

1-80Networking Fundamentals © 2009, Velocis Systems

Page 81: Day 5 - Switching and Wireless

1-81Networking Fundamentals © 2009, Velocis Systems

VTP Configuration Guidelines

• The default VTP configuration parameters for the 2950 Switch are as follows:

• VTP domain name: None

• VTP mode: Server

• VTP password: None

• VTP pruning: Disabled

Page 82: Day 5 - Switching and Wireless

1-82Networking Fundamentals © 2009, Velocis Systems

VTP CONFIGURATION COMMANDS

Use the vtp global configuration command to modify the VTP configuration, domain name,interface, and mode:

SwitchX# configure terminalSwitchX(config)# vtp mode [ server | client | transparent ]SwitchX(config)# vtp domain domain-nameSwitchX(config)# vtp password passwordSwitchX(config)# end

Note: The domain name and password are case sensitive.

Page 83: Day 5 - Switching and Wireless

1-83Networking Fundamentals © 2009, Velocis Systems

VLAN CONFIGURATION COMMANDS

Use the VLAN global configuration command to create a VLAN and enter VLAN configuration mode:SwitchX# configure terminalSwitchX(config)# vlan 2SwitchX(config-vlan)# name testvlan

Note: Use the no form of this command to delete the VLAN.

Page 84: Day 5 - Switching and Wireless

1-84Networking Fundamentals © 2009, Velocis Systems

VLAN PORT ASSIGNMENTSwitchX# configure terminalSwitchX(config)# interface range fastethernet 0/2 - 4SwitchX(config-if)# switchport access vlan 2SwitchX# show vlan

VLAN Name Status Ports---- -------------------------------- --------- -------------------1 default active Fa0/12 testvlan active Fa0/2,

Fa0/3, Fa0/4

Page 85: Day 5 - Switching and Wireless

1-85Networking Fundamentals © 2009, Velocis Systems

Explaining Trunk Link Problems – Trunks can be configured statically or autonegotiated with DTP.

– For trunking to be autonegotiated, the switches must be in the same VTP domain.

– Some trunk configuration combinations will successfully configure a trunk, some will not.

– Will any of the above combinations result in an operational trunk?

Page 86: Day 5 - Switching and Wireless

1-86Networking Fundamentals © 2009, Velocis Systems

Resolving Trunk Link Problems

– When using DTP, ensure that both ends of the link are in the same VTP domain.

– Ensure that the trunk encapsulation type configured on both ends of the link is valid.

– On links where trunking is not required, DTP should be turned off.

– Best practice is to configure trunk and nonegotiate where trunks are required.

Page 87: Day 5 - Switching and Wireless

1-87Networking Fundamentals © 2009, Velocis Systems

DTP

• Trunk negotiation is managed by DTP• It is a point to point protocol.• To enable trunking to a device that does not support DTP, use Switch (config - if) # switchport mode trunkSwitch (config - if) # swicthport nonegotiateTo cause interface to become a trunk but to not generate DTP frames.Switch (config - if) # switchport mode {dynamic {auto |desirable} | trunk}dynamic auto — Set the interface to a trunk link if the neighboring interface is set to trunk or desirable mode.dynamic desirable — Set the interface to a trunk link if the neighboring interface is set to trunk, desirable, or auto mode.Trunk — Set the interface in permanent trunking mode and negotiate to convert the link to a trunk link even if the neighboring interface is not a trunk interface.

Page 88: Day 5 - Switching and Wireless

1-88Networking Fundamentals © 2009, Velocis Systems

Routing Between VLANs

• In a VLAN environment, frames are switched only between ports within the same broadcastdomain.• VLANs perform network partitioning and traffic separation at Layer 2.• Inter-VLAN communication cannot occur without a Layer 3 device, such as a router.

Page 89: Day 5 - Switching and Wireless

1-89Networking Fundamentals © 2009, Velocis Systems

ROUTER ON A STICK

Page 90: Day 5 - Switching and Wireless

1-90Networking Fundamentals © 2009, Velocis Systems

CREATING SUB-INTERFACES

• To support 802.1Q trunking, you must subdivide the physical FastEthernet interface of the router into multiple, logical, addressable interfaces, one per VLAN.• This address will be used as the gateway for the workstations in a that VLAN.

Page 91: Day 5 - Switching and Wireless

1-91Networking Fundamentals © 2009, Velocis Systems

Wireless LANs

Introducing WLANs

Page 92: Day 5 - Switching and Wireless

1-92Networking Fundamentals © 2009, Velocis Systems

Wireless Data Technologies

Page 93: Day 5 - Switching and Wireless

1-93Networking Fundamentals © 2009, Velocis Systems

Wireless Data Technologies (Cont.)

Page 94: Day 5 - Switching and Wireless

1-94Networking Fundamentals © 2009, Velocis Systems

Wireless Data Technologies (Cont.)

PAN(Personal Area

Network)

LAN(Local Area Network)

WAN(Wide Area Network)

MAN(Metropolitan Area Network)

PAN LAN MAN WAN

Standards Bluetooth IEEE 802.11a, 802.11b, 802.11g

802.16MMDS, LMDS

GSM, GPRS,CDMA, 2.5–3G

Speed <1 Mbps 1–54+ Mbps 22+ Mbps 10–384 kbpsRange Short Medium Medium–long Long

Applications Peer to peer,device to device

Enterprise networks

Fixed, last-mile access

PDAs, mobilephones, cellular

access

Page 95: Day 5 - Switching and Wireless

1-95Networking Fundamentals © 2009, Velocis Systems

Wireless LAN (WLAN)– A WLAN is a shared

network.

– An access point is a shared device and functions like a shared Ethernet hub.

– Data is transmitted over radio waves.

– Two-way radio communications (half-duplex) are used.

– The same radio frequency is used for sending and receiving.

Page 96: Day 5 - Switching and Wireless

1-96Networking Fundamentals © 2009, Velocis Systems

WLAN Evolution

–Warehousing–Retail–Health care–Education–Businesses–Home

Page 97: Day 5 - Switching and Wireless

1-97Networking Fundamentals © 2009, Velocis Systems

What Are WLANs?

•They are:– Local– In building or campus for

mobile users– Radio or infrared– Not required to have RF

licenses in most countries– Using equipment owned by

customers

•They are not:– WAN or MAN networks– Cellular phones networks– Packet data transmission via

celluar phone networks• Cellular digital packet data

(CDPD)• General packet radio

service (GPRS)• 2.5G to 3G services

Page 98: Day 5 - Switching and Wireless

1-98Networking Fundamentals © 2009, Velocis Systems

Similarities Between WLAN and LAN

– A WLAN is an 802 LAN.• Transmits data over the air vs. data over the wire • Looks like a wired network to the user • Defines physical and data link layer• Uses MAC addresses

– The same protocols/applications run over both WLANs and LANs. • IP (network layer)• IPSec VPNs (IP-based)• Web, FTP, SNMP (applications)

Page 99: Day 5 - Switching and Wireless

1-99Networking Fundamentals © 2009, Velocis Systems

Differences Between WLAN and LAN

– WLANs use radio waves as the physical layer.• WLANs use CSMA/CA instead of CSMA/CD to access the network.

– Radio waves have problems that are not found on wires.• Connectivity issues.

– Coverage problems– Multipath issues – Interference, noise

• Privacy issues.– WLANs use mobile clients.

• No physical connection.• Battery-powered.

– WLANs must meet country-specific RF regulations.

Page 100: Day 5 - Switching and Wireless

1-100Networking Fundamentals © 2009, Velocis Systems

Service Set Identifier (SSID)– SSID is used to logically separate

WLANs.– The SSID must match on client and

access point.– Access point broadcasts one SSID

in beacon.– Client can be configured without

SSID.– Client association steps:

1. Client sends probe request.2. A point sends probe response.3. Client initiates association.4. A point accepts association.5. A point adds client MAC

address to association table.

Page 101: Day 5 - Switching and Wireless

1-101Networking Fundamentals © 2009, Velocis Systems

WLAN Access Topology

Page 102: Day 5 - Switching and Wireless

1-102Networking Fundamentals © 2009, Velocis Systems

Wireless Repeater Topology

Page 103: Day 5 - Switching and Wireless

1-103Networking Fundamentals © 2009, Velocis Systems

Alternative Peer-to-Peer Topology

Page 104: Day 5 - Switching and Wireless

1-104Networking Fundamentals © 2009, Velocis Systems

Service Sets and ModesAd hoc mode

• Independent Basic Service Set (IBSS)– Mobile clients connect directly

without an intermediate access point.

Infrastructure mode• Basic Service Set

– Mobile clients use a single access point for connecting to each other or to wired network resources.

• Extended Services Set– Two or more Basic Service Sets

are connected by a common distribution system.

Page 105: Day 5 - Switching and Wireless

1-106Networking Fundamentals © 2009, Velocis Systems

Roaming Through Wireless Cells

Roaming

Page 106: Day 5 - Switching and Wireless

1-107Networking Fundamentals © 2009, Velocis Systems

Client Roaming

• Roaming without interruption requires the same SSID on all access points.

• Maximum data retry count exceeded

• Too many beacons missed

• Data rate shifted• Periodic intervals

Page 107: Day 5 - Switching and Wireless

1-108Networking Fundamentals © 2009, Velocis Systems

Unlicensed Frequency Bands

• ISM: Industry, scientific, and medical frequency band

• No license required

• No exclusive use • Best effort• Interference possible

Page 108: Day 5 - Switching and Wireless

1-109Networking Fundamentals © 2009, Velocis Systems

Unlicensed Frequency Bands

Page 109: Day 5 - Switching and Wireless

1-110Networking Fundamentals © 2009, Velocis Systems

Radio Frequency Transmission

– Radio frequencies are radiated into the air via an antenna, creating radio waves.

– Radio waves are absorbed when they are propagated through objects (e.g., walls).

– Radio waves are reflected by objects (e.g., metal surfaces).

– This absorption and reflection can cause areas of low signal strength or low signal quality.

Page 110: Day 5 - Switching and Wireless

1-111Networking Fundamentals © 2009, Velocis Systems

Radio Frequency Transmission

Page 111: Day 5 - Switching and Wireless

1-112Networking Fundamentals © 2009, Velocis Systems

Radio Frequency Transmission

– Higher data rates have a shorter transmission range.• The receiver needs more signal strength and

better SNR to retrieve information.– Higher transmit power results in greater distance.– Higher frequencies allow higher data rates.– Higher frequencies have a shorter transmission

range.

Page 112: Day 5 - Switching and Wireless

1-113Networking Fundamentals © 2009, Velocis Systems

WLAN Regulation and Standardization

•Regulatory agencies– FCC (United States)– ETSI (Europe)

•Standardization– IEEE 802.11 – http://standards.ieee.org/

getieee802/•Certfication of equipment– Wi-Fi Alliance certifies

interoperability between products– Certified products can be found at

http://www.wi-fi.org.

Page 113: Day 5 - Switching and Wireless

1-114Networking Fundamentals © 2009, Velocis Systems © 2005 Cisco Systems, Inc. All rights reserved.

802.11b

Page 114: Day 5 - Switching and Wireless

1-115Networking Fundamentals © 2009, Velocis Systems

802.11b Standard

– Standard was ratified in September 1999– Operates in the 2.4-GHz band– Specifies four data rates up to 11 Mbps

• 1, 2, 5.5, 11 Mbps– Defines basic security, encryption, and authentication for the

wireless link– Is the most commonly deployed WLAN standard

Page 115: Day 5 - Switching and Wireless

1-116Networking Fundamentals © 2009, Velocis Systems

Channel

Identifier

Channel Center

Frequency

Channel Frequency

Range [MHz]

Regulatory Domain

Americas

Europe, Middle

East, and Asia

Japan

1 2412 MHz 2401 – 2423 X X X2 2417 MHz 2406 – 2428 X X X3 2422 MHz 2411 – 2433 X X X4 2427 MHz 2416 – 2438 X X X5 2432 MHz 2421 – 2443 X X X6 2437 MHz 2426 – 2448 X X X7 2442 MHz 2431 – 2453 X X X8 2447 MHz 2436 – 2458 X X X9 2452 MHz 2441 – 2463 X X X10 2457 MHz 2446 – 2468 X X X11 2462 MHz 2451 – 2473 X X X12 2467 MHz 2466 – 2478 X X13 2472 MHz 2471 – 2483 X X14 2484 MHz 2473 – 2495   X

2.4-GHz Channels

Page 116: Day 5 - Switching and Wireless

1-117Networking Fundamentals © 2009, Velocis Systems

2.4-GHz Channel Use

• Each channel is 22 MHz wide.• North America: 11 channels.• Europe: 13 channels.• There are three nonoverlapping channels: 1, 6, 11.• Using any other channels will cause interference.• Three access points can occupy the same area.

Page 117: Day 5 - Switching and Wireless

1-118Networking Fundamentals © 2009, Velocis Systems

802.11b/g (2.4 GHz) Channel Reuse

Page 118: Day 5 - Switching and Wireless

1-119Networking Fundamentals © 2009, Velocis Systems © 2005 Cisco Systems, Inc. All rights reserved.

802.11a

Page 119: Day 5 - Switching and Wireless

1-120Networking Fundamentals © 2009, Velocis Systems

802.11a Standard– Standard was ratified September 1999– Operates in the 5-GHz band– Uses orthogonal frequency-division multiplexing (OFDM)– Uses eight data rates of up to 54 Mbps

• 6, 9, 12, 18, 24, 36, 48, 54 Mbps– Has from 12 to 23 nonoverlapping channels (FCC)– Has up to 19 nonoverlapping channels (ETSI)– Regulations different across countries

• Transmit (Tx) power control and dynamic frequency selection required (802.11h)

Page 120: Day 5 - Switching and Wireless

1-121Networking Fundamentals © 2009, Velocis Systems © 2005 Cisco Systems, Inc. All rights reserved.

802.11g

Page 121: Day 5 - Switching and Wireless

1-122Networking Fundamentals © 2009, Velocis Systems © 2005 Cisco Systems, Inc. All rights reserved.

802.11 Standards Comparison

Page 122: Day 5 - Switching and Wireless

1-123Networking Fundamentals © 2009, Velocis Systems

802.11 Standards Comparison802.11b 802.11g 802.11a

Ratified 1999 2003 1999Frequency

band 2.4 GHz 2.4 GHz 5 GHz

No of channels 3 3 Up to 23

Transmission DSSS DSSS OFDM OFDM

Data rates [Mbps]

1, 2, 5.5, 11

1, 2, 5.5, 11

6, 9, 12, 18, 24, 36,

48, 54

6, 9, 12, 18, 24, 36, 48,

54Throughput

[Mbps]Up to 6 Up to 22 Up to 28

Page 123: Day 5 - Switching and Wireless

1-124Networking Fundamentals © 2009, Velocis Systems

Range Comparisons

Page 124: Day 5 - Switching and Wireless

1-125Networking Fundamentals © 2009, Velocis Systems © 2005 Cisco Systems, Inc. All rights reserved.

WLAN Security

Page 125: Day 5 - Switching and Wireless

1-126Networking Fundamentals © 2009, Velocis Systems

Why WLAN Security?• Wide availability and low cost of

IEEE 802.11 wireless equipment • 802.11 standard ease of use and

deployment• Availability of sniffers• Statistics on WLAN security• Media hype about

hot spots, WLAN hacking, war driving

• Nonoptimal implementation of encryption in standard Wired Equivalent Privacy (WEP) encryption

• Authentication vulnerability

Page 126: Day 5 - Switching and Wireless

1-127Networking Fundamentals © 2009, Velocis Systems

WLAN Security Threats

Page 127: Day 5 - Switching and Wireless

1-128Networking Fundamentals © 2009, Velocis Systems

Mitigating the Threats

Control and Integrity

Privacy and Confidentiality

Protection and Availability

Authentication EncryptionIntrusion Detection

System (IDS)Ensure that

legitimate clients associate with trusted access

points.

Protect data as it is transmitted and received.

Track and mitigate

unauthorized access and

network attacks.

Page 128: Day 5 - Switching and Wireless

1-129Networking Fundamentals © 2009, Velocis Systems

Evolution of WLAN Security

• No strong authentication

• Static, breakable keys

• Not scalable

Initial (1997)

Encryption (WEP)

Interim (2001)

802.1x EAP

• Dynamic keys• Improved

encryption• User

authentication• 802.1x EAP

(LEAP, PEAP)• RADIUS

Interim (2003)

Wi-Fi Protected Access (WPA)

• Standardized• Improved

encryption• Strong, user

authentication (e.g., LEAP, PEAP, EAP-FAST)

Present

Wireless IDS

IEEE 802.11i

WPA2 (2004)

• Identification and protection against attacks, DoS

• AES strong encryption

• Authentication• Dynamic key

management

Page 129: Day 5 - Switching and Wireless

1-130Networking Fundamentals © 2009, Velocis Systems

Wireless Client Association– Access points send out beacons

announcing SSID, data rates, and other information.

– Client scans all channels.– Client listens for beacons and responses

from access points.– Client associates to access point with

strongest signal.– Client will repeat scan if signal becomes

low to reassociate to another access point (roaming).

– During association SSID, MAC address and security settings are sent from the client to the access point and checked by the access point.

Page 130: Day 5 - Switching and Wireless

1-131Networking Fundamentals © 2009, Velocis Systems

Access Point Homepage

Page 131: Day 5 - Switching and Wireless

1-132Networking Fundamentals © 2009, Velocis Systems

Express Setup

Initial configuration of access point: hostname, IP address, SNMP