Ppt in Chapter 13

27
Confidential Configuring Cisco Switches Chapter 13

Transcript of Ppt in Chapter 13

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 1/27

Confidential 

Configuring Cisco Switches

Chapter 13

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 2/27

Confidential 

Understand Cisco switches

Select the appropriate media, cables, ports, and connectors to

connect switches to other network devices and hosts

Explain network segmentation and basic traffic management concepts

Explain basic switching concepts and the operation of Cisco switches

Define what is a loop

Describe the Spanning Tree process

Working with switches.

Configuring Switches.

Chapter Objectives

At the end of this Chapter you will be able to:

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 3/27

Confidential 

Bridges and Switches

The main function of bridges and switches is to solve bandwidth, or

collision, problems.

Switching Services

Unlike bridges, which use software to create and manage a filter

table, switches use application specific integrated circuits (ASICs) to

build and maintain their filter tables.

Layer 2 switches and bridges are faster than routers because they

don’t take up time looking at the Network layer header information.

Instead, they look at the frame’s hardware addresses before

deciding to either forward, flood or drop the frame.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 4/27

Confidential 

Layer 2 switching provides the following:

Hardware-based bridging (ASIC)

Wire speed

Low latency

Low cost

Private Domains Created by switches

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 5/27

Confidential 

Bridging vs. LAN Switching

there are some important differences:

Bridges are software based, while switches are hardware based

because they use ASIC chips to help make filtering decisions.

A switch can be viewed as a multiport bridge.

There can be only one spanning-tree instance per bridge, while

switches can have many.

Switches have a higher number of ports than most bridges.

Bridges and switches learn MAC addresses by examining thesource address of each frame received.

Both bridges and switches make forwarding decisions based on

layer 2 addresses.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 6/27

Confidential 

Switch Functioning at Layer 2

There are three distinct functions of layer 2 switching-

Address learning

forward/filter decisions

loop avoidance

Address learning

Layer 2 switches and bridges remember the source hardware

address of each frame received on an interface, and they enter this

information into a MAC database called a forward/filter table.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 7/27Confidential 

Forward/filter decisions

When a frame is received on an interface, the switch looks at the

destination hardware address and finds the exit interface in the MAC

database. The frame is only forwarded out the specified destination

port.

Loop avoidance

If multiple connections between switches are created for redundancy

purposes, network loops can occur. Spanning Tree Protocol (STP)is used to stop network loops while still permitting redundancy.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 8/27Confidential 

Address Learning  – A Detailed Look

When a switch is first powered on, the MAC forward/filter table is

empty.

When a device transmits and an interface receives a frame, the

switch places the frame’s source address in the MAC forward/filter 

table

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 9/27Confidential 

Mac Forward/Filter Table

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 10/27Confidential 

Forward/Filter Decisions  – A Detailed Look

When a frame arrives at a switch interface, the destination hardware

address is compared to the forward/filter MAC database. If the

destination hardware address is known and listed in the database,

the frame is only sent out the correct exit interface. The switch

doesn’t transmit the frame out any interface except for the

destination interface. This preserves bandwidth on the other network

segments and is called frame filtering.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 11/27Confidential 

Another Forward/Filter Table

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 12/27Confidential 

Redundant links between switches are a good idea because theyhelp prevent complete network failures in the event one link stops

working.

even though redundant links can be extremely helpful, they often

cause more problems than they solve. This is because frames can

be flooded down all redundant links simultaneously, creating

network loops

Loop Avoidance and Spanning Tree Protocol

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 13/27Confidential 

Broadcast Storm

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 14/27

Confidential 

A device can receive multiple copies of the same frame since thatframe can arrive from different segments at the same time.

Figure below demonstrates how a whole bunch of frames can arrive

from multiple segments simultaneously. The server in the figure

sends a unicast frame to Router C. Since it’s a unicast frame, Switch

A forwards the frame and Switch B provides the same service—it

forwards the broadcast. This is bad because it means that Router C

receives that unicast frame twice, causing additional overhead on

the network.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 15/27

Confidential 

Multiple Frame Copies

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 16/27

Confidential 

The Spanning Tree Protocol

What is Spanning Tree Protocol?

The main function of the Spanning Tree Protocol (STP) is to remove

layer-2 loops from your topology

Spanning Tree Terms

Root bridge: The root bridge is the bridge with the lowest best

bridge ID. With STP, the key is for all the switches in the network to

elect a root bridge that becomes the focal point in the network.

BPDU: All the switches exchange information to use in the selection

of the root switch as well as in subsequent configuration of the

network. Each switch compares the parameters in the Bridge

Protocol Data Unit (BPDU) that it sends to one neighbor with the

one that it receives from another neighbor.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 17/27

Confidential 

Conti… 

Bridge ID: The bridge ID is how STP keeps track of all the switchesin the network. It is determined by a combination of the bridge

priority (32,768 by default on all Cisco switches) and the base MAC

address. The bridge with the lowest bridge ID becomes the root

bridge in the network.

Nonroot bridges: These are all bridges that are not the root bridge.

Nonroot bridges exchange BPDUs with all bridges and update the

STP topology database on all switches, preventing loops and

providing a measure of defense against link failures.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 18/27

Confidential 

Conti..

Port cost: Port cost determines the best path when multiple linksare used between two switches and none of the links is a root port.

The cost of a link is determined by the bandwidth of a link.

Root port:

The root port is always the link directly connected to the root bridge,

or the shortest path to the root bridge. If more than one link connects

to the root bridge, then a port cost is determined by checking the

bandwidth of each link. The lowest-cost port becomes the root port.

If multiple links have the same cost, the bridge with the lower

advertising bridge ID is used. Since multiple links can be from the

same device, the lowest port number will be used.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 19/27

Confidential 

Conti… 

Designated port: A designated port is one that has been determined

as having the best (lowest) cost. A designated port will be marked as a

forwarding port.

Non designated port: A non designated port is one with a higher cost

than the designated port. Non designated ports are put in blockingmode—they are not forwarding ports.

Forwarding port: A forwarding port forwards frames.

Blocked port: A blocked port is the port that, in order to prevent

loops, will not forward frames. However, a blocked port will always

listen to frames.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 20/27

Confidential 

Connect Switch to a Computer

Step 1

All network cable connections are secure.

Your PC or terminal is connected to the console port. Your terminal

emulator application, such as HyperTerminal is running and

configured properly. The figure shows a PC connected to a switchusing the console port.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 21/27

Confidential 

Connect Dialogue Box

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 22/27

Confidential 

Choose appropriate settings for your region and verify, the pre-selected ones.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 23/27

Confidential 

Step 2

Observe the boot sequence as follows:

When the switch is on, the POST begins. During POST, the LEDs

blink while a series of tests determine that the switch is functioning

properly. When the POST has completed, the SYST LED rapidly

blinks green. If the switch fails POST, the SYST LED turns amber.

When a switch fails the POST test, it is necessary to repair the

switch.

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 24/27

Confidential 

2950 Switch Configuration Commands

1) Setting the Passwords

(config)#enable password ?

level Set exec level password

(config)#enable password level ?

<1-15> Level number

(config)#enable password level 15 hcl1

2) Setting the Hostname

#config t

Switch(config)#hostname hcl2950

hcl2950(config)#

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 25/27

Confidential 

3) Setting IP Information

hcl1900#config t

hcl1900(config)#ip address 172.16.10.16 255.255.255.0

hcl1900(config)#ip default-gateway 172.16.10.1

hcl1900(config)#

4) Configuring Interface Descriptions

Hcl1900#config t

Hcl1900(config)#int e0/1

Hcl1900(config-if)#description Finance_VLAN

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 26/27

Confidential 

5)  Setting Port Security on a Catalyst Switch

Switch(config-if)#switchport port-security mac-address mac-address  

Now only this one MAC address is allowed on this switch port.

6) Erasing the Switch Configuration

Hcl1900#delete nvram

8/3/2019 Ppt in Chapter 13

http://slidepdf.com/reader/full/ppt-in-chapter-13 27/27

Confidential

THANK YOU