Flexlinks (backup port)
Na prepinaci:
Switch(config)# interface FastEthernet 0/1
Switch(config-if)# switchport backup interface FastEthernet 0/2
Switch(config-if)# switchport backup interface FastEthernet 0/2 preemptive
Na routri:
interface Serial0/0.401 point-to-point
backup delay 0 300
backup interface Serial0/1
Interface dampening
Router(config)# interface FastEthernet 0/1
Router(config-if)# dampening HALF-LIFE REUSE SUP-THRES MAX-SUP-TIME
Frame relay Traffic shaping
Plati Tc = BC / CIR, standardny Tc je 125 ms
R(config)# map-class frame-relay FRTS
R(config-map)# frame-relay cir CIR_SPEED
R(config-map)# frame-relay bc BC_BURST
R(config-map)# frame-relay be EXCESS_BURST
R(config)# interface Serial 0/0/0
R(config-if)# frame-relay traffic-shaping
R(config-if)# frame-relay class FRTS
QUEUEING pre real-time traffic
R(config-if)# ip rsvp bandwidth XYZ ABC
Commited access rate (CAR)
R(config-if)# rate-limit input CIR BC BE conform-action transmit exceed-action drop
Multicast helper
Funguje v dense mode, vie prebalit unicast//broadcast na multicast a naopak.
Netreba zabudnut na "ip forward-protocol udp ..."
Na rozhrani sa pouziva "ip multicast helper-map SRC DST ACL
VRRP
Pre čísla viac ako 255 je potrebné zapnúť vrrp version 2
Login enhancements
login block-for SEC attempts X within SEC
login quiet-mode access-class ACL
login on-success ...
login on-failure ...
DHCP options
066 - TFTP name
150 - TFT IP
UDLD
by default, ked sa udld zapne, je zapnute iba na optickych portoch.
Na ethernetoch ho treba zapnut manualne. Ak chcem aby pri detekcii UDLD aj port zhodil, treba zapnut udld aggresive mode
OSPF MTU
Ak je potrebne OSPFkom prepojit catalyst 3560 s routrom rady 2600/2800 maju rozdielne MTU. MTU na strane katalystu je 1504. Smerovace teda ostanu v stave EXSTART, da sa to vsak upravit bud zmenou ip mtu, alebo v konfiguracii rozhrania cez ip ospf mtu-ignore
Multicast borders
(config-if)# ip multicast-ttl
(config-if)# ip multicast boundary ACL
(config-if)# ip mutlicast bsr-border
Multicast stub
R(config-if)# ip igmp helper-address ...
Site-to-site VPN
R(config)# crypto isakm enable
R(config)# crypto isakmp policy 10
R(config-isakmp)# authentication pre-share
R(config-isakmp)# encryption aes 256
R(config-isakmp)# hash sha
R(config-isakmp)# group 5
R(config-isakmp)# lifetime 3600
R(config)# crypto isakmp key cisco address IP
R(config)# crypto ipsec transform-set 50 esp-aes 256 esp-sha-hmac ah-sha-hmac
R(config)# crypto ipsec security-association lifetime seconds 1800
R(config)# crypto map MYMAP 10 ipsec-isakmp
R(config-crypto-map)# match ACL
R(config-crypto-map)# set peer IP
R(config-crypto-map)# set pfs group 5
R(config-crypto-map)# set security-association lifetime seconds 900
R(config-if)# crypto map MYMAP
Multicast rate limiting
interface FastEthernet0/3
ip multicast rate-limit out 1000
IPv6 routing na Cat3550
sdm prefer dual-ipv4-and-ipv6 default
Etherchannel silent/non-silent mode
- silent - defaultný režim. Nekontrolujem, či je na druhej strane PAgP?/LACP klient. Ak nie je, tak port nie je v etherchanneli, alle je schopný fungovať ako normálny port (nastavenia priamo na porte, mimo portchannelu)
- non-silent - striktne kontrolujem zhodu negociačného protokolu a jeho prítomnosť aj na druhej strane. Ak susedné zariadenie nepodporuje PAgP?/LACP, tak jednoducho port nechám v stave disabled a neumožním na ňom žiadnu komunikáciu.
RPF check pre prichádzajúce unicastové pakety
interface Ethernet0/1
ip verify unicast reverse-path
IP alias
ip alias IP PORT
VTY unsuccessful login
ip host R4 150.1.4.4
!
busy-message R4 “Connection Unsuccessful”
PPP support reliable transfer
interface Serial0/1
encapsulation ppp
ppp reliable-link
MAC address aging
mac-address-table aging-time 10 vlan 8
IP PIM neighbor filter
interface FastEthernet0/0
ip pim neighbor-filter 75
!
access-list 75 deny 192.10.1.254
access-list 75 permit any
Multicast boundary
interface Ethernet0/0
ip multicast boundary 51
!
access-list 51 deny 239.0.0.0 0.255.255.255
access-list 51 permit 224.0.0.0 15.255.255.255
Multicast distribution
Ak pre nejaku multicastovu skupinu, nemam vytvorit SBT, ale pouzivat iba sharder-tree:
ip pim spt-threshold infinity group-list 52
!
access-list 52 permit 239.0.0.0 0.255.255.255
Frame-relay RTP header compression
interface Serial1/0
frame-relay map ip 162.1.0.4 304 broadcast rtp header-compression passive connections 15
Dot1q tunnel
SW(config-if)# switchport mode dot1q-tunnel
SW(config-if)# switchport access vlan XYZ
SW(config-if)# l2protocol tunnel {cdp|vtp|stp}
Tunnel checksum
V pripade, ze budu nejake data prenosom cez tunel poskodene, nech ich automaticky zahodim.
int tunnel 0
tunnel checksum
Druhovrstvové cosy (nastavenie)
switchport priority extend cos X
End-to-end keepalive Frame-Relay
interface Serial0/0.54 point-to-point
frame-relay interface-dlci 504
class DLCI_504
!
map-class frame-relay DLCI_504
frame-relay end-to-end keepalive mode request
PPP remove peer route
R(config-if)# no peer neighbor-route
BGP Fast external fallover
Ak chcem zabezpecit, aby sa nasilne cakalo na dead-time a nebral sa do uvahy vypadok fyzickeho rozhrania a okamzita reakcia - tj. widthdraw smerov od neighbora, ktory bol dosazitelny touto linkou, da sa to spravit takto:
no bgp fast-external-fallover bgp
TCP synwait
The TCP SYN wait time is the time the router will wait after sending a TCP SYN packet for a SYN/ACK to come back. If the SYN/ACK response has not been received before the timer expires, the connection is reset.
ip tcp synwait-time 5
MAC address table SNMP notification
interface FastEthernet0/24
snmp trap mac-notification added
!
snmp-server enable traps MAC-Notification
snmp-server host 187.1.3.100 CISCOTRAP MAC-Notification
mac-address-table notification
OSPF demand-circuit
Ak chcem zabezpecit aby ospf robilo iba inicializacnu cast OSPFka a dalej neposielalo bezne keepalive spravy ale iba spravy o zmenach, da sa pouzit:
ip ospf demand-circuit
Frame relay BOOTP neighbor
Na strane servera:
frame-relay interface-dlci DLCI protocol ip IP
DHCP-relay po seriovej PPP linke
Klient:
interface Serial0/1
ip address negotiated
encapsulation ppp
Server:
interface Serial0/1
encapsulation ppp
peer default ip address dhcp
clockrate 64000
!
ip dhcp-server 139.1.11.100
Vypnutie kontroly rovnakeho adresneho priestoru neighbora v RIP
no validate-update-source
BGP maximum prefixes
router bgp X
neighbor .... maximum-prefix NUM TIME
RIPv2 broadcasting
ip rip v2-broadcast
Oznamenie sieti do DVMRP
interface Tunnel0
ip dvmrp metric 1 list VLAN4_AND_VLAN5
ip dvmrp summary-address 167.1.4.0 255.255.254.0
no ip dvmrp auto-summary
!
ip access-list standard VLAN4_AND_VLAN5
permit 167.1.4.0 0.0.0.255
permit 167.1.5.0 0.0.0.255
Rate limit pre ICMP unreachables
R(config)# ip icmp rate-limit unreachable 5000
Bridging
bridge irb
R(config-if)# bridge-group X
bridge 1 protocol ieee
bridge 1 route ip
OSPF flood reduction
Ak chcem zrusit renewal OSPF kazdych 30min, mozem pouzit "ip ospf flood-reduction"
Alias
R(config)# alias MODE ALIAS-NAME ORIG-COMMAND
Alias pre interface-range
R(config)# define interface-range MM Fa0/1...- 4
Kontrola IOSu po reloade
R(config)# file verify auto
WCCP
R(config)# ip wccp web-cache
R(config)# int f 0/0
R(config-if)# ip wccp redirect in
CPU treshold notification (bez RMON)
R(config)# snmp-server enable traps cpu threshold
R(config)# process cpu threshold type {total|process|interupt} rising PERCENT interval SEC failing PERCENT interval SEC
TCP intercept
R(config)# ip tcp intercept list ACL-NUM
R(config)# ip tcp intercept mode intercept | watch
R(config)# ip tcp intercept watch-timeout SEC
R(config)# ip tcp intercept drop-mode oldest | random
R(config)# ip tcp intercept max-incomplete low | high NUM
R(config)# ip tcp intercept one-minute low | high
Qosy??
Garantovaná minimálna šírka pásma pre komunikáciu podľa ACL
policy-map QoS
class SMTP
bandwidth 1500
Pakety nad 1250B budú limitované na 2.5M
class-map match-all ABOVE_1250_BYTES
match packet length min 1251
!
policy-map QoS
class ABOVE_1250_BYTES
police cir 2500000
Queueing strategies
WFQ
R(config-if)# fair-queue
CBWFQ
R(config-policy-map)# bandwidth ...
LLQ
R(config-policy-map)# priority ...
Congestion management
WRED
R(config-if)# random-detect
R(config-if)# random-detect dscp-based
Policing
R(config-policy-map)# police cir X/percent conform-action ... exceed-action
Defaultné hodnoty ?
- BPDU - vysielané každé 2s
- STP - Blocking (max. 20s), Listening (max. 15s), Learning (max. 15s), Forwarding
- HSRP - 224.0.0.2 port 1985, priorita 100, mac: 0000.0c07.acXX, kde XX je cislo skupiny, Hello 3s, dead 10s
- VRRP - moze mat fyz. addr=virt. a v tom pripade volbu vyhrava, 224.0.0.18 port 112, Hello 1s, down interval 3x Hello
- GLBP - kazde 3s, 224.0.0.102, udp 3222
Otázky:
-
Čo je preferované, ip mtu, alebo ip ospf mtu-ignore pri rôznych OSPF MTU?
-
Aký je rozdiel medzi ipv6 enable a ipv6 address autoconfig
-
Musí byť pre tunelovanie IPv6 v IPv4 použitý tunnel mode ipv6ip? nemôže byť použitý GRE?
-
Preposiela "ip pim auto-rp listener" požiadavky ďalej ako mapping-agent? Na akej adrese?
-
Ak uvediem do frame-relay mapy, že moja lokálna IP je dostupná cez DLCI a zároveň mám rovnakú IP nastavenú na sub-rozhraní, prečo sa neobslúži priamo rozhraním, ale prenesie sa po FR linke?
-
Aký je rozdiel medzi police X a *police cir X*
-
Ako sa správa NSSA oblasť k redistribuovaným smerom?
-
rmon absolute vs. delta
- vyskusat konfiguraciu OSPF s oznamenim default route podla route mapy - conditional default route, ale spravat sa ako route-server, tj. cez set oznamit inu branu
- vyskusat limitovat EIGRP prijemcov pomocou statickej mac adresy na switchi
- otocit sa na sticku s NATkom na jednom fyzickom rozhrani