Thursday 3 November 2016

Configuring Frame Relay CCNA Training in Faisalabad


Configuring Frame Relay
-------------------------------
Router(config-if)# encapsulation frame relay [cisco | ietf]
Router(config-if)# bandwidth kbps
Router(config-if)# frame-relay lmi-type [cisco | q933a | ansi]
Router(config-if)# frame-relay map [protocol][network address][dlci] broadcast

Wednesday 6 July 2016

EtherChannel Configuration

EtherChannel Configuration
           Switch(config)#  interface range fa0/1 – 4 {we can use the range or single interface}
Switch(config-if)#  channel-group [1 – 6] mode [auto | desirable | on | active | passive]

This port-channel can be customized via the CLI:

           Switch(config)# interface port-channel[1 – 6]
           Switch(config-if)# switchport mode trunk {an example only}

However if we wish to view the operation we use the term “etherchannel”.

            Switch# show interface etherchannel

            Switch# show etherchannel [summary | load balance | port-channel]

EtherChannel Requirements CCNA

EtherChannel has specific requirements and additional platform (hardware) related requirements. A partial list is:
·         EtherChannel can have a maximum of eight physical interfaces per port-channel
·         All interfaces within the port-channel must have the same speed and duplex settings
·         An EtherChannel does not form if one interface is a Switch Port Analyzer (SPAN) port
·         An interface within a port-channel cannot be configured as a secure port (do not activate port security)
·         All interfaces within a port-channel must be assigned to the same access VLAN or if they are Dot1q trunks they must be assigned the same native VLAN
·         If interfaces are trunking then they must all have the same allowed range of VLANs

Catalyst 2960 switches can leverage a protocol to dynamically establish and maintain the EtherChannel bundle. The channel-group mode command allows you to decide if the EtherChannel group uses Port aggregation Protocol (PAgP), Link Aggregation Protocol (LACP), or to simply force the interface to channel without PAgP or LACP.  Forcing interfaces to channel may create problems if any interfaces have dissimilar configurations.  PAgP allows the switches to learn the capabilities of each interface assigned to an EtherChannel bundle and reliably activates interfaces of similar configuration to form a port-channel. PAgP transmits and receives messages on all interfaces in the EtherChannel bundle and restricts the PAgP traffic to the native VLAN if the ports are in trunking mode. LACP is similar in operation to PAgP and standards based while PAgP is Cisco proprietary.
Other local link protocols such as DTP, VTP, CDP, and STP still transmit and receive frames over a port-channel. STP only sends frames out the first interface in the port-channel and views the port-channel as a single physical port. Cisco uses Per-VLAN Spanning-Tree (PVST) and if the port-channel is a Dot1q trunk then multiple STP messages might require transmission (with appropriate Dot1q tags).

Spanning-tree reflects the increased bandwidth provided by EtherChannel. The default cost for a 100 Mbps link is 19 and if a port-channel is created that has only two 100 Mbps links the spanning-tree cost will be 9. If more physical ports are assigned to the port-channel the cost decreases. Note: the spanning-tree cost does not dynamically change when links go down or when a link is brought back up within the port-channel; the cost is calculated based on the number of ports assigned to the port-channel. 

Friday 20 May 2016

CCNA Recent Certified Cisco Academy Faisalabad Pakistan




Cisco Training Center Faisalabad
Cisco Networking Academy Faisalabad

Cisco Instructor at Cisco Academy Faisalabad

Cisco Expert Level Instructor Excellence Award

Cisco Expert Level Instructor Excellence Award 
Cisco Certified Expert Instructor Saeed Ahmad Faisalabad Pakistan

Wednesday 18 May 2016

Benefits of VPNs , CCNA in Faisalabad

Cost savings 
•Enable organizations to use cost-effective, third-party Internet transport to connect remote offices and remote users to the main site.
Scalability 
•Enable organizations to use the Internet infrastructure within ISPs and devices, which makes it easy to add new users.
Compatibility with broadband technology 
•Allow mobile workers and telecommuters to take advantage of high-speed, broadband connectivity, such as DSL and cable, to gain access to the networks of their organization, providing workers flexibility and efficiency.
•Provide a cost-effective solution for connecting remote offices.
Security 
•Can include security mechanisms that provide the highest level of security by using advanced encryption and authentication protocols that protect data from unauthorized access.
Connect entire networks to each other, in the past, a leased line or Frame Relay connection was required to connect sites, but because most corporations now have Internet access, these connections can be replaced with site-to-site VPNs.
Internal hosts have no knowledge that a VPN exists.
Created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.
End hosts send and receive normal TCP/IP traffic through a VPN gateway.
The VPN gateway is responsible for encapsulating and encrypting outbound traffic for all traffic from a particular site
The VPN gateway then sends it through a VPN tunnel over the Internet to a peer VPN gateway at the target site.
Upon receipt, the peer VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network.

Sunday 24 April 2016

Best Practices for VLAN Design

§One to three VLANs per access module and limit those VLANs to a couple of access switches and the distribution switches.
§Avoid using VLAN 1 as the "blackhole" for all unused ports. Use a dedicated VLAN separate from VLAN 1 to assign all the unused ports.
§Separate the voice VLANs, data VLANs, the management VLAN, the native VLAN, blackhole VLANs, and the default VLAN (VLAN 1).
§Avoid VTP when using local VLANs; use manually allowed VLANs on trunks.
§For trunk ports, turn off Dynamic Trunking Protocol (DTP) and configure trunking. Use IEEE 802.1Q rather than ISL because it has better support for QoS and is a standard protocol.
§Manually configure access ports that are not specifically intended for a trunk link.
§Prevent all data traffic from VLAN 1; only permit control protocols to run on VLAN 1 (DTP, VTP, STP BPDUs, PAgP, LACP, CDP, etc.).

§Avoid using Telnet because of security risks; enable SSH support on management VLANs.

Local VLANs CCNP SWITCH Exam Faisalabad

The Campus Enterprise Architecture is based on the local VLAN model wherein users of geographically common switches are grouped into a single VLAN, regardless of the organizational function of the users.
Local VLANs are generally confined to a wiring closet, as shown in the figure, and VLANs are local to one access switch which trunks to the distribution switch.
If users move from one location to another in the campus, their connection changes to the new VLAN at the new physical location.

In the local VLAN model, Layer 2 switching is implemented at the access level and routing is implemented at the distribution and core level, as shown in the figure, to enable users to maintain access to the resources they need.

§Create local VLANs with physical boundaries in mind rather than job functions of the users. 
§Local VLANs exist between the access and distribution layers.
§Traffic from a local VLAN is routed at the distribution and core levels. 
§Switches are configured in VTP transparent mode.
§Spanning tree is used only to prevent inadvertent loops in the wiring closet.
§One to three VLANs per access layer switch recommended.


Saturday 20 February 2016

Cisco CCNA CCNP Training Center in Faisalabad

Network Administrator

Minimum 2 to 4 years qualification experience in relevant field.

Salary Range: Rs. 25 to 45 K (according to skills/experience)+(free accommodation)

Qualification:

Having Bcs or equivalent education in Computer Science / Information Technology .
Qualified Microsoft Certified (CCNA etc) will be preferred 
Skills Required:                 Having Rich Knowledge and Hand on Experience of        
                                    Linux Servers, Microsoft servers (DC,ADC, TMG)
                                    Mail Server Mdeamon 
                                    Design and Manage LAN / VLAN/ WAN Infrastructure
Having good knowledge of switching and routing

Most of the course cover in CCNA R&S check the 4 modules cover Introduction , Routing and

switching LAN , VLAN , VTP , STP , Inter-VLAN routing , PPP , Frame relay , ACL , HSRP , VRRP, GLBP , NAT 

Definitely Career Institute Faisalabad provide the complete training for ccna 200-120 , ccna 640-554 , ccnp and mcse 2012 track cover all 5 major exam code. we also provide internship and jobs for students with the help of industry links and repute.

Thursday 18 February 2016

CCNA Security Classes in Faisalabad by Saeed Ahmad

Now a days Network Security and Devices prevention from unauthorized access is major issue in the world. Daily a lot of companies make expense to secure the network , password , data .

Career Institute Faisalabad offer CCNA 200-120 Routing and switching , CCNA Security IINS2.0 by Sir Saeed Ahmad certified CCSP and Certified CCNA Security Instructor only in Faisalabad having 8 years of teaching experience in the world.

CCNA in faisalabad only offers at cisco networking academy Career Institute with official course material , online contents , modules , quiz , participation , free packet tracer course and a lot of facilities by cisco networking academy faisalabad.

Upon completion of the CCNA Security course, students will be able to perform the following tasks:
Explain network threats, mitigation techniques, and the basics of securing a network
Secure administrative access on Cisco routers
Secure administrative access with AAA
Implement firewall technologies to secure the network perimeter
Configure IPS to mitigate attacks on the network
Describe LAN security considerations and implement endpoint and Layer 2 security features
Describe methods for implementing data confidentiality and integrity
Implement secure virtual private networks
Implement an ASA firewall configuration using the CLI
Implement an ASA firewall configuration and VPNs using ASDM
Test network security and create a technical security policy


Saturday 6 February 2016

Single Area and Multiarea OSPF in CCNA

Objectives
Review OSPF Single AreaMultiarea OSPF Implementation
Types of LSAs Exchanged Between Areas
Configuring Multiarea OSPFv2 and OSPFv3
Verifying an OSPFv2 and OSPFv3 Configuration
Review OSPF Key Points
OSPF Single Area - Review
Link State Routing Protocol
Faster Convergence
Cost Metric (Cisco – Bandwidth)
Identical Link-State Databases (LSDBs)
SPF – Dijkstra’s Algorithm
Determine Neighbors on Directly-connected links
Use Link-State Packets (LSP) for each directly-connected link
Flood LSPs to neighbors
As a review, OSPF (Open Shortest Path First) is a Link State Routing Protocol with an Administrative distance (AD) of 110.
(AD = trustworthiness or preference of the routing protocol.) OSPF is classless; therefore, it supports VLSM and CIDR.
OSPF quickly propagates network changes.  Routing changes trigger OSPF routing updates so it is more efficient than distant vector routing protocols such as RIPv2. (RIPv2 uses periodic updates of every 30 seconds.)
In OSPF, The cost of a link is based on bandwidth only.  Higher bandwidths will have a lower cost.

OSPF creates and maintains three databases:
Adjacency database - Creates the neighbor table
Link-state database (LSDB) - Creates the topology table
Forwarding database - Creates the routing table
These tables contain a list of neighboring routers to exchange routing information with and are kept and maintained in RAM.
Once the network is converged all routers in an area will have identical link-state databases!
OSPF uses the Shortest Path First algorithm to choose the best path. The CPU processes the neighbor and topology tables using Dijkstra’s SPF algorithm This algorithm is based on the cumulative cost to reach a destination. The SPF algorithm creates an SPF tree by placing each router at the root of the tree and calculating the shortest path to each node. The SPF tree is then used to calculate the best routes. OSPF places the best routes into the forwarding database, which is used to make the routing table.
OSPF uses link-state packets (LSPs) to establish and maintain neighbor adjacencies and exchange routing updates. LSPs represent the state of a router and its links to the rest of the network. 
Single Area OSPF 
OSPF Packet Types
OSPF exchanges messages to convey routing information using five types of packets. These packets are:
Hello packet
Database description packet
Link-state request packet
Link-state update packet
Link-state acknowledgment packet

These packets are used to discover neighboring routers and also to exchange routing information to maintain accurate information about the network.

OSPF Packet Type
OSPF – Hello Packet
Let’s look at the Hello Packet
The OSPF Type 1 packet is the Hello packet. Hello packets are used to:
Discover OSPF neighbors and establish neighbor adjacencies.
Advertise parameters on which two routers must agree to become neighbors.
Hello Packets are also used to Elect the Designated Router (DR) and Backup Designated Router (BDR) on multiaccess networks like Ethernet and Frame Relay. Just a reminder…Point-to-point links do not require DR or BDR.
The figure displays the fields contained in the Type 1 Hello packet. Important fields shown in the figure include:
Type - Identifies the type of packet. A one (1) indicates a Hello packet. A value 2 identifies a DBDescription packet, 3 an LSRequest packet, 4 an LSUpdate packet, and 5 an LSAck packet.
Router ID - A 32-bit value expressed in dotted decimal notation used to uniquely identify the originating router. (an IPv4 address)
Area ID - Area from which the packet originated.
Network Mask - Subnet mask associated with the sending interface.
Hello Interval - Specifies the frequency, in seconds, at which a router sends Hello packets. The default Hello interval on multiaccess networks is 10 seconds. This timer must be the same on neighboring routers; otherwise, an adjacency is not established.
Router Priority - Used in a DR/BDR election. The default priority for all OSPF routers is 1, but can be manually altered from 0 to 255. The higher the value, the more likely the router becomes the DR on the link.
Dead Interval - Is the time in seconds that a router waits to hear from a neighbor before declaring the neighboring router out of service. By default, the router Dead Interval is four times the Hello interval. This timer must be the same on neighboring routers; otherwise, an adjacency is not established.
Designated Router (DR) - Router ID of the DR.
Backup Designated Router (BDR) - Router ID of the BDR.
List of Neighbors - List that identifies the router IDs of all adjacent routers.

OSPF – Link State Updates (LSU)
Type 4: Link-State Update (LSU) packet - Used to reply to LSRequests (type 3) and to announce new information. LSUs can be one of 11 different types of LSAs. LSUs are sometimes referred to as LSAs. Only the first 5 LSA types are covered on the CCNA.

Basic OSPF Configuration
R1(config)#int fa 0/0
R1(config-if)#ip address 172.16.1.17 255.255.255.240
R1(config)#int s 0/0/0
R1(config-if)#ip address 192.168.10.1 255.255.255.252
R1(config)#int s 0/0/1
R1(config-if)#ip address 192.168.10.5 255.255.255.252
R1(config-if)#router ospf 1
R1(config-router)#network 172.16.1.16 0.0.0.15 area 0
R1(config-router)#network 192.168.10.0 0.0.0.3 area 0
R1(config-router)#network 192.168.10.4 0.0.0.3 area 0

OSPF Diagram configuration
This is a basic single area OSPF configuration
Interfaces are configured and then networks are advertised.  The wildcard mask is used to identify which bits in the network address are significant.  The network 172.16.1.16/28 will be advertised as 172.16.1.16 0.0.0.15. This wildcard mask is the inverse of the subnet mask, 255.255.255.240.  Notice the subnet mask for /30 is 255.255.255.252 and the wildcard mask used to advertise this network is 0.0.0.3.  (255.255.255.255 – 255.255.255.252 = 0.0.0.3)

OSPF Router ID
1.Use the IP address configured with the OSPF router-id command.
2.If the router-id is not configured, the router chooses highest IP address of any of its loopback interfaces.
3.If no loopback interfaces are configured, the router chooses highest active IP address of any of its physical interfaces.
Every router requires a router ID to participate in an OSPF domain. The router ID can be defined by an administrator or automatically assigned by the router.
The router ID is used by the OSPF-enabled router to:
Uniquely identify the router 
Participate in the election of the DR and BDR
Let’s review how to determine the router ID? As illustrated in the figure, Cisco routers derive the router ID based on one of three criteria, in the following order:
1.The router ID is configured using the OSPF router-id rid router configuration mode command. The rid value is any 32-bit value expressed as an IPv4 address. This is the recommended method to assign a router ID. (Example: 1.1.1.1)
2.If the router ID is not configured, the router chooses the highest IPv4 address of any of configured loopback interfaces. This is the next best alternative to assigning a router ID.
3.If no loopback interfaces are configured, then the router chooses the highest active IPv4 address of any of its physical interfaces. This is the least recommended method because it makes it more difficult for administrators to distinguish between specific routers.
R1(config)#interface loopback 0
R1(config-if)#ip address 10.1.1.1 255.255.255.255
R1(config)#router ospf 1
R1(config-router)#router-id 10.1.1.1
Reload or use "clear ip ospf process" command, for this to take effect
OSPF Metric - Cost
Cisco IOS uses the cumulative bandwidths of the outgoing interfaces from the router to the destination network as the cost value
Cost for an interface is calculated as 10 to the 8th power divided by bandwidth in bps
Results in interfaces with a bandwidth of 100 Mbps and higher having the same OSPF cost of 1
Reference bandwidth can be modified to accommodate networks with links faster than 100 Mbps using the OSPF command auto-cost reference-bandwidth
OR – Directly specify the cost for a link:
R1(config)#interface serial 0/0/0
R1(config-if)#ip ospf cost 1562

default Cisco OSPF Cost Value
OSPF uses cost as a metric. A lower cost indicates a better path than a higher cost. A 10-Mb/s Ethernet line has a higher cost than a 100-Mb/s Ethernet line.
The formula used to calculate the OSPF cost is:
Cost = reference bandwidth /interface bandwidth
The default reference bandwidth is 10^8 (100,000,000) as you can see in the graphic; therefore, the formula is:
Cost 100,000,000 bps / interface bandwidth in bps
Refer to the table for a breakdown of the cost calculation. Notice that FastEthernet, Gigabit Ethernet, and 10 GigE interfaces share the same cost, because the OSPF cost value must be an integer. Consequently, because the default reference bandwidth is set to 100 Mb/s, all links that are faster than Fast Ethernet also have a cost of 1.
Reference bandwidth can be modified to accommodate networks with links faster than 100 Mbps using the OSPF command auto-cost reference-bandwidth
The “auto-cost reference-bandwidth” command must be configured on every router in the OSPF domain. The value is expressed in Mb/s; therefore, to adjust the costs for:
Gigabit Ethernet - auto-cost reference-bandwidth 1,000
10 Gigabit Ethernet - auto-cost reference-bandwidth 10,000
To return to the default reference bandwidth, use the auto-cost reference-bandwidth 100 command.
As seen in the last bullet, you do have the choice to define the cost that will be used in OSPF calculations with the interface command, ip ospf cost.

OSPF and Multiaccess Networks
Link-state routers flood their link-state packets when OSPF is initialized or when there is a change in the topology.
In a multiaccess network this flooding can become excessive.
On multiaccess networks, OSPF elects a Designated Router (DR) and a Backup Designated Router (BDR) in case the Designated Router fails.
All other routers become DROthers
DROthers only form full adjacencies with the DR and BDR in the network, and send their LSAs to the DR and BDR using the multicast address 224.0.0.6 (IPv6 FF02::06)

The solution to managing the number of adjacencies and the flooding of LSAs on a multiaccess network is the DR. On multiaccess networks such as ethernet or frame relay, OSPF elects a DR to be the collection and distribution point for LSAs sent and received. A BDR is also elected in case the DR fails. All other routers become DROTHERs. A DROTHER is a router that is neither the DR nor the BDR.
DROthers only form full adjacencies with the DR and BDR in the network, and send their LSAs to the DR and BDR using the OSPF multicast address 224.0.0.6  (IPv6 FF02::06)

Why Multiarea OSPF?
Here we have an implementation of Multi-Area OSPF with 3 areas, area 1, area 0, and area 51.  The result is smaller routing tables and less LSAs.  SPF is only run within an area if there is a change in the network.
OSPF Two-Layer Area Hierarchy
Multiarea OSPF is implemented in a two-layer area hierarchy:
Backbone (Transit) area -
Area whose primary function is the fast and efficient movement of IP packets.
Interconnect with other OSPF area types
Called OSPF area 0 which all other areas directly connect
Regular (Non-backbone) area -
Connects users and resources
A regular area does not allow traffic from another area to use its links to reach other areas

Multiarea OSPF is implemented in a two-layer area hierarchy:
Backbone (Transit) area - Hierarchical networking defines the backbone area or area 0 as the core to which all other areas directly connect. Backbone areas interconnect with other OSPF area types. An OSPF backbone area’s primary function is the fast and efficient movement of IP packets. Generally, end users are not found within a backbone area.
Regular (Non -backbone) area -Connects users and resources. Regular areas are usually set up along functional or geographical groupings. By default, a regular area does not allow traffic from another area to use its links to reach other areas. All traffic from other areas cross area 0.

Types of OSPF Routers
There are four different types of OSPF routers:
Internal router – This is a router that has all of its interfaces in the same area. All internal routers in an area have identical LSDBs.
Backbone router – This is a router in the backbone area. Generally, the backbone area is set to area 0.
Area Border Router (ABR) – This is a router that has interfaces attached to multiple areas. It must maintain separate LSDBs for each area it is connected to, and can route between areas. ABRs are exit points for the area, which means that routing information destined for another area can get there only via the ABR of the local area. ABRs can be configured to summarize the routing information from the LSDBs of their attached areas. ABRs distribute the routing information into the backbone. The backbone routers then forward the information to the other ABRs. In a multiarea network, an area can have one or more ABRs.
Autonomous System Boundary Router (ASBR) – This is a router that has at least one interface attached to an external internetwork (another autonomous system), such as a non-OSPF network. An ASBR can import non-OSPF network information to the OSPF network, and vice versa, using a process called route redistribution.
Redistribution in multiarea OSPF occurs when an ASBR connects different routing domains (e.g., EIGRP and OSPF) and configures them to exchange and advertise routing information between those routing domains.
A router can be classified as more than one router type. For example, if a router connects to area 0 and area 1, it falls under two different classifications: a backbone router, and an ABR.