One last day before the CCNA.
After a bit of testing, I'm pretty good on the LAN side. It's WAN and routing protocols that I need to spend the most time on. I can get the necessary points out of studying OSPF, EIGRP, PPP, and Frame Relay.
Still working on Mnemosyne on my studying. I covered the LAN side way too deeply. Basically means I can answer LAN side questions without a second thought. But WAN and routing protocol side is weak.
On the practice tests, I've been getting about 65%. So that means I only need to improve 20% or so. Easy.
Back tomorrow afternoon with results.
A blog about the things that interest me. Includes random thoughts, Cisco, programming, and business related stuff from convenience store world.
Showing posts with label CCNA. Show all posts
Showing posts with label CCNA. Show all posts
Monday, July 4, 2016
Learning the Right Lesson
I finally set a date to take the CCNA. Actually, it's the part of the CCENT. So I'm doing the two part CCNA thing. Anyways, now that I have a date I have a limited time left to learn everything that I could possibly need to pass this thing.
And I'm doing everything different again.
See, success is a bad teacher. I think I heard that from Bill Gates.
So far, I've had success. But there were certain places that I had limitations. Mental gaps in the knowledge. I should be strong in all the information, not just sections. But there are sections and specific information that I needed that just wasn't making it into my head in the correct manner.
It's funny. At one point I was turning my CCENT notes into a book to sell. That project was abandoned for various reasons. But the main one being that what did good for the CCENT may not be good for the CCNA. How can I know?
So I've been using Mnemosyne. It's a flash card program that allows you to create your own flash cards. So you end up getting a lot of flash cards that you study. It seems I heard about flash cards for years, but always avoided them.
I didn't avoid them because they were complicated.
I avoided them because they were work. I didn't need to work to learn everything. Until I did. And the methods I was doing weren't working. And they didn't work for years. YEARS.
So now, it's time to quit avoiding work. Because that's what all this searching has been about. Avoiding work. And flash cards are work.
You are what you repeatedly do.
I think Aristotle said that.
Success is a bad teacher.
So if you want success, you must repeatedly do something. And it's probably going to be work. And it is going to suck.
And you can either do it now, or spend the rest of your life avoiding the work.
And you will keep ending up in the same scenario: wondering why you only get so far.
You are what you repeatedly do. Excellence then, is not an act but a habit.
Success is a bad teacher.
Strangeness indeed.
And I'm doing everything different again.
See, success is a bad teacher. I think I heard that from Bill Gates.
So far, I've had success. But there were certain places that I had limitations. Mental gaps in the knowledge. I should be strong in all the information, not just sections. But there are sections and specific information that I needed that just wasn't making it into my head in the correct manner.
It's funny. At one point I was turning my CCENT notes into a book to sell. That project was abandoned for various reasons. But the main one being that what did good for the CCENT may not be good for the CCNA. How can I know?
So I've been using Mnemosyne. It's a flash card program that allows you to create your own flash cards. So you end up getting a lot of flash cards that you study. It seems I heard about flash cards for years, but always avoided them.
I didn't avoid them because they were complicated.
I avoided them because they were work. I didn't need to work to learn everything. Until I did. And the methods I was doing weren't working. And they didn't work for years. YEARS.
So now, it's time to quit avoiding work. Because that's what all this searching has been about. Avoiding work. And flash cards are work.
You are what you repeatedly do.
I think Aristotle said that.
Success is a bad teacher.
So if you want success, you must repeatedly do something. And it's probably going to be work. And it is going to suck.
And you can either do it now, or spend the rest of your life avoiding the work.
And you will keep ending up in the same scenario: wondering why you only get so far.
You are what you repeatedly do. Excellence then, is not an act but a habit.
Success is a bad teacher.
Strangeness indeed.
Thursday, May 12, 2016
CCNA class
The final class of CCNA prep is done today. I've got to take the final, and then the formalized class is over. It has been kicking me up one side of the street and down the other.
It's not that material is hard. It's just that there's a lot of material covered in an incredibly short time period. What is normally a 16 week class has been reduced to 8. And that's pretty crazy. That's nothing for many classes. But a bunch just turns college into some horrendous grind.
I guess colleges needed to find a new way to make money. And grinding students through faster always seems like a good idea. How much do I want to bet they are charging the same amount for the 8 week class as they were the 16 week class? Nothing.
Anyways. Once the class is finished, I need to start studying to take the CCNA. I'm aiming for about one month out for that. My goal is to have it done before July 1st. Maybe June 12th, as the place I take the test schedules on Thursdays.
Seems like that is the next thing I need to do. Schedule the CCNA, so I have a definite date in which I'm going to take the thing. Definiteness adds a sense of urgency.
It's not that material is hard. It's just that there's a lot of material covered in an incredibly short time period. What is normally a 16 week class has been reduced to 8. And that's pretty crazy. That's nothing for many classes. But a bunch just turns college into some horrendous grind.
I guess colleges needed to find a new way to make money. And grinding students through faster always seems like a good idea. How much do I want to bet they are charging the same amount for the 8 week class as they were the 16 week class? Nothing.
Anyways. Once the class is finished, I need to start studying to take the CCNA. I'm aiming for about one month out for that. My goal is to have it done before July 1st. Maybe June 12th, as the place I take the test schedules on Thursdays.
Seems like that is the next thing I need to do. Schedule the CCNA, so I have a definite date in which I'm going to take the thing. Definiteness adds a sense of urgency.
Friday, March 25, 2016
cisco 4 class
Back to class for Cisco 4, and I wonder where the passion is. There are a lot of people in the class spouting the typical stuff. Worried about how much homework they have and how to get out of it. A lot of spurious griping and complaining from people.
I wonder why they are there. What's the purpose of giving up your Thursday night for a class you don't care about?
I guess it's part of the degree plan. But where's the drive to be the best? Where's the drive to do something great in the world? To make a name for yourself in your position?
It doesn't exist in the classroom I'm in.
I guess they haven't learned yet.
You do not rise to the occasion. You fall to the level of your training.
And if your training sucks, so will your response in stress.
I wonder why they are there. What's the purpose of giving up your Thursday night for a class you don't care about?
I guess it's part of the degree plan. But where's the drive to be the best? Where's the drive to do something great in the world? To make a name for yourself in your position?
It doesn't exist in the classroom I'm in.
I guess they haven't learned yet.
You do not rise to the occasion. You fall to the level of your training.
And if your training sucks, so will your response in stress.
Wednesday, December 2, 2015
Useful Cisco Commands
Here's a collection of Cisco commands I still haven't been taught by Cisco. But I learned through various other methods.
terminal monitor
and
term no mon
Terminal monitor is the answer to all remote diagnostic issues. So when you ssh or telnet into a client, you then get the output you would if you were on site. The only problem is that output occasionally drives you mad as you try to figure out the solution to a problem. How in the world do you turn it off? That's where term no mon comes into play. It turns off console connections for after they have been turned on with terminal monitor. Terminal monitor is taught in class. Term no mon is not.
term len 0
Another terminal command. The terminal length command tells how many lines of output to display when you hit a key. But term len 0 has a special use. Let's say you want to do a quick examination of the entire running config of a site. How do I do that?
Using Putty, turn on logging. I'd actually recommend setting logging to default so it logs every piece of output forever. Might be useful when you have other issues. Next, remote access the system via telnet or ssh. Next. term len 0. You now just set the terminal length to 0, so it will display the entire output without having to press a single key. Guess what? No more parsing crud out of text files. You now have a complete running config stored in the Putty log file that only needs minor parsing. No more removing typing, input characters, or what not. Just open the file and remove the login/logout sections.
Next, exit. Do not save. No not write. That way, the next time you log in everything will be just as you found it before. No weirdness or strangeness. Otherwise you might have to use term len 10 or something to that effect to put it all back together again.
monitor session 1 source interface interface_name/number
monitor session 1 destination interface interface_name/number
The only pair of commands in my list. I've only used these commands on switches. They might work on routers as well. Not sure. But here's the great thing about these commands: along with Wireshark, you can kick back and examine all the traffic going through a device in order to try and troubleshoot communication issues. It's kind of like a programmable hub, but better. And, you can monitor as few or as many ports as you want. I'm sure there's limitations to the commands, but like I said, these are things I've learned that classes have never taught me.
So, there you go. A short collection of Cisco commands that seem to make life easier. Or get rid of terminal monitor after you start it up. Hope it helps.
terminal monitor
and
term no mon
Terminal monitor is the answer to all remote diagnostic issues. So when you ssh or telnet into a client, you then get the output you would if you were on site. The only problem is that output occasionally drives you mad as you try to figure out the solution to a problem. How in the world do you turn it off? That's where term no mon comes into play. It turns off console connections for after they have been turned on with terminal monitor. Terminal monitor is taught in class. Term no mon is not.
term len 0
Another terminal command. The terminal length command tells how many lines of output to display when you hit a key. But term len 0 has a special use. Let's say you want to do a quick examination of the entire running config of a site. How do I do that?
Using Putty, turn on logging. I'd actually recommend setting logging to default so it logs every piece of output forever. Might be useful when you have other issues. Next, remote access the system via telnet or ssh. Next. term len 0. You now just set the terminal length to 0, so it will display the entire output without having to press a single key. Guess what? No more parsing crud out of text files. You now have a complete running config stored in the Putty log file that only needs minor parsing. No more removing typing, input characters, or what not. Just open the file and remove the login/logout sections.
Next, exit. Do not save. No not write. That way, the next time you log in everything will be just as you found it before. No weirdness or strangeness. Otherwise you might have to use term len 10 or something to that effect to put it all back together again.
monitor session 1 source interface interface_name/number
monitor session 1 destination interface interface_name/number
The only pair of commands in my list. I've only used these commands on switches. They might work on routers as well. Not sure. But here's the great thing about these commands: along with Wireshark, you can kick back and examine all the traffic going through a device in order to try and troubleshoot communication issues. It's kind of like a programmable hub, but better. And, you can monitor as few or as many ports as you want. I'm sure there's limitations to the commands, but like I said, these are things I've learned that classes have never taught me.
So, there you go. A short collection of Cisco commands that seem to make life easier. Or get rid of terminal monitor after you start it up. Hope it helps.
Thursday, November 26, 2015
Last Projects for Cisco 3
So I just finished my last two packet tracers for my Cisco 3 class. Presented, for all your wonderful glory, is a picture of my EIGRP capstone project.
Which I have to admit is about as complicated as some things I've designed for work, and are actually in operation. The fun thing about this one is I ended up setting up DHCP on every single one of those networks in there, so the end user connections are all DHCP assigned. The EIGRP portion wasn't that difficult. Mostly, it was just labor.
The interesting thing was in creating the ISP connection. Really, it's just a router with an assigned public IP. From there, I added a default route back towards the network I designed. It might have been more interesting to design the thing as a multiaccess network, but who cares. The system wanted a multiple location EIGRP network. So I used serial connections. And funny thing is, I've never had to set up a serial connection in real life. All Ethernet based. One was PPPOE, and that was a bit annoying to set up.
So now, all I have to do is study for the final and start working on the next book. In the process of taking over four stores. Isn't work fun?
Tuesday, September 15, 2015
Kitchen Table
It's formica, and it's my kitchen table. At least it doesn't look like it came from 1999. Maybe 1975.
Maybe I should spend more than 5 minutes on the background.
Or, I could go back to studying Scaling Networks.
Back to studying.
Maybe I should spend more than 5 minutes on the background.
Or, I could go back to studying Scaling Networks.
Back to studying.
Sunday, July 5, 2015
post CCENT
I passed the CCENT. Grading criteria was between 300 and 1000, and passing was 803. I scored a 907. Hooray for me.
The test was copyrighted 2013. There was a lot of subnetting through out. Not much IPv6. There was four question problem on OSPF. Another was on security settings. Which reminds me. I need to test one of the configurations they performed. Because I think I know the answer, but I don't know if I was correct or not.
I guess now on to something else. Back to studying the stuff I've been studying. I'm currently reading Simple Nature by Benjamin Cromwell. After that, it's on to Mechanics and then my study of physics takes a temporary break.
Other stuff I'm currently reading include The Book of Five Rings by Miyamoto Musashi. After that one is finished, it's off to The Hacker Playbook by Peter Kim.
There's an entire list of books after that, but that collection will keep me good for several days.
Remember: people don't grow without intentional effort.
The test was copyrighted 2013. There was a lot of subnetting through out. Not much IPv6. There was four question problem on OSPF. Another was on security settings. Which reminds me. I need to test one of the configurations they performed. Because I think I know the answer, but I don't know if I was correct or not.
I guess now on to something else. Back to studying the stuff I've been studying. I'm currently reading Simple Nature by Benjamin Cromwell. After that, it's on to Mechanics and then my study of physics takes a temporary break.
Other stuff I'm currently reading include The Book of Five Rings by Miyamoto Musashi. After that one is finished, it's off to The Hacker Playbook by Peter Kim.
There's an entire list of books after that, but that collection will keep me good for several days.
Remember: people don't grow without intentional effort.
Monday, May 11, 2015
construction
Working on a site out of town. Learning many new things. The crash course in PPPOE was interesting.
Routing and Switching class final is tomorrow. Need to schedule the CCENT for about 2 weeks from then. That should give me enough time, without being too much time.
I think I've come to the conclusion that IPv6 will permanently be a WAN interface technology, while the world uses dual stack routers to NAT into IPv4 private addresses.
One bad tracert and a nefarious person could find your entire inner networking scheme. But that doesn't work if NAT is involved. The door shuts at the front door, and not somewhere inside. That's really the problem with globally routable IP addresses inside your network. If you don't have tracert blocked, you'll end up giving away your entire network structure.
It's not the "one shot, one kill" approach to network security. There isn't such a thing. There is only security in depth. Walls and trenches and gates and guards and ACLs and NAT and every other thing you can possibly through between you and the outside world. Maybe some machine gun nests and razor wire, as well.
Routing and Switching class final is tomorrow. Need to schedule the CCENT for about 2 weeks from then. That should give me enough time, without being too much time.
I think I've come to the conclusion that IPv6 will permanently be a WAN interface technology, while the world uses dual stack routers to NAT into IPv4 private addresses.
One bad tracert and a nefarious person could find your entire inner networking scheme. But that doesn't work if NAT is involved. The door shuts at the front door, and not somewhere inside. That's really the problem with globally routable IP addresses inside your network. If you don't have tracert blocked, you'll end up giving away your entire network structure.
It's not the "one shot, one kill" approach to network security. There isn't such a thing. There is only security in depth. Walls and trenches and gates and guards and ACLs and NAT and every other thing you can possibly through between you and the outside world. Maybe some machine gun nests and razor wire, as well.
Friday, March 27, 2015
Pareto Principle in Action
My last experiment started as a practical examination of the
Pareto principal, otherwise known as the 80/20 rule. I had been making straight B’s on my Routing
and Switching tests, and I wanted to consistently improve them to A’s. In order to do that, I needed to know how much
time I was spending getting that B.
So I changed my study habits slightly, and decided to keep
track of time spent studying. I’d also
read something about two competing South Pole expeditions. One ran as much as they could every day. Some days they didn’t go anywhere because the
weather was bad. The other went 15 miles
a day, regardless. They went 15 miles,
and stopped for the day. So I decided to
try that principal with studying. And
the results were pretty remarkable.
I went from an average low B to a high A on the next
test. Hooray for me. Anyway, this was the process.
Read any previous notes I had made.
Grab a highlighter, and read 15 pages, highlighting what I
thought was important.
Copy those highlighted notes into my printed notes.
Quit for the day.
Return tomorrow.
In doing this process, I found it only took about an hour a
day, so I really had more time to work on other things. Normally, I would have spent 3-4 hours
straight on Saturday or Sunday reading and highlighting. Granted, chapter 7 took me 387 minutes to
complete, but that only averaged 64 minutes per day. I have yet to take the test on that chapter,
so I’m not yet sure how effective this process has been for that chapter. But I do know the previous chapter resulted
in huge positive results.
I think I missed a lot of the main part of this that makes
it so effective. The main effective part
is that you study a little bit every single day. It’s not a brain destroying group done once
or twice per week. It’s simply an hour
per day, every single day. In that way,
your brain doesn’t have time to stop thinking about what you have studied. On top of that, by the end you’ve read and
reread your notes numerous times. Then,
the information is more likely to stick.
We’ll see what happens with chapter 8. Though I have to admit, single area OSPF just
doesn’t interest me that much.
Thursday, December 11, 2014
Introduction to Networks ch 6
Quiz
How does the network layer use the MTU value?
A) The MTU is passed to the network layer by the data link layer.
What are 2 functions that are provided by the network layer?
1) providing end devices with a unique network identifier
2) directing data packets to destination hosts on other networks
During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
A) flash
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation
A) Flow Label
Within a production network, what is the purpose of configuring a switch with a default gateway address?
A) The default gateway address is used to forward packets originating from the switch to remote networks.
Chapter 6 Notes
routing - communication between networks
Network Layer
Provides services to allow end devices to exchange data across the network
-OSI Layer 3
-4 basic processes
-Addressing (end devices)
end device with configured IP is called a host
-Encapsulation
Receives PDU from transport layer. Adds header. Now called a Packet
-Routing - services to direct packets to a destination host on another network
-each route the packet takes to reach the destination is called a hop
-Deencapsulation - process of removing headers from lower layers
Operates without knowing/caring of the data being carried
Media/Path is irrelevant. Satelite, wireless, cable modem, serial.. doesn't matter
Network Layer protocols
IPv4
IPv6
Characteristics of IP protocols
-low overhead
-connectionless
-best effort (unreliable)
-media independant
Connectionless - no dedicated end to end connection created before sending. Kind of like mail.
-send at any time
-unaware of the state of the recipient
-unaware if the receiver can understand the data
-no error correction
-no guarantee packets will arrive in order
Best Effort Delivery
can't recover from failed/corrupt packets
bad packets are dropped
trouble with transmission handled by upper layers if the layer desires
Media Independent
Data link layer responsible for transmitting over media.
maximum size packet that can be sent is the MTU (maxium transmission unit)
-data link layer passes the MTU value up to the network layer
-network layer uses information to determine packet size
-breaks packets to fit the MTU.
-Fragmentation is necessary to split packet size so it will fit on a device with a smaller MTU
IPv4 Packet
-In use since 1983
Packet has 2 parts
1) IP header
Significant portions of the header
-Version - packet version. Constant at 0100
-Differentiated services (formerly Type of Service) - used for QoS. 1st 6 bits used by QoS. last 2 bits used to prevent dropping
-TTL (Time to Live) 8 bit value to limit the lifetime of the packet. Reduced at each hop. If hits 0, router discards packet and returns ICMP Time Exceeded message to the source IP address
-Protocol - indicates data payload
-Source IP address
-Destination IP address
2) Payload
Remaining fields of the IPv4 header
-Internet Header Length (IHL) - 4 bit value identifying the number of 32 bit words in the header
-total length - defines entire packet size, including header and data
-header checksum - used for error checking IP header. If values do not match, packet is discarded
If the packet is fragmented, other fields are used to keep track of the data
-Identification - unique identifier of a fragment
-flags - identifies how a packet is fragmented
-fragment offset - identifies the order in which to place the packet when it arrives at the destination
IPv6 packet
Limitations of IPv4
-IP address depletion - only 4 billion available IP addresses. Quickly running out due to always-on connections
-Internet Routing Table Expansion - more networks, more routes, more waiting
-Lack of end-to-end connectivity - Troublesome when NAT and PAT are used.
Encapsulating
-simplification of the IPv6 header
IPv4 had 20 octets and 12 basic header fields
IPv6 has 40 octets and 8 basic header fields
advantages over IPv4
-better routing efficiency for performance and forwarding rate
-no requirement for processing checksums
-simplified and more efficient extension header mechanisms
-flow label field for per-flow processing with no need to dencapsulate to identify various traffic flows
IPv6 packet header
-Version- 4 bit binary. Constantly set to 0110
-Traffic Class - equivelant of the differentiaed services field
-flow label - used to inform routers and switches to maintain the same path for packet flow so that packets are not reordered
-payload length
-next header - equivelent of the IPv4 protocol field. indicates data being carried
-hop limit
-source address
-destination address
IPv6 addresses
-128 bit address
-colons separate entries into a series of 16-bit hexadecimal blocks
Routing
How a host routes
Host forwarding decision
hosts can send a packet to ...
-itself
-local host
-remote host
local host vs remote host is based on IP address and subnet mask comparison between sender and receiver
devices beyond the local network segment referred to as remote hosts
Default Gateway
the device that routes traffic from the local network to devices on remote networks
if a host is sending to remote network, it sends to default gateway
default gateway maintains a routing table
-data file in RAM that stores route information from directly connected networks
-also knows remote networks the device has learned
host must maintain a local routing table to ensure proper delivery
hosts routing table typically contains of...
-direct connection
-local network route
-local default route
default route only used to connect outside of the local network
IPv4 routing
If a host wants to send a packet inside the local network
1) consult the IPv4 route table
2) match the destination IP address and identify it as being in the same network
3) send the packet using the local interface
If a host wants to send a packet outside the local network
1) consult the IPv4 route table
2) find there is no exact match for the destination IP address
3) choose the local default route to pick the forwarding location
4) send the packet to the gateway using the local interface
IPv6 routing
View routing table in Windows with netstat -r or route print
If - lists the interface numbers from the interface list
metric - lists the cost of each route to a destination. Lower numbers are preferred routes
network destination - lists the reachable networks
gateway - lits the address used by local host to forward outside the network
::/0 - IPv6 equivalent of the local default route
::1/128 - IPv6 equivalent of the loop back address
200::/32 - global unicast network prefix
fe80::/64 local link network route address; represents all computers in the local network
ff00::/8 multicast address
no broadcast addresses in IPv6
Router Routing Tables
routers store information about
directly connected routes
-known from interfaces physically plugged into the router
remote routes
-routes that come from other routers.
-manually configured or dynamically configured through the device learning from other routers
routing table of a router
-destination network
-metric associated with the destination
-gateway to get to the destination
show ip route
when a packet arrives at the router, the router examines the routing table. if the destination network matches a route in the routing table, the router forwards the packet to that route
if multiple paths to the same location, then lowest metric wins
directly connected routing table entries
routers have 2 rotus after IP address is assigned
route source: - how the route was learned
C: directly connected
L - local route
Destination network and how reached
identifies the address of the network and how a packet can reach the destination
outgoing interface
what interface is used to connect to that network
routers generally have multiple interfaces configured
common codes for remote networks
-S: route was manually created by an admin. Static route
-D: learned dynamically using EIGRP
-O: learned dynamically using OSPF
remote network routing table entries
route source- how the route was learned
destination network - the address of the remote network
administrative distance - trustworthiness of the route source
metric - value assigned to reach the remote network. Lower wins
next hop - ip address of the next router to forward packets to
route timestamp - when the route was last heard from
outgoing interface - physical interface to forward a packet
next hop address
address of the device that will process the packet next.
packets can not be forwarded by the router without a route for the destination network.
if no route, packet is dropped
router can be configured with a gateway of last resort if the destination is unknown
Routers -
a router is a computer
branch - small business, medium business, teleworkes
WAN - large business
Service provider - large service providers
router CPU and OS
Router memory
RAM - store applications and process including
-IOS - copied during bootup
-running config
-ip routing table
-ARP cache
-packet buffer
routers use DRAM
volatile memory and requires continual power to maintain information
all content lost when powered down
ROM
used to store:
-bootup instruction
-basic diagnostic software
-limited IOS
firmware embedded on an integrated circuit inside the router
doesn't lose contents when powered down
NVRAM
used as permanent storage for the startup config file
doesn't lose contents when powered off
flash
used as permanent storage for IOS and system related fields
router backplane
has the following connections
-console ports
-aux port
-LAN interfaces
-Enhanced high-speed WAN interface card (EHWIC) slot
modular enhancement slot. Different interface, different card
connecting to a router
routers interconnect many devices
connections grouped into two categories
management ports - used to configure/manage/troubleshoot. not used for packet forwarding
in-band router interfaces - LAN and WAN interfaces configured with IP addressing to carry traffic
two interfaces can't belong to the same network
router bootup
bootset files - loaded into RAM when booted
-IOS image file
-start config file
router bootup process
1) perform POST and load the bootstrap program
2) locate and load the Cisco IOS software
3) locate and load the startup config file or enter setup mode
locating/loading config file
can be saved in NVRAM.
if not, can be loaded from a TFTP server
show version
CPU and amount of RAM
some versions write the amount of ram with XXXX/YYYY. add those two numbers together
has config register as 0x2102. changing to other used for password recovery
general config steps
1)give hostname
2) set passwords
-enable
-console
-VTY
-use service password-encryption to encrypt password
3) setup a banner motd
4) exit config
5) save configuration
configuring interfaces
1) conf t
2) interface whatever
3) ip address xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy where x is IP address, y is subnet mask
4) description blah
5) no shutdown
6) exit config
7) save
verify interface configuration
show ip interface brief
show ip route
show interfaces
show ip interface
default gateway on a switch
1) interface blah
2) ip address xxx yyy (x is IP, y is subnet)
3) no shutdown
4) ip default-gateway xxx.xxx.xxx.xxx (x is IP address)
IP address on a switch is only used to mange the switch
if you want it accessible from anywhere, it needs a default gateway
Tuesday, December 2, 2014
Changing passwords... and Eclipse
Want to figure out how much you know about a system? Change
a password. Sounds stupid, but
automation is often setup under a single user account. In a large company (I’m hoping) you find that
only one password affects one process.
In a small company you will run into craziness. But I would encourage you to change
passwords, even ones where you don’t have a great deal of information on what
happens when the password changes.
If anything, it becomes a good time to write
documentation. Let’s face it, you are
supposed to have documentation on everything you do anyways. Password changes are no different. If you have built the infrastructure
properly, then a password change should only effect one device or service. That may seem like a lot of passwords. It is.
But if you aren’t willing to put effort into security, you won’t have any.
Moving on…
And Eclipsing we will go…
I took my final today, and I don’t have any site upgrades planned until
January, so I think it’s time to get the mobile apps I have built in head
tested and running. That means breaking
several things I would normally use at work.
But I suppose that will have to work.
Wednesday, November 26, 2014
Introduction to Networks (non-technical)
Rather than post my typical notes from a CCNA course, I figured I'd post a non-technical description of how networks "work". I'm going to preface this by saying this is "allegory" of TCI/IP layer 3. This is not intended to be definitive.
So...
You have built a company. It's a great company. But no one can ever find your physical location. You live on a drab, grey, boring street. Did I mention grey? I meant every single building is nothing but grey concrete, and the streets are bleached grey. It is grey as far as the eye can see.
So, being the great business leader you are, you go out and buy a bucket of purple paint. Now, purple paint is the greatest thing since sliced bread. And because it's the greatest thing since sliced bread, it costs an arm and a leg. To get the shade of purple you want, you buy one can of paint. It covers the outside of the door well, but nothing else.
So, from the outside your door looks purple. But that paint is so darn expensive, you only paint the outside. The inside of the door is still brown.
So, a customer comes to visit.
You tell him to drive down the grey street until you see a purple door. He find your location in minutes. It's easy.
Back in your office, you have a discussion, and he thinks he is going to buy from you. But he needs to talk to a few people to determine how much he wants to buy. And he forgot how to get out of the building.
"Oh, just go out the purple door", you tell your customer.
The man spends 45 minutes wandering your halls, and finally finds you. He curses you out, cancelling all potential business. You are at a complete loss. The customer can't find the purple door.
The one thing you forgot is that doors have two sides. One side that is visible from the street, and one side that is only visible from the inside of the building. You painted your street door purple. It's easy to find. But your exit door on your building? Still just as brown as it ever was. So telling someone to go find a purple door is an exercise in futility.
You have to name the door based off which side you happen to be looking at.
Even though both talk about the same thing, it's a matter of which side of the door you are on. And you have to have your discussion based on which side of the door you can see.
So...
You have built a company. It's a great company. But no one can ever find your physical location. You live on a drab, grey, boring street. Did I mention grey? I meant every single building is nothing but grey concrete, and the streets are bleached grey. It is grey as far as the eye can see.
So, being the great business leader you are, you go out and buy a bucket of purple paint. Now, purple paint is the greatest thing since sliced bread. And because it's the greatest thing since sliced bread, it costs an arm and a leg. To get the shade of purple you want, you buy one can of paint. It covers the outside of the door well, but nothing else.
So, from the outside your door looks purple. But that paint is so darn expensive, you only paint the outside. The inside of the door is still brown.
So, a customer comes to visit.
You tell him to drive down the grey street until you see a purple door. He find your location in minutes. It's easy.
Back in your office, you have a discussion, and he thinks he is going to buy from you. But he needs to talk to a few people to determine how much he wants to buy. And he forgot how to get out of the building.
"Oh, just go out the purple door", you tell your customer.
The man spends 45 minutes wandering your halls, and finally finds you. He curses you out, cancelling all potential business. You are at a complete loss. The customer can't find the purple door.
The one thing you forgot is that doors have two sides. One side that is visible from the street, and one side that is only visible from the inside of the building. You painted your street door purple. It's easy to find. But your exit door on your building? Still just as brown as it ever was. So telling someone to go find a purple door is an exercise in futility.
You have to name the door based off which side you happen to be looking at.
Even though both talk about the same thing, it's a matter of which side of the door you are on. And you have to have your discussion based on which side of the door you can see.
Monday, November 24, 2014
Monday Ramblings
Here are some ramblings for Monday.
The subcontract work fell through. I spent about 45 minutes on the phone explaining how TCP/IP layer 3 works, and finally got them to know what they needed to know. I guess a broad knowledge of networking helps a lot when working in an industry that is increasingly network based. It doesn't help that most networking issues happen at layer 1. The issue there was a layer 3 addressing issue. Pictures don't help some people.
After messing with my current reading chart, I determined it will take me (on average) until January 17th to finish the next book. Strange what a few excel formulas can do. It's almost magical. The formula here happens to be
(today's date + (estimated remaining sessions * average days between reading))
estimated remaining sessions = (total pages - current page ) / average increase in page count
So, by close to February I'll be back into an old Security+ book, Some time after that, I'll be into the book on Physics. Progress, as it were, is happening. After starting over with the Active Directory book, I'm about 12.7% complete with my reading goal. That doesn't seem like much, but it more progress than I've made in years.
It's hard to remember that progress only happens when it is intentional. Rambling through life will not get you where you want to go. Make a plan, and go there. That's the only way to get to the end of the path. And if that path takes reading 5,200 pages, then so be it. At least you've got a plan, which is a lot more than most people have.
Finals are next Monday, so I'll finish up Introduction to Networking then and be free for a few weeks. Fighting issues with the next class, but we'll see what happens with that. The issue is a supply/demand problem. The next class filled up in three days. Every other class doesn't have the people as the one section I want to take. Lovely stuff.
The subcontract work fell through. I spent about 45 minutes on the phone explaining how TCP/IP layer 3 works, and finally got them to know what they needed to know. I guess a broad knowledge of networking helps a lot when working in an industry that is increasingly network based. It doesn't help that most networking issues happen at layer 1. The issue there was a layer 3 addressing issue. Pictures don't help some people.
After messing with my current reading chart, I determined it will take me (on average) until January 17th to finish the next book. Strange what a few excel formulas can do. It's almost magical. The formula here happens to be
(today's date + (estimated remaining sessions * average days between reading))
estimated remaining sessions = (total pages - current page ) / average increase in page count
So, by close to February I'll be back into an old Security+ book, Some time after that, I'll be into the book on Physics. Progress, as it were, is happening. After starting over with the Active Directory book, I'm about 12.7% complete with my reading goal. That doesn't seem like much, but it more progress than I've made in years.
It's hard to remember that progress only happens when it is intentional. Rambling through life will not get you where you want to go. Make a plan, and go there. That's the only way to get to the end of the path. And if that path takes reading 5,200 pages, then so be it. At least you've got a plan, which is a lot more than most people have.
Finals are next Monday, so I'll finish up Introduction to Networking then and be free for a few weeks. Fighting issues with the next class, but we'll see what happens with that. The issue is a supply/demand problem. The next class filled up in three days. Every other class doesn't have the people as the one section I want to take. Lovely stuff.
Wednesday, November 12, 2014
Introduction to Network chapter 5: Ethernet
Ethernet operates at datalink and physical layer
Ethernet most widely used LAN technology
defined by IEEE 802.2 and 802.3
speeds between 10 and 100,000 Mb/s
802.2 - LLC
802.3 - MAC and Physical layers
LLC sublayer
handles communication between upper and lower layers
between networking software and device hardware
implemented in software
considered driver software
MAC sublayer
lower sublayer of data link layer
2 responsiblities
data encapsulation
media access control
data encapsulation
frame assembly before trasnmission
frame dissassembly upon reception
adds header and trailer to network layer pdu
data encapsultion has 3 primary functions
frame delimiting
used to identify groups of bits that make up a frame
provides syncronization between transmitting and receiving
addressing
contains physical address
Error detection
contains a CRC value used to determine if the contents have changed
media access control
responsible for placement of frames on the media (wire)
removal of frames from the media
underlying logical topology is a multiaccess bus
all nodes in a network segment share the medium
uses CSMA
understanding CSMA
1) detect if there is a signal on the media
a) if busy, wait
2) if no signal, transmit
if there is a collision, all data is bad and must be resent
contention-based methods have less overhead than controlled access systems
do not scale well with heavy media use
CSMA/CD
widespread use of switched networks makes CSMA/CD largely unneeded
CSMA/CA in wireless still needed
Every device receives every frame
To prevent mass processing of frames not intended for that device, MAC was created.
MAC used to identify which device should process a frame
MAC address structure
1st 24 bits/ 6 hex digits - Organizationally Unique Identifer
Last 24 bits/ 6 hex digits - Vendor assigned
1) Source computer sends
2) each NIC in the network views the information
a) if the destination MAC matches, then the frame is processed further
b) if not, the frame is dropped
Ethernet Frame Attributes
created in 1973
2 primary versions
-802.3 Ethernet Standard
-DIX Ethernet, or Ethernet II Used in TCP/IP networks
framing style differences are minimal
both define minimum frame size as 64 bytes
max 1518
preamble/Start Frame Delimiter not included when describing frame size
any frame less that 64 bytes discarded as a "runt"
VLAN technology increased maximum frame size to 1522
frame too big or too small, frame is dropped
Ethernet Frame
-preamble and SFD - synchronization between sender and receiver
-Destination MAC -
-Source MAC
-Length Field - exact length of the frame's data field; can indicate which higher-layer protocol is used;
if size greater than 1536, frame is ethertype protocol indicated.
-if 1500 or less, then use of 802.3 frame format
-data field - contains encapsulated layer 3 pdu
-frame check sequence - used to detect errors
In Ethernet, different MAC addresses used for layer 2 unicast, broadcast, and multicast communications
Unicast -destination MAC of receiver
broacast - destination MAC of FFFF.FFFF.FFFF
Multicast - destination MAC is 01-00-5E
MAC and IP
2 primary addresses assigned to a host
Physical Address - MAC
Logical Address - IP
Source device sends based on IP address
DNS used to identify remote network
ARP protocol has 2 basic functions
-resolving IPv4 addresses to MAC addresses
-maintaining a table of mappings
Frame must have destination address to be placed on the media (wire)
refers to ARP table or ARP cache. Stored in RAM on all devices
Each entry binds a MAC with an IP
table maintained dynamically
-adds information by
-monitoring network
-ARP request - L2 broadcast to all devices on the LAN
-entries are time stamped; if the system doesn't get a message by the time stamp expires, the entry is removed
-also capable of static entries
ARP to remote network
-when host creates a packet for a destination, it compares destination IP address to its own IP address to determine if they are both on the same network.
-if not the same network, then ARP to router interface serving as the gateway
ARP issues
overhead on the media
-could initially flood the network
security - ARP spoofing or ARP poisoning
-broadcast adn security issues can be mitigated with modern switches
-switches segment LAN into independent collision domains
-switches send to only sender and receiver, reducing traffic flows
Switching
devices usually connected by a layer 2 switch
switch builds MAC table to make forwarding decisions
if destination MAC is not known, switch sends the frame out all port except receiving port
when destination responds, switch adds MAC to its MAC table
-capable of multiple MACs per port (switch connected to a switch)
switch MAC table sometimes referred to as CAM (content addressable memory)
-transparent to network protocols and user applications
-can operate in different modes that affect the end user
-duplex settings
-half duplex - one talks ata time
-full duplex - send and receive at the same time; CSMA/CD shut off in this case
-Cisco Catalyst supports 3 duplex settings
-half
-full
-auto
-proper cabling also required (or used to be)
-MDIX auto function
autmatic medium dependent interface crossover (auto-mdix)
switches use following forwarding methods
-store and forward
get the entire frame before forwarding
use CRC to determine if it needs to dump frame
analyzes destination for where to forward
required for QoS analysis
-cut-through
holds frame until it gets destination address, then forwards
no error checking
faster than store and forward, but can send broken frames
2 variations to cut-through
-fast-forwards
offers lowest level of latency
typical of cut-through switching
-fragment free
reads first 64 bytes before forwarding (most errors occur in first 64 bytes)
switches use buffering techniques
port-based memory buffering
frames are stored in queues that are linked to specific incoming and outgoing ports
delay occurs if there is nothing transmitting on other ports and buffer is full
shared memory buffer
frame stores in common buffer used for all ports
useful for asymmetric switching
Fixed or Modular switches
PoE allows power to be sent to devices
forwarding rate defines how many frames the switch can process in a second
stackable vs non-stackable
modular configurations - add more cards
Small form-factor pluggable (ports that can be purchased and easily changed out on each switch)
Layer 3 switch
capable of performing layer 3 routing as opposed to the standard switch that just handles layer 2
support Cisco Express Forwarding (CEF)
complex, but based on
Forwarding Information Base
conceptionally similiar to routing table
Adjacency table
maintains layer 2 next-hop addresses for all FIB entries
separation provides benefits
-adjacency table can be built separately from the FIB table
-MAC header rewrite used to forward a packet is not stored in cache entries
layer 3 switch variants
Switch virtual interface (SVI)
logical interface on a switch associated with a VLAN
Routed port
physical port on an L3 switch configured to act as a router port
allow L3 switch to act as a router
not associated with a particular vlan
L3 interface only and does not support L2 protocol
no switchport interface configuration command
Layer 3 EtherChannel
logical itnerface on a Cisco device associated with a bundle of routed ports
Subscribe to:
Posts (Atom)