SlideShare a Scribd company logo
Mahmmoud A. Mahdi
   The Routing Information Protocol
     The important differences between RIPv1 and RIPv2:
      ▪ The primary, or most important, difference between versions 1
        and 2 of RIP is that:
        ▪ RIPv2 supports variable-length subnet masking (VLSM). VLSM helps
          preserve IP address space by enabling networks to be subdivided into
          smaller blocks based on need.
      ▪ RIPv2 supports simple (that is, plain text) username/password
        authentication
        ▪ which is handy to prevent unwanted changes from cluttering your routing
          tables.
      ▪ RIPv2 routers add the ability to receive triggered updates.
        ▪ When you know that your network topology is changing. This trigger
          forces all the RIP routers you own to assimilate the changes immediately.
        ▪ Triggered updates are also useful because routers that detect a link or
          router failure can update their routing tables and announce the
          change, making their neighbors aware of it sooner rather than later.
   You can use the Routing And Remote Access
    snap-in to set up two kinds of filters that
    screen out some types of RIP updates:
     Route filters allow you to pick and choose the
      networks that you want to admit knowing about
      and for which you want to accept
      announcements.
     Peer filters give you control over the
      neighboring routers to which your router will
      listen.
   RIP has two operation modes:
     Periodic update mode, a RIP router sends out its list
      of known routes at periodic intervals (which you
      define).
     Autostatic update mode, the RRAS router
      broadcasts the contents of its routing table only
      when a remote router asks for it.
      ▪ One drawback to RIP in either version is that it causes the
        router to send its entire routing table with every update.
        This can generate a large amount of traffic and makes RIP
        inappropriate for many of today’s networks.
      ▪ Another routing protocol, Open Shortest Path First, solves
        this problem by sending updates for only routes that have
        changed.
   Internal routing:
     Refers to routing that occurs within your
     internetwork. By contrast, border routing is
     what happens when packets leave your
     internetwork and go to another router
     someplace else.
   Filters are usually used to block out
    undesirable traffic.
   In general, the idea is to keep out packets
    that your machines doesn’t need to see.
   You can construct filters that allow traffic
    into or deny traffic out of your network
    based on rules that specify source and
    destination addresses and ports.
   The basic idea behind packet filtering is
    simple:
    1. You specify filter rules.
    2. Incoming packets are measured against those
       rules.
   There are two types of filter rule:
     Accept all packets except those prohibited by a
      rule.
     Drop all packets except those permitted by a
      rule.
   The following are some examples of filters:
     Block all packets to a web server except those
      on TCP ports 80 and 443.
     Block all outgoing packets on the ports used by
      the MSN and AOL instant messaging tools.
     Filters on a PPTP or L2TP server can screen out
      everything except VPN traffic.
 You create and remove filters by using the
  Input Packet Filters and Output Packet Filters
  buttons on the General tab of the Local Area
  Network Properties dialog box.
 The mechanics of working with incoming and
  outbound filters are identical; just remember
  the following guidelines:
     You create inbound filters to screen traffic coming to
      the interface.
     You create outbound filters to screen traffic going
      back out through that interface.
Lesson.7: Configuring IP Routing B
   This dialog box has the following six parts:
     Receive All Packets Except Those That Meet The Criteria Below
      excludes the packets you specify and accepts everything else.
       ▪ This option is inactive until you create a filter rule.
     Drop All Packets Except Those That Meet The Criteria Below
      accepts only those packets you specify and excludes everything else.
       ▪ This option is inactive until you create a filter rule.
     The Filters list, which is initially empty, shows you which filters are
      defined on this interface.
       ▪ Each entry in the list shows the following:
        Source address and mask
        Destination address and mask
        Protocol, port, and traffic type specified in the rule
     The New, Edit, and Delete buttons allow you to add, edit, and
      remove filters.
Lesson.7: Configuring IP Routing B
 To create a filter that blocks packets by their origin or source
  address, check the Source Network box, and supply the IP
  address and subnet mask for the source you want to block.
 To create a filter that blocks packets according to their
  destination address, check the Destination Network box, and fill
  in the appropriate address and subnet mask.
 To filter by protocol, choose the protocol you want to block:
       Any, which blocks everything
       TCP
       TCP (Established)
       IP
       UDP
       ICMP
       Other, with a fill-in field for a protocol number
   Packet filters provide a useful security
    mechanism for blocking unwanted traffic on
    particular machines.
     ▪ It’s a good idea to use packet filters to keep non-VPN
       traffic out of your VPN servers.
   You need at least two filters to adequately screen
    out non-PPTP traffic:
     The first filter allows traffic with a protocol ID of 47—
      the Generic Routing Encapsulation (GRE) protocol—to
      pass to the destination address of the PPTP interface.
     The second filter allows inbound traffic bound for TCP
      port 1723 (the PPTP port) to come to the PPTP
      interface.
     You can add a third filter if the PPTP server also works
      as a PPTP client; in that case, the third filter needs the
      interface’s destination address, a protocol type of TCP
      (established), and a source port of 1723.
1.       Open the Routing And Remote Access snap-in by selecting Start
         Administrative Tools Routing And Remote Access. Expand the server and
         IPv4 nodes to expose the General node of the server on which you’re working.
         Select the General node.
2.       Right-click the Local Area Connection interface, and choose Properties.
3.       In the General tab of the interface’s Properties dialog box, click the Inbound
         Filters button. The Inbound Filters dialog box appears.
4.       Click the New button, and the Add IP Filter dialog box appears.
5.       Fill out the Add IP Filter dialog box as follows:
            Check the Destination Network check box.
            Fill in the destination IP address field with the IP address of the remote VPN interface. (For
             this exercise, we entered 192.168.1.254. You can use the same.)
            Enter a destination subnet mask of 255.255.255.255.
            Select a protocol type of TCP, and then specify a source port of 0 and a destination port of
             1723.
            Click the OK button.
Lesson.7: Configuring IP Routing B
6. The Inbound Filters dialog box reappears, listing
      the new filter you created in step 5.
  ▪      Add another new filter using the same IP address and
         subnet mask, but this time specify Other in the Protocol
         field and fill in a protocol number of 47.
  ▪      When you’re done, click the OK button to return to the
         Inbound Filters dialog box.
7. In the Inbound Filters dialog box,
  ▪      Click the Drop All Packets Except Those That Meet The
         Criteria Below radio button
  ▪      And click the OK button.
8. Close the interface’s Properties dialog box.
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
   Four filters are required—two input filters and
    two output filters:
     Two input filters with a destination of the VPN
     interface address and a netmask of
     255.255.255.255, filtering UDP:
      ▪ One with a source and destination port of 500
      ▪ The second with a source and destination port of 1701
     Two output filters with a source of the VPN
     interface address and a netmask of
     255.255.255.255, filtering UDP:
      ▪ One with a source and destination port of 500
      ▪ The second with a source and destination port of 1701
1.       Open the Routing And Remote Access snap-in by selecting Start 
         Administrative Tools Routing And Remote Access.
2.       Select the server whose status you want to monitor in the left pane of the
         MMC.
3.       Select the Network Interfaces node.
            Notice that the right pane of the MMC now lists all known interfaces along with their
             status and connection state.
4.       Select the General node beneath IPv4.
            Notice that the right pane of the MMC updates to show the IP interfaces, their IP
             addresses, their administrative and operational states, and whether IP filtering is
             enabled on each interface.
5.       Right-click the General node, and choose the Show TCP/IP Information
         command.
            Check the number of IP routes shown.
6.       Right-click the Static Routes node, and choose the Show IP Routing Table
         command.
            Note that the number of routes listed corresponds to the route count in the TCP/IP
             Information window and that some of the routes listed are automatically generated.
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
   IP multicasting works by sending to a single
    IP address a packet that is read by many
    hosts.
     Multicasting uses a special range of IP
     addresses, called the Class D address space, that
     is reserved exclusively for multicasting.
   Internet Group Management Protocol
    (IGMP) is used to exchange multicast group
    membership information between
    multicast capable routers.
   You can configure RRAS in two modes:
     IGMP router mode
     ▪ Listens for IGMP membership report packets and tracks
       group membership.
     ▪ Must be attached to any interfaces that connect to
       multicast configured hosts.
     IGMP proxy mode
     ▪ essentially acts like a multicast host, except that it forwards
       IGMP membership report packets to an IGMP router.
     ▪ This provides a list of multicast-enabled hosts to an
       upstream router that normally wouldn’t be aware of the
       hosts.
     ▪ Typically, it is used on single-router networks connected to
       the Internet.
   IP-in-IP interfaces (or IP-in-IP tunnels)
     You may need to send multicast traffic across
      non-multicast-compatible routers.
     An IP-in-IP interface actually encapsulates
      packets with an additional IP header.
     You create and manage IP-in-IP interfaces in
      RRAS the same way you configure other
      interfaces.
Lesson 1
   What Are Static and Dynamic Routing?
   How the IP Protocol Selects a Route
   Demonstration: Viewing a Routing Table
   Troubleshooting Routing
   Statically configured routers:
     Do not automatically discover the IDs of remote
      networks.
     Do not exchange information with other routers.
     Are not fault tolerant.
   Dynamically configured routers:
     Discover the IDs of remote networks automatically.
     Use a routing protocol to exchange information with
      other routers.
     Can be fault tolerant.
Lesson.7: Configuring IP Routing B
Lesson 2
   RRAS Routing Roles
   Routing Protocols
   Configuration Options for an Interface
   Information Available for an Interface
   Demonstration: Configuring RRAS as a LAN
    Router
   Routing roles include:
    Routing role   Description

    LAN router     Can route IPv4 and IPv6 packets between network
                   segments

    Demand-dial    Automatically create a connection to a remote location
                   by using dial-up networking or a VPN connection

    NAT            Perform NAT and allow computers to access the
                   internet by sharing a single internet addressable IPv4
                   address.
   Routing protocols include:
Routing Protocol    Description
DHCP Relay Agent    Allows a RRAS server to relay DHCP requests to a DHCP
                    server on a remote network
IGMP Router         Allows a RRAS server to act as an IGMP router or proxy
Proxy               for multicast traffic
NAT                 Allows a RRAS server to act as a NAT router to share a
                    single IPv4 address.
RIP Version 2 for   Allows a RRAS router to perform dynamic routing with
Internet Protocol   other RIP routers.
DHCPv6 Relay        Allows a RRAS server to relay DHCP request to a DHCPv6
Agent               server on a remote network.
   Interface configuration options include:
Configuration Option      Description
IP Router Manager         Enables or disables TCP/IP for the interface.
Router Discovery          Clients use router discovery advertisements to
Advertisements            dynamically discover default gateways.
Inbound/Outbound          Filters similar to Windows Firewall.
filters
Fragmentation checking Specifies whether filtering is performed on packet
                       fragments.
Multicast boundaries      Configures time to live for multicast traffic.
Multicast heartbeat       Used to confirm that multicast infrastructure is
detection                 functioning properly.
   Available interface information includes:
Interface information   Description
TCP/IP Information      Statistics such as number of packets sent and
                        received.
Address Translations    Translations from IP address to physical address.
IP Addresses            IP addresses that are bound to this computer.
IP Routing Table        Host and network routes in the routing table of this
                        computer
TCP connections         Active connection and listening TCP ports.
UDP listener ports      A list of UDP ports listening to accept UDP packets.
Tool                 Use for                      Where to find it
Routing and Remote   •Configuring Routing and     Administrative Tools
Access               Remote Access as a           Computer Management.
                     router, VPN server, dial-
                     up server, or RADIUS
                     client.
Route                •Views and modifies the      Command prompt
                     routing table.
Ping                 •Verifying host availability Command prompt
                     and reachability
Tracert              •Use to verify router        Command prompt
                     status on a network path
Pathping             •Use to verify router        Command prompt
                     status on a network path
Group Policy         •Edit group policy objects   Administrative Tools
Management Console   •Create QoS policies
Contact Me: qursaan@gmail.com
Ad

More Related Content

What's hot (20)

PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
Roman Brovko
 
Network layer
Network layerNetwork layer
Network layer
Hasib Shaikh
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
Networking in college
Networking in collegeNetworking in college
Networking in college
Harpreet Gaba
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)
Tutun Juhana
 
Internet technology unit 1
Internet technology unit 1Internet technology unit 1
Internet technology unit 1
WE-IT TUTORIALS
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6
WE-IT TUTORIALS
 
Routing
RoutingRouting
Routing
Saima Azam
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
KathirKathiresan4
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
welcometofacebook
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
 
BGP vs OSPF on Mikrotik
BGP vs OSPF on MikrotikBGP vs OSPF on Mikrotik
BGP vs OSPF on Mikrotik
GLC Networks
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
Anil Nembang
 
IP Routing
IP RoutingIP Routing
IP Routing
Ravi Shairaywal
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
Roman Brovko
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
Networking in college
Networking in collegeNetworking in college
Networking in college
Harpreet Gaba
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)
Tutun Juhana
 
Internet technology unit 1
Internet technology unit 1Internet technology unit 1
Internet technology unit 1
WE-IT TUTORIALS
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6
WE-IT TUTORIALS
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
KathirKathiresan4
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
 
BGP vs OSPF on Mikrotik
BGP vs OSPF on MikrotikBGP vs OSPF on Mikrotik
BGP vs OSPF on Mikrotik
GLC Networks
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
Anil Nembang
 

Viewers also liked (20)

IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
Mahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
Mahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
Mahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
Mahmmoud Mahdi
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
Mahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
Mahmmoud Mahdi
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
Kashif Sohail
 
Gmail Basics
Gmail BasicsGmail Basics
Gmail Basics
Jamie
 
Beginner's guide to gmail
Beginner's guide to gmailBeginner's guide to gmail
Beginner's guide to gmail
Monique Ross
 
Gmail ppt
Gmail pptGmail ppt
Gmail ppt
gmailcustomerservices
 
Subnetting
SubnettingSubnetting
Subnetting
ashiesh0007
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
Hamza Malik
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
Introduction to Gmail
Introduction to GmailIntroduction to Gmail
Introduction to Gmail
Baldwin Public Library
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
Mahmmoud Mahdi
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
University of Science & Technology, Beijing
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
mikem801
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
Dsunte Wilson
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
Mahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
Mahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
Mahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
Mahmmoud Mahdi
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
Mahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
Mahmmoud Mahdi
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
Kashif Sohail
 
Gmail Basics
Gmail BasicsGmail Basics
Gmail Basics
Jamie
 
Beginner's guide to gmail
Beginner's guide to gmailBeginner's guide to gmail
Beginner's guide to gmail
Monique Ross
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
Hamza Malik
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
Mahmmoud Mahdi
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
mikem801
 
Ad

Similar to Lesson.7: Configuring IP Routing B (20)

hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docxhwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
adampcarr67227
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Mikro tik vpn configuration with site converted
Mikro tik vpn configuration with site convertedMikro tik vpn configuration with site converted
Mikro tik vpn configuration with site converted
Uttam Ds
 
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Know the advantages and disadvantages of peer-to-peer network and a server-ba...Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
ekwinsi
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
Đồng Quốc Vương
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PROIDEA
 
CCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA testCCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA test
epro2k71
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
Download Mipdfcom
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Đồng Quốc Vương
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018
Download Mipdfcom
 
Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-
junkut3
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
adampcarr67227
 
chapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.pptchapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.ppt
Mohammed586397
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
Mac Filtering
Mac FilteringMac Filtering
Mac Filtering
Devang Doshi
 
hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docxhwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
hwinstructions.docxCSCI 6642 –Computer Networks & Data Commun.docx
adampcarr67227
 
Mikro tik vpn configuration with site converted
Mikro tik vpn configuration with site convertedMikro tik vpn configuration with site converted
Mikro tik vpn configuration with site converted
Uttam Ds
 
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Know the advantages and disadvantages of peer-to-peer network and a server-ba...Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
ekwinsi
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
Đồng Quốc Vương
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PROIDEA
 
CCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA testCCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA test
epro2k71
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
Download Mipdfcom
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Đồng Quốc Vương
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018
Download Mipdfcom
 
Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-
junkut3
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
adampcarr67227
 
chapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.pptchapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.ppt
Mohammed586397
 
Ad

Lesson.7: Configuring IP Routing B

  • 2. The Routing Information Protocol  The important differences between RIPv1 and RIPv2: ▪ The primary, or most important, difference between versions 1 and 2 of RIP is that: ▪ RIPv2 supports variable-length subnet masking (VLSM). VLSM helps preserve IP address space by enabling networks to be subdivided into smaller blocks based on need. ▪ RIPv2 supports simple (that is, plain text) username/password authentication ▪ which is handy to prevent unwanted changes from cluttering your routing tables. ▪ RIPv2 routers add the ability to receive triggered updates. ▪ When you know that your network topology is changing. This trigger forces all the RIP routers you own to assimilate the changes immediately. ▪ Triggered updates are also useful because routers that detect a link or router failure can update their routing tables and announce the change, making their neighbors aware of it sooner rather than later.
  • 3. You can use the Routing And Remote Access snap-in to set up two kinds of filters that screen out some types of RIP updates:  Route filters allow you to pick and choose the networks that you want to admit knowing about and for which you want to accept announcements.  Peer filters give you control over the neighboring routers to which your router will listen.
  • 4. RIP has two operation modes:  Periodic update mode, a RIP router sends out its list of known routes at periodic intervals (which you define).  Autostatic update mode, the RRAS router broadcasts the contents of its routing table only when a remote router asks for it. ▪ One drawback to RIP in either version is that it causes the router to send its entire routing table with every update. This can generate a large amount of traffic and makes RIP inappropriate for many of today’s networks. ▪ Another routing protocol, Open Shortest Path First, solves this problem by sending updates for only routes that have changed.
  • 5. Internal routing:  Refers to routing that occurs within your internetwork. By contrast, border routing is what happens when packets leave your internetwork and go to another router someplace else.
  • 6. Filters are usually used to block out undesirable traffic.  In general, the idea is to keep out packets that your machines doesn’t need to see.  You can construct filters that allow traffic into or deny traffic out of your network based on rules that specify source and destination addresses and ports.
  • 7. The basic idea behind packet filtering is simple: 1. You specify filter rules. 2. Incoming packets are measured against those rules.  There are two types of filter rule:  Accept all packets except those prohibited by a rule.  Drop all packets except those permitted by a rule.
  • 8. The following are some examples of filters:  Block all packets to a web server except those on TCP ports 80 and 443.  Block all outgoing packets on the ports used by the MSN and AOL instant messaging tools.  Filters on a PPTP or L2TP server can screen out everything except VPN traffic.
  • 9.  You create and remove filters by using the Input Packet Filters and Output Packet Filters buttons on the General tab of the Local Area Network Properties dialog box.  The mechanics of working with incoming and outbound filters are identical; just remember the following guidelines:  You create inbound filters to screen traffic coming to the interface.  You create outbound filters to screen traffic going back out through that interface.
  • 11. This dialog box has the following six parts:  Receive All Packets Except Those That Meet The Criteria Below excludes the packets you specify and accepts everything else. ▪ This option is inactive until you create a filter rule.  Drop All Packets Except Those That Meet The Criteria Below accepts only those packets you specify and excludes everything else. ▪ This option is inactive until you create a filter rule.  The Filters list, which is initially empty, shows you which filters are defined on this interface. ▪ Each entry in the list shows the following:  Source address and mask  Destination address and mask  Protocol, port, and traffic type specified in the rule  The New, Edit, and Delete buttons allow you to add, edit, and remove filters.
  • 13.  To create a filter that blocks packets by their origin or source address, check the Source Network box, and supply the IP address and subnet mask for the source you want to block.  To create a filter that blocks packets according to their destination address, check the Destination Network box, and fill in the appropriate address and subnet mask.  To filter by protocol, choose the protocol you want to block:  Any, which blocks everything  TCP  TCP (Established)  IP  UDP  ICMP  Other, with a fill-in field for a protocol number
  • 14. Packet filters provide a useful security mechanism for blocking unwanted traffic on particular machines. ▪ It’s a good idea to use packet filters to keep non-VPN traffic out of your VPN servers.
  • 15. You need at least two filters to adequately screen out non-PPTP traffic:  The first filter allows traffic with a protocol ID of 47— the Generic Routing Encapsulation (GRE) protocol—to pass to the destination address of the PPTP interface.  The second filter allows inbound traffic bound for TCP port 1723 (the PPTP port) to come to the PPTP interface.  You can add a third filter if the PPTP server also works as a PPTP client; in that case, the third filter needs the interface’s destination address, a protocol type of TCP (established), and a source port of 1723.
  • 16. 1. Open the Routing And Remote Access snap-in by selecting Start Administrative Tools Routing And Remote Access. Expand the server and IPv4 nodes to expose the General node of the server on which you’re working. Select the General node. 2. Right-click the Local Area Connection interface, and choose Properties. 3. In the General tab of the interface’s Properties dialog box, click the Inbound Filters button. The Inbound Filters dialog box appears. 4. Click the New button, and the Add IP Filter dialog box appears. 5. Fill out the Add IP Filter dialog box as follows:  Check the Destination Network check box.  Fill in the destination IP address field with the IP address of the remote VPN interface. (For this exercise, we entered 192.168.1.254. You can use the same.)  Enter a destination subnet mask of 255.255.255.255.  Select a protocol type of TCP, and then specify a source port of 0 and a destination port of 1723.  Click the OK button.
  • 18. 6. The Inbound Filters dialog box reappears, listing the new filter you created in step 5. ▪ Add another new filter using the same IP address and subnet mask, but this time specify Other in the Protocol field and fill in a protocol number of 47. ▪ When you’re done, click the OK button to return to the Inbound Filters dialog box. 7. In the Inbound Filters dialog box, ▪ Click the Drop All Packets Except Those That Meet The Criteria Below radio button ▪ And click the OK button. 8. Close the interface’s Properties dialog box.
  • 21. Four filters are required—two input filters and two output filters:  Two input filters with a destination of the VPN interface address and a netmask of 255.255.255.255, filtering UDP: ▪ One with a source and destination port of 500 ▪ The second with a source and destination port of 1701  Two output filters with a source of the VPN interface address and a netmask of 255.255.255.255, filtering UDP: ▪ One with a source and destination port of 500 ▪ The second with a source and destination port of 1701
  • 22. 1. Open the Routing And Remote Access snap-in by selecting Start Administrative Tools Routing And Remote Access. 2. Select the server whose status you want to monitor in the left pane of the MMC. 3. Select the Network Interfaces node.  Notice that the right pane of the MMC now lists all known interfaces along with their status and connection state. 4. Select the General node beneath IPv4.  Notice that the right pane of the MMC updates to show the IP interfaces, their IP addresses, their administrative and operational states, and whether IP filtering is enabled on each interface. 5. Right-click the General node, and choose the Show TCP/IP Information command.  Check the number of IP routes shown. 6. Right-click the Static Routes node, and choose the Show IP Routing Table command.  Note that the number of routes listed corresponds to the route count in the TCP/IP Information window and that some of the routes listed are automatically generated.
  • 25. IP multicasting works by sending to a single IP address a packet that is read by many hosts.  Multicasting uses a special range of IP addresses, called the Class D address space, that is reserved exclusively for multicasting.  Internet Group Management Protocol (IGMP) is used to exchange multicast group membership information between multicast capable routers.
  • 26. You can configure RRAS in two modes:  IGMP router mode ▪ Listens for IGMP membership report packets and tracks group membership. ▪ Must be attached to any interfaces that connect to multicast configured hosts.  IGMP proxy mode ▪ essentially acts like a multicast host, except that it forwards IGMP membership report packets to an IGMP router. ▪ This provides a list of multicast-enabled hosts to an upstream router that normally wouldn’t be aware of the hosts. ▪ Typically, it is used on single-router networks connected to the Internet.
  • 27. IP-in-IP interfaces (or IP-in-IP tunnels)  You may need to send multicast traffic across non-multicast-compatible routers.  An IP-in-IP interface actually encapsulates packets with an additional IP header.  You create and manage IP-in-IP interfaces in RRAS the same way you configure other interfaces.
  • 29. What Are Static and Dynamic Routing?  How the IP Protocol Selects a Route  Demonstration: Viewing a Routing Table  Troubleshooting Routing
  • 30. Statically configured routers:  Do not automatically discover the IDs of remote networks.  Do not exchange information with other routers.  Are not fault tolerant.  Dynamically configured routers:  Discover the IDs of remote networks automatically.  Use a routing protocol to exchange information with other routers.  Can be fault tolerant.
  • 33. RRAS Routing Roles  Routing Protocols  Configuration Options for an Interface  Information Available for an Interface  Demonstration: Configuring RRAS as a LAN Router
  • 34. Routing roles include: Routing role Description LAN router Can route IPv4 and IPv6 packets between network segments Demand-dial Automatically create a connection to a remote location by using dial-up networking or a VPN connection NAT Perform NAT and allow computers to access the internet by sharing a single internet addressable IPv4 address.
  • 35. Routing protocols include: Routing Protocol Description DHCP Relay Agent Allows a RRAS server to relay DHCP requests to a DHCP server on a remote network IGMP Router Allows a RRAS server to act as an IGMP router or proxy Proxy for multicast traffic NAT Allows a RRAS server to act as a NAT router to share a single IPv4 address. RIP Version 2 for Allows a RRAS router to perform dynamic routing with Internet Protocol other RIP routers. DHCPv6 Relay Allows a RRAS server to relay DHCP request to a DHCPv6 Agent server on a remote network.
  • 36. Interface configuration options include: Configuration Option Description IP Router Manager Enables or disables TCP/IP for the interface. Router Discovery Clients use router discovery advertisements to Advertisements dynamically discover default gateways. Inbound/Outbound Filters similar to Windows Firewall. filters Fragmentation checking Specifies whether filtering is performed on packet fragments. Multicast boundaries Configures time to live for multicast traffic. Multicast heartbeat Used to confirm that multicast infrastructure is detection functioning properly.
  • 37. Available interface information includes: Interface information Description TCP/IP Information Statistics such as number of packets sent and received. Address Translations Translations from IP address to physical address. IP Addresses IP addresses that are bound to this computer. IP Routing Table Host and network routes in the routing table of this computer TCP connections Active connection and listening TCP ports. UDP listener ports A list of UDP ports listening to accept UDP packets.
  • 38. Tool Use for Where to find it Routing and Remote •Configuring Routing and Administrative Tools Access Remote Access as a Computer Management. router, VPN server, dial- up server, or RADIUS client. Route •Views and modifies the Command prompt routing table. Ping •Verifying host availability Command prompt and reachability Tracert •Use to verify router Command prompt status on a network path Pathping •Use to verify router Command prompt status on a network path Group Policy •Edit group policy objects Administrative Tools Management Console •Create QoS policies

Editor's Notes

  • #30: Routing tables are lists of networks. The maintenance of routing tables can be either static or dynamic. Hosts and routers use routing tables to determine how a packet is delivered.
  • #31: Key Points Hosts and routers maintain a list of network IDs and how to deliver packets to those networks. This list of network IDs is a routing table. Depending on the priorities of your organization, the routing table can be updated dynamically or manually. Question: Why would you use static routing instead of dynamic routing?
  • #32: Key Points To send data packets from one Internet protocol (IP) network to another, IP must select the appropriate path. When a router receives a packet, the network interface adapter passes the packet to IP. IP examines the destination address and compares it to a routing table. A routing table is a series of entries, called routes, which contain information about the location of the network IDs for the internetwork. IP then makes a decision as to how to forward the packet. Question: Is the routing process used for IPv4 the same for IPv6?
  • #33: Question: Which route in the routing table represents the default gateway?
  • #34: Key Points Answer the questions in a classroom discussion.
  • #36: The Routing and Remote Access administrative tool can be used to configure RRAS as a LAN router, demand-dial router, or network address translation (NAT). Depending on which role you select, various routing protocols can be configured. The Routing and Remote Access administrative tool allows you to configure routing characteristics of network interfaces and view statistics for network interfaces.
  • #37: Key Points When RRAS is configured as a router, you can use it for LAN routing, demand-dial routing, and NAT. Question: Why is a demand-dial connection required to configure a VPN connection over the Internet between two offices?
  • #38: Key Points Routing protocols are rules for how routers can manipulate packets. Question: When should you implement RIP Version 2 Internet Protocol on RRAS?
  • #39: Key Points In the Routing and Remote Access administrative tool, there are a number of routing related settings that can be configured for each network interface. Question: Why is the use of Inbound/Outbound filters not recommended?
  • #40: Key Points The Routing and Remote Access administrative tool allows you to view a variety of statistics for each network interface and the general computer. Interface specific information is shown under the IPv4 and IPv6 nodes in the General node. Question: Why would you view the computer summary information in the Routing and Remote Access administrative tool rather than using command-line tools such as Netstat?
  • #41: Question: Which option must be selected to configure RRAS as a LAN router?
  • #43: Quality of Service (QoS) is used to ensure that certain types of data packets have priority on the network. Windows uses QoS policies to delivery QoS configuration information to workstations and servers.
  • #44: Key Points QoS for network communication is used to give specific network packets higher priority for delivery through the network than other packets. As each packet is created on the workstation or server, a Differentiated Services Code Point (DCSP) is embedded in the header of the packet. The DSCP value is read by routers during delivery and the packet is given priority by routers based on the DSCP value. Question: Are there any specific requirements for routers to support QoS?
  • #45: Key Points The implementation of QoS in Windows Server 2008 and Windows Vista uses the following components: QoS Client-Side Extension, QoS Inspection Module, and Pacer.sys. Question: Why is it necessary for the network layer to obtain header information from Pacer.sys?
  翻译: