Archive

Category Archives for "TTL Bits"

DWDM – The Innovation Technology

Today I am going to talk about the technology named as DWDM, DWDM stands for Dense Wavelength Division Multiplexing.  So the question now is why and where we are using the DWDM technology and Who are using these technology.

DWDM is a technology used to used to increase bandwidth over existing fiber optics backbone and is generally used by the service provider across the globe. The need to have the higher bandwidth in the backbone because the count of the users and the customers increases day by day and service provider required higher bandwidth in the core or backbone networks.

The Technology behind the DWDM is used the multiple signals together at different wavelength on the same fiber. DWDM became market in the year of 1995 whilst CWDM (Coarse WDM) emerged after 2000, stimulated by using the telecom crisis. CWDM brings less complicated technological standards as compared to DWDM, reducing down costs, but suits just the lower transmission ability markets, together with the metro and corporation networks. extra recently,  new paradigmatic revolutions have made their manner into the optical communique market: ROADM (Reconfigurable Optical upload-Drop Multiplexing) and Coherent Optical systems. whilst those optical technology are the suitable solutions to fulfil Continue reading

The Concept of Native VLAN

Today I am going to talk about one of the most interesting topic and its none other than Native VLAN. I knew most of you guys know the concept and the requirement of the Native VLAN and most of you already using and configuring the same in your network environment. But there are so many people just starting studying the basics of the networking and this is one of the most important topic to understand the basics of switching. 

In my example I am taking the Cisco devices where I will show the Native VLAN working and the configurations of the Native VLAN on the devices.

So my first question is What is Native VLAN ?
What is the Use of the Native VLAN ?
When and where to use the Native VLAN concept ? 
Standards of the Native VLANs ?

I knew there are lot of questions in your mind, So lets start with the beginning on the Native VLAN part. The IEEE 802.1Q trunking protocol describes some thing called the “native VLAN”. All site visitors sent and acquired on an interface that is configured for 802.1Q gained have a tag on its Ethernet body. whilst you look Continue reading

Discovery Protocols- CDP and LLDP

Today I am going to talk about the CDP and LLDP protocols. As you guys already knew of CDP, I think most of you are using this command in your daily use to find the connected devices in Cisco devices environment while LLDP is same as CDP but it is a standard protocol for all other Vendors.

So If I am talking about the CDP, CDP Stands for Cisco Discovery Protocol and LLDP stands for Link Layer Discovery Protocol. The role and the working is same for both of these protocols.

CDP is a Cisco proprietary protocol and can be used only on Cisco devices While  LLDP is the standard protocol and can be used for interworking between different network vendors. We need to know only CDP with regards to discovery protocols. But it is always good to go beyond and above what is required in the exam topics. You might find yourself in the situation where you have to monitor and configure a multi-vendor network. LLDP knowledge will come in handy in that situation.

Fig 1.1- CDP Protocol

Some of the important facts about CDP Protocols are given below:-
  • CDP is used to discover the directly related neighboring gadgets, Continue reading

MPLS Design Scenario : Penultimate Hop Popping (PHP)

Today I am going to talk about one of the best practices we are doing while we configuring MPLS in our network. This post is basically for the Service Providers who provide MPLS services to their clients. Let's talk about the concept PHP in details. PHP Stands for penultimate hop popping.

Before you go with this article, Lets review all the articles which can be relevant with the service Provider Domain. Below are the links of these articles.


Now Let's talk about the PHP,  PHP is penultimate hop popping which means remove the label one hop before its destination.It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a Label Switch Router (LSR) before the packet is passed to an adjacent Label Edge Router.

Below is the diagram showing the PHP operation in MPLS environment

Fig 1.1- PHP in MPLS

The process is important in a Layer 3 MPLS VPN environment as it reduces the load on Continue reading

MPLS Traffic Engineering: RSVP Resource Reservation Protocol

Today I am going to talk about the other MPLS traffic Engineering protocol named as RSVP or stands for Resource Reservation Protocol. In my earlier article I talked about the CR-LDP protocol and i promised to discuss about the RSVP protocol. Lets talk about the RSVP protocol in details to understand. I will come up with the configuration part of the RSVP protocol in later stage.

Before starting with the RSVP Protocol, Please have a look on the below mentioned link which will describe you CR-LDP protocol in details.

CR-LDP Protocol



Now Lets Talk about RSVP Protocol.
Resource Reservation Protocol - Traffic Engineering RSVP is a separate protocol at the IP level. It uses IP datagrams (or UDP at the margins of the network) to communicate between LSR peers. It does not require the maintenance of TCP sessions, but as a consequence of this it must handle the loss of control messages 

Fig 1.1- MPLS Traffic Engineering- RSVP Protocol
The Ingress LSR, LSR A, determines that it needs to set up a new LSP to LSR C. The traffic parameters required for the session or administrative policies for the network enable LSR A to determine that the route for Continue reading

MPLS Scenario : CR-LDP(Constraint-based Routing Label Distribution Protocol)

Today i am picking very interesting topic about the MPLS. Some of People are aware of MPLS technology and how it works in the ISP - Internet Service Provider environment but some of them are not aware of the MPLS concept even.

This topic is basically for those students who knew the concept of MPLS ( May be the Frame mode MPLS or ATM based MPLS - L2 MPLS or you can say the L3MPLS concept ). Those who don't knew about MPLS, please go through the basic MPLS before this topic as this is one of the advance topic in MPLS named as " MPLS Traffic Engineering " which tells you about the how RSVP or CR-LDP works in the environment.

MPLS is a technology that offers to open up the internet by means of offering many additional services to programs using IP. MPLS forwards statistics using labels which are attached to each facts packet. these labels must be dispensed among the nodes that include the network.

So i have a question for you, Can you please let me know how many labels are used in the MPLS environment ? Did you read that ? Well i guess you knew, there Continue reading

Basics on Cisco DSL Router Configuration

Today I am going to talk about the DSL router basics and the configuration of the Cisco DSL router. People who are from the Routing and Switching background should have this as a basics level of learning. You can connect Cisco DSL router with the PC. A console connection is made with a rolled cable and connects the console port of the Cisco Digital Subscriber Line (DSL) Router to a COM port on a PC. The console cable that is included with the Cisco DSL Router is a flat light blue cable. 

For more information on the pin outs of a rolled cable, or the pin outs of an RJ−45 to DB9 converter, see Cabling Guide for Console and AUX Ports.
  • Connect the RJ−45 connector on one end of a Cisco console cable to the console port of the Cisco DSL Router.
  • Connect the RJ−45 connector at the other end of the console cable to an RJ−45 to DB9 converter.
  • Connect the DB9 connector to an open COM port on your PC.
Fig 1.1- Cisco 871W DSL Router 
Now Lets talk about how to set up the basic configurations on the above mentioned Cisco DSL router in Continue reading

Cisco Firepower 2140 BOQ with licensing models

As per my previous article on the new Next Generation Firewall Cisco Firepower 2100, Today I am going to talk about the hardware and the actual BOQ required for the features mentioned in the header.

I got so many requests from the people to provide the BOQ for the Cisco Firepower 2140 with AVC+IPS Licensing model. In this article I will come up with all the licensing model of Cisco Firepower 2100 Next generation firewall.

If you missed my earlier article on Cisco Firepower 2100 series Next Generation Firewalls, below is the link for your reference.

Cisco Firepower 2100 Next Generation Firewalls Introduction

So lets discuss about the BOQ for all the 3 licensing model in Cisco Firepower 2100 Series Next Generation Firewalls. Before i come with the BOQ, one thing i want to tell you that with the NGFW image of the Cisco Firepower 2100 Series AVC is inbuilt feature. AVC stands for Application visibility and you can have all the management on the Firesight management console which can be either on VM or by using the dedicated appliances.

We have three licensing model and they are :

  • L-FPR2140T-T= This License stands for the NGIPS feature in Cisco Firepower Continue reading

Cisco Next Generation Firewalls : Cisco Firepower 2100 Series

Today I am going to talk about the Cisco Next Generation Firewalls named as Cisco Firepowers. Firepower is gaining the market with the best features of NGFW. Cisco uses both images of ASA and NGFW with various features.

In this article I am specifically talking about the Cisco Firepower 2100 Series. You can have two different models with the various licensing models in Cisco 2100 series firewall. One model is Cisco Firepower with ASA image where you can have the same capabilities of ASA CLI model and the other Cisco model is Cisco Firepower with NGFW image. 

Let's talk about NGFW image, Cisco Firepower 2100 with NGFW image ( Next Generation Firewall) having Application visibility inbuilt and have three other licensing which will provide you the features of NGIPS ( Cisco Next-Generation Intrusion Prevention System) , AMP ( Advance Malware Protection) , Content filtering ( URL filtering ). 

Fig 1.1- Cisco Firepower 2100 Series

Now If you are going to have the customer who wants the next generation firewalls, ofcourse Cisco Firepower with NGFW image is there to support you. Let me talk about the general features of Cisco Firepower 2100 Series Next Generation firewall with the Continue reading

Questions and Answers about Cisco 3850 Switches

Today I am going to talk about the queries about the Cisco 3850 Switch as it is one of the most used switch at the access layer in the large enterprise network and at core layer in some of the small and the mod sized enterprise networks. 

I will address some of the concerns which some of you have for using the Cisco 3850 switch in your network. Below are some of the questions and the answer to that questions regarding the Cisco 3850 switches.

Fig 1.1- Cisco 3850 Switch


Q: What are the supporting uplink modules in the Cisco 3850 Switches ?
A: There are some of the supported uplink network modules in Cisco 3850 Switches and these are 

  • 4x 1G Network Module 
  • 2 x 1/10 G Network Module
  • 4 x 1/10 G Network Module and can be used for 48 port RJ models
  • 8 x 10 G Network Module
  • 2 x 40 G Network Module
Q: Does the Cisco Catalyst 3850 10G SFP+ 48-port switch support uplink modules ?
A: No. It has 4 fixed 40G QSFP ports for uplinks. 

Q: Are the uplinks between the Cisco Catalyst 3850 and the 3750-X interchangeable?
A: No Because they are not compatible Continue reading

Part II- Quick Interview questions on Routing

As per my earlier article on Quick interview question on Networking and Switching, Now I am coming up with the Quick interview question on Routing. If you want to look on the Part-I, click the link below


Lets have a Quick Interview questions on Routing now

Basics
  • What is Router and Routing ?
  • What is the difference between router and switch ?
  • What is the difference between the static and dynamic routing protocols ?
  • What is the difference between distance vector and Link state routing protocols ?
  • What is the AD value of RIP, EIGRP, OSPF and BGP ?
  • How we can define the static routing in the network ?

Fig 1.1- CCIE Lab routing


Dynamic Protocols- Internal Routing Protocols
  • What is the difference between RIPv1, RIPv2 and RIPv3 ?
  • How route is calculated in EIGRP protocol ?
  • What is the EIGRP Stuck in Active state and how it can be resolved ?
  • What is EIGRP passive interface ?
  • What is EIGRP stub routing feature ?
  • What are the different route types in EIGRP ?
  • What is the offset list in EIGRP and how it is useful ?
  • What are the neighbor states of OSPF and how it works ?
  • What are the different types of areas and Continue reading

iBGP Full meshed solution: BGP Route Reflectors

Today I am going to talk about the BGP route reflectors. The concept of BGP route reflectors resolves the expensive iBGP full meshed topology or you can say BGP route reflector are another solution for the explosion of iBGP peering within the AS. We earlier talk about the solution named as BGP confederation which also resolves the expensive iBGP full meshed network.

So lets start with the bgp Route reflector scenario where I let you know about the configuration done on the routers. As per the scenario showed in the below mentioned one router will act as route reflector and other two routers will be act as route reflector clients.

Below is the topology which has no relevance with any of the live or the enterprise network. The topology shown here is for the demo purposes.

Fig 1.1- BGP route reflectors

Without a route reflector, the network shown in above mentioned topology would require a full IBGP mesh (that is, Router A would have to be a peer of Router B). If Router C is configured as a route reflector, IBGP peering between Routers A and B is not required because Router C will reflect updates from Router A Continue reading

Palo-Alto Firewalls Category IV

In my previous article I wrote about the Category I, II, III firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls
Palo-Alto Firewalls Category II
Palo-Alto Firewalls Category III

Now after Category I, Lets talk about the category II firewalls now. As i earlier divide the firewalls in the categories, so below are the Category II firewalls 

Catagory-IV
In the Virtual Firewall appliances we have VM-50; VM-100/200; VM-300/VM-1000HV; VM-500 and VM-700 models.


We will have the discussion in the same features which I discussed in Category I, Category II and Category III firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • CPU configuration supported
  • New Sessions per seconds
  • Dedicated Memory
  • Dedicated disk drive
  • VMware Support
  • NSX Manager support
  • Citrix Xen Server support
  • Amazon AWS support
  • Microsoft Azure support
Below is the table showing all the capabilities of the Category IV firewalls. Please click on the image for more clarity.

Fig 1.1- Palo Alto Firewalls- Category IV




Palo-Alto Firewalls Category III

In my previous article I wrote about the Category I, II firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls
Palo-Alto Firewalls Category II

Now after Category I, II Lets talk about the category III firewalls now. As i earlier divide the firewalls in the categories, so below are the Category III firewalls 

Catagory-III
PA-850; PA-820; PA-500; PA-220 and PA-200 models of Firewall in the Palo-Alto portfolio.

We will have the discussion in the same features which I discussed in Category I, II and now in  Category III firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • Max and New Sessions per seconds
  • Interface supported
  • Management I/O systems information
  • Rack mountable Information
  • Power supply information
  • Disk drives and hot swap fans information with full details.
Below is the table showing all the capabilities of the Category III firewalls. Please click on the image for more clarity.

Fig 1.1- Palo-Alto Firewalls Category III



Palo-Alto Firewalls Category II

In my previous article I wrote about the Category I firewalls with features, capabilities and other functions. You can go through the article again on the below mentioned links as

Palo-Alto Firewalls Category I firewalls

Now after Category I, Lets talk about the category II firewalls now. As i earlier divide the firewalls in the categories, so below are the Category II firewalls 

Catagory-II
PA-5060; PA-5050; PA-5020; PA-3060; PA-3050 and PA-3020 Systems.

We will have the discussion in the same features which I discussed in Category I firewalls and the features are 

  • Throughput of the firewalls
  • Threat Preventions capabilities
  • IPSEC VPN throughput
  • Max and New Sessions per seconds
  • Interface supported
  • Management I/O systems information
  • Rack mountable Information
  • Power supply information
  • Disk drives and hot swap fans information with full details.
Below is the table showing all the capabilities of the Category II firewalls. Please click on the image for more clarity.

Fig 1.1- Palo-Alto Firewalls Category II

Palo Alto Firewalls and Models- Category I

Today I am going to talk about the various models of Palo-Alto Firewalls with their features and the capabilities. They have major market hold in this segment and competing with the various competitors which includes Cisco, Checkpoint mainly. In this article I am going to cover various models of the Palo-Alto Firewalls.

Catagory-I
We have various models which includes Palo-Alto PA-7080 Systems; PA-7050 Systems; PA-5260; PA-5250; PA-5220 Systems.

Catagory-II
PA-5060; PA-5050; PA-5020; PA-3060; PA-3050 and PA-3020 Systems.

Catagory-III
Apart from the above mentioned models we have some small capable models as well which includes PA-850; PA-820; PA-500; PA-220 and PA-200 models of Firewall in the Palo-Alto portfolio.

Catagory-IV
In the Virtual Firewall appliances we have VM-50; VM-100/200; VM-300/VM-1000HV; VM-500 and VM-700 models. In this article I am going to talk about the Category I.

Below is the diagram showing the deployment of the Palo-Alto Firewalls with Arista Switches in the network.

Fig 1.1- Palo Alto Firewalls
Now Let's talk about the various models and the features they supports. I will talk Category II and Category III in another post.

Below is the comparison showing between the various models which i talk about in the Category1 Palo-Alto Firewalls. To view Continue reading

BGP : iBGP fully meshed solution : Confederations

Today I am going to talk about the one of the BGP article named as BGP Confederations. Now question is why we are using the BGP Confederations. If you guys ever configured the iBGP protocol you need to configure full meshed scenario in iBGP as per the rule of the policy.

With the full meshed network you will have to maintain all the links from all the routers to each other in the internal BGP network. So let us suppose you have 10 routers in your network and you want to configure iBGP network between them, so how many links you required to maintain the fully meshed network here. Well you need to have the 45 links between these 10 routers to establish the iBGP links between all of them.

You ever think that this may be of higher cost and ever router needs to have the information of the other routers in the network. Well to sort out iBGP full meshed network scenario we have two methods and these methods are Confederations and Route Reflectors.

In this article I am going to take the first method and the name is Confederations. In which I will explain how Confederations work and what are the basic Continue reading

BGP Peer Groups

Today I am going to explain the concept of the BGP peer groups. So if you able to understand the concept by name as they have a group by which they share same kind of policies and the configurations. Now the question is why we are doing this. 

Sometimes we have a network where we really want to deploy the same kind of the configuration with the same policies and we can achieve in two different ways. One is to configure all the router one by one manually and it is a time consuming task. The other way to define the same set of the configurations and the policies is to set up with the peer groups in the BGP. So if there are 4 routers and we want to have these routers with same kind of configurations and the policies we can set all of them in a peer group.

So with the above explained definition hope you guys understand the concept of the peer group. Now we are going to talk about the configuration with the help of the topology. The Topology and the IP used in this article is for demo purposes and has no relevance Continue reading

BGP Attribute : Multi-Exit Discriminator or Known as MED

Today I am going to talk about the other BGP attribute which is widely used for the inbound traffic to come in to your network. MED is generally set by the service provider and the lower value of the MED will be selected as a preference route for incoming traffic into the network.

MED attribute is exchanged between ASs, but a MED attribute that comes into an AS does not leave the AS. When an update enters the AS with a certain MED value, that value is used for decision making within the AS. When BGP sends that update to another AS, the MED is reset to 0.

MED is called as optional non-transtive attribute and the router compares MED attributes for paths from external neighbors that are in the same AS. Hope you got the exact point of the MED use in the BGP enabled network. Lets take an topology and the configuration part of the MED. The topology and the IP addresses showing in this example is taken only for the demo purposes and have no relevance with any of the live or the enterprise network.

Fig 1.1- BGP Attribute- MED

 Configurations on Router A  

Concept of Local Preference in BGP : BGP Attribute

Today I am going to talk about the BGP attribute which is widely used in many of the enterprise networks. BGP attribute name "Local Preference" is used for controlling outbound traffic in the network. It actually used when we have two different paths and want to select the preference path then we are going to use the local preference by putting the higher local preference value to the route.


Local Preference is not local to the router, the local preference attribute is part of the routing update and is exchanged among routers in the same AS. So if you applied local preference in your network it will effect the network part which is under same AS.

We have two different method to apply the local preference in the network. The one way is to use the bgp default local-preference command and the other way is by using the route-map to set the local preference. I will cover the configuration part of the both the ways in the network.

Below is the basic topology where we are using the local preference in the enterprise network. The topology and the IP addresses uses here below is for the demo purposes and has Continue reading