Copyright © 2002 ProsoftTraining. All rights reserved. Advanced TCP/IP Concepts and Practices.

Post on 22-Dec-2015

212 views 0 download

Transcript of Copyright © 2002 ProsoftTraining. All rights reserved. Advanced TCP/IP Concepts and Practices.

Copyright © 2002 ProsoftTraining. All rights reserved.

Advanced TCP/IPConcepts and Practices

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 1:Routing

Objectives

• Explain the difference between direct and indirect routing

• Describe the routing process and explain the function of routing information tables

• Compare static routing with dynamic routing, and manually configure a static routing table

• Explain the difference between interior and exterior routing protocols, and identify routing protocols within each category

Objectives (cont’d)

• Compare and contrast RIP with OSPF, and describe the advantages and disadvantages of each

• Identify the EGP and the BGPv4• Describe distance-vector, link-state and path-

vector protocols• Describe CIDR

Introduction to Routing

• Direct routing• Indirect routing

– The traceroute command

Routing Process

• Routing involves two key elements– The sending host must know which router

to use for a given destination; the router is determined by the default gateway

– The router must know where to send the packet; the destination is determined by the router’s routing information table

Routing Information Table

Router1 Router2 Router3

Network Z

Network Y

Network X

Router2Routing Information Table

Network Router HopsX Router1 2Y Router2 1Z Router3 2

Static vs. Dynamic Routing

• The route command• The ping command

Routing and Packets

• The network, transport, session, presentation and application layers remain unchanged during the routing process

Routing Protocols

• Interior versus exterior protocols– Interior routing protocols include RIP and

OSPF– Exterior routing protocols include EGP and

BGP

Routing Information Protocol

• RIPv1 header• RIPv1 versus RIPv2• How RIP works• Disadvantages of RIP

RIP Count-to-Infinity Disadvantage

Router1 Router2 Router3

Network X

Open Shortest Path First

• Interior gateway routing protocol that uses IP directly

• Overcomes many RIP shortcomings• Contains:

– Various types of service routing– Load balancing– Network areas– Authenticated exchanges– Routing table updates

Exterior Gateway Protocol

• Used to communicate reachability information between autonomous systems

• Has been largely replaced by BGP

Border Gateway Protocol

• Used between the NSFnet backbone and some regional networks

• Exchanges network reachability information with other BGP subsystems

Classless Interdomain Routing

• Minimizes the number of routing table entries• Summarizes multiple IP addresses into single

entry

Summary

Explain the difference between direct and indirect routing

Describe the routing process and explain the function of routing information tables

Compare static routing with dynamic routing, and manually configure a static routing table

Explain the difference between interior and exterior routing protocols, and identify routing protocols within each category

Summary (cont’d)

Compare and contrast RIP with OSPF, and describe the advantages and disadvantages of each

Identify the EGP and the BGPv4 Describe distance-vector, link-state and path-

vector protocols Describe CIDR

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 2:TCP/IP Troubleshooting Tools—Files,

Protocols and Commands

Objectives

• Describe useful network files• Compare TCP/IP implementations on various

operating systems• Describe ICMP concepts and message types• Identify general network troubleshooting

commands• Identify name and address troubleshooting

commands

Useful Network Files

• protocols (UNIX) and protocol (2000)• services• xinetd.conf (UNIX only)

Internet Control Message Protocol

• Source-quench error messages• Echo-request and echo-reply query messages• ICMP message types

Troubleshooting General Network Problems

• Commands– ping– traceroute or tracert– netstat

Troubleshooting Name and Address Problems

• Commands– ifconfig (Linux)– ipconfig (Windows 2000)– arp– nslookup– hostname

Summary

Describe useful network files Compare TCP/IP implementations on various

operating systems Describe ICMP concepts and message types Identify general network troubleshooting

commands Identify name and address troubleshooting

commands

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 3:Troubleshooting TCP/IP Networks

Objectives

• Determine factors that can affect the performance of TCP/IP or intranet applications

• Identify potential areas for bottlenecks and traffic congestion

• Establish a baseline with which to compare future network activity

• Monitor network traffic and congestion

Objectives (cont’d)

• Test performance and transfer time• Identify and isolate duplicate address

problems• Determine specific TCP/IP components that

cause failures• Recommend corrective actions for TCP/IP

failures• Use TCP/IP tools to determine problems

Performance Factors

• Baseline– A recording of network activity obtained

through documentation and monitoring– Serves as an example for comparing future

network activity

Identifying Performance Degradation

• System• Network• Client/server application• Establishing guidelines

System Environment

• System hardware– Processor– Memory– Network interface– Disk

• Operating system

Network Environment

• Performance factors– Protocol stack– Routing architecture

• Routing protocol• Routing configuration• Routing hops

– Duplicate IP addresses

Client/Server Applications

• Application architecture in terms of systems and networks

• Application architecture in terms of modules (screens, routines)

• Version control• Testing

Summary

Determine factors that can affect the performance of TCP/IP or intranet applications

Identify potential areas for bottlenecks and traffic congestion

Establish a baseline with which to compare future network activity

Monitor network traffic and congestion

Summary (cont’d)

Test performance and transfer time Identify and isolate duplicate address

problems Determine specific TCP/IP components that

cause failures Recommend corrective actions for TCP/IP

failures Use TCP/IP tools to determine problems

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 4:Network

Management Fundamentals

Objectives

• Explain the importance of network management

• Identify effective management strategy components

• Explain the OSI Network Management Functional Areas model

• Describe OSI network management model elements

• Define the network management architecture types

Network Management

• The ideal network management protocol– Proprietary solutions– Open solutions

Management Functional Areas (MFAs)

Network Management Model

• Managed nodes• Agents

– Traversals and traps– Polling– Proxy agents– Gateway agents

• Information base• NMS

Information Baseon a Managed Node

Network Management Architecture

• Centralized architecture• Distributed architecture• Hierarchical architecture

Centralized Management Architecture Model

NMS

Agent Agent Agent Agent

Summary

Explain the importance of network management

Identify effective management strategy components

Explain the OSI Network Management Functional Areas model

Describe OSI network management model elements

Define the network management architecture types

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 5:SNMP History,

Process and Architecture

Objectives

• Discuss the history of SNMP• Explain the purpose of the SMI, the MIB tree,

an OID, the ASN.1 and the BER• Summarize the SNMP process• Describe the SNMP architecture• Identify key SNMP communication methods• Install an industry-standard NMS• Install an SNMP agent

Popularity of SNMP

• Simplicity• Wide industry support• Wise use of resources• Standardization and stability• Centralized administration• Portability

History of SNMP

• Chronology• SNMPv1• SNMPv2• SNMPv3• SNMP extensions

The Structure of Management Information

• The object identifier• Naming an object: OIDs and the MIB tree• Creating an MIB: Syntax and encoding

The SNMP Process

• Querying MIB variables• NMS-to-agent PDUs• Agent-to-NMS PDUs• Instance identification• Network discovery• The network map• The NMS management database• Security and the NMS application

SNMP Architecture

• The SNMP message• SNMP and TCP/IP• UDP ports and communication

Common NMS Applications

• Ipswitch Ping Pro• Ipswitch WhatsUp Gold• Scotty• HP OpenView• NetScout• IBM AIX NetView/6000• SunNet Manager product architecture

Agents and Windows 2000 Server

• Configuring an SNMP agent in Windows 2000 Server– Agent tab– Traps tab– Security tab

• SNMP agents and Windows 95/98/Me

SNMP Agents and UNIX

• Configuring a UCD SNMP agent– Default community name– Access– Queries

Agents andInternetworking

• Routers and SNMP support• Smart hubs• Managed hubs• RMON and RMON2 specifications

Summary

Discuss the history of SNMP Explain the purpose of the SMI, the MIB tree,

an OID, the ASN.1 and the BER Summarize the SNMP process Describe the SNMP architecture Identify key SNMP communication methods Install an industry-standard NMS Install an SNMP agent

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 6:The Management Information Base

Objectives

• Describe the MIB tree in detail• Describe the purpose of an OID, and describe

OIDs• Describe specific MIB groups• Define MIB terminology• Explain the MIB query process• Access SNMP information

The MIB Tree

• The ISO branch• The Internet node and its children

MIB Terminology

• MIB-I• MIB-II

MIB Groups

• Groups residing off the enterprises group– Vendor sub-groups

• Groups residing off the management group– System group; interfaces group; address

translation group; IP group; ICMP group; TCP group; UDP group; EGP group; CMOT group; transmission group; SNMP group

Accessing MIB Variables

• Accessing simple variables• Accessing array variables

Summary

Describe the MIB tree in detail Describe the purpose of an OID, and describe

OIDs Describe specific MIB groups Define MIB terminology Explain the MIB query process Access SNMP information

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 7:SNMP in

the Enterprise

Objectives

• Identify the five SNMPv1 message formats• Describe the construction of a PDU• Explain the structure of SNMPv1 PDUs• List the common SNMPv1 error messages• Discuss SNMPv1 and security• Implement SNMP on a network• Describe RMON and identify its goals

SNMPv1 Message Format

• GetRequest• GetNextRequest• GetResponse• SetRequest• Trap• SNMPv1 error messages

SNMPv1 Drawbacks

• Security– Trivial authentication: the community name– Lack of encryption– Practical concerns

• Limited communication paths• No multiprotocol support• SNMPv2 and SNMPv3• Defining RMON

Remote NetworkMonitoring MIB (RMON)

• What is RMON?• Defining RMON• RMON goals

Summary

Identify the five SNMPv1 message formats Describe the construction of a PDU Explain the structure of SNMPv1 PDUs List the common SNMPv1 error messages Discuss SNMPv1 and security Implement SNMP on a network Describe RMON and identify its goals

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 8:IPv6—Introduction

and IPv4 Comparison

Objectives

• Describe the need for IPv6• Explain the IPv6 history• Compare and contrast the IPv4 and IPv6

headers• Identify removed, revised and new header

fields in IPv6• Capture IPv4 packets for comparison with

IPv6

The Need for IPv6

• Methodology for determining required number of IP addresses

History of IPv6

• Candidates– TUBA– CATNIP– SIPP

• The decision

IPv4 vs. IPv6: Key Differences

• IPv4 header– 20 bytes in length– Ten fields of information and a source and

destination address– Ten fields account for 12 bytes

• IPv6 header– 40 bytes in length– Six fields of information and a source and

destination address– Six fields account for eight bytes

IPv4 Removed Fields

• Fixed format for IP headers• No header checksum• No hop-by-hop segmentation• No Type of Service field

IPv4 Revised Fields

• Datagram Length field Payload Length field• Protocol field Next Header field• Time To Live field Hop Limit field

IPv6 New Fields

• Flow Label field• Class field

Summary

Describe the need for IPv6 Explain the IPv6 history Compare and contrast the IPv4 and IPv6

headers Identify removed, revised and new header

fields in IPv6 Capture IPv4 packets for comparison with

IPv6

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 9:IPv6 Header and

Extension Headers

Objectives

• Define each IPv6 header field and its function• Identify IPv6 extension header types• Describe Hop-by-Hop, Destination Options,

Routing, and Fragment extension headers• Explain how IPv6 extension header types

affect routing performance

Objectives (cont’d)

• Identify IPv6 extension header order and explain its significance

• Download and install Windows 2000 IPv6 stack

• Install IPv6 parsers for Windows 2000 Network Monitor

• Capture IPv6 packets and analyze them• Compare and contrast IPv4 packets with IPv6

packets

IPv6 Header in Detail

• Version• Class• Flow Label• Payload Length

• Next Header• Hop Limit• Source Address• Destination Address

IPv6 Extension Headers

• Hop-by-Hop extension header• Destination Options extension header• Routing extension header• Fragment extension header

IPv6 Extension Header Order

1. IPv62. Hop-by-Hop3. Destination Options4. Routing5. Fragment6. Authentication7. Encapsulating Security Payload8. Destination Options9. Upper-layer

Windows 2000 and IPv6

• IPv6 utilities– ipv6– ping6– tracert6– ttcp

Linuxand IPv6

• Linux 2.2.14-5.0 (Red Hat Linux 6.2) kernel allows users to reconfigure the kernel to support IPv6

Summary

Define each IPv6 header field and its function Identify IPv6 extension header types Describe Hop-by-Hop, Destination Options,

Routing, and Fragment extension headers Explain how IPv6 extension header types

affect routing performance

Summary (cont’d)

Identify IPv6 extension header order and explain its significance

Download and install Windows 2000 IPv6 stack

Install IPv6 parsers for Windows 2000 Network Monitor

Capture IPv6 packets and analyze them Compare and contrast IPv4 packets with IPv6

packets

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 10:IPv6 Address Architecture

Objectives

• Compare and contrast IPv4 addresses with IPv6 addresses

• Describe IPv6 address architecture• Convert IPv6 addresses between hexadecimal,

decimal and binary values• Abbreviate and expand IPv6 addresses• Identify address types in IPv6: unicast,

multicast and anycast

Objectives (cont’d)

• Define the Aggregatable Global Unicast address format

• Explain address hierarchy• Create IEEE EUI-64 addresses from IEEE 802

addresses• Define the IPv6 multicast address format• Explain five special-case IPv6 unicast

addresses• Discuss address renumbering advantages and

disadvantages

IPv4 vs. IPv6 Addresses

• Length• Notation• Number system

Hexadecimal Values

Hexadecimal Value Decimal Equivalent

A 10

B 11

C 12

D 13

E 14

F 15

IPv6 Address Abbreviation

• Double-colon convention• Expanding IPv6 addresses

Address Types

• Unicast• Multicast• Anycast

IPv6 Address Assignments

Address Prefix Definition

0000 0000 Reserved

0000 001 Reserved for NSAP

0000 010 Reserved for IPX

001 Aggregatable Global Unicast addresses

100 Reserved for Geographic-based Unicast addresses

1111 1110 10 Link-local addresses

1111 1110 11 Site-local addresses

1111 1111 Multicast addresses

Aggregatable GlobalUnicast Addresses

• Top-Level Aggregator (TLA)• Next-Level Aggregator (NLA)• Site-Level Aggregator (SLA)• Host address

Special Unicast Addresses

• IPv4-based• Loopback• Unspecified• Site local

Multicast Addresses

• Flags• Scope• Group identifier

Fixed Length vs. Variable Length

• Variable-length addresses increase IPv6 growth flexibility, but make it difficult to renumber networks in the provider-based Internet

Summary

Compare and contrast IPv4 addresses with IPv6 addresses

Describe IPv6 address architecture Convert IPv6 addresses between hexadecimal,

decimal and binary values Abbreviate and expand IPv6 addresses Identify address types in IPv6: unicast,

multicast and anycast

Summary (cont’d)

Define the Aggregatable Global Unicast address format

Explain address hierarchy Create IEEE EUI-64 addresses from IEEE 802

addresses Define the IPv6 multicast address format Explain five special-case IPv6 unicast

addresses Discuss address renumbering advantages and

disadvantages

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 11:IPv6 Routing and Security

Objectives

• Explain why CIDR will be replaced by the TLA in the IPv6 address

• Describe the aggregatable routing hierarchy concept

• Describe IPv6 multicast routing• Explain why the IPv6 proposed standard

recommends using IDRP instead of BGPv4• Explain why the IPv6 proposed standard

recommends using OSPF instead of RIP

Objectives (cont’d)

• Specify IPv6 security features• Compare Internet-layer security to application-

layer security• Discuss the functions of the Authentication

and ESP extension headers• Identify Authentication extension header fields• Identify ESP extension header fields

IPv6 Routing

• CIDR to aggregate network routes

Aggregatable Routing Hierarchy

• Ensures routing tables are smaller because SLA routers can use NLA routers as default routes, and NLA routers can use TLA routers as default routes

Multicast Routing

• ICMPv6 group management header includes the following fields:– Type– Code– Checksum– Maximum Response Delay– Unused– Multicast Address

IPv6 Routing Protocols

• BGPv4 to IDRP• Updating interior routing protocols to work

with IPv6– OSPF– RIP

IPv6 Security

• Authentication– Authentication extension header

• Confidentiality– Typical ESP extension header– Cipher Block Chaining mode of the Data

Encryption Standard (DES-CBC)

Summary

Explain why CIDR will be replaced by the TLA in the IPv6 address

Describe the aggregatable routing hierarchy concept

Describe IPv6 multicast routing Explain why the IPv6 proposed standard

recommends using IDRP instead of BGPv4 Explain why the IPv6 proposed standard

recommends using OSPF instead of RIP

Summary (cont’d)

Specify IPv6 security features Compare Internet-layer security to application-

layer security Discuss the functions of the Authentication

and ESP extension headers Identify Authentication extension header fields Identify ESP extension header fields

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 12:Reduced Network

Management with IPv6

Objectives

• Identify IPv6 elements that reduce network management overhead

• Describe ND and its functions• Compare and contrast ICMPv6 with ICMPv4• Identify removed, revised and new ICMPv6

message types• Define IPv6 plug and play

Objectives (cont’d)

• Describe Router Solicitation and Router Advertisement ICMPv6 messages, and explain how they function with stateless autoconfiguration

• Identify ICMPv6 message headers• Explain address resolution using ND• Compare ND with ARP

Neighbor Discovery Protocol

• Allows hosts to find routers• Enables nodes to determine one another’s link

layer addresses• Enables nodes to discover the existence of

other nodes• Enables nodes to maintain reachability

information• Provides nodes with path status to active

neighbors

Internet Control Message Protocol Version 6

• ICMPv6 header• ICMPv6 messages

Plug-and-PlayAutoconfiguration

• Stateless autoconfiguration• Stateful configuration

Address Resolution

• Neighbor Solicitation message header• Neighbor Advertisement message header

Summary

Identify IPv6 elements that reduce network management overhead

Describe ND and its functions Compare and contrast ICMPv6 with ICMPv4 Identify removed, revised and new ICMPv6

message types Define IPv6 plug and play

Summary (cont’d)

Describe Router Solicitation and Router Advertisement ICMPv6 messages, and explain how they function with stateless autoconfiguration

Identify ICMPv6 message headers Explain address resolution using ND Compare ND with ARP

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 13:Transitioning to IPv6

Objectives

• Describe the SIT mechanisms• Explain the issues involved in IPv4-to-IPv6

migration, including addressing and DNS• Discuss the dual IP stack strategy and how it

will be supported• Explain the purpose of the 6Bone• Define tunneling and relate it to the 6Bone• Explain how to join the 6Bone

Simple InternetTransition Mechanisms

• SIT features• SIT mechanisms

Dual IP Stacks

• Dual IP stack support• IPv6 name service

IPv4 Address Compatibility

• IPv6 address can embed in IPv4 addresses using a combination of:– Dotted decimal formats– Double colon formats

IPv6-in-IPv4 Tunneling:The 6Bone

• Tunneling process• Connecting to the 6Bone• Connecting to isolated hosts

Summary

Describe the SIT mechanisms Explain the issues involved in IPv4-to-IPv6

migration, including addressing and DNS Discuss the dual IP stack strategy and how it

will be supported Explain the purpose of the 6Bone Define tunneling and relate it to the 6Bone Explain how to join the 6Bone

Advanced TCP/IP Concepts and Practices

Routing TCP/IP Troubleshooting Tools—Files,

Protocols and Commands Troubleshooting TCP/IP Networks Network Management Fundamentals SNMP History, Process and Architecture The Management Information Base (MIB) SNMP in the Enterprise

Advanced TCP/IP Concepts and Practices

IPv6—Introduction and IPv4 Comparison IPv6 Address Architecture IPv6 Header and Extension Headers IPv6 Address Architecture IPv6 Routing and Security Reduced Network Management with IPv6 Transitioning to IPv6