Currently browsing

September 2012

PPP Authentication – EAP

1. One way authentication 1.1 EAP Server (Authenticator) PPP will require the use of a Radius. However, you can use the local usernames if you configure: Remember to configure the username and password that the client will use: 1.2 EAP Client (Authenticating) 2. Two way authentication On R1: On R2:

Frame Relay QoS

1. Per VC Frame Relay QoS See Per VC Frame Relay QoS 2. MQC For Frame Relay MQC can be used to apply QoS settings per interface or per VC if used in conjunction with a map-class. Special MQC configuration is available for Frame Relay interfaces in regard to Class …

Multicast features on switches

1. IGMP Snooping 1.1 Enabling IGMP Snooping Normally, a switch should forward multicast frames out all ports. It will forward the traffic to all receivers, but it will also forward it to many hosts that don’t need it. To optimize this behavior, Cisco routers implement IGMP Snooping. With IGMP Snooping, …

IPv6 Multicast

1. IPv6 Multicast Addressing FF00::/8 Multicast addresses represent a group of interfaces, just like in IPv4 multicast. The format of a multicast address is: Flags: The R Flag is used for addresses with an embedded RP. The P Flag indicates a multicast address that is assigned based on the network …

Inter Domain Multicast

1. MSDP (Multicast Source Discovery Protocol) PIM-DM is not a viable solution to use over Internet, so we will use PIM-SM for interdomain multicast routing. PIM-SM Requires a Randezvous Point. In PIM-SM, when a source starts to transmit, the DR on it’s segment will register the source with the RP.Then, …

IGMP 101

To make multicast work, we use 2 types of protocols: one that is used to signal the receivers to the routers, and the other used by the routers to build distribution trees from the source to the receivers. In the first category we have IGMP (Internet Group Management Protocol), while …

PIM 101

1. PIM basics PIM is a protocol used to create loop-free multicast delivery trees from the source to the receivers. There are 2 different modes for PIM – Dense Mode and Sparse Mode, and a few other variations: PIM Sparse-Dense Mode, Bidirectional PIM and Source Specific PIM. PIM uses the …

Control Plane

1. CoPP – Control Plane Policing Control Plane Policing is used to apply policy maps to traffic going to or coming from the control plane. This feature also mitigates DoS attacks by filtering traffic that arrives at the processor. First, you should define a policy-map using MQC. Then, apply this …