Monday, March 17, 2014
Saturday, March 15, 2014
EIGRP Route Filtering
- Are you looking for flexible job in Information Technology ? Post your CV with:
- https://www.security-architecture.com/add-cv/
- Why to Filter routes in EIGRP
- Branch routers do not need to see each others networks.
- Branch routers might be in sales division and don’t need to use manufacturing division
- Some routers will have smaller routing table
- Propagation of topology database on slow links will use less bandwidth
- Security reason
- How to Filter routes in EIGRP:
- Filtering routes in EIGRP is always done with distribution-lists. To match the routes to be filtered we can use:
- access-list
- ip prefix-list
- route-map
Filter by an access-list
- Let’s say router have the network 172.16.28.0/24
- We want this prefix to be filtered from being propagated to other routers.
- Remember that at the end of each access-list there is an implicit deny statement
- Create a Standard ACL (named or numbered)
- Ip access-list standard 5
- deny 172.16.0.0 0.0.255.255
- permit any
- Attach the access-list to eigrp by using distribute-list
- Router eigrp 10
- distribute-list 5 out
Filter by a prefix-list
- Caracteristics of prefix-list usage
- Allows the matching of the prefix-length (subnet mask) while ACL do not
- Faster matching of routes as compared to ACL
- Can only be used for route filtering and cannot be used for security
- Each line has a sequence number and permit/deny statement
- Example of prefix-list filtering>
- Ip prefix-list list-name seq seq-num {deny | permit} {prefix/prefix-length} [ge ge-value] [le le-value]
- Route prefix must be within the range of addresses implied by the prefix/prefix-length parameters
- Route’s prefix length must match the range of prefixes implied by the prefix-length, ge-value and le-value
- You can read our other blogs:
- http://ftpservices.blogspot.com/
- http://dhcpservices.blogspot.com/
-
Saturday, February 15, 2014
802.1x configuration
Why to use dot1x authentication ? dot1x authentication can be used to secure access to the network.
•enable “aaa” on the switch “ aaa new-model”
•enable “aaa” on the switch “ aaa new-model”
•Define external
radius-servers:
–Radius-server
host hostname | ip-address} key string
•Define the
authentication method for 802.1x
–Aaa authentication dot1x
default group radius
•Enable 802.1x
globally “dot1x system-auth-control”
•Configure each switchport that uses 802.1x
–Switch(config-if)#dot1x
port-control {force-authorized | force-unauthorized | auto}
•Force-authorized:
the port always authorize any connected client (default state)
•Force-unauthorized:
the port is forced to never authorize any connected client (client need to
disconnect/reconnect)
•Auto:
the port uses 802.1x exchange to move from unauthorized to the authorized state
•Allow multiple hosts
on a switchport
–Dot1x
host-mode multi-host
•“show dot1x all”
If you are looking to find a job remotely, apply here:
https://www.security-architecture.com/add-cv/
If you are looking to find a job remotely, apply here:
https://www.security-architecture.com/add-cv/
Switch port-security
Looking for a part-time job ? Click here to post your CV
Control port-access based on MAC addresses. To configure it:
Control port-access based on MAC addresses. To configure it:
–Enable
port-security on an interface “switchport port-security”
–Specify
the maximum number of MAC addresses that will be allowed “switchport port-security
maximum mac-address-number
(1-1024). By default port-security will make sure that only one MAC
address will be allowed access on each switchport.
–You
can specify MAC addresses for a switchport statically or dynamically – the switch will learn the mac addresses for the
host connected to a switchport (up to the maximum
configured); learned mac addresses can be
aged out if the hosts are silent for a period of time (by default no aging). If
after the maximum number a new host connect to that switchport, the port will go to
errdisabled
•switchport port-security maximum
2
•Switchport port-security mac-address xxxx.xxxx.xxxx
•Swtichport port-security mac-address sticky
–Define
how the interface will react in case of port-security violation:
•“switchport port-security
violation {shutdown | restrict | protect}
•Shutdown:
put port in errdisabled stated (either
re-enable manually or through err-disable recovery)
•Restrict:
the port is allowed to stay up, but all packets from violating MAC address are
dropped. (send snmp trap or syslog)
•Protect:
Port is allowed to stay up, although packets from violating addresses are
dropped. No record of violation is kept
OSPF metric
•OSPF
uses a Metric of
cost=100,000,000/bandwidth(Kbps)
•The default reference bandwdith is 100,000,000 and it can be
changed.
OSPF router type
•We
have these types of routers:
–Internal
router: All networks (interfaces) connected directly to this router belong to
the same area. An internal-router has a single link-state database
–Area
Border router: ABR: He has at least 2 connected networks (interfaces) that are
in two different areas. ABR will have more than one link-state database, 1 for
each area. Its responsibility to exchange topology information between areas
–Backbone
router: at least one connected network in area 0 ( can be internal or ABR)
–Autnomous System Boundary
router: ASBR: at least one network participating in OSPF, and one network in
another routing domain. Its role is to exchange information between OSPF and
external routes.
Wednesday, January 8, 2014
Troubleshooting VTP
•If a switch doesn’t
seem to be receiving updated information from a VTP server:
–Either
the swtich is in transparent
mode. Verify by “show vtp status”
–“there
might not be a switch configured as vtp server”
–The
link between the switch and the other switches is not in trunking mode. VTP can be
advertised only over trunk links. To verify if an interface is trunk or acess
•“show
interface type mod/num switchport”
–Make
sure the vtp version is
compatible with other switches in the VTP domain.
–Make
sure the VTP password matches in the vtp domain
–Make
sure the VTP domain name match that of the VTP server
VTP configuration
•By default vtp mode is server,
management domain is NULL, and there is no password.
•If a switch receives
a VTP summary advertisement on a trunk port from any other switch, it will
automatically learn the VTP domain name, VLANs and the configuration revision
number it hears.
•Before you add a
switch to the network, verify that the revision number is set to 0 “show vtp status”
•There is two ways to
configure VTP:
–Global
config mode
–vlan database mode mostly
deprecated
To join a specific
VTP management domain, you have to “vtp domain domain-name
Configuring the VTP
mode:
–Server
mode: multiple VTP servers can coexist in a domain. The servers do not elect
primary or secondary, if one server is configured with a new VLAN or VTP
parameter, it advertises the changes to the rest of the domain. All other
servers synchronize the VTP databases to this advertisement just as any VTP
client would
–Client
mode: if you want to configure a as VTP server, you start it as a client to
learn the latest changes, than you configure it in server mode.
–Transparent
mode: this mode is used if a switch will not share the VLAN information with
any other switch in the network. VLAN can still be created, deleted or
modified, but they are not advertised, however VTP advertisement received by a
transparent switch are forwarded out trunk links. Keeping switches in
transparent mode can eliminate the chance for duplicate over-lapping VLANs in
large network with many network administrators
–“vtp mode {server |
client | transparent}
–Vtp password password
On some IOS, you can turn vtp off, by using the command vtp off command. This command allows the switch to act the same as if it is in a vtp transparent with the addition that the switch doesn't forward vtp advertisement on trunk links.
If you are looking for job, you can apply through this website:
If you need to use our support and consulting services, please visit our website:You can also visit our other blogs:
On some IOS, you can turn vtp off, by using the command vtp off command. This command allows the switch to act the same as if it is in a vtp transparent with the addition that the switch doesn't forward vtp advertisement on trunk links.
If you are looking for job, you can apply through this website:
Subscribe to:
Posts (Atom)