Vt Ccna Report
-
Upload
amit-vishwakarma -
Category
Documents
-
view
226 -
download
0
Transcript of Vt Ccna Report
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 1/29
Company Overview
Overall Evaluation
SWOT
Recommendation
Conclusion
References
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 2/29
Company Overview
About the Company – Matrix Technology Pvt.Ltd.
Matrix Technology has large group of network integrators coming fromdifferent backgrounds. We are able to balance network development efforts andproject durations to your need for the business. Matrix Technology also works in thearea of product development and software maintenance and independent softwaretesting with a local project management team.
Matrix Technology is a Network Integration company started with an idea toenhance, promote and provide various Business Enterprise Solutions to businessesworldwide.
Matrix Technology delivers high quality software and customized e-businesssolutions that reflects the in depth knowledge and understanding of emergingtechnologies in today's fast growing competitive world. Our team comprises of people who have a passion for their area of work and believe in bringing the best fortheir company's clients.
Matrix Technology also serves software consultancy and any type of technicalassistance for your organizations. Matrix Technology Pvt. Ltd. promising you for off shoring works. We are dedicated to our work. Our motive is to create HighLandmark in Network Industries with our work as early as possible.
We undertake every aspect of your project, requirements management,product design and architecture, programming and development, quality assurance,documentation preparation, technical support, and maintenance. We ensure toguarantee the secure management of your trade secrets, source codes, copyrightsand any information involved in the product development.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 3/29
Overall Evaluation
Network Formation
Hardware Elements of the Network
Unless the computers that are connected know they are connected and agree
on a common means of communication and what resources are to be shared, they
can't work together. Networking software is just as important as networking
hardware because it establishes the logical connections that make the physical
connections work.
At a minimum, each network requires the following:
Physical (cable), or wireless (infrared [IRDA] or radio-frequency) connections
between computers.
Network devices like switches or routers to connect all the computers.
A common set of communications rules, known as a Network Protocol.
Software that enables resources to be shared with other PCs and controls
access to shared resources, known as a Network Operating System.
Resources that can be shared, such as printers, disk drives, and CD-ROMs.
Software that enables computers to access other computers with shared
resources, known as a Network Client.
These rules apply to the simplest and most powerful networks, and all the
ones in between, regardless of their nature.
Network Interface Card
On most of the computers, the network interface adapters takes the form of a
network interface card (NIC) that fits into a PCI slots on a desktop computer or a PC
card (PCMCIA) slot on a notebook computer. Although network cards for older
systems might use the ISA or EISA slot standard, these don’t support high speed
network standards and are obsolete. Many recent systems incorporate the network
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 4/29
interface adapters onto the motherboard, but this practice is more commonly found
in workstation and portable computers and rarely in serves because most network
administrators prefer to select their own NICs.
Network Adapter Connectors
Ethernet adapters typically have a connector that looks like a large
telephone jack called an RJ-45 (for 10-BASE-T and Fast Ethernet twisted pair cables),
or a D-shaped 15-pin connectors called a DB15 (for thick net coaxial cables). A few
older 10 Mbps adapters have a combination of two or all three of these connector
types; adapters with two or more connectors are referred to as combo adapters.
Token-Ring adapters can have a 9-pin connector called a DB9 (for type 1 STP cable)
or sometimes an RJ-45 jack (for type three UTP cable).
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 5/29
RJ-45
Virtually standard and 10/100 Ethernet NICs made the client-PC on the use
market today are designed to support unshielded twisted-pair (UTP) cable
exclusively; Gigabit Ethernet cards made for wire (not fiber-optic) networks also useonly UTP cables.
Installing and Configuring Network Cards
If we are removing another card to insert the new one, we need to follow the
following steps:
1. Make sure the card is disconnected from any outside cables.
2. Unscrew the small screw attaching the card to the PC case, and lay it aside.3. Pull gently on the card, using both hands to wiggle it back and forth slightly
to disengage it from the connectors. This may take a little tugging, but if the
card does not come fairly easily, stop and make sure that the card is indeed
fully disconnected from the PC.
4. After we pull the card out, we set it aside. Wrap it back up in its original
sheath if we have kept it and plan to use the card again. We should never
touch the gold, connector on the card; the oils in our skin can corrode the
gold and thus reduce the cards connectivity
Installing a card is much the same process, in reverse:
1. Unwrap the card, being careful not to touch the gold connectors, and set it
aside.
2. Power down the PC, and open it up.
3. Find an open slot on the motherboard. It will most probably be an open
Peripheral Component Interconnect (PCI) slot.
4. Unscrew the plate that covered the open slot’s opening to the rear of the
computer, and set the plate and screw aside. We may need the plate later,
and we will need the screw in just a minute.
5. Align the network card with the slot in the PC and push gently but firmly to
seat the card in its slot. We may need to push fairly hard for this to work,
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 6/29
which can be somewhat intimidating if we are not used to inserting the cards.
If we have the right slot and push straight in, then the card should snap its
place.
6. Using the screw that we set aside in step 4, screw the card into the little hole
in the case to hold it in place. If the card is in all the way, this extra step will
not affect the card’s positioning all that much, but it will keep it from sagging
or working loose.
7. Replace the card and if the cables are already in place, connect them to card.
Installing Network Adapter Cards
Network Cables
Originally, all networks used some type of cable to connect the computers on
the network to each other. Although various types of wireless networks are now on
the market, most office and home networks are still based on one of the followingwired topologies:
Coaxial cable
Twisted-pair cabling
Fiber optic cable.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 7/29
Thick and Thin Ethernet Coaxial Cable
The first versions of Ethernet were based on coaxial cable. The original form
of Ethernet, 10BASE-5, used a thick coaxial cable (called Thicknet) that was not
directly attached to the NIC. A device called an attachment unit interface (AUI) ran
from a DB15 connector on the rear of the NIC to the cable. The cable had a hole
drilled into it to allow the "vampire tap" to be connected to the cable. NICs designed
for use with thick Ethernet cable are almost impossible to find as new hardware
today.
10BASE-2 Ethernet cards use a BNC (Bayonet-Neill-Councilmen) connector on
the rear of the NIC. Although the thin coaxial cable (called Thinnet or RG-58) used
with 10BASE-2 Ethernet has a bayonet connector that can physically attach to the
BNC connector on the card, this configuration is incorrect and won't work. Instead, aBNC T-connector attaches to the rear of the card, allowing a thin Ethernet cable to
be connected to either both ends of the T (for a computer in the middle of the
network) or to one end only (for a computer at the end of the network). A 50-ohm
terminator is connected to the other arm of the T to indicate the end of the network
and prevent erroneous signals from being sent to other clients on the network.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 8/29
Some early Ethernet cards were designed to handle thick (AUI/DB15), thin (RG-58),
and UTP (RJ-45) cables. Combo cards with both BNC and RJ-45 connectors are still
available but can run at only standard Ethernet speeds.
Advantages of Coaxial CablesIt has higher bandwidth and excellent noise immunity.
These are relatively cheap as compared to fiber optic cables and easy to use.
Disadvantage of Coaxial CablesIf any part of cable is damaged then the entire network will be shut down.
Twisted-Pair Cable
Twisted-pair cable is just what its name implies: insulated wires within a
protective casing with a specified number of twists per foot. Twisting the wires
reduces the effect of electromagnetic interference (that can be generated by
nearby cables, electric motors, and fluorescent lighting) on the signals being
transmitted. Shielded twisted pair (STP) refers to the amount of insulation around
the cluster of wires and therefore its immunity to noise. You are probably familiar
with unshielded twisted-pair (UTP) cable; it is often used for telephone wiring.
Most Ethernet and Fast Ethernet installations that use twisted-pair cabling
use UTP because the physical flexibility and small size of the cable and connectors
makes routing it very easy. However, its lack of electrical insulation can make
interference from fluorescent lighting, elevators, and alarm systems (among other
devices) a major problem. If you use UTP in installations where interference can be
a problem, you need to route the cable away from the interference, use an external
shield, or substitute STP for UTP near interference sources.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 9/29
Fiber Optic Cable
Fiber cable is the ideal cable for data tram mission. Not only does this type of
cable accommodate extremely high bandwidths, but it also presents no problems
with EMI and supports durable cables and cable runs as long as several K.M.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 10/29
The center conductor of a fiber optic cable is a fiber consists of highly refined
glass or plastic designed to transmit light signals with little loss. A glass core
supports a longer cabling distance, but a plastic core is typically easier to work with.
The fiber is coated with a cladding or a gel that reflects signals back into the fiber to
reduce signal loss a plastic sheath protects the fiber.
Advantages of Fiber Optic CableIt can handle much higher bandwidth than copper.
Fiber is not affected by power surges, electromagnetic interference, or power
failure.
Disadvantages of Fiber Optic CableIt is very costly.
Its installation is very difficult.
Hubs and Switches for Ethernet Networks
We know that most of the modern Ethernet workgroup networks are based on
UTP cable with workstations arranged in a star topology. The center of the star uses
a multi-port connecting device that can be either a hub or a switch. Although hubs
and switches can be used to connect the network-and can have several features in
common-the differences between them are also significant.
All Ethernet hubs and switches have the following features:
• Multiple RJ-45 UTP connectors
• Diagnostic and activity lights
• A power supply
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 11/29
• Ethernet hubs and switches are made in two forms: managed and
unmanaged. Managed hubs and switches can be configured, enabled or
disabled, or monitored by a network operator and are commonly used on
corporate networks. Workgroup and home-office networks use less expensive
unmanaged hubs, which simply connect on the network.
The connection between each workstation and the hub or switch is the UTP
cable running from the RJ-45 jack on the rear of the NIC to the RJ-45 jack on the rear
of the hub or switch.
Signal lights on the front of the hub or switch indicate which connections are
in use by computers; switches also indicate whether a full-duplex connection is in
use. Multi-speed hubs and switches also indicate which connection speed is in use
on each port. A hub or switch must have at least one RJ-45 UTP connector for each
computer we want to connect to it.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 12/29
Cisco Router Configuration
There are several methods available for configuring Cisco routers. It can be
done over the network from a TFTP server. It can be done via menu interface
provided at bootup, and it can be done from the menu interface provided by using
the command setup. Under the training program we went through the IOS
command line interface for configuration.
The main reason for using the command-line interface instead of a menu
driven interface is speed. Once you have invested the time to learn the command-
line commands, you can perform many operations much more quickly than by using
a menu. This is basically true of all command-line vs. menu interfaces. What makes
it especially efficient to learn the command-line interface of the Cisco IOS is that itis standard across all Cisco routers
Initialization
Initially you will probably configure your router from a terminal. If the router
is already configured and at least one port is configured with an IP address, and it
has a physical connection to the network, you might be able to telnet to the routerand configure it across the network. If it is not already configured, then you will
have to directly connect to it with a terminal and a serial cable. With any Windows
box you can use Hyperterminal to easily connect to the router. Plug a serial cable
into a serial (COM) port on the PC and the other end into the console port on the
Cisco router. Start Hyperterminal, tell it which COM port to use and click OK. Set the
speed of the connection to 9600 baud and click OK. If the router is not on, turn it on.
If you wish to configure the router from a Linux box, either Seyon or Minicom
should work. At least one of them, and maybe both, will come with your Linux
distribution.
Often you will need to hit the Enter key to see the prompt from the router. If
it is unconfigured it will look like this:
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 13/29
Router>
If it has been previously configured with a hostname, it will look like this:
hostname of router>
If you have just turned on the router, after it boots it will ask you if you wish
to begin initial configuration. Say no. If you say yes, it will put you in the menu
interface.
Modes
The Cisco IOS command-line interface is organized around the idea of modes.
You move in and out of several different modes while configuring a router, and
which mode you are in determines what commands you can use. Each mode has aset of commands available in that mode, and some of these commands are only
available in that mode. In any mode, typing a question mark will display a list of the
commands available in that mode.
Router>?
Unprivileged and Privileged ModeWhen you first connect to the router and provide the password (if necessary),
you enter EXEC mode, the first mode in which you can issue commands from the
command-line. From here you can use such unprivileged commands as ping, telnet,
and rlogin. You can also use some of the show commands to obtain information
about the system. In unprivileged mode you use commands like, show version to
display the version of the IOS the router is running. Typing show ? will diplay all the
show commands available in the mode you are presently in.
Router>show ?
You must enter privileged mode to configure the router. You do this by using
the command enable. Privileged mode will usually be password protected unless the
router is unconfigured. You have the option of not password protecting privileged
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 14/29
mode, but it is HIGHLY recommended that you do. When you issue the command
enable and provide the password, you will enter privileged mode.
To help the user keep track of what mode they are in, the command-line
prompt changes each time you enter a different mode. When you switch from
unprivileged mode to privileged mode, the prompt changes from:
Router>
to
Router#
This would probably not be a big deal if there were just two modes. There
are, in fact, numerous modes, and this feature is probably indispensable. Pay closeattention to the prompt at all times.
Within privileged mode there are many sub-modes. In this document I do not
closely follow Cisco terminology for this hierarchy of modes. I think that my
explanation is clearer, frankly. Cisco describes two modes, unprivileged and
privileged, and then a hierarchy of commands used in privileged mode. I reason
that it is much clearer to understand if you just consider there to be many sub-
modes of privileged mode, which I will also call parent mode. Once you enter
privileged mode (parent mode) the prompt ends with a pound sign (#). There are
numerous modes you can enter only after entering privileged mode. Each of these
modes has a prompt of the form:
Router(arguments)#
They still all end with the pound sign. They are subsumed within privileged
mode. Many of these modes have sub-modes of their own. Once you enter priliged
mode, you have access to all the configuration information and options the IOS
provides, either directly from the parent mode, or from one of its submodes.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 15/29
Configuring the Router
If you have just turned on the router, it will be completely unconfigured. If it
is already configured, you may want to view its current configuration. Even if it has
not been previously configured, you should familiarize yourself with the show
commands before beginning to configure the router. Enter privileged mode by
issuing the command enable, then issue several show commands to see what they
display. Remember, the command show ? will display all the showcommands
aavailable in the current mode. Definately try out the following commands:
Router#show interfaces
Router#show ip protocols
Router#show ip route
Router#show ip arp
When you enter privileged mode by using the command enable, you are in
the top-level mode of privileged mode, also known in this document as "parent
mode." It is in this top-level or parent mode that you can display most of the
information about the router. As you now know, you do this with the show
commands. Here you can learn the configuration of interfaces and whether they are
up or down. You can display what IP protocols are in use, such as dynamic routing
protocols. You can view the route and ARP tables, and these are just a few of the
more important options.
As you configure the router, you will enter various sub-modes to set options,
then return to the parent mode to display the results of your commands. You also
return to the parent mode to enter other sub-modes. To return to the parent mode,
you hit ctrl-z. This puts any commands you have just issued into effect, and returns
you to parent mode.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 16/29
Global configuration (config)
To configure any feature of the router, you must enter configuration mode.
This is the first sub-mode of the parent mode. In the parent mode, you issue the
command config.
Router#config terminal
Router(config)#
As demonstrated above, the prompt changes to indicate the mode that you
are now in.
In connfiguration mode you can set options that apply system-wide, also
refered to as "global configurations." For instance, it is a good idea to name yourrouter so that you can easily identify it. You do this in configuration mode with the
hostname command.
Router(config)#hostname ExampleName
ExampleName(config)#
As demonstrated above, when you set the name of the host with the
hostname command, the prompt immediately changes by replacing Router with
ExampleName. (Note: It is a good idea to name your routers with an organized
naming scheme.)
Another useful command issued from config mode is the command to
designate the DNS server to be used by the router:
ExampleName(config)#ip name-server aa.bb.cc.dd
ExampleName(config)#ctrl-Z
ExampleName#
This is also where you set the password for privileged mode.
ExampleName(config)#enable secret examplepassword
ExampleName(config)#ctrl-Z
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 17/29
ExampleName#
Until you hit ctrl-Z (or type exit until you reach parent mode) your command
has not been put into effect. You can enter config mode, issue several different
commands, then hit ctrl-Z to activate them all. Each time you hit ctrl-Z you return to
parent mode and the prompt:
ExampleName#
Here you use show commands to verify the results of the commands you
issued in config mode. To verify the results of the ip name-server command, issue
the command show host.
Configuring the interfaces
Cisco interface naming is straightforward. Individual interfaces are referred to
by this convention:
media type slot#/port#
"Media type" refers to the type of media that the port is an interface for, such
as Ethernet, Token Ring, FDDI, serial, etc. Slot numbers are only applicable for
routers that provide slots into which you can install modules. These modules
contain several ports for a given media. The 7200 series is an example. These
modules are even hot-swapable. You can remove a module from a slot and replace
it with a different module, without interrupting service provided by the other
modules installed in the router. These slots are numbered on the router.
Port number refers to the port in reference to the other ports in that module.
Numbering is left-to-right, and all numbering starts at 0, not at one.
For example, a Cisco 7206 is a 7200 series router with six slots. To refer to an
interface that is the third port of an Ethernet module installed in the sixth slot, it
would be interface ethernet 6/2. Therefor, to display the configuration of that
interface you use the command:
ExampleName#show interface ethernet 6/2
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 18/29
If your router does not have slots, like a 1600, then the interface name
consists only of:
media type port#
For example:
ExampleName#show interface serial 0
Here is an example of configuring a serial port with an IP address:
ExampleName#config
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)#no shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#
Then to verify configuration:
ExampleName#show interface serial 1/1
Note the no shutdown command. An interface may be correctly configured
and physically connected, yet be "administratively down." In this state it will not
function. The command for causing an interface to be administratively down is
shutdown.
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#show interface serial 1/1
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 19/29
In the Cisco IOS, the way to reverse or delete the results of any command is
to simply put no infront of it. For instance, if we wanted to unassign the IP address
we had assigned to interface serial 1/1:
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)ctrl-Z
ExampleName#show interface serial 1/1
Configuring most interfaces for LAN connections might consist only of
assigning a network layer address and making sure the interface is not
administratively shutdown. It is usually not necessary to stipulate data-link layerencapsulation.
Configuring Dynamic Routing
IP routing is automatically enabled on Cisco routers. If it has been previously
disabled on your router, you turn it back on in config mode with the command ip
routing.
ExampleName(config)#ip routing
ExampleName(config)#ctrl-Z
There are two main ways a router knows where to send packets. The
administrator can assign static routes, or the router can learn routes by employing a
dynamic routing protocol.
These days static routes are generally used in very simple networks or in
particular cases that necessitate their use. To create a static route, the
administrator tells the router operating system that any network traffic destined for
a specified network layer address should be forwarded to a similarly specified
network layer address. In the Cisco IOS this is done with the ip route command.
ExampleName#config
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 20/29
ExampleName(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1
ExampleName(config)#ctrl-Z
ExampleName#show ip route
Two things to be said about this example; first, the packet destination
address must include the subnet mask for that destination network. Second, the
address it is to be forwarded to is the specified address of the next router along the
path to the destination.
Dynamic routing protocols, running on connected routers, enable those
routers to share routing information. This enables routers to learn the routes
available to them. The advantage of this method is that routers are able to adjust to
changes in network topologies. If a route is physically removed, or a neighbor router
goes down, the routing protocol searches for a new route. Routing protocols can
even dynamically choose between possible routes based on variables such as
network congestion or network reliability.
There are many different routing protocols, and they all use different
variables, known as "metrics," to decide upon appropriate routes. Unfortunately, a
router needs to be running the same routing protocols as its neighbors. Many
routers can, however, run multiple protocols.
Routing protocols are a complex topic and this document contains only this
superficial description of them. There is much to learn about them, and there are
many sources of information about them available.
This describes how to configure the Routing Information Protocol (RIP) on
Cisco routers. From the command-line, we must explicitly tell the router which
protocol to use, and what networks the protocol will route for.
ExampleName#config
ExampleName(config)#router rip
ExampleName(config-router)#network aa.bb.cc.dd
ExampleName(config-router)#network ee.ff.gg.hh
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 21/29
ExampleName(config-router)#ctrl-Z
ExampleName#show ip protocols
Now when you issue the show ip protocols command, you should see an
entry describing RIP configuration.
Saving Cisco Router Configuration
Once you have configured routing on the router, and you have configured
individual interfaces, your router should be capable of routing traffic. Give it a few
moments to talk to its neighbors, then issue the commands show ip route and show
ip arp. There should now be entries in these tables learned from the routing
protocol.
If you turned the router off right now, and turned it on again, you would have
to start configuration over again. Your running configuration is not saved to any
permanent storage media. You can see this configuration with the command show
running-config.
ExampleName#show running-config
You do want to save your successful running configuration. Issue thecommand copy running-config startup-config.
ExampleName#copy running-config startup-config
Your configuration is now saved to non-volatile RAM (NVRAM). Issue the
command show startup-config.
ExampleName#show startup-config
Now any time you need to return your router to that configuration, issue the
command copy startup-config running-config.
ExampleName#copy startup-config running-config
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 22/29
Troubleshooting Cisco router
Inevitably, there will be problems. Usually, it will come in the form of a user
notifying you that they cannot reach a certain destination or any destination at all.
You will need to be able to check how the router is attempting to route traffic, and
you must be able to track down the point of failure.
You are already familiar with the show commands, both specific commands
and how to learn what other show commands are available. Some of the most basic,
most useful commands you will use for troubleshooting are:
ExampleName#show interfaces
ExampleName#show ip protocols
ExampleName#show ip route
ExampleName#show ip arp
Testing Connectivity
It is very possible that the point of failure is not in your router configuration or
at your router at all. If you examine your router's configuration and operation and
everything looks good, the problem might be farther up the line. In fact, it may be
the line itself, or it could be another router, which may or may not be under your
administration.
One extremely useful and simple diagnostic tool is the ping command. Ping is
an implementation of the IP Message Control Protocol (ICMP). Ping sends an ICMP
echo request to a destination IP address. If the destination machine receives the
request, it responds with an ICMP echo response. This is a very simple exchange
that consists of:
Hello, are you alive? Yes, I am.
ExampleName#ping xx.xx.xx.xx
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 23/29
If the ping test is successful, you know that the destination you are having
difficulty reaching is alive and physically reachable.
If there are routers between your router and the destination you are having
difficulty reaching, the problem might be at one of the other routers. Even if you
ping a router and it responds, it might have other interfaces that are down, its
routing table may be corrupted, or any number of other problems may exist.
To see where packets that leave your router for a particular destination go,
and how far, use the trace command.
ExampleName#trace xx.xx.xx.xx
It may take a few minutes for this utility to finish, so give it some time. It will
display a list of all the hops it makes on the way to the destination.
Table 7-1 ICMP Message Types
Message Description
DestinationUnreachable
Tells the source host that there is a problem delivering apacket.
Time Exceeded The time that it takes a packet to be delivered has expired,so the packet has been discarded.
Redirect The router sending this message has received a packet forwhich another router has a better route. The message tellsthe sender to use the better route.
Echo Request,Echo Reply
Used by the ping command to verify connectivity.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 24/29
Table 7-2 ICMP Unreachable Codes
Unreachable Code When It Is Used What TypicallySends It
Network unreachable There is no match in arouting table for thepacket’s destination.
Router
Host unreachable The packet can berouted to a routerconnected to thedestination subnet, butthe host is notresponding.
Router
Can’t fragment The packet has the
Don’t Fragment bit set,and a router mustfragment to forward thepacket.
Router
Protocol unreachable The packet is deliveredto the destination host,but the transport layerprotocol is not availableon that host.
Host
Port unreachable The packet is deliveredto the destination host,but the destination porthas not been opened byan application.
Host
Table 7-3 Codes That the ping Command Receives in Response to Its
ICMP Echo Request
ping CommandCode
Description
! ICMP Echo Reply received. Nothing was received before the ping command timed
outU ICMP unreachable (destination) receivedN ICMP unreachable (network/subnet) receivedM ICMP Can’t Fragment message received
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 25/29
? Unknown packet received
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 26/29
Table 7-4 Common Host Problem Symptoms and Typical
Reasons
Symptom Common Root Cause
The host can send packets to hosts in thesame subnet, but not to other subnets.
The host does not have a defaultgateway configured, or the defaultgateway IP address is incorrect.
The host can send packets to hosts in thesame subnet, but not to other subnets.
The host’s default gateway is in adifferent subnet than the host’s IPaddress (according to the host’sperception of the subnet).
Some hosts in a subnet can communicatewith hosts in other subnets, but otherscannot.
This may be caused by the defaultgateway (router) using a different maskthan the hosts. This may result in therouter’s connected route not includingsome of the hosts on the LAN.
Some hosts on the same VLAN can sendpackets to each other, but others cannot.
The hosts may not be using the samemask.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 27/29
SWOT
Strength
The whole network was secure via use of access list, and switches wereconfigured to be attached on a specific PC.
The router and the switches were secure by passwords, so that no one is able
to access other than administrator.
Weakness
The limitation was the number of connections that existed and were limited.
Opportunities
The connections could be increased via use of more port switches and even
the router could be changed to allow more number of network connections.
Threats
There was not any special threat we could detect.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 28/29
Recommendation
The company is though very stable in the kind of network infrastructure it
prepares, but it needs to look more into the security side of the devices.
The devices currently are placed in open space, for which a special room can
be provided so that they can be secure physically also.
Conclusion
The environment provided at the company was good. We were able tounderstand the whole network architecture that was laid.
8/8/2019 Vt Ccna Report
http://slidepdf.com/reader/full/vt-ccna-report 29/29
References