Ppt in Chapter 13
-
Upload
michelle-tatenda -
Category
Documents
-
view
218 -
download
0
Transcript of Ppt in Chapter 13
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 1/27
Confidential
Configuring Cisco Switches
Chapter 13
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 2/27
Confidential
Understand Cisco switches
Select the appropriate media, cables, ports, and connectors to
connect switches to other network devices and hosts
Explain network segmentation and basic traffic management concepts
Explain basic switching concepts and the operation of Cisco switches
Define what is a loop
Describe the Spanning Tree process
Working with switches.
Configuring Switches.
Chapter Objectives
At the end of this Chapter you will be able to:
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 3/27
Confidential
Bridges and Switches
The main function of bridges and switches is to solve bandwidth, or
collision, problems.
Switching Services
Unlike bridges, which use software to create and manage a filter
table, switches use application specific integrated circuits (ASICs) to
build and maintain their filter tables.
Layer 2 switches and bridges are faster than routers because they
don’t take up time looking at the Network layer header information.
Instead, they look at the frame’s hardware addresses before
deciding to either forward, flood or drop the frame.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 4/27
Confidential
Layer 2 switching provides the following:
Hardware-based bridging (ASIC)
Wire speed
Low latency
Low cost
Private Domains Created by switches
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 5/27
Confidential
Bridging vs. LAN Switching
there are some important differences:
Bridges are software based, while switches are hardware based
because they use ASIC chips to help make filtering decisions.
A switch can be viewed as a multiport bridge.
There can be only one spanning-tree instance per bridge, while
switches can have many.
Switches have a higher number of ports than most bridges.
Bridges and switches learn MAC addresses by examining thesource address of each frame received.
Both bridges and switches make forwarding decisions based on
layer 2 addresses.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 6/27
Confidential
Switch Functioning at Layer 2
There are three distinct functions of layer 2 switching-
Address learning
forward/filter decisions
loop avoidance
Address learning
Layer 2 switches and bridges remember the source hardware
address of each frame received on an interface, and they enter this
information into a MAC database called a forward/filter table.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 7/27Confidential
Forward/filter decisions
When a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the MAC
database. The frame is only forwarded out the specified destination
port.
Loop avoidance
If multiple connections between switches are created for redundancy
purposes, network loops can occur. Spanning Tree Protocol (STP)is used to stop network loops while still permitting redundancy.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 8/27Confidential
Address Learning – A Detailed Look
When a switch is first powered on, the MAC forward/filter table is
empty.
When a device transmits and an interface receives a frame, the
switch places the frame’s source address in the MAC forward/filter
table
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 9/27Confidential
Mac Forward/Filter Table
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 10/27Confidential
Forward/Filter Decisions – A Detailed Look
When a frame arrives at a switch interface, the destination hardware
address is compared to the forward/filter MAC database. If the
destination hardware address is known and listed in the database,
the frame is only sent out the correct exit interface. The switch
doesn’t transmit the frame out any interface except for the
destination interface. This preserves bandwidth on the other network
segments and is called frame filtering.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 11/27Confidential
Another Forward/Filter Table
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 12/27Confidential
Redundant links between switches are a good idea because theyhelp prevent complete network failures in the event one link stops
working.
even though redundant links can be extremely helpful, they often
cause more problems than they solve. This is because frames can
be flooded down all redundant links simultaneously, creating
network loops
Loop Avoidance and Spanning Tree Protocol
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 13/27Confidential
Broadcast Storm
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 14/27
Confidential
A device can receive multiple copies of the same frame since thatframe can arrive from different segments at the same time.
Figure below demonstrates how a whole bunch of frames can arrive
from multiple segments simultaneously. The server in the figure
sends a unicast frame to Router C. Since it’s a unicast frame, Switch
A forwards the frame and Switch B provides the same service—it
forwards the broadcast. This is bad because it means that Router C
receives that unicast frame twice, causing additional overhead on
the network.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 15/27
Confidential
Multiple Frame Copies
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 16/27
Confidential
The Spanning Tree Protocol
What is Spanning Tree Protocol?
The main function of the Spanning Tree Protocol (STP) is to remove
layer-2 loops from your topology
Spanning Tree Terms
Root bridge: The root bridge is the bridge with the lowest best
bridge ID. With STP, the key is for all the switches in the network to
elect a root bridge that becomes the focal point in the network.
BPDU: All the switches exchange information to use in the selection
of the root switch as well as in subsequent configuration of the
network. Each switch compares the parameters in the Bridge
Protocol Data Unit (BPDU) that it sends to one neighbor with the
one that it receives from another neighbor.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 17/27
Confidential
Conti…
Bridge ID: The bridge ID is how STP keeps track of all the switchesin the network. It is determined by a combination of the bridge
priority (32,768 by default on all Cisco switches) and the base MAC
address. The bridge with the lowest bridge ID becomes the root
bridge in the network.
Nonroot bridges: These are all bridges that are not the root bridge.
Nonroot bridges exchange BPDUs with all bridges and update the
STP topology database on all switches, preventing loops and
providing a measure of defense against link failures.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 18/27
Confidential
Conti..
Port cost: Port cost determines the best path when multiple linksare used between two switches and none of the links is a root port.
The cost of a link is determined by the bandwidth of a link.
Root port:
The root port is always the link directly connected to the root bridge,
or the shortest path to the root bridge. If more than one link connects
to the root bridge, then a port cost is determined by checking the
bandwidth of each link. The lowest-cost port becomes the root port.
If multiple links have the same cost, the bridge with the lower
advertising bridge ID is used. Since multiple links can be from the
same device, the lowest port number will be used.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 19/27
Confidential
Conti…
Designated port: A designated port is one that has been determined
as having the best (lowest) cost. A designated port will be marked as a
forwarding port.
Non designated port: A non designated port is one with a higher cost
than the designated port. Non designated ports are put in blockingmode—they are not forwarding ports.
Forwarding port: A forwarding port forwards frames.
Blocked port: A blocked port is the port that, in order to prevent
loops, will not forward frames. However, a blocked port will always
listen to frames.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 20/27
Confidential
Connect Switch to a Computer
Step 1
All network cable connections are secure.
Your PC or terminal is connected to the console port. Your terminal
emulator application, such as HyperTerminal is running and
configured properly. The figure shows a PC connected to a switchusing the console port.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 21/27
Confidential
Connect Dialogue Box
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 22/27
Confidential
Choose appropriate settings for your region and verify, the pre-selected ones.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 23/27
Confidential
Step 2
Observe the boot sequence as follows:
When the switch is on, the POST begins. During POST, the LEDs
blink while a series of tests determine that the switch is functioning
properly. When the POST has completed, the SYST LED rapidly
blinks green. If the switch fails POST, the SYST LED turns amber.
When a switch fails the POST test, it is necessary to repair the
switch.
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 24/27
Confidential
2950 Switch Configuration Commands
1) Setting the Passwords
(config)#enable password ?
level Set exec level password
(config)#enable password level ?
<1-15> Level number
(config)#enable password level 15 hcl1
2) Setting the Hostname
#config t
Switch(config)#hostname hcl2950
hcl2950(config)#
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 25/27
Confidential
3) Setting IP Information
hcl1900#config t
hcl1900(config)#ip address 172.16.10.16 255.255.255.0
hcl1900(config)#ip default-gateway 172.16.10.1
hcl1900(config)#
4) Configuring Interface Descriptions
Hcl1900#config t
Hcl1900(config)#int e0/1
Hcl1900(config-if)#description Finance_VLAN
8/3/2019 Ppt in Chapter 13
http://slidepdf.com/reader/full/ppt-in-chapter-13 26/27
Confidential
5) Setting Port Security on a Catalyst Switch
Switch(config-if)#switchport port-security mac-address mac-address
Now only this one MAC address is allowed on this switch port.
6) Erasing the Switch Configuration
Hcl1900#delete nvram