Basic Device Configuration
Basic Device Configuration
1.2.3 Auto-MDIX
Switching Concepts
6.1.2 EtherChannel
7. DHCPv4
7.2. Configure a Cisco IOS DHCPv4 Server
10 / 10
8.2.3 Authentication
8.2.4 Authorization
8.2.5 Accounting
8.2.6 802.1X
8.3. Layer 2 Security Threats
4/4
Virtual LANs (VLANs) are a group of devices that can communicate as if each device
was attached to the same cable. VLANs are based on logical instead of physical
connections. Administrators use VLANs to segment networks based on factors such
as function, team, or application. Each VLAN is considered a separate logical
network. Any switch port can belong to a VLAN. A VLAN creates a logical broadcast
domain that can span multiple physical LAN segments. VLANs improve network
performance by separating large broadcast domains into smaller ones. Each VLAN in
a switched network corresponds to an IP network; therefore, VLAN design must use
a hierarchical network-addressing scheme. Types of VLANs include the default
VLAN, data VLANs, the native VLAN, management VLANs. and voice VLANs.
VLAN Configuration
Hosts in one VLAN cannot communicate with hosts in another VLAN unless there is
a router or a Layer 3 switch to provide routing services. Inter-VLAN routing is the
process of forwarding network traffic from one VLAN to another VLAN. Three options
include legacy, router-on-a-stick, and Layer 3 switch using SVIs. Legacy used a
router with multiple Ethernet interfaces. Each router interface was connected to a
switch port in different VLANs. Requiring one physical router interface per VLAN
quickly exhausts the physical interface capacity of a router. The ‘router-on-a-stick’
inter-VLAN routing method only requires one physical Ethernet interface to route
traffic between multiple VLANs on a network. A Cisco IOS router Ethernet interface is
configured as an 802.1Q trunk and connected to a trunk port on a Layer 2 switch.
The router interface is configured using subinterfaces to identify routable VLANs. The
configured subinterfaces are software-based virtual interfaces, associated with a
single physical Ethernet interface. The modern method is Inter-VLAN routing on a
Layer 3 switch using SVIs. The SVI is created for a VLAN that exists on the switch.
The SVI performs the same functions for the VLAN as a router interface. It provides
Layer 3 processing for packets being sent to or from all switch ports associated with
that VLAN.
Enterprise campus LANs use Layer 3 switches to provide inter-VLAN routing. Layer 3
switches use hardware-based switching to achieve higher-packet processing rates
than routers. Capabilities of a Layer 3 switch include routing from one VLAN to
another using multiple switched virtual interfaces (SVIs) and converting a Layer 2
switchport to a Layer 3 interface (i.e., a routed port). To provide inter-VLAN routing,
Layer 3 switches use SVIs. SVIs are configured using the same interface vlan vlan-
id command used to create the management SVI on a Layer 2 switch. A Layer 3 SVI
must be created for each of the routable VLANs. To configure a switch with VLANS
and trunking, complete the following steps: create the VLANS, create the SVI VLAN
interfaces, configure access ports, and enable IP routing. From a host, verify
connectivity to a host in another VLAN using the ping command. Next, verify
connectivity with the host using the ping Windows host command. VLANs must be
advertised using static or dynamic routing. To enable routing on a Layer 3 switch, a
routed port must be configured. A routed port is created on a Layer 3 switch by
disabling the switchport feature on a Layer 2 port that is connected to another Layer
3 device. The interface can be configured with an IPv4 configuration to connect to a
router or another Layer 3 switch. To configure a Layer 3 switch to route with a router,
follow these steps: configure the routed port, enable routing, configure routing, verify
routing, and verify connectivity.
DHCPv4 Concepts
The DHCPv4 server dynamically assigns, or leases, an IPv4 address to a client from
a pool of addresses for a limited period of time chosen by the server, or until the
client no longer needs the address. The DHCPv4 lease process begins with the client
sending message requesting the services of a DHCP server. If there is a DHCPv4
server that receives the message it will respond with an IPv4 address and possible
other network configuration information. The client must contact the DHCP server
periodically to extend the lease. This lease mechanism ensures that clients that
move or power off do not keep addresses that they no longer need. When the client
boots (or otherwise wants to join a network), it begins a four-step process to obtain a
lease: DHCPDISCOVER, then DHCPOFFER, then DHCPREQUEST, and finally
DHCPACK. Prior to lease expiration, the client begins a two-step process to renew
the lease with the DHCPv4 server: DHCPREQUEST then DHCPACK.
A Cisco router running Cisco IOS software can be configured to act as a DHCPv4
server. Use the following steps to configure a Cisco IOS DHCPv4 server: exclude
IPv4 addresses, define a DHCPv4 pool name, and configure the DHCPv4 pool.
Verify your configuration using the show running-config | section dhcp, show ip
dhcp binding, and show ip dhcp server statistics commands. The DHCPv4
service is enabled, by default. To disable the service, use the no service
dhcp global configuration mode command. In a complex hierarchical network,
enterprise servers are usually located centrally. These servers may provide DHCP,
DNS, TFTP, and FTP services for the network. Network clients are not typically on
the same subnet as those servers. In order to locate the servers and receive
services, clients often use broadcast messages. A PC is attempting to acquire an
IPv4 address from a DHCPv4 server using a broadcast message. If the router is not
configured as a DHCPv4 server, it will not forward the broadcast. If the DHCPv4
server is located on a different network, the PC cannot receive an IP address using
DHCP. The router must be configured to relay DHCPv4 messages to the DHCPv4
server. The network administrator releases all current IPv4 addressing information
using the ipconfig /release command. Next, the network administrator attempts to
renew the IPv4 addressing information with the ipconfig /renew command. A better
solution is to configure R1 with the ip helper-address address
interface configuration command. The network administrator can use the show ip
interface command to verify the configuration. The PC is now able to acquire an
IPv4 address from the DHCPv4 server as verified with the ipconfig /all command. By
default, the ip helper-address command forwards the following eight UDP services:
\
1. Проектиране на мрежата (топология)
Офис разпределение по схема
Office 1 – 2 компютъра + 1 принтер
Office 2 - Office 5 – по 1 компютър + 1 принтер
Break Room – Wi-Fi зона (с безжичен рутер/точка за достъп)
Main Router – разположен между мрежата и интернет/ISP
Switch – централен суич за свързване на всички устройства
Сървъри – ще поставим поне 2 сървъра (DHCP и FTP)
2. Проектиране на мрежата (топология) по схемата
Стаите:
Офис 1: Главен офис – има 2 компютъра
Офис 2–5: По 1 компютър и 1 принтер
Break Room / Kitchen: Вероятно без устройства, но ще има Wi-Fi покритие
Мрежови устройства и свързаност:
Рутер: Един централен рутер, свързан към интернет
Суичове: 2 суича
Сървъри: Ще сложим сървъри в отделен VLAN ( за файлове, принтери, DHCP)
Принтери: Един във всеки офис (Офис 1–5)
Wi-Fi точка за достъп: в Break Room
Жична и безжична мрежа: Жична за офисите, безжична в общите помещения
Основна конфигурация:
Именуване на устройства
IP схеми (напр. 192.168.1.2)
DHCP за клиентите (освен сървърите с фиксирани IP)
VLAN-и:
o VLAN 10 – Офиси
o VLAN 20 – Сървъри
o VLAN 30 – Принтери
o VLAN 40 – Wi-Fi
Конфигурация на суич:
hostname SW1
interface vlan 1
ip address 192.168.1.2 (SBM 255.255.255.0)
no shutdown
Активиране на портове, описание, VLAN
enable SSH
Конфигурация на рутер:
hostname R1
ip dhcp pool
Сървъри:
DHCP сървър
Файлов сървър
Принт сървър
Wi-Fi:
SSID: OfficeNet
WPA2 шифриране
Разделяне на мрежа от жичната с VLAN