Creating a network map of the environment
4.1.4
Wednesday, November 24, 2010
Sunday, November 21, 2010
Implementation, monitoring, and maintenance of CDP / Creating a network map of the environment
Implementation, monitoring, and maintenance of CDP
4.1.3 This page will introduce the commands that are used to implement, monitor, and maintain CDP information:
The Lab Activity on this page will teach students about some basic CDP commands.
The next page will explain how CDP can be used to create a network map.
Creating a network map of the environment
4.1.4
4.1.3 This page will introduce the commands that are used to implement, monitor, and maintain CDP information:
- cdp run
- cdp enable
- show cdp traffic
- clear cdp counters
- show cdp
- show cdp entry {*|device-name [*][protocol | version]}
- show cdp interface [type number]
- show cdp neighbors [type number] [detail]
The Lab Activity on this page will teach students about some basic CDP commands.
The next page will explain how CDP can be used to create a network map.
Creating a network map of the environment
4.1.4
This page will explain how the information that is obtained by CDP can be used to create a network map.
CDP was designed and implemented as a simple, low-overhead protocol. Though a CDP frame can be small, it can retrieve a lot of useful information about directly connected Cisco devices.
This information can be used to create a network map of the connected devices. To discover devices that are connected to neighbor devices, use Telnet to connect to the neighbors. Then use the show cdp neighbors command.
The Lab Activity will show students how to use CDP commands to learn about neighboring network devices.
The next page will describe how CDP can be disabled.
Module 4: Overview / Learning about Other Devices / Introduction to CDP / Information obtained with CDP
Overview
4.1 Discovering and Connecting to Neighbors
Introduction to CDP
4.1.1 This page will introduce Cisco Discovery Protocol (CDP). CDP is a Layer 2 protocol that connects lower physical media and upper network layer protocols, as shown in Figure . CDP is used to obtain information about neighboring Cisco devices, such as the types of devices connected, the router interfaces they are connected to, the interfaces used to make the connections, and the model numbers of the devices. CDP is media and protocol independent, and runs on all Cisco equipment over the Subnetwork Access Protocol (SNAP).
Information obtained with CDP
4.1.2 This page will explain how CDP is used to obtain information about network devices.
Sometimes network documentation is incomplete or inaccurate. Cisco Discovery Protocol (CDP) is a useful tool in these situations because it can build a basic picture of a network. CDP is a media and protocol independent, Cisco proprietary protocol used for neighbor discovery. CDP will only show information about directly connected neighbors but it is still a powerful tool.
After a router is initially configured it is often difficult to connect directly to the router for configuration changes or other activities. Telnet is a TCP/IP-based application that allows remote connection to the router command-line interface (CLI) for configuration, monitoring, and troubleshooting purposes. Telnet is an essential tool for network professionals.
This module covers some of the objectives for the CCNA 640-801, INTRO 640-821, and ICND 640-811 exams. -
Students who complete this module should be able to perform the following tasks:
- Enable and disable CDP
- Use the show cdp neighbors command
- Determine which neighbor devices are connected to each local interface
- Gather network address information about neighbor devices that use CDP
- Establish a Telnet connection
- Verify a Telnet connection
- Disconnect from a Telnet session
- Suspend a Telnet session
- Perform alternative connectivity tests
- Troubleshoot remote terminal connections
4.1 Discovering and Connecting to Neighbors
Introduction to CDP
4.1.1 This page will introduce Cisco Discovery Protocol (CDP). CDP is a Layer 2 protocol that connects lower physical media and upper network layer protocols, as shown in Figure
CDP Version 2 (CDPv2) is the most recent release of the protocol. Cisco IOS Release 12.0(3)T or later supports CDPv2. CDP Version 1 (CDPv1) is enabled by default with Cisco IOS Release 10.3 to 12.0(3)T.
When a Cisco device boots up, CDP starts up automatically and allows the device to detect neighbor devices that use CDP. CDP operates at the data link layer and allows two systems to learn about each other, even if they use different network layer protocols.
Each device that is configured for CDP sends periodic messages, which are known as advertisements, to directly connected Cisco devices. Each device advertises at least one address at which it can receive Simple Network Management Protocol (SNMP) messages. The advertisements also contain time-to-live or holdtime information, which indicates the length of time that receiving devices should hold CDP information before they discard it. Each device also listens to periodic CDP messages that are sent by others to learn about neighbor devices.
The next page will explain how CDP collects and delivers information. Information obtained with CDP
4.1.2 This page will explain how CDP is used to obtain information about network devices.
The primary use of CDP is to discover all Cisco devices that are directly connected to a local device. Use the show cdp neighbors command to display CDP updates on the local device.
Figure displays an example of how CDP delivers its collection of information to a network administrator. Each router that uses CDP exchanges protocol information with its neighbors. The network administrator can display the results of this CDP information exchange on a console that is connected to a local router.
An administrator can use the show cdp neighbors command to display information about the networks that are directly connected to a router. CDP transmits type length values (TLVs) to provide information about each CDP neighbor device. TLVs are blocks of information embedded in CDP advertisements.
Device TLVs displayed by the show cdp neighbors command include the following:
- Device ID
- Local Interface
- Holdtime
- Capability
- Platform
- Port ID
The following TLVs are only included in CDPv2:
- VTP management domain name
- Native VLAN
- Full or half-duplex
Notice that the router at the bottom of Figure is not directly connected to the console router that is used by the administrator. To obtain CDP information about this device, the administrator would need to Telnet to a router that is directly connected to this device.
The next page will introduce the commands that are used to monitor CDP information. Summary
Summary
This page summarizes the topics discussed in this module.
A router has several modes that are used to accomplish specific tasks. The user EXEC mode is used primarily to check the status of a router. The privileged EXEC mode allows administrators to set usernames and passwords for access to router commands. Global configuration mode is used to apply configuration statements that affect a whole system.
One of the first configuration tasks is to give a unique name to a router. For security purposes, passwords and user IDs for authorized users should be set. The show command is used to examine the contents of files and for troubleshooting.
Serial interfaces require a clock signal to control the timing of the communications. An interface must have an IP address and subnet mask to route IP packets. By default, interfaces are turned off or disabled. Use the no shutdown command to turn on an interface. Use the show running-config command to display the current running configuration to verify any modifications.
Configuration standards are developed for consistency, to reduce network complexity, to reduce downtime, and to maximize network performance. Some standards for configuration files include the number of files to maintain, how they are stored, and where they are stored. Interface descriptions, login banners, and MOTDs can be standardized to inform users about events such as downtime and to warn unauthorized users.
Host name resolution translates names to IP addresses. The Cisco IOS software maintains a cache of host name-to-address mappings for use by EXEC commands. The cache speeds up the conversion process. Unlike DNS, host names are only significant to the router on which they are configured. Host names are entered in global configuration mode.
Configuration backup can be stored on a TFTP server, on a network server, or on a disk. A specific backup plan will ensure that the files are available if a problem occurs.
Backing up configuration files
Backing up configuration files
The next page will explain how configuration files can be copied and implemented.
|
Host name resolution / Configuring host tables / Configuration backup and documentation
Host name resolution
3.2.6 This page will explain how Cisco IOS performs host name resolution.
Configuration host tables
3.2.7 This page will teach students how to configure a host table.
Configuration backup and Documentation
3.2.8 This page will discuss the backup and documentation of configuration files.
Include documentation with the offline information.
3.2.6 This page will explain how Cisco IOS performs host name resolution.
Host name resolution is the process that a computer system uses to associate a host name with an IP address.
In order to use host names to communicate with other IP devices, network devices such as routers must be able to associate the host names with IP addresses. A list of host names and their associated IP addresses is called a host table.
A host table might include all devices in a network organization. Each unique IP address can have a host name associated with it. The Cisco IOS software maintains a cache of host name-to-address mappings for use by EXEC commands. This cache speeds up the process of converting names to addresses.
Host names, unlike DNS names, are significant only on the router on which they are configured. The host table will allow the network administrator to type either the host name such as Auckland or the IP address to Telnet to a remote host.
The next page will explain how host tables are configured.Configuration host tables
3.2.7 This page will teach students how to configure a host table.
To assign host names to addresses, first enter global configuration mode. Issue the command ip host followed by the name of the destination and all IP addresses where the device can be reached. This maps the host name to each of its interface IP addresses. To test connectivity to the host, use a telnet or ping command with the name of the router or an IP address that is associated with the router name.
The procedure to configure a host table is as follows:
- Enter global configuration mode.
- Enter the ip host command followed by the name of the router and all IP addresses associated with the router interfaces.
- Repeat Step 2 until all routers in the network are entered.
- Save the configuration to NVRAM.
In the Lab Activities, students will configure host tables that identify routers and interfaces.
The next page explains how configuration files should be managed.Configuration backup and Documentation
3.2.8 This page will discuss the backup and documentation of configuration files.
The configuration of network devices determines how the network will behave. Management of device configuration includes the following tasks:
- List and compare configuration files on running devices.
- Store configuration files on network servers.
- Perform software installations and upgrades.
Login banners / Configuring message-of-the-day (MOTD)
Login banners
3.2.4 This page will explain what login banners are and why they are used.
Configuring message-of-the-day (MOTD)
3.2.5 This page will explain how a message-of-the-day (MOTD) banner can be configured and displayed on all connected terminals.
3.2.4 This page will explain what login banners are and why they are used.
A login banner is a message that is displayed at login. Login banners can be used to convey messages that affect all network users, such as scheduled system shutdowns.
Login banners can be seen by anyone. Therefore, a banner message should be worded carefully. “Welcome” is an invitation for anyone to enter a router and is probably not an appropriate message.
A login banner should warn users not to attempt login unless they are authorized. A message such as “This is a secure system, authorized access only!” informs unwanted visitors that any further intrusion is illegal.
The next page will explain how message-of-the-day banners are configured.Configuring message-of-the-day (MOTD)
3.2.5 This page will explain how a message-of-the-day (MOTD) banner can be configured and displayed on all connected terminals.
Enter global configuration mode to configure an MOTD banner. Use the banner motd command, followed by a space and a delimiting character, such as the pound sign (#). Add an MOTD followed by a space and the delimiting character again.
Follow these steps to create and display a message-of-the-day:
- Use the configure terminal command to enter global configuration mode.
- Enter the command banner motd # <message of the day > # .
- Issue the copy running-config startup-config command to save the changes.
Students can use the Lab Activities to configure basic router settings such as the MOTD.
The next page will discuss host name resolution.
Subscribe to:
Posts (Atom)