Overblog
Follow this blog Administration + Create my blog
Cisco & Cisco Network Hardware News and Technology
Recent posts

Focus on CCNA Exam, Two Important Topics

February 6 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

The CCNA might be intimidating at first, especially since Cisco has expanded the scope of the exam to include more advanced topics such as Open Shortest Path First (OSPF) routing which is traditionally only tested in the CCNP and other professional level exams.  Time management during the exam is the number 1 most important thing to do well.  This means scoring easy points when possible and to spend more time focusing on those questions which are harder. 

 

To maximize the chance of passing the CCNA exam, here are 2 most important (in my opinion) topics to focus on for the CCNA:

Subnetting

Learning how to subnet effectively is the most important thing for the CCNA.  It’s also important to be able to size subnets quickly in the real world for network planning and troubleshooting purposes.  Because the CCNA (and any other certification exam) is a test of your time management skills during the test, and subnetting can be done quickly (and 100% correctly) if you know the right technique, it’s a quick way to score easy points.

 

Common subnetting questions include calculating the number of hosts in a subnet, finding if 2 hosts are in the same subnet, and deciding on the correct hostmasks, among others.  Being able so solve such questions quickly means that you will be able to free up valuable exam time to solve other questions.  Answering such calculation questions are a matter of simple calculations and it’s hard to get them wrong once you know how.  Again, the key is speed and you will definitely want to get subnetting questions out of the way as quickly as possible. 

 

Simulation Questions

Simulation questions (commonly now referred to as “sims”) are designed by Cisco to test the practical aspect of Cisco networking.  A simulation of a real Cisco IOS command-line is provided to you and you are expected to troubleshoot or otherwise configure the network to the required specification.

 

These questions are more time consuming but very important.  Only Cisco knows for sure how these are actually scored but it’s very likely that you won’t get enough points to pass the CCNA if you cannot answer all the simulation questions to a satisfactory level.  The CCNA passing score gets higher all the time, which makes scoring high on the simulation questions a priority.

 

One good thing about using simulation questions is that you’ll be able to gauge roughly how well you’ve done by showing the running configuration and running other tests such as ping and using other show commands.  A good way to prepare for the exam is to use a Cisco router simulator.

 

More guide and tips about CCNA: Best Path for Getting Your CCNA Certification

 


 

Read more

Cisco Ethernet Switches Make Big Leap to 40/100G

February 3 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Switches - Cisco Firewall

Cisco unveiled significant extensions to both of its major switching lines with the addition of 40/100G Ethernet capabilities.

 Cisco-Catalyst-Series-copy-1.jpg

The enhancements are intended to address the growth of 10G Ethernet in data centers, which Dell’Oro Group forecasts will be the major revenue contributor to Ethernet switching in the next five years. Growth in 10G necessitates larger pipes between switches to aggregate those links and forward traffic at faster rates to alleviate congestion and keep network operations running optimally, especially with trends like cloud, video and mobility sending more packets in all different directions.

 

Cisco is adding 40G Ethernet to its Catalyst 6500 switching line, and 40/100G Ethernet to its Nexus 7000 switch to aggregate 40G at the core, and interconnect data centers to service providers.

 

Cisco also rolled out two fixed configuration switches for high-density 10G Ethernet in campus aggregation and data center top-of-rack deployments.

 

And in an effort to bring legacy infrastructures into the virtual world, Cisco unveiled network virtualization capabilities for its Catalyst 6500, 4500 and ASR 1000 product lines, as well as a new data center appliance for scalable virtual services.

 

Cisco is offering two modules for the Nexus 7000: a two-port 100G Ethernet board, which would provide the switch with up to 32 non-blocking 100G Ethernet ports; and a six-port 40G Ethernet module which would provide up to 96 non-blocking 40G ports for the switch.

 

Of the major switching vendors, only Brocade is offering 100G Ethernet on a core platform -- its MLX series switching routers. Several other vendors are already offering 40G fixed, modular and uplink ports on their switches.

 

The technology has yet to go gangbusters though.

Notes: More News of Cisco Updates Its High-end Switches

 

"We see sporadic implementation" of 40/100G Ethernet, says Jon Oltsik, an analyst at Enterprise Strategy Group. "Cisco’s one of the first big players to go mainstream with it. It’s good for marketing – they’ll be perceived as a high-performance vendor."

 

Cisco also unveiled the Nexus 3064-X, which had been expected. The 3064-X is aimed at low latency financial services environments and features 48 1/10G Ethernet ports plus four 40G links.
And the company’s Nexus 1000V virtual switch, which resides on blade servers like the Cisco Unified Computing System, now supports the Virtual Extensible LAN (VXLAN) workload scaling capability Cisco announced last summer.

 

VXLAN is also new in Cisco’s Nexus 1010 new virtual services appliance. The VXLAN version is called the Nexus 1010-X and it is a dedicated hardware platform for provisioning and scaling network services in virtualized environments, like data centers and clouds.

 

For the campus environment and the Catalyst line, Cisco unveiled the Catalyst 6900 Series 40 Gigabit Ethernet Interface Module for the flagship Catalyst 6500 switch. It allows the switch to support up to 44 40G ports.

 

Cisco also rolled out the Catalyst 4500-X, a fixed aggregation switch targeted at space-constrained campus networks. It supports up to 40 10G Ethernet ports and 1.6Tbps of switching capacity through Cisco’s Virtual Switching System redundancy technique. It also includes support for Medianet video and NetFlow analysis services.

 

Lastly, Cisco unveiled software for its campus switches and routers designed to simplify network virtualization. Cisco Easy Virtual Network (EVN) runs on the Catalyst 6500 and 4500 switches, and ASR 1000 edge router, and allows operators to more easily create separate logical networks on a single physical infrastructure.

 

And in the data center, Cisco added features to the Nexus NX-OS operating system such as PowerOn Auto-Provisioning and Python scripting to customize network behavior based on events as they happen. These features are now available on Nexus 3000 series platforms, and planned for the Nexus 2000 and 5000 switches.

 

The 40/100G modules for the Nexus 7000 will be available in the second quarter. The 6900 module for the Catalyst 6500 will be available in April. The Nexus 3064-X will be available in March.                         

---Original News from Networkworld.com

Read more

Cisco 1941W Enables Borderless Networks at the Branch

February 2 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

The Cisco 1941W Integrated Services Router (ISR) delivers highly secure data, mobility, and application services.

Cisco-1941w.jpg

 

Cisco 1941W is a true solution in terms of delivering pure security for your transmitted data, application as well as for security of your mobility over wired or especially designed wireless network whether it is at home or the network is prepared for your small office. This ISR router of 1900 series has Ethernet ports (2 same ports) of 10Mbps, 100Mbps and 1000Mbps speed.

 

Cisco 1941W router also comes with (e)HWIC’s 2 slots that are able of supporting or hosting 1 single wide Enhanced High-Speed WAN Interface Card as well as of 2 single wide or you may say 1 double wide card. Wireless Access Point is also supported by 1941W router through built-in 802.11n technology. Power distribution is also fully integrated to this router just to support Cisco Enhanced Power of Ethernet as well as 802.3a PoE.

 

VPN encryption through accelerated hardware (embedded hardware rather) is also supported by Cisco 1941W Integrated Services Router and this 1900 series’ router has identity management support as well which is normally done through public key infrastructure’s usage as well as through the usage of authorization, authentication and accounting method i.e. “AAA”.

 

Integrated threat control functionality of Cisco 1941W is as same as it is seen in 1941 router of 1900 series who provides it (threat control functionality) through IOS IPS of Cisco, IOS Zone-Based Firewall of Cisco, IOS Content Filtering of Cisco and finally IOS Firewall of Cisco. Mobility in this router is supported through 5 GHz mode of 802.11a/n as well as through 2.4 GHz mode of 801.11/b/g/n of radio signals.

 

Quick View: Key features of Cisco 1941W include:

  • 2 integrated 10/100/1000 Ethernet ports
  • 2 Enhanced High-Speed WAN Interface Card slots that can host 2 single wide or 1 double wide and 1 single wide (e)HWIC
  • 1 integrated 802.11n Wireless Access Point
  • Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and Cisco Enhanced PoE
  • Security
    • Embedded hardware-accelerated encryption for VPN
    • Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN
    • Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering
    • Identity management that uses authentication, authorization and accounting (AAA), and public key infrastructure
  • Mobility
    • The integrated access point offers IEEE 802.11n draft 2.0 support for mobile access to high-bandwidth data, voice, and video
    • The access point supports both unified and autonomous deployments and is supported by a wireless LAN controller and the Cisco Wireless Controller System
    • IEEE 802.11n technology delivers outstanding reliability and up to nine times the throughput of current IEEE 802.11 a/b/g networks
    • Dual radios for 2.4-Ghz 802.11b/g/n. and 5-GHz 802.11a/n modes
Read more

From Technical User: Open Port 873 on Cisco 1921

February 1 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

Caskibum’s Problem of Opening Port 873 on Cisco 1921

I have a Cisco 1921 and need to open ports 22 (SSH) and 873 (rsync) to run an rsync server on my network and the rest of the network needs standard "internet" access.  I am fairly new to Cisco ACLs and so I expect I'm doing something stupid but not sure what. When I add the ip access-group XXX in / out to the gig0/0 interface, I lose all www functionality at that point. Here is my current (working) config with the ACLs listed (101 and 102) but not enabled on the gig0/0 interface. I have tried the "established" statement at the start and end of the 101 list, no difference. Thanks for any help!
Router#show run
Building configuration...
Current configuration : 2675 bytes
!
! Last configuration change at 15:03:45 UTC Sun Dec 18 2011 by
!
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$Sx2k$wiHT8Af585IB/HsSZkwC61
enable password 7 073E325F19190C1D47
!
no aaa new-model
!
no ipv6 cef
ip source-route
ip cef
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 10.1.0.1 10.1.0.149
ip dhcp excluded-address 10.1.0.200 10.1.0.254
!
ip dhcp pool net_dhcp
   import all
   network 10.1.0.0 255.255.255.0
   default-router 10.1.0.1
   lease 0 0 5
!
!
no ip domain lookup
ip domain name treeskier.ca
multilink bundle-name authenticated
!
!
!
license udi pid CISCO1921/K9 sn FGL15092836
!
!
username blah password blahblah
!
!         
ip ssh version 2
!
!
!
!
interface GigabitEthernet0/0
 description Internet
 ip dhcp client update dns
 ip address dhcp
 ip nat outside
! ip access-group 101 in
! ip access-group 102 out
! once I turn these on, it all dies.
 ip virtual-reassembly
 duplex auto
 speed auto
 no cdp enable
 no mop enabled
!
interface GigabitEthernet0/1
 description internal
 ip address 10.1.0.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 duplex auto
 speed auto
 no mop enabled
!
ip forward-protocol nd
!
ip http server
ip http authentication local
no ip http secure-server
!
ip nat inside source list 1 interface GigabitEthernet0/0 overload
ip nat inside source static tcp 10.1.0.102 873 interface GigabitEthernet0/0 873
ip nat inside source static tcp 10.1.0.102 22 interface GigabitEthernet0/0 22
!
access-list 1 permit 10.1.0.0 0.0.0.255
access-list 1 remark INSIDE_IF=gig0/1
access-list 101 permit tcp any 10.1.0.0 0.0.0.255 established
access-list 101 permit tcp any host 10.1.0.102 eq 22
access-list 101 permit udp any host 10.1.0.102 eq 22
access-list 101 permit tcp any host 10.1.0.102 eq 873
access-list 101 permit udp any host 10.1.0.102 eq 873
access-list 102 permit tcp 10.1.0.0 0.0.0.255 any
access-list 102 permit udp 10.1.0.0 0.0.0.255 any
dialer-list 1 protocol ip permit
!
!         
!
control-plane
!
banner login ^C**************************^C
!
CON and VTY setup
!
scheduler allocate 20000 1000
end
A bit of really basic troubleshooting:
Router#sh access-lists
Standard IP access list 1
    10 permit 10.1.0.0, wildcard bits 0.0.0.255 (9854736 matches)
Extended IP access list 101
    10 permit tcp any 10.1.0.0 0.0.0.255 established
    20 permit tcp any host 10.1.0.102 eq 22
    30 permit udp any host 10.1.0.102 eq 22
    40 permit tcp any host 10.1.0.102 eq 873
    50 permit udp any host 10.1.0.102 eq 873
Extended IP access list 102
    10 permit tcp 10.1.0.0 0.0.0.255 any
    20 permit udp 10.1.0.0 0.0.0.255 any

Router#sh ip nat translations
Pro Inside global         Inside local          Outside local         Outside global
tcp 192.168.0.10:22       10.1.0.102:22         ---                   ---
tcp 192.168.0.10:873      10.1.0.102:873        ---                   ---
tcp 192.168.0.10:54693    10.1.0.150:54693      208.88.180.96:80      208.88.180.96:80
tcp 192.168.0.10:54695    10.1.0.150:54695      208.88.180.96:80      208.88.180.96:80
tcp 192.168.0.10:54696    10.1.0.150:54696      208.88.180.106:5222   208.88.180.106:5222
tcp 192.168.0.10:54699    10.1.0.150:54699      208.88.181.46:1935    208.88.181.46:1935
tcp 192.168.0.10:54700    10.1.0.150:54700      208.88.180.96:80      208.88.180.96:80
... (more dynamic NAT at work)

 

Reply to Caskibum from Imbadatthis

You aren't allowing DNS in .

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080100548.shtml#allowdns 

also a nice to know:

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080100548.shtml#debugtraffic

 

After Imbadatthis ‘s Reply

Caskibum solved problems like this:

Thanks for the response. 

I actually sorted it out last night, my "new" cable modem was blocking the port forwarding before it got to the router.  So once I set up the NAT port forwarding on the cable modem, all good now.

Just FYI, I've ended up with a much simpler ACL and NAT setup:

!

ip nat inside source list nat-acl interface GigabitEthernet0/0 overload

ip nat inside source static tcp 10.1.0.101 873 interface GigabitEthernet0/0 873

ip nat inside source static tcp 10.1.0.101 22 interface GigabitEthernet0/0 22

!

ip access-list extended nat-acl

 permit ip 10.1.0.0 0.0.0.255 any

 permit tcp any host 10.1.0.101 eq 22

 permit tcp any host 10.1.0.101 eq 873

!

!

Best Regards

 

More discussion between these two buddies to talk about Opening port 873 on Cisco 1921

Imbadatthis: So you've removed both acl 101 and 102?

 

Caskibum:

Yep, the only ACL is the named extended list, which is applied on the outside interface in the overload command. I could have probably left them in place, I found this "alternate" solution with the named extended list as it is now, and then after that didn't work either I went to the cable modem and found the source of the problem.  I expect the 101 / 102 acls are fine if I were to use them. Then the two static NAT commands to handle the traffic direction. Seems to be working. I'm no security expert so if this leaves some gaping hole please let me know and I'll rework it.

Cheers!

 

 

Read more

Configuring VTP on a Cisco Switch

January 30 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Switches - Cisco Firewall

During the early days of networking, it was difficult to implement VLANs across networks. Each VLAN was manually configured on each network switch. Managing a large switched network used to be a complicated tasks, VLAN trunking methods has helped to ease this problem.

 

 VLAN Trunking Protocol (VTP) is a Cisco Proprietary which basic aim is to manage all configured VLANs across a switched network.  VTP helps to propagate and maintain VLAN configurations consistency to other switches on the network.

 

VTP is a messaging protocol that uses layer 2 trunk frames to add, delete and rename VLANs on a single domain. It helps to centralize changes which are sent to other switches on the network.

 

A switch had to be configured in the role of a VTP server to manage your VLAN configuration on your network. The sever(s) will share VLAN information with other switches on the network which must use the same domain name.

 

VTP learns only normal-range VLANs (VLAN IDs 1 to 1005).

The primary role of VTP is to maintain VLAN configuration consistency across a network administration domain.

 

VTP stores VLAN configurations in the VLAN database called vlan.dat.

After a trunk is established between switches, VTP advertisement is exchanged between the switches. Both the server switch and client exchange and monitor advertisement from one another to ensure each has an accurate record of VLAN information. VTP advertisement will not be exchanged if the trunk between the switches is inactive.

 

 

In the diagram above, a trunk link is configured between switch S1, - VTP Server, S2 and S3 - VTP client. After a trunk is established between the switches, VTP summary advertisement is exchanged among the switches.

 

More Notes:

VTP Configuration Guidelines 

Follow these steps to configure a Cisco Catalyst switch to use VTP successfully:

 

VTP Server Switches 

i. Before you begin configuration, ensure that all of the switches are set to their default settings.

 

ii. Always reset the configuration revision number before installing a previously configured switch into a VTP domain. Not resetting the configuration revision number allows for potential disruption in the VLAN configuration across the rest of the switches in the VTP domain.

iii. Configure at least two VTP server switches in your network. Because only server switches can create, delete, and modify VLANs, you should make sure that you have one backup VTP server in case the primary VTP server becomes disabled. If all the switches in the network are configured in VTP client mode, you cannot create new VLANs on the network.

 

iv. Configure a VTP domain on the VTP server. Configuring the VTP domain on the first switch enables VTP to start advertising VLAN information. Other switches connected through trunk links receive the VTP domain information automatically through VTP advertisements.

 

v. If there is an existing VTP domain, make sure that you match the name exactly. VTP domain names are case-sensitive.

 

vi. If you are configuring a VTP password, ensure that the same password is set on all switches in the domain that need to be able to exchange VTP information. Switches without a password or with the wrong password reject VTP advertisements.

 

vii. Ensure that all switches are configured to use the same VTP protocol version. VTP version 1 is not compatible with VTP version 2. By default, Cisco Catalyst 2960 switches run version 1 but are capable of running version 2. When the VTP version is set to version 2, all version 2 capable switches in the domain auto configure to use version 2 through the VTP announcement process. Any version 1-only switches cannot participate in the VTP domain after that point.

 

viii. Create the VLAN after you have enabled VTP on the VTP server. VLANs created before you enable VTP are removed. Always ensure that trunk ports are configured to interconnect switches in a VTP domain. VTP information is only exchanged on trunk ports.

 

VTP Client Switches 

i. As on the VTP server switch, confirm that the default settings are present.

ii. Configure VTP client mode. Recall that the switch is not in VTP client mode by default. You have to configure this mode.

iii. Configure trunks. VTP works over trunk links.

iv. Connect to a VTP server. When you connect to a VTP server or another VTP-enabled switch, it takes a few moments for the various advertisements to make their way back and forth to the VTP server.

v. Verify VTP status. Before you begin configuring the access ports, confirm that the revision mode and number of VLANs have been updated.

vi. Configure access ports. When a switch is in VTP client mode, you cannot add new VLANs. You can only assign access ports to existing VLANs.

 

Read more

Cisco 7600 Series Router, Ideal for Enterprise WAN Aggregation

January 19 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

Ideal for Enterprise WAN aggregation or service provider environments, Cisco 7600 series is the industry's first carrier-class edge router to offer integrated, high-density Ethernet switching, carrier-class IP/MPLS routing, and 10-Gbps interfaces, benefiting enterprises and helping enable service providers to deliver both consumer and business services over a single converged Carrier Ethernet network.

Cisco-7600.jpg

 

The Cisco 7600 Internet Router delivers optical wide- and metropolitan-area network (WAN and MAN) services with high-touch IP services at the network edge. Now, service providers (SPs) and enterprises can "service enable" their networks at optical speeds, providing competitive advantage and service differentiation to the SP and high-speed connectivity and link usage efficiency to the enterprise.

 

 

Cisco 7600 Router’s Key Features

High performance, with up to 720 Gbps in a single chassis, or 40 Gbps capacity per slot

A choice of form factors purpose-built for high availability

Cisco I-Flex design: A portfolio of shared port adapters (SPAs) and SPA interface processors (SIPs) that controls voice, video, and data experiences

Scalable and extensible suite of hardware and software capabilities to enable intelligent Carrier Ethernet services

Integrated Video Call Admission Control with innovative visual quality of experience for both broadcast and video on demand (VoD)

Intelligent Services Gateway, providing scalable subscriber and application awareness with multidimensional identity capabilities and policy controls

Integrated Session Border Control with quality of experience in both Session Initiated Protocol (SIP) and non-SIP applications

 

What Cisco 7600 series Supports

Supports Services modules such as IPsec, firewall, SSL VPN

Intrusion Prevention System (IPS) Modularity

Chassis supports up to 4-, 6-, 9-, and 13-slot chassis for redundant supervisors and line cards

Supervisor engines supporting up to 15 Mpps with broad range of edge services

Support for Shared Port Adapter (SPA) and SPA Interface Processors (SIP), which offers intelligent services.

Supports up to 12 SPA bays

Support for the Enhanced FlexWAN module, which offers Port Adapter investment protection

 

Cisco 7600 Router’s Price & Availability

Cisco 7600 series ranges from US$5000 to US$20000, not all the types are required by enterprise head offices. There are some 7600 series items such as Cisco 7606, Cisco 7609, Cisco 7609-S, Cisco 7606-S; these are popular among large enterprises. Prices of Cisco 7606 and Cisco 7609 are available here:

CISCO7606: List price: US$6,000.00 / Wholesale Price: US$2,940.00

CISCO7609: List price: US$10,500.00 / Wholesale Price: US$5,145.00

CISCO7606-S: List price: US$6,000.00 / Wholesale Price: US$2,940.00

CISCO7609-S: List price:  US$10,500.00 / Wholesale Price: US$5,145.00

 

If you want to know more pricing and purchasing information of Cisco router and other Cisco IT equipments, you can visit Cisco router at Router-switch.com…

Read more

How to Use the Cisco Aironet 1242?

January 18 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

The Cisco Aironet 1242 is a wireless access point created by Cisco. The main difference between this device and most other Cisco products is that the Aironet1242 provides support for mesh wireless networks. Mesh networks extend wireless network range by relaying information from an access point to other access points, instead of requiring that each access point have its own wired backbone connection.

Cisco Aironet 1240 Series

 

Ethernet cable you first need

 

Instructions to Use the Cisco Aironet 1242

1. Power on the 1242.

 

2. Connect your network switch to the "Ethernet" port on the back of the 1242, using the Ethernet cable.

 

3. Log in to any computer connected to the same network switch. Click "Start," then "Programs." Select "Accessories" and "Telnet." A new Telnet window will come up.

 

4. Click "Connect," then "Remote system" on the Telnet window. Type the Internet Protocol (IP) of the 1242; the default is 192.168.1.1. Click "Connect."

 

5. Type the following commands into the Telnet session to configure an IP address for the 1242:

configure terminal

interface bvi1

IP address 192.168.40.9 255.255.0.0

Replace "192.168.40.9" and "255.255.0.0" with the IP address and network mask, respectively, assigned to the 1242 by your network's administrator. Press "Enter" after each command.

 

6. Launch a Web browser on the computer and navigate to the Web address "http://192.168.40.9" (replace the IP address with the one assigned in Step 5). Type "Cisco" as the user name and "Cisco" as the password, then press "Enter." The 1242's configuration utility will come up on the browser.

 

7. Click "Express Set-up." Type a host name of your choice if the default value is already being used by another 1242 on the same network. Select "Enable" for the "Aironet Extensions" for both the 802.11a and the 802.11g radios. Click "Apply." At that point, the 1242 will provide a wireless network ready for client computers to join.



More Related: Password Recovery on Cisco 1242 Access Point

 



Read more

CCNA Certification: IPv6 Features

January 16 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

Main Feature of IPv6 

IPv6 address a lot concerns and issues that are faced today in using IPv4. Cisco CCNA Certification requires that a candidate must have a general overview of IPv6 and what new features it brings into the world of networking. Here we will go through some of the features of Internet Protocol Version 6 (IPv6).

 

The main feature of IPv6 are described in the sections below

Larger Address Space 

IPv6 addresses are 128-bits long which gives us a theoretical address space of 3.4 x 1038 addresses, like IPv4 some address space is reserved for special purpose but still there is a huge number of public routable addresses.

 

Aggregation 

A larger address space allows for large address allocations to ISPs and Organization. This allows them to use a single prefix for the entire network making summarization easy and flexible which turn promotes efficient and scalable routing.

 

New Improved Header Format

Optional and non-essential fields are removed from the IPv6 Header and are moved the Extension Header that is placed after the IPv6 Header. Fewer fields of fixed lengths mean Header overhead is minimized and processing performance is improved.  Another significant enhancement is that all routers in a path do need to do checksum recalculation for an IPv6 Packet instead error detection is handled by data-link layer technologies checksums of the end-to-end connection at transport layer. 

Allocation

IPv6 addresses are composed of two parts, 64-bit Network Prefix and 64-bit host part. The IPv6 address allocation follows a generally acceptable assignment policy as shown in figure 1. This allows for an efficient, hierarchical, and summarizable routing infrastructure.

 

Easy Address Assignment Methods

IPv6 has three assignment methods

  • Static
  • DHCPv6 (Stateful)
  • Autoconfiguration (Stateless)

An IPv6 host can configure a link-local address for each interface automatically. By using ICMPv6 router discovery messages, a host can also determine the addresses of routers, additional addresses, and other configuration parameters.

 

Built-in Security

IPSec is built into IPv6 unlike IPv4 in which it is optional. IPSec requirement is mandatory in IPv6 Protocol Suite Implementation. IPv6 networks have potentially more end-to-end security because of IPSec availability on all nodes.

 

Extensibility

New futures for IPv6 can be added through the use of Extension Headers. At present there are various Extension Headers specified for QoS, Security, Mobility and Routing purposes.

 

Mobility

Mobility is built in to IPv6 which allows any node to use Mobile IP. Mobility is achieved using Mobility Extension Headers.

 

Better Quality of Service Support

IPv6 Header includes a new field called Flow Label that allows routers to identify and provide special handling for packets that belong to a particular flow. This field allows for easier identification of traffic without doing any tricks even when the packet payload is encrypted with IPSec.

 

Neighbor Discovery Protocol

Neighbor Discovery Protocol uses ICMPv6 messages to perform various functions such as

  • Stateless Auto-configuration
  • Router Discovery
  • Prefix Discovery
  • Address Resolution
  • Neighbor Unreachability Detection
  • Link MTU Discovery
  • Duplicate Address Detection
  • Next Hop Determination

 

Transition

The transition options supported by IPv6 to transition from IPv4 are another key feature of the protocol. Many Transitions mechanism are available for different scenarios. They are mentioned below

  • Dual-Stack
  • Tunneling IPv6 over IPv4 networks
  • Protocol Translation

 

Within each option are various different techniques to support transition. A few tunneling mechanism are mentioned below

  • Static GRE Tunnels
  • 6to4 Tunnels
  • ISATAP
  • Automatic IPv4-Compatible IPv6 Tunnels

 

These rich features of IPv6 enable easy deployment, migration and operation of IPv6 networks.

 

Read more

How to Make Your Web Site Popular?

January 13 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

Anyone can put up a web site. The hard part is helping people discover it, and then stay with it. Your first priority: Make your site people friendly. Your second: Make it search-engine friendly.

Make-Your-Web-Site-Popular.jpg

Here are a few more specific suggestions:

Design it well. Make it pleasing to the eye, and easy to navigate. If the site has a lot of pages, develop a structure that people can easily navigate, rather than throwing too many links up at once.

 

Write well. Re-read your text before posting it. Correct spelling and grammar errors. Use clear and concise language.

 

Stick to your subject(s). Don't be all over the map with content. Keep the site focused, at most, on a handful of topics that you're passionate about.

 

Link with words, not pictures. For web navigation, a word is worth a million pictures. A link that reads "The eternal allure of the Three Stooges" says more about the page it leads to than a photo of Larry, Moe, and Curly. That holds true for search engines as well as for people.

 

Use title and description tags. Search engines give priority to the text in these tags, and usually display their contents in result pages. So think carefully about what you want to put here.

 

Try to read your title through the eyes of a stranger. It should clearly describe the page. See the comments on this post to see how I messed up in this area.

 

And where do you put this text? In your page's HTML code, the title text goes between the <title>and </title> tags. The description goes inside a meta tag that looks something like this:

·         <meta name="description" content="This is where you put the content of your description. It can be longer and thus more descriptive than a title." />.

 

Describe your images. When you do use pictures, give them descriptive file names. Also, describe the picture in the image tag's alt attribute. The Alt text is there for people who can't see the images, but it also helps search engines. In the HTML code, that tag looks something like this:

 

·         <img src="http://urltopicture/filename.jpg" alt="Put your alt text here" />.

 

Finally, links can be extremely helpful in drawing people to your site. That's one of several reasons why I always suggest that people read the original forum discussion. And then I include additional links in the italicized "bio" paragraph below.

 

More news and info about  networking you can visit: http://blog.router-switch.com/

 

Read more

Overview on CISCO 7200VXR Series Routers

January 12 2012 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Routers

With processing speeds up to 2 million packets per second, port- and service adapters ranging from NxDS0 to Gigabit Ethernet, and OC-3 as well as an unparalleled number of high-touch IP services, the Cisco 7200 VXR series is the ideal Services Aggregation WAN/MAN edge device for enterprises and service providers deploying any of the following solutions:

WAN edge-Award-winning quality-of-service (QoS) feature performance

Broadband aggregation-Up to 16,000 Point-to-Point Protocol (PPP) sessions per chassis

Multiprotocol Label Switching provider edge (MPLS PE)-Number one choice for provider edge deployment today

Voice/video/data integration-Time-division multiplexer (TDM)-enabled VXR chassis and voice port adapters

IP-to-IP Gateway Support-Direct IP-interconnections

IP Security virtual private networking (IPSec VPN)-Scalable to 5,000 tunnels per chassis

High-End Customer Premises Equipment (CPE)-For managed WAN services saving equipment, transport and administrative cost

 

The Cisco 7200 VXR addresses these solution requirements by integrating functions previously performed by separate devices into a single platform. Through this integration, the Cisco 7200 VXR provides a single, cost-effective platform that supports:

• High-density LAN and WAN interfaces

• Broadband subscriber services aggregation, including PPP, RFC 1483 termination, and Layer 2 Tunneling Protocol (L2TP) tunneling

• Digital T1/E1 TDM trunk termination for voice, video, and data

• High-density multichannel T3/E3 and T1/E1 with integrated channel service unit/data service unit (CSU/DSU)

• ATM and Packet over SONET (POS) connectivity

• ATM IMA (Inverse Multiplexing over ATM) for voice, video, and data

• Light-density Layer 2 Ethernet switching

 

 The Cisco 7200 VXR Router Series with Network Processing En

The Cisco 7200 VXR Router Series with Network Processing Engine NPE-G2

 

The Cisco 7200 VXR Series offers a rich set of capabilities that address requirements for performance, density, high reliability, availability, serviceability, and manageability.

 

Cisco 7200 VXR Features and Benefit

Features

Benefits

Up to 2 Mpps Processing Capability

Provides high-performance routing and processing performance

Maximum Connectivity Options

Meets a variety of topology requirements with the widest range of port densities and interface options

Breadth of Services

Supports QoS, security, MPLS, broadband, multiservice, voice, IP-to-IP Gateway and management features for next-generation networks

Investment Protection

Low initial investment with upgrade and redeployment capability

 

Hardware for Cisco 7200 VXR Series Router includes:

7204 VXR or Cisco 7206 VXR chassis

• Network Processing Engine

• Input/Output controller

• Processor memory

• Input/Output controller memory

• Power supply

• Console and auxiliary cables

• Second power supply, accessories

• Port adapters

• Service adapters

 

More Notes: If you need to know more about Cisco 7200VXR series (for enterprise head offices and service provider edge), such as its applications, Specifications--- Cards, Ports, Slots; Components--- Chassis, Environmental Conditions; Processors, Input/Output Controllers, Port Adapter Jacket Card, Interfaces, Performance---Memory; Network Management, Power; Protocols; Product Regulatory Approvals and Compliance; Software Requirements, you can visit Cisco's official website...

Read more