TTL Bits

Author Archives: TTL Bits

Introduction to DHCP (Dynamic host configuration protocol)

 Today I am going to talk about the most interesting topic named as DHCP. I knew lot of you guys already knew about the DHCP and how it works in the real network environment but some of you are the beginners in the field of networking and this is why it is one of the most important topic for them.

Why we use the DHCP server and what is the purpose of the DHCP ?

Well Routers, servers, other key nodes require specific or static IP address and Clients can use an IP from a pool of available addresses. Minimum host configuration for Internet:
  • IP address
  • Subnet mask
  • Default gateway
  • DNS server IP

DHCP allows network administrator to assign a pool of available IP addresses for clients with additional configuration information such as default gateway, DNS IP, WINS IP, domain names
Addresses are leased, Cisco default is 24 hours

Fig 1.1- DHCP Server


DHCP process
·      Client boots up, sends a DHCPDISCOVER broadcast
·      All available DHCP servers respond with DHCPOFFER containing proposed IP address, lease time, DNS IP; server checks that IP offered is not in use before making the offer by issuing a default 2 pings

Basics on Riverbed WAN optimization Solution

Today I am going to talk about basics of Riverbed WAN optimization solution. WAN optimization solutions that deliver broad-spectrum improvement of WANs and the name comes into the mind is Riverbed WAN optimization solution. With Riverbed products, enterprises can implement solutions that help them empower their distributed workforce while eliminating IT capital expenditures and simplifying IT management. 
  • With the help of Riverbed enterprise can Centralize distributed infrastructure like file servers, mail servers, network attached storage (NAS), and remote office backup systems without affecting remote users 
  • It is a challenge to share large files but with the help of riverbed you can share large files among colleagues on different continents 
  • Are you afraid of backup and replication over WAN links, well with Riverbed you can perform backup and replication over long distance WAN links and will have complete them during backup windows that were unachievable just a year ago 
  • Enterprises need not to upgrade the bandwidth of their WAN circuits as with the Riverbed you can deliver significantly more services on existing WANs 
Fig 1.1- Riverbed Steelhead deployment in WAN

If you guys aware of the TCP, TCP has a window of packets that can be Continue reading

Introduction to Brocade 6510 Switch


Today I am going to talk about the Brocade 6510 Switch with the specifications and the details. Brocade 6510 switch features up to 48 ports of Gen 5 Fibre Channel technology with specifications suitable for hyper-scale, private cloud, virtualized, and other high-bandwidth Fibre Channel environments. 

Fig 1.1- Brocade Fiber Switch with Cisco Nexus 5K Switch Testing

With an aggregate 768Gb/s throughput and an 18-inch deep 1U footprint, the 6510 supports 2, 4, 8, 10, or 16 Gb/s Fibre Channel across 24, 36, or 48 ports of connectivity and with a feature set that can be extended via add-on licenses for a wide variety of usage scenarios. 

The Brocade 6510 represents best-of-class Fibre Channel SAN switching, which is an important asset to the Storage Review Enterprise Storage Lab in order to ensure that network components do not bottleneck storage devices during SAN benchmarks.

Fig 1.2- Brocade VCS Fabric Extension Over Brocade 6510 Switch
Let's talk about the Brocade Switch Specifications in detail. Above is the sample diagram showing the use of the Brocade VCS and below is the specifications of the Switch.

Brocade 6510 Switch Specifications
  • Fibre Channel ports: Switch mode (default): 24-, 36-, and 48-port configurations Continue reading

Easy and Simple 11 Steps to configure Cisco DSL Router

Today I am going to talk about the easy and the simple 11 steps to configure the DSL configuration. Below is the basic setup of the DSL router in the network.


Fig 1.1- Cisco DSL Topology
The above shown diagram is just an example of DSL connection and below is the sample configurations on the cisco routers. Let's talk about the 11 steps to configure the Cisco DSL router now.


Step 1
Configure service time stamp to properly log and display debug output in the troubleshooting section.

ttlbits_router#configure terminal
ttlbits_router(config)#service timestamps debug datetime msec
ttlbits_router(config)#service timestamps log datetime msec
ttlbits_router(config)#end

Step 2
Disable the logging console on your Cisco DSL Router to suppress console messages that may be triggered while you are configuring the router.

ttlbits_router#configure terminal
ttlbits_router(config)#no logging console
ttlbits_router(config)#end

Step 3
Configure IP routing, IP subnet−zero, and ip classless to provide flexibility in routing configuration options.

ttlbits_router#configure terminal
ttlbits_router(config)#ip routing
ttlbits_router(config)#ip subnet−zero
ttlbits_router(config)#ip classless
ttlbits_router(config)#end

Step 4
Configure an IP address and subnet mask on the Cisco DSL Router Ethernet interface. Enable NAT inside on the Ethernet interface.

ttlbits_router#configure terminal
ttlbits_router(config)#interface ethernet 0
ttlbits_router Continue reading

NAT- Network Address Translation types and configurations

Today I am going to talk about the NAT which stands for Network Address Translation of the IPs in your network. NAT is one of the most important topic of the network space and is used in almost all the enterprise networks. With the help of NAT you can save your IPs from the public domain.

Now question is Why we are in need and the purpose of NAT ?
What kinds of NAT is there, we are using ?
How configurations looks line if we are using the NAT in our networks ?
How it helps me in my network ?

I knew we have multiple questions on NAT and i also knew that many of you guys already knew about the NAT, the concept and the configuration part. This post is generally for the new comers in the network space who really want to understand the basics of it. Lets start from the beginning why and where to start from.

Why we required NAT:

Its a kind of shortage of the public IPv4 address space has forced the all of us to think harder about alternative ways of addressing networked hosts. Network Address Translation (NAT) therefore was introduced to overcome these addressing Continue reading

Interview Questions for CCNA Candidates with Answers- Basics II


After out Part-I, we are again with Part-II

CCNA Interview Questions

What command copies router configuration from NVRAM to a file server? 
copy startup-config tftp

What command assigns and enables IPX on an interface? 
ipx network 4a

How does TCP provide flow control and error checking? 
Acknowledgements and windowing.

Using Cisco IOS, what PPP data compression methods can be used?  
Stacker and Predictor.

What command can verify Application layer connectivity? 
Telnet.

What command switches from User to Privileged mode? 
enable

What command will deny all telnet traffic from subnet 2.1.3.0? 
deny all telnet traffic from 2.1.3.0

Which of the following exist at the Transport Layer?
LLC
IP
SQL
UDP*
ARP

What command line keyword matches Ethernet_SNAP? 
snap

Among the five classes of TCP/IP addresses, how many are available to the public? 
3.

After entering the command ‘router igrp 50,’ what command enables IGRP on the router for interace E1, with an address of 155.88.3.5 and a mask of 255.255.255.0? 
network 157.89.0.0

In what OSI layer do EBCDIC and ASCII exist? 
Presentation.

What command Continue reading

The Concept of Native VLAN

Today I am going to talk about one of the most interesting topic and its none other than Native VLAN. I knew most of you guys know the concept and the requirement of the Native VLAN and most of you already using and configuring the same in your network environment. But there are so many people just starting studying the basics of the networking and this is one of the most important topic to understand the basics of switching. 

In my example I am taking the Cisco devices where I will show the Native VLAN working and the configurations of the Native VLAN on the devices.

So my first question is What is Native VLAN ?
What is the Use of the Native VLAN ?
When and where to use the Native VLAN concept ? 
Standards of the Native VLANs ?

I knew there are lot of questions in your mind, So lets start with the beginning on the Native VLAN part. The IEEE 802.1Q trunking protocol describes some thing called the “native VLAN”. All site visitors sent and acquired on an interface that is configured for 802.1Q gained have a tag on its Ethernet body. whilst you look Continue reading

Discovery Protocols- CDP and LLDP

Today I am going to talk about the CDP and LLDP protocols. As you guys already knew of CDP, I think most of you are using this command in your daily use to find the connected devices in Cisco devices environment while LLDP is same as CDP but it is a standard protocol for all other Vendors.

So If I am talking about the CDP, CDP Stands for Cisco Discovery Protocol and LLDP stands for Link Layer Discovery Protocol. The role and the working is same for both of these protocols.

CDP is a Cisco proprietary protocol and can be used only on Cisco devices While  LLDP is the standard protocol and can be used for interworking between different network vendors. We need to know only CDP with regards to discovery protocols. But it is always good to go beyond and above what is required in the exam topics. You might find yourself in the situation where you have to monitor and configure a multi-vendor network. LLDP knowledge will come in handy in that situation.

Fig 1.1- CDP Protocol

Some of the important facts about CDP Protocols are given below:-
  • CDP is used to discover the directly related neighboring gadgets, Continue reading

MPLS Design Scenario : Penultimate Hop Popping (PHP)

Today I am going to talk about one of the best practices we are doing while we configuring MPLS in our network. This post is basically for the Service Providers who provide MPLS services to their clients. Let's talk about the concept PHP in details. PHP Stands for penultimate hop popping.

Before you go with this article, Lets review all the articles which can be relevant with the service Provider Domain. Below are the links of these articles.


Now Let's talk about the PHP,  PHP is penultimate hop popping which means remove the label one hop before its destination.It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a Label Switch Router (LSR) before the packet is passed to an adjacent Label Edge Router.

Below is the diagram showing the PHP operation in MPLS environment

Fig 1.1- PHP in MPLS

The process is important in a Layer 3 MPLS VPN environment as it reduces the load on Continue reading

MPLS Traffic Engineering: RSVP Resource Reservation Protocol

Today I am going to talk about the other MPLS traffic Engineering protocol named as RSVP or stands for Resource Reservation Protocol. In my earlier article I talked about the CR-LDP protocol and i promised to discuss about the RSVP protocol. Lets talk about the RSVP protocol in details to understand. I will come up with the configuration part of the RSVP protocol in later stage.

Before starting with the RSVP Protocol, Please have a look on the below mentioned link which will describe you CR-LDP protocol in details.

CR-LDP Protocol



Now Lets Talk about RSVP Protocol.
Resource Reservation Protocol - Traffic Engineering RSVP is a separate protocol at the IP level. It uses IP datagrams (or UDP at the margins of the network) to communicate between LSR peers. It does not require the maintenance of TCP sessions, but as a consequence of this it must handle the loss of control messages 

Fig 1.1- MPLS Traffic Engineering- RSVP Protocol
The Ingress LSR, LSR A, determines that it needs to set up a new LSP to LSR C. The traffic parameters required for the session or administrative policies for the network enable LSR A to determine that the route for Continue reading

MPLS Scenario : CR-LDP(Constraint-based Routing Label Distribution Protocol)

Today i am picking very interesting topic about the MPLS. Some of People are aware of MPLS technology and how it works in the ISP - Internet Service Provider environment but some of them are not aware of the MPLS concept even.

This topic is basically for those students who knew the concept of MPLS ( May be the Frame mode MPLS or ATM based MPLS - L2 MPLS or you can say the L3MPLS concept ). Those who don't knew about MPLS, please go through the basic MPLS before this topic as this is one of the advance topic in MPLS named as " MPLS Traffic Engineering " which tells you about the how RSVP or CR-LDP works in the environment.

MPLS is a technology that offers to open up the internet by means of offering many additional services to programs using IP. MPLS forwards statistics using labels which are attached to each facts packet. these labels must be dispensed among the nodes that include the network.

So i have a question for you, Can you please let me know how many labels are used in the MPLS environment ? Did you read that ? Well i guess you knew, there Continue reading

Basics on Cisco DSL Router Configuration

Today I am going to talk about the DSL router basics and the configuration of the Cisco DSL router. People who are from the Routing and Switching background should have this as a basics level of learning. You can connect Cisco DSL router with the PC. A console connection is made with a rolled cable and connects the console port of the Cisco Digital Subscriber Line (DSL) Router to a COM port on a PC. The console cable that is included with the Cisco DSL Router is a flat light blue cable. 

For more information on the pin outs of a rolled cable, or the pin outs of an RJ−45 to DB9 converter, see Cabling Guide for Console and AUX Ports.
  • Connect the RJ−45 connector on one end of a Cisco console cable to the console port of the Cisco DSL Router.
  • Connect the RJ−45 connector at the other end of the console cable to an RJ−45 to DB9 converter.
  • Connect the DB9 connector to an open COM port on your PC.
Fig 1.1- Cisco 871W DSL Router 
Now Lets talk about how to set up the basic configurations on the above mentioned Cisco DSL router in Continue reading

Cisco Firepower 2140 BOQ with licensing models

As per my previous article on the new Next Generation Firewall Cisco Firepower 2100, Today I am going to talk about the hardware and the actual BOQ required for the features mentioned in the header.

I got so many requests from the people to provide the BOQ for the Cisco Firepower 2140 with AVC+IPS Licensing model. In this article I will come up with all the licensing model of Cisco Firepower 2100 Next generation firewall.

If you missed my earlier article on Cisco Firepower 2100 series Next Generation Firewalls, below is the link for your reference.

Cisco Firepower 2100 Next Generation Firewalls Introduction

So lets discuss about the BOQ for all the 3 licensing model in Cisco Firepower 2100 Series Next Generation Firewalls. Before i come with the BOQ, one thing i want to tell you that with the NGFW image of the Cisco Firepower 2100 Series AVC is inbuilt feature. AVC stands for Application visibility and you can have all the management on the Firesight management console which can be either on VM or by using the dedicated appliances.

We have three licensing model and they are :

  • L-FPR2140T-T= This License stands for the NGIPS feature in Cisco Firepower Continue reading

Cisco Next Generation Firewalls : Cisco Firepower 2100 Series

Today I am going to talk about the Cisco Next Generation Firewalls named as Cisco Firepowers. Firepower is gaining the market with the best features of NGFW. Cisco uses both images of ASA and NGFW with various features.

In this article I am specifically talking about the Cisco Firepower 2100 Series. You can have two different models with the various licensing models in Cisco 2100 series firewall. One model is Cisco Firepower with ASA image where you can have the same capabilities of ASA CLI model and the other Cisco model is Cisco Firepower with NGFW image. 

Let's talk about NGFW image, Cisco Firepower 2100 with NGFW image ( Next Generation Firewall) having Application visibility inbuilt and have three other licensing which will provide you the features of NGIPS ( Cisco Next-Generation Intrusion Prevention System) , AMP ( Advance Malware Protection) , Content filtering ( URL filtering ). 

Fig 1.1- Cisco Firepower 2100 Series

Now If you are going to have the customer who wants the next generation firewalls, ofcourse Cisco Firepower with NGFW image is there to support you. Let me talk about the general features of Cisco Firepower 2100 Series Next Generation firewall with the Continue reading

Palo-Alto Firewalls Category IV

In my previous article I wrote about the Category I, II, III firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls
Palo-Alto Firewalls Category II
Palo-Alto Firewalls Category III

Now after Category I, Lets talk about the category II firewalls now. As i earlier divide the firewalls in the categories, so below are the Category II firewalls 

Catagory-IV
In the Virtual Firewall appliances we have VM-50; VM-100/200; VM-300/VM-1000HV; VM-500 and VM-700 models.


We will have the discussion in the same features which I discussed in Category I, Category II and Category III firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • CPU configuration supported
  • New Sessions per seconds
  • Dedicated Memory
  • Dedicated disk drive
  • VMware Support
  • NSX Manager support
  • Citrix Xen Server support
  • Amazon AWS support
  • Microsoft Azure support
Below is the table showing all the capabilities of the Category IV firewalls. Please click on the image for more clarity.

Fig 1.1- Palo Alto Firewalls- Category IV




Palo-Alto Firewalls Category III

In my previous article I wrote about the Category I, II firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls
Palo-Alto Firewalls Category II

Now after Category I, II Lets talk about the category III firewalls now. As i earlier divide the firewalls in the categories, so below are the Category III firewalls 

Catagory-III
PA-850; PA-820; PA-500; PA-220 and PA-200 models of Firewall in the Palo-Alto portfolio.

We will have the discussion in the same features which I discussed in Category I, II and now in  Category III firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • Max and New Sessions per seconds
  • Interface supported
  • Management I/O systems information
  • Rack mountable Information
  • Power supply information
  • Disk drives and hot swap fans information with full details.
Below is the table showing all the capabilities of the Category III firewalls. Please click on the image for more clarity.

Fig 1.1- Palo-Alto Firewalls Category III



Palo-Alto Firewalls Category II

In my previous article I wrote about the Category I firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls

Now after Category I, Lets talk about the category II firewalls now. As i earlier divide the firewalls in the categories, so below are the Category II firewalls 

Catagory-II
PA-5060; PA-5050; PA-5020; PA-3060; PA-3050 and PA-3020 Systems.

We will have the discussion in the same features which I discussed in Category I firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • Max and New Sessions per seconds
  • Interface supported
  • Management I/O systems information
  • Rack mountable Information
  • Power supply information
  • Disk drives and hot swap fans information with full details.
Below is the table showing all the capabilities of the Category II firewalls. Please click on the image for more clarity.

Fig 1.1- Palo-Alto Firewalls Category II

Palo Alto Firewalls and Models- Category I

Today I am going to talk about the various models of Palo-Alto Firewalls with their features and the capabilities. They have major market hold in this segment and competing with the various competitors which includes Cisco, Checkpoint mainly. In this article I am going to cover various models of the Palo-Alto Firewalls.

Catagory-I
We have various models which includes Palo-Alto PA-7080 Systems; PA-7050 Systems; PA-5260; PA-5250; PA-5220 Systems.

Catagory-II
PA-5060; PA-5050; PA-5020; PA-3060; PA-3050 and PA-3020 Systems.

Catagory-III
Apart from the above mentioned models we have some small capable models as well which includes PA-850; PA-820; PA-500; PA-220 and PA-200 models of Firewall in the Palo-Alto portfolio.

Catagory-IV
In the Virtual Firewall appliances we have VM-50; VM-100/200; VM-300/VM-1000HV; VM-500 and VM-700 models. In this article I am going to talk about the Category I.

Below is the diagram showing the deployment of the Palo-Alto Firewalls with Arista Switches in the network.

Fig 1.1- Palo Alto Firewalls
Now Let's talk about the various models and the features they supports. I will talk Category II and Category III in another post.

Below is the comparison showing between the various models which i talk about in the Category1 Palo-Alto Firewalls. To view Continue reading

BGP Peer Groups

Today I am going to explain the concept of the BGP peer groups. So if you able to understand the concept by name as they have a group by which they share same kind of policies and the configurations. Now the question is why we are doing this. 

Sometimes we have a network where we really want to deploy the same kind of the configuration with the same policies and we can achieve in two different ways. One is to configure all the router one by one manually and it is a time consuming task. The other way to define the same set of the configurations and the policies is to set up with the peer groups in the BGP. So if there are 4 routers and we want to have these routers with same kind of configurations and the policies we can set all of them in a peer group.

So with the above explained definition hope you guys understand the concept of the peer group. Now we are going to talk about the configuration with the help of the topology. The Topology and the IP used in this article is for demo purposes and has no relevance Continue reading

BGP Attribute : Multi-Exit Discriminator or Known as MED

Today I am going to talk about the other BGP attribute which is widely used for the inbound traffic to come in to your network. MED is generally set by the service provider and the lower value of the MED will be selected as a preference route for incoming traffic into the network.

MED attribute is exchanged between ASs, but a MED attribute that comes into an AS does not leave the AS. When an update enters the AS with a certain MED value, that value is used for decision making within the AS. When BGP sends that update to another AS, the MED is reset to 0.

MED is called as optional non-transtive attribute and the router compares MED attributes for paths from external neighbors that are in the same AS. Hope you got the exact point of the MED use in the BGP enabled network. Lets take an topology and the configuration part of the MED. The topology and the IP addresses showing in this example is taken only for the demo purposes and have no relevance with any of the live or the enterprise network.

Fig 1.1- BGP Attribute- MED

 Configurations on Router A