Wednesday, July 17, 2019

Campus Area Network (CAN)

The Campus Area Network (CAN) is a network of several LAN's interconnected in a limited geographical area. CAN is smaller than a Wide Area Network (WAN) or urban network (MAN). CAN is also known as the Company Area Network (CAN).

Campus network, campus area network or corporate network, or CAN is a computer network that is connected to local networks within a limited geographical area.



Routers and switches for data centres. "Campus" is the place where users connect to the network, along with all the devices used by such employees (such as desktops, laptops, IP phones, cell phones, video conferences, printers, etc.).

University and university networks connect administrative buildings, dormitories, academic halls, libraries, student centres, sports facilities and other buildings associated with the institution in a particular city or neighbourhood. The campus networks connect the buildings with the main departments and staff. The corporate campus network is the user side of the larger corporate network within a limited geographical area.

Most CANs consist of multiple LAN's connected between adaptors and routers that come together to create a single network. It works as a LAN, where users with network access (wired or wireless) can communicate directly with other systems within the network

Local Area Network (LAN)

In this article we will discuss the local network, we will have a brief discussion on the local network.

A computer network that connects devices within a building or a group of adjacent buildings, particularly with a radius of less than one kilometre.






A LAN is a computer network that connects computers within a limited area such as residence, school, laboratory, campus or office building. In contrast, a large network covers not only a wider geographical distance, but generally includes leased circuits.

The LAN can function as few or two users (for example in a small office network) or several hundred users in a larger office. LAN's protect cables, adaptors, routers, and other components that allow users to connect to internal servers, websites, and other local networks on large networks.

Local area networks (LAN's) are computer networks ranging from the size of a few computers in an office to hundreds or even thousands of devices distributed in many buildings. It connects computers together and provides shared access to printers, file servers and other services.

Friday, July 12, 2019

Python 3.7 Programming Script For Telnet And Setting IP To Interface (Don't Use It In Real Network)

Python is an open source scripting language, thus used to automate anything!! I have started learning python from its complete basics and then gradually turned up writing scripts to automate stuff around me. To automate things in python, you can simply write scripts.




import getpass
import telnetlib

HOST=input("Enter IP of Router :")
user=input("Enter The Username :")
password=getpass.getpass()

tn=telnetlib.Telnet(HOST)

tn.read_until(b"Username:")
tn.write(user.encode('ascii')+b"\n")
if password:
tn.read_until(b"Password:")
tn.write(password.encode('ascii')+b"\n")

tn.write(b"enable\n")
print("Enter Enable Password\n")
enable=getpass.getpass()

if password:
tn.read_until(b"Password:")
tn.write(enable.encode('ascii')+b"\n")

tn.write(b"conf t\n")
tn.write(b"int f0/0\n")
ip=input("Enter New IP address with Subnet Mask :")
tn.write(ip.encode('ascii')+b"\n")
tn.write(b"do write\n")
tn.write(b"End\n")
tn.write(b"Exit\n")
print("Done")


print(tn.read_all().decode('ascii'))

Sunday, June 23, 2019

Biggest Cisco Certification Update: New CCIE coming in 2020 !!!



Cisco developed the Cisco Certification Program, which brings together network professionals and software developers in a single community, leading to the creation of an IT team in the future. The next level CCIE CCIE certification will help accelerate business and drive technological innovation. Network automation is one of the biggest challenges for the IT industry. Community professionals have developed changes and Cisco network experts have sponsored the best automation practices to implement these changes in Cisco certifications.

Cisco's intent-based networks have created a huge shift in the role of network professionals and the way they run networks. This change is a manual and time-consuming task for the world where IT developers, applications, DevOps and cloud developers work together to take full advantage of the new network features. The Cisco certification and training program includes DevNet certificates to improve applications and write the new network and select the skills to develop. The DevNet program can use best practices and collaboration for the main automation functions.

Technicians and industry experts claim that IT is one of the fastest growing sectors, and we can experience this rapid growth around us. This has led to expectations about work roles and requests for new skills. This certification program is based on integrity and integrity: integrity protects the organization from vulnerabilities and threats and ensures that the product meets the customer's requirements.

A complete set of CCNA, CCNP and CCIE has been modified. The first level certificate, the associated level certificate, the professional level certificate and the expert level certificate remain the same, but the delivery method has changed along with the rules and criteria for obtaining this certificate.

Domains                                                    Old Version                                         New Version
CCIE Enterprise Infrastructur  CCIE Routing and Switching v5.0 CCIE Enterprise Infrastructure v1.0
CCIE Enterprise Wireless   CCIE Wireless v3.1                   CCIE Enterprise Wireless v1.0
CCIE Data Center                   CCIE Data Center v2.1                   CCIE Data Center v3.0
CCIE Security                           CCIE Security v5.0                   CCIE Security v6.0
CCIE Service Provider           CCIE Service Provider v5.0           CCIE Service Provider v5.0
CCIE Collaboration           CCIE Collaboration v2.0           CCIE Collaboration v3.0


Why does the CCIE change?

Technology is changing rapidly, skills needs and business roles are increasing day by day. The level of experts is essential as the professionals must know everything under the roof. For Cisco it was difficult to create a program as requested, so now they have created a certification program, a combination of knowledge and technology.

Where does CCIE differ?

People think that CCNP and CCIE are similar, but the difference here. CCNP is a Cisco certified network expert and Cisco international network expert. CCNP Professional focuses on a vertical approach and focuses on a technique. In addition, the Professional course focuses on being a master only in a particular location, along with the Common Technology Core exam. On the other hand, at the CCIE level, the professional must know the different areas and all the components of the technology and how they relate.

For example, in the security domain, there is network access, encryption, firewall authentication, web security, email security, etc. To discover all the areas listed above.

All the above changes are effective from February 24th 2020 onwards.

Here's how the new Cisco certification path looks:



New Cisco certification changes

Big changes in CCIE certification
Full life cycle certification
There are different phases in the network life cycle. The first phase is the planning and design of the network and therefore the implementation of the solutions developed in the network. After execution, there is optimization and troubleshooting, if appropriate. The new certification certificate will focus on the same path: design, implementation, operation and optimization.

Align with five buildings
Enterprise, Service Provider, Data Center, Security and Collaboration are the five Cisco structures. CCIE Enterprise is now divided into two divisions: CCIE Enterprise Infrastructure and CCIE Enterprise Wireless. CCIE Enterprise Infrastructure is a routing and switching, but together with a console-based architecture and software-sensitive networks and automation. CCIE Enterprise Wireless will include a similar approach to CCIE Wireless, but more in terms of automation and sophistication in the wireless sector. So automation will be an integral part of the entire curriculum.

The design department is now an integral part
If you want to specialize in network design at CCNP, you can choose one between design and wireless design, but CCIE has no choice but to learn planning skills in planning and publishing during network maintenance.

Influence on accredited CCIE candidates
This will not affect the candidates already approved because the certificate structure is always the same. Therefore, the CCIE certification will always have CCIE certification. But there will be a transition measure. For example, if you are a CCIE filter for routing and switching, Cisco will take you to be a CCIE Enterprise employee or if you are certified by CCIE wirelessly, you will become a CCIE Wireless Enterprise. Together with the two above, all other areas remain as they are.

Exam changes
CCIE is still an exam on two levels. The first level of the CCIE Technology Core exam will be at the Pearson VUE centers, while the second level will be an 8 hour laboratory test in which the candidate will have to visit the Cisco Lab site and be tested. The only thing that changes here is the examination process. Initially, if the candidate has received the CCIE Core Technology exam, he will not receive any certification or recognition, however, once the candidate has completed the CCIE Core Technology exam, he will receive a professional accreditation badge.

Secondly, if you have already passed the CCIE Technology Core exam, Cisco now offers the flexibility that will also be a well-known CCNP certification test. Therefore, the Core Technology exam works in two ways, which means it will take you halfway through the CCIE exam and the CCNP exam. So while you study CCIE, you can still take CCNP Concentration and post it on your social media profile and fill in the work you want.

Changes in the laboratory
Since the horrible CCIE Lab experiment may seem stressful, it is one of the most enjoyable tests and tests of your working abilities in stressful conditions. The structure of the exam is always the same. The only thing that changes is the delivery method.

There are currently three units in the exam, namely the diagnostic unit, the troubleshooting unit and the configuration unit. From February 2020 onwards, there will be only two modules, namely the Design Unit (3 hours) and the operational, operational and optimization module (5 hours). It will be a continuous process from now on. For example, if customer A comes to you to resolve the network and suggests his needs, you will carry out the activities in the same order as the two modules described above. If an error occurs in the first unit, this will not affect the second unit, but the plot and the customer's needs will remain the same.

Re-certification policy
Modification 1: recertification period

The recertification period is currently two years. If the certificate fails or expires, you will receive a public comment. But by February 2020 the certification period will be set for 3 years. There will have been no suspension.

For example,

Current date - June 2019
Deadline for two years - August 2019 (assumption of certificate of start date - August 2017)
Suppose the candidate does not recertify himself by the aforementioned date
Therefore, in September 2019, the certificate will be suspended from August 2019 to August 2020
But due to changes in the re-certification policy
Now, the certificate will expire in August 2020.
Candidates now have 3 years for recertification.

Change 2: recertification date

Let's take the same example above.

Expiration date based on new policies - August 2020
Candidates must re-certify before August 2020
If you take the exam in August and sign up again, it will be called "Anniversary Date"
Therefore, the next recovery period is August 2020 - August 2023
But now, the "anniversary date" is no longer valid.
The "Event Date" will now be considered
The date of the event is the date on which the activity is performed.
Take the same example from above
Validity date of the certificate - August 2020
Exam date: June 2020
Therefore the recertification period - June 2020 - June 2023

Old program withdrawn
Candidates who have a certificate for 20 years now have the opportunity to go on to an honorary life. There are no costs for himself.

Changes in the continuing education program
No administrative costs after February 2020
Old needs: 100 continuous credits
New requirements: 120 credit hours
CCIE hybrid model
Before the candidates appear for the exam or follow the model of continuing education, but now due to its flexibility there may be differences such as:

An exam and a training o
An exam and two courses or
Try one and one Cisco Live
All of the above is applicable until 120 credit hours are obtained.

Any changes


Wednesday, May 22, 2019

Show interfaces status command

The Interface State command appears
Interface status can be verified on the Cisco key using the show interface TYPE command for the show interface. Consider the following example:



SW1 # Displays fa0 / 1 interfaces
FastEthernet0 / 1 Active, Line Protocol Active (connected)
The device is Lance, the address is 0040.0b21.0b01 (bia 0040.0b21.0b01)
BW 100000 Kbit, DLY 1000 usec,
Reliability 255/255, txload 1/255, rxload 1/255
ARPA packaging, loopback is not set
Set Keepalive (10 seconds)
Two-way, 100 Mb / s
Input flow control is disabled, output flow control is disabled
Type ARP: ARPA, ARP Timeout 04:00:00
Last Login 00:00:08, exit 00:00:05, exit is not blocked
The last cancellation of the Show Interface counters is never done
Input queue: 0/75/0/0 (size / max / droplets / flush); Total output decreases: 0
Strategy Queue: fifo
Output queue: 0/40 (size / max)
Input frequency of 5 minutes 0 bits / sec, 0 packets / sec
Output speed is 5 minutes 0 bits / sec, 0 packets / sec
956 input packet, 193351 bytes, 0 no buffer
Received 956 transmissions, 0 runes, 0 Giants, 0 throttles
Input errors 0, 0 CRC, 0 Window, 0 Override, 0 Ignore, 0 Abort
0 IEA, 0 multicast, 0 pause input
0 Input packets with dribble detection mode
2357 outgoing package, 263570 bytes, 0 overrides
0 output errors, 0 collisions, 10 interface reset
0 chatter, 0 collision late, 0 postpone
0 carrier company missing, 0 carrier company no
0 The output buffer fails, 0 exchange the output buffers

As you can see from the above output, this gives us a lot of information about the selected interface. The following is a brief description of the most important lines:

FastEthernet0 / 1 Active, Active Line Protocol (Connected) - Indicates that the interface is in the active state
The device is Lance, the address is 0040.0b21.0b01 - Lance refers to the chip used by the port. The MAC address of the port is also listed
BW 100000 Kbps, DLY 1000 usec - Bandwidth and interface delay
Fully duplex printer, 100 MB / s - The port operates in full duplex mode and supports speeds up to 100MB / s
956 Entry Pack, 193351 Bytes, 0 No Stores - The total number and size of packets received by the port.
Received 956 transmissions: The total number of packets received by the device.
Input errors 0, 0 CRC, 0 Window ... - Number of received packets received incorrectly.
2357 Outbound packets, 263570 bytes, 0 Overrides: The total number and size of packets sent from the port.
Output errors 0, 0 Conflicts: The number of packets that were not sent due to an error and number of Ethernet collisions.

Friday, May 10, 2019

Ping explained

Ping is perhaps the most used tool to troubleshoot a network. Ping (Packet Internet Groper) is included in most operating systems. It is called using a ping command and uses ICMP (Internet Control Message Protocol) to report errors and provide information about the handling of IP packets. Ping works by sending an ICMP echo request message to the specified IP address. If the computer with the destination IP address is reachable, it responds with an ICMP echo response message.

A ping command typically provides other information about network performance, for example, round-trip time, time to send an ICMP request packet, and receive an ICMP response packet.

Here is an output of the Windows 7 ping command:




In the example above, we ping the IP address 10.10.100.1. By default, ping on Windows sends four ICMP request packets. As you can see from the previous output, the host with the IP address 10.10.100.1 is accessible and has responded with four ICMP response packets. It is also possible to see that the remote host responded in 1 ms (time <1 ms), indicating that the network is not congested.


Sunday, April 28, 2019

BGP Authentication

The router authenticates the source of each routing update packet it receives. Supports many authentication routing protocols such as OSPF, EIGRP, ISIS, BGP, and RIPv2.



The Gateway Gateway Protocol (BGP) supports the authentication mechanism through the use of Message Summary (MD5) algorithms. When I enable authentication, any TCP portion that belongs to the BGP peer exchange is checked and accepted only if the authentication succeeds. If authentication fails, the BGP neighbor relationship (can not be established) is disabled.


Let's see the composition: -

Topology:




Target:
Configure topology according to drawing
Configure basic iBGP
Configure MD5 authentication by using passwords between networks


R1 # Display a brief IP interface
IP interface - OK address? Method method method
FastEthernet0 / 0 10.1.1.1 Guide Yes above
FastEthernet1 / 0 Not Assigned Yes Administratively Disabled Down
GigabitEthernet2 / 0 YES has been disabled administratively down
Serial3 / 0 1.1.1.1 Guide Yes above

R2 # Displays a brief IP interface
IP interface - OK address? Method method method
FastEthernet0 / 0 20.1.1.1 Guide Yes above
FastEthernet1 / 0 Not Assigned Yes Administratively Disabled Down
GigabitEthernet2 / 0 YES has been disabled administratively down
Serial3 / 0 1.1.1.2 Manual Yes above



R1 (config) #router bgp 65011
R1 (config-router) # Neighbor 1.1.1.2 Remote like 65011
R1 (config-router) # Network 10.0.0.0
R1 (config-router) # Network 1.0.0.0
R1 (config-router) # nincronization
R1 (config-router) # exit



R2 (config) #luter bgp 65011
R2 (config-router) # is running 1.1.1.1 as remote as 65011

* March 22, 13: 44: 19.255:% BGP-5-SETTING: Neighbor 1.1.1.1

R2 (config-router) # Network 1.0.0.0
R2 (config-router) # Network 10.0.0.0
R2 (config-router) # nincronization
R2 (config-router) # exit


R1 # show ip bgp
The BGP table version is 3, the local router ID is 10.1.1.1
Status codes: suppressed, padded, h record, * valid,> better, i - internal,
RIB malfunction, S Stale, m m, backup paths b, f RT-Filter,
The best external roads, additional path, compressed by RIB,
Symbols of origin: i - IGP, e - EGP,? - incomplete
Validation codes RPKI: valid V, invalid, N does not exist

The following route weighs the following jump from LocPrf
* i 1.0.0.0 1.1.1.2 0 100 0 i
*> 0.0.0.0 0 32768 i
*> 10.0.0.0 0.0.0.0 0 32768 i

R1 # View IP Summary bgp
Routing ID BGP 10.1.1.1, local AS number 65011
The version of the BGP table is 3, the main routing table version 3
2 network input with 288 bytes of memory
3 way entries using 240 bytes of memory
2/1 BGP / bestpath path entries with 272 bytes of memory
0 BGP Routes the cache schema using 0 bytes of memory
BGP filters the list of cache entries by using 0 bytes of memory
BGP using 800 bytes total memory
BGP activity 2/0 primers, 3/0 modes, and clears the interval 60 seconds

The Fifth Neighbor AS MsgRcvd MsgSent Tbl Ver InQ OutQ Top / Bottom State / PfxRcd
1.1.1.2 4 65011 10 10 3 - - 00:04:49 1



R2 # show ip bgp
The BGP table version is 4, the local router ID is 20.1.1.1
Status codes: suppressed, padded, h record, * valid,> better, i - internal,
RIB malfunction, S Stale, m m, backup paths b, f RT-Filter,
The best external roads, additional path, compressed by RIB,
Symbols of origin: i - IGP, e - EGP,? - incomplete
Validation codes RPKI: valid V, invalid, N does not exist

The following route weighs the following jump from LocPrf
*> 1.0.0.0 0.0.0.0 0 32768 i
* i 1.1.1.1 0 100 0 i
*> i 10.0.0.0 1.1.1.1 0 100 0 i

R2 # sample IP summary bgp
Routing ID BGP 20.1.1.1, local AS number 65011
The version of the BGP table is 4, the main routing table version 4
2 network input with 288 bytes of memory
3 way entries using 240 bytes of memory
2/2 Path / bestpath BGP entries with 272 bytes of memory
0 BGP Routes the cache schema using 0 bytes of memory
BGP filters the list of cache entries by using 0 bytes of memory
BGP using 800 bytes total memory
BGP activity 2/0 primers, 3/0 modes, and clears the interval 60 seconds

The Fifth Neighbor AS MsgRcvd MsgSent Tbl Ver InQ OutQ Top / Bottom State / PfxRcd
1.1.1.1 4 65011 11 10 4 0 0 00:05:18 2



R1 (config) #router bgp 65011
R1 (config-router) #neighbor 1.1.1.2 Password between networks
R1 (config-router) # Neighbor 1.1.1.2 version 4
R1 (config-router) # End



R1 #

* 22 March 13: 54: 42.691:% TCP-6-BADAUTH: No MD5 summary from 1.1.1.2 (179) to 1.1.1.1 (47927) tableid - 0

* 22 March, 13: 54: 42695:% TCP-6-BADAUTH: No MD5 summary from 1.1.1.2 (179) to 1.1.1.1 (47927) tableid - 0

* 22 March, 13: 54: 3851:% TCP-6-BADAUTH: No MD5 summary from 1.1.1.2 (32235) to 1.1.1.1 (179) tableid - 0


R2 # show ip bgp
The version of the BGP table is 2, the local router ID is 20.1.1.1
Status codes: suppressed, padded, h record, * valid,> better, i - internal,
RIB malfunction, S Stale, m m, backup paths b, f RT-Filter,
The best external roads, additional path, compressed by RIB,
Symbols of origin: i - IGP, e - EGP,? - incomplete
Validation codes RPKI: valid V, invalid, N does not exist

The following route weighs the following jump from LocPrf
*> 1.0.0.0 0.0.0.0 0 32768 i

R2 # sample IP summary bgp
Routing ID BGP 20.1.1.1, local AS number 65011
The version of the BGP table is 2, the main routing table version 2
1 network entries using 144 bytes of memory
1 way entries using 80 bytes of memory
1/1 Path / BGP entries for the bestpath attribute using 136 bytes of memory
0 BGP Routes the cache schema using 0 bytes of memory
BGP filters the list of cache entries by using 0 bytes of memory
BGP using 360 bytes of memory
The activity prefixes BGP 3/2 and 4/3 methods and the exploration interval are 60 seconds

The Fifth Neighbor AS MsgRcvd MsgSent Tbl Ver InQ OutQ Top / Bottom State / PfxRcd
1.1.1.1 4 65011 0 - 1 - 0 00:02:46 Active



R2 (config) #luter bgp 65011
R2 (config-router) #neighbor 1.1.1.1 Password between networks
R2 (config-router) # Neighbor 1.1.1.1 version 4

* March 22 13: 57: 36.931:% BGP-5-SETTING: Neighbor 1.1.1.1 Top

R2 (config-router) # end


R2 # show ip bgp
The BGP table version is 3, the local router ID is 20.1.1.1
Status codes: suppressed, padded, h record, * valid,> better, i - internal,
RIB malfunction, S Stale, m m, backup paths b, f RT-Filter,
The best external roads, additional path, compressed by RIB,
Symbols of origin: i - IGP, e - EGP,? - incomplete
Validation codes RPKI: valid V, invalid, N does not exist

The following route weighs the following jump from Lockup
* i 1.0.0.0 1.1.1.1 0 100 0 i
*> 0.0.0.0 0 32768 i
*> i 10.0.0.0 1.1.1.1 0 100 0 i

R2 # sample IP summary bgp

Routing ID BGP 20.1.1.1, local AS number 65011
The version of the BGP table is 3, the main routing table version 3
2 network input with 288 bytes of memory
3 way entries using 240 bytes of memory
2/2 Path / bestpath BGP entries with 272 bytes of memory
0 BGP Routes the cache schema using 0 bytes of memory
BGP filters the list of cache entries by using 0 bytes of memory
BGP using 800 bytes total memory
The activity prefixes BGP 4/2 and 6/3 methods and the exploration interval are 60 seconds

The Fifth Neighbor AS MsgRcvd MsgSent Tbl Ver InQ OutQ Top / Bottom State / PfxRcd
1.1.1.1 4 65011 5 5 3 - - 00:00:44 2

BGP Attributes

Features of BGP
BGP supports a wide range of path attributes, BGP chooses a path to a network based on its path attributes.



There are four categories of features are the following:
Known mandatory
Estimated known
Transitive optional
Optional non-transitive

The mandatory attribute known by all BGP routers, present in all BGP updates, must be recognized and transferred to other BGP routers. As the track and origin the next jump.

All BGP routers must recognize the known discretion and pass them on to other BGP routers, but they do not need to be present in an update. Local preference

An BGP router may recognize or not recognize an optional transitive, but it is passed to other BGP routers.
If it is not recognized, it is marked as partial. Assembly, community.

Optional Non-Transitive If BGP does not recognize the attribute, you can ignore the update and not announce the path to its counterpart. Highlight Multiple Output (MED), Author ID

AS_Path attribute: This path attribute lists the independent system numbers in the path from end to end. BGP uses AS_Path as its main loop prevention tool.



The AS_Path attribute is a known mandatory attribute. List your AS and from which the updates come. A shorter list of AS_PATH is more desirable.

Next_hop is a known mandatory attribute. The following jump means that the IP address reaches the next independent system because BGP is AS by the AS routing protocol.

Attribute of origin

The origin of all ASS in the intranet is how the network was presented in the BGP.

(I) represents PGI
E Represents EBGP
(?) Represent incomplete

Feature weight is a feature of Cisco. That is, how to get out of AS, track with higher weight is more desirable. Weight is a partial feature, where weight 0 learns by default the 32,769 track for locally injected methods. Your local router is not advertised for any BGP counterpart.

Local preference feature

Local preferences determine how data traffic should leave an independent system. The route with the highest preference value is the most popular by default is 100, the range of preference from 0 to 232 is well known, an estimate attribute is only announced to adjacent iBGP within a standalone system.


The version of the BGP table is 5, the local router ID is 13.0.3.1
Status codes: suppressed, padded, h record, * valid,> better, i - internal,
RIB malfunction, S Stale, m m, backup paths b, f RT-Filter,
The best external roads, additional path, compressed by RIB,
Symbols of origin: i - IGP, e - EGP,? - incomplete
Validation codes RPKI: valid V, invalid, N does not exist

Weight way for the next jump network

r> i 10.0.0.0 11.0.0.1 0 100 0 i
r> i 20.0.0.0 12.0.0.1 0 100 0 i
*> 30.0.0.0 0.0.0.0 0 32768 i
r> i 40.0.0.0 14.0.0.1 0 100 0 i

Monday, April 22, 2019

BGP AS Path Prepending

AS Path is the fourth BGP attribute, AS Path is known, the attribute is mandatory. BGP prefers the shortest route to reach the destination. In other words, the route that contains the shortest route to the tracks is more than satisfactory.

You can handle this using a pre-route AS. Manually manipulating the length of the AS track is called the previous AS route. The AS route should be extended with several copies of the sender's AS number.

The AS is used to prepend the route to:


1.Ensure a correct selection of the return route.
. Distribution of cargo traffic for multi-homed clients.


The prepayment results for the AS route can be observed on the receiving router.

Let's see the composition: -

Topology:




Objective:

Configure the topology according to the scheme and assign the IP address by structure.
The composition of IBGP and EBGP.
Configure AS 650014 to make sure that all routes in AS 650014 must leave router_1 to AS 650003 (30.0.0.0).
Configure AS 650014 to ensure that traffic is from 30.0.0.0 to 10.0.0.0. The return traffic must use the same route as the routing traffic routers_1_2_3.



R1 # Displays a brief IP interface

IP interface - correct address? Protocol State Method
FastEthernet0 / 0 10.1.1.1 Yes, even manual
Serial3 / 0 1.1.1.1 Yes Arrive manually
Serial3 / 3 4.1.1.2 Yes Manual lifting
Loopback0 11.0.0.1 Yes Manual Reach


R2 # Displays a brief IP interface

IP interface - correct address? Protocol State Method
FastEthernet0 / 0 20.1.1.1 Yes, manual lifting
Serial3 / 0 1.1.1.2 Yes Arrive manually
Serial3 / 1 2.1.1.1 Yes Manual lifting
Loopback0 12.0.0.1 Yes Manual Reach


R3 # Displays a brief IP interface

IP interface - correct address? Protocol State Method
FastEthernet0 / 0 30.1.1.1 Yes, manual lifting
Serial3 / 1 2.1.1.2 Yes Manual lifting
Serial3 / 2 3.1.1.1 Yes Manual lifting
Loopback0 13.0.0.1 Yes Reach manual

R4 # Displays a brief IP interface

IP interface - correct address? Protocol State Method
FastEthernet0 / 0 40.1.1.1 Yes, manual lifting
Serial3 / 2 3.1.1.2 Yes Manual lifting
Serial3 / 3 4.1.1.1 Yes Manual lifting
Loopback0 14.0.0.1 Yes Manual Reach




R1 (config) #router bgp 650014
R1 (config-router) #neighbor 4.1.1.1 remote as 650014
R1 (config-router) # Neighbor 1.1.1.2 Remote as 650002
R1 (config-router) # Red 10.0.0.0
R1 (config-router) # Red 1.0.0.0
R1 (config-router) # Red 4.0.0.0
R1 (config-router) # Network mask 11.0.0.0 255.255.255.0
R1 (router configuration)

R2 (config) #rout bgp 650002
R2 (config-router) # Neighbor 1.1.1.1 Remote like 650014

* March 13 12: 23: 30.111:% BGP-5-ADJCHANGE: Neighbor 1.1.1.1 Top

R2 (config-router) # Neighbor 2.1.1.2 Remote as 650003
R2 (config-router) # Red 20.0.0.0
R2 (config-router) # Red 1.0.0.0
R2 (config-router) # Red 2.0.0.0
R2 (config-router) # Network Mask 12.0.0.0 255.255.255.0
R2 (router configuration) #exit

R3 (config) #router bgp 650003
R3 (config-router) # Neighbor 2.1.1.1 Remote as 650002

* March 13 12: 25: 42,495:% BGP-5-ADJCHANGE: Neighbor 2.1.1.1 Top

R3 (config-router) # Neighbor 3.1.1.2 Remote as 650014
R3 (config-router) # Red 30.0.0.0
R3 (config-router) # Network 3.0.0.0
R3 (config-router) # Red 2.0.0.0
R3 (config-router) # Network mask 13.0.0.0 255.255.255.0
R3 (router configuration) #exit

R4 (config) #luter bgp 650014
R4 (config-router) # Neighbor 3.1.1.1 Remote as 650003

* 13 Mar 12: 27: 46.807:% BGP-5-ADJCHANGE: Neighbor 3.1.1.1 Top

R4 (config-router) #neighbor 4.1.1.2 remote like 650014

* March 13 12: 28: 10.663:% BGP-5-SETTING: Neighbor 4.1.1.2

R4 (config-router) # Red 40.0.0.0
R4 (config-router) # Red 4.0.0.0
R4 (config-router) # Network 3.0.0.0
R4 (config-router) # Netmask 14.0.0.0 255.255.255.0
R4 (router configuration) #exit

R1 # See IP bgp
Router ID BGP 11.0.0.1, local AS number 650014
Fifth neighbor AS MsgRcvd MsgSent TblVer InQ OutQ State higher / lower State / PfxRcd
1.1.1.2 4 650002 14 16 21 - 0 00:08:00 7
4.1.1.1 4 650014 14 13 21 - 0 00:03:19 7

See the IPgpp summary
The BGP router ID 12.0.0.1, local AS number 650002
Fifth neighbor AS MsgRcvd MsgSent TblVer InQ OutQ State higher / lower State / PfxRcd
1.1.1.1 4 650014 17 15 14 - 0 00:09:06 9
2.1.1.2 4 650003 12 15 14 - 0 00:06:54 9

R3 # See the IP summary bgp
The BGP router ID 13.0

R1 # show ip bgp 30.1.1.1
Entry of the BGP routing table for 30.0.0.0/8, version 20
Tracks: (2 available, best # 1, default table)
Update of announced groups:
one
Update age 1
650003
3.1.1.1 of 4.1.1.1 (14.0.0.1)
Origin of IGP, metric 0, local prefix 100, fit, internal, best
rx pathid: 0, tx pathid: 0x0
Update age 1
650002
1.1.1.2 of 1.1.1.2 (12.0.0.1)
Origin of IGP, localpref 100, valid, external.
rx pathid: 0, tx pathid: 0

(By default, AS_650014, exit VIA R4 to access the prefix AS 650003 (30.0.0.0) by using shorter AS-PATH)


R1 (config) # access-list 10 Statement 30.0.0.0 0.255.255.255

R1 (config) # cisco-route route 10
R1 (config-route-map) #match ip address 10
R1 (config-route-map) #set Local preference 300
R1 (Configuration route map)

Roadmap Permit
R1 (Configuration route map)


R1 # show ip bgp 30.1.1.1
Entry of the BGP routing table for 30.0.0.0/8, version 22
Tracks: (1 available, best # 1, default table)
Update of announced groups:
two
Update 2 years
650002
1.1.1.2 of 1.1.1.2 (12.0.0.1)
Origin of IGP, localpref 300, valid, external, better.
rx pathid: 0, tx pathid: 0x0

(Now set the traffic back)

R3 # show ip bgp
The version of the BGP table is 18, and the ID of the local router is 13.0.0.1
Status codes: s deleted, d damped, h record, * fit,> better, i - internal,
Malfunction of the RIB, S Stale, m m, backup routes b, f RT-Filter,
Better external x, additional track, compressed from RIB,
Origin codes: i - IGP, e - EGP,? - incomplete
RPKI verification codes: V is valid, I is not valid, N does not exist

Weight of the Metric Next Hop route LocPrf of the network
* 1.0.0.0 3.1.1.2 0 650014 i
*> 2.1.1.1 0 - 650002 i
*> 2.0.0.0 0.0.0.0 0 32768 i
* 2.1.1.1 0 - 650002 i
* 3.0.0.0 3.1.1.2 0 0 650014 i
*> 0.0.0.0 0 32768 i
*> 4.0.0.0 3.1.1.2 0 0 650014 i
* 2.1.1.1 0 650002 650014 i
*> 10.0.0.0 3.1.1.2 0 650014 i
* 2.1.1.1 0 650002 650014 i
*> 11.0.0.0/24 3.1.1.2 0 650014 i
* 2.1.1.1 0 650002 650014 i
* 12.0.0.0/24 3.1.1.2 0 650014 650002 i
*> 2.1.1.1 0 - 650002 i
Weight of the Metric Next Hop route LocPrf of the network
*> 13.0.0.0/24 0.0.0.0 0 32768 i
* 14.0.0.0/24 2.1.1.1 0 650002 650014 i
*> 3.1.1.2 0 0 650014 i
* 20.0.0.0 3.1.1.2 0 650014 650002 i
*> 2.1.1.1 0 - 650002 i
*> 30.0.0.0 0.0.0.0 0 32768 i
*> 40.0.0.0 3.1.1.2 0 0 650014 i
* 2.1.1.1 0 650002 650014 i

R3 # show ip bgp 10.1.1.1
Entry of the BGP routing table for 10.0.0.0/8, version 13
Tracks: (2 available, best # 1, default table)
Update of announced groups:
one
Update age 1
650014
3.1.1.2 From 3.1.1.2 (14.0.0.1)
Origin of IGP, localpref 100, valid, external, better.
rx pathid: 0, tx pathid: 0x0
Update 2 years
650002
2.1.1.1 of 2.1.1.1 (12.0.0.1)
Origin of IGP, localpref 100, valid, external.
rx pathid: 0, tx pathid: 0

R4 (config) # access-list 10 Statement 10.0.0.0 0.255.255.255

R4 (config) # cisco-map route 10
R4 (config-route-map) #match ip address 10
R4 (config-route-map) #set as-path prepend 650014 650014 650014 650014
R4 (Configuration route map)

Route Map - Permission
R4 (Configuration route map)

R4 (config) #luter bgp 650014
R4 (router configuration) #nei
R4 (config-router) # Neighbor 3.1.1.1 rou
R4 (config-router) # Neighbor 3.1.1.1 Road-m
R4 (config-router) # Neighbor 3.1.1.1 - Cisco Outbound Scheme
R4 (router configuration) #END

R3 # show ip bgp
The BGP table version is 19, the ID of the local router is 13.0.0.1
Status codes: s deleted, d damped, h record, * fit,> better, i - internal,
Malfunction of the RIB, S Stale, m m, backup routes b, f RT-Filter,
Better external x, additional track, compressed from RIB,
Origin codes: i - IGP, e - EGP,? - incomplete
RPKI verification codes: V is valid, I is not valid, N does not exist

Weight of the Metric Next Hop route LocPrf of the network
* 1.0.0.0 3.1.1.2 0 650014 i
*> 2.1.1.1 0 - 650002 i
*> 2.0.0.0 0.0.0.0 0 32768 i
* 2.1.1.1 0 - 650002 i
* 3.0.0.0 3.1.1.2 0 0 650014 i
*> 0.0.0.0 0 32768 i
*> 4.0.0.0 3.1.1.2 0 0 650014 i
* 2.1.1.1 0 650002 650014 i
* 10.0.0.0 3.1.1.2 0 650014 650014 650014 650014 650014 i
*> 2.1.1.1 0 650002 650014 i
*> 11.0.0.0/24 3.1.1.2 0 650014 i
* 2.1.1.1 0 650002 650014 i
* 12.0.0.0/24 3.1.1.2 0 650014 650002 i
Weight of the Metric Next Hop route LocPrf of the network
*> 2.1.1.1 0 - 650002 i
*> 13.0.0.0/24 0.0.0.0 0 32768 i
* 14.0.0.0/24 2.1.1.1 0 650002 650014 i
*> 3.1.1.2 0 0 650014 i
* 20.0.0.0 3.1.1.2 0 650014 650002 i
*> 2.1.1.1 0 - 650002 i
*> 30.0.0.0 0.0.0.0 0 32768 i
*> 40.0.0.0 3.1.1.2 0 0 650014 i
* 2.1.1.1 0 650002 650014 i

R3 # show ip bgp 10.1.1.1
Entry of the BGP routing table for 10.0.0.0/8, version 19
Tracks: (2 available, best # 2, default table)
Update of announced groups:
one
Update age 3
650014 650014 650014 650014 650014
3.1.1.2 From 3.1.1.2 (14.0.0.1)
Origin of IGP, localpref 100, valid, external.
rx pathid: 0, tx pathid: 0
Update age 3
650002
2.1.1.1 of 2.1.1.1 (12.0.0.1)
Origin of IGP, localpref 100, valid, external, better.
rx pathid: 0, tx pathid: 0x0


R1 # traceroute 30.1.1.1
Write the escape sequence for the abortion.
Route route up to 30.1.1.1.
VRF information: (vrf in name / id, vrf out of name / id)
1.1.1.2 52 ms
2 2.1.1.2 [AS 650002] 120 milliseconds 140 ms 176 ms

R3 # traceroute 10.1.1.1
Write the escape sequence for the abortion.
Follow the road to 10.1.1.1
VRF information: (vrf in name / id, vrf out of name / id)
1 2.1.1.1 36 msec
1.1.1.1 [AS 650002] 112 ms. 92 ms 76 ms.