100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Samenvatting - Computer Netwerken 4

Puntuación
-
Vendido
-
Páginas
172
Subido en
06-06-2023
Escrito en
2022/2023

Samenvatting van het vak computer networks 4, gegeven in de bachelor Toegepaste Informatica, 3e jaar 1e semester

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
6 de junio de 2023
Número de páginas
172
Escrito en
2022/2023
Tipo
Resumen

Temas

Vista previa del contenido

Inhoudstafel
H1: Single-area OSPFv2 concepts ......................................................................................................... 12
1.1. OSPF features and characteristics.............................................................................................. 12
1.1.1. Introduction to OSPF........................................................................................................... 12
1.1.2. Components of OSPF .......................................................................................................... 12
1.1.3. Link-state operation ............................................................................................................ 13
1.1.4. Single-area and multiarea OSPF .......................................................................................... 14
1.1.5. Multiarea OSPF ................................................................................................................... 14
1.1.6. OSPFv3 ................................................................................................................................ 15
1.2. OSPF packets .............................................................................................................................. 15
1.2.1. Video – OSPF packets .......................................................................................................... 15
1.2.2. Types of OSPF packets ........................................................................................................ 15
1.2.3. Link-state updates ............................................................................................................... 16
1.2.4. Hello packet ........................................................................................................................ 16
1.3. OSPF operation .......................................................................................................................... 16
1.3.1. Video – OSPF operation ...................................................................................................... 16
1.3.2. OSPF operational states ...................................................................................................... 17
1.3.3. Establish neighbor adjacencies ........................................................................................... 17
1.3.4. Synchronizing OSPF databases............................................................................................ 18
1.3.5. The need for a DR ............................................................................................................... 19
1.3.6. LSA flooding with a DR ........................................................................................................ 19
H2: Single area OSPFv2 configuration................................................................................................... 20
2.1. OSPF router ID............................................................................................................................ 20
2.1.1. OSPF reference topology .................................................................................................... 20
2.1.2. Router configuration mode for OSPF.................................................................................. 20
2.1.3. Router IDs............................................................................................................................ 20
2.1.4. Router ID order of precedence ........................................................................................... 21
2.1.5. Configure a loopback interface as the router ID................................................................. 21
2.1.6. Explicitly configure a router ID............................................................................................ 21
2.1.7. Modify a router ID............................................................................................................... 21
2.2. Point-to-point OSPF networks ................................................................................................... 22
2.2.1. The network command syntax............................................................................................ 22
2.2.2. The wildcard mask .............................................................................................................. 22
2.2.4. Switch verification commands ............................................................................................ 22
2.2.6. Configure OSPF using the ip ospf command ....................................................................... 22

, 2.2.8. Passive interface ................................................................................................................. 22
2.2.9. Configure passive interfaces ............................................................................................... 23
2.2.11. OSPF point-to-point networks .......................................................................................... 23
2.2.12. Loopback and point-to-point networks ............................................................................ 23
2.3. Multiaccess OSPF networks ....................................................................................................... 24
2.3.1. OSPF network types ............................................................................................................ 24
2.3.2. OSPF designated router ...................................................................................................... 24
2.3.3. OSPF multiaccess reference topology................................................................................. 24
2.3.4. Verify OSPF router roles...................................................................................................... 25
2.3.5. Verify DR/BDR adjacencies ................................................................................................. 25
2.3.6. Default DR/BDR election process........................................................................................ 26
2.3.7. DR failure and recovery....................................................................................................... 26
2.3.8. The ip ospf priority command ............................................................................................. 26
2.3.9. Configure OSPF priority....................................................................................................... 27
2.4. Modify single-area OSPFv2 ........................................................................................................ 27
2.4.1. Cisco OSPF cost metric ........................................................................................................ 27
2.4.2. Adjust the reference bandwidth ......................................................................................... 27
2.4.3. OSPF accumulates costs ...................................................................................................... 27
2.4.4. Manually set OSPF cost value ............................................................................................. 28
2.4.5. Test failover to backup route .............................................................................................. 28
2.4.7. Hello packet intervals.......................................................................................................... 28
2.4.8. Verify hello and dead intervals ........................................................................................... 28
2.4.9. Modify OSPFv2 intervals ..................................................................................................... 29
2.5. Default route propagation ......................................................................................................... 29
2.5.1. Propagate a default static route in OSPFv2 ........................................................................ 29
2.5.2. Verify the propagated default route ................................................................................... 29
2.6. Verify single-are OSPFv2 ............................................................................................................ 30
2.6.1. Verify OSPF neighbors ......................................................................................................... 30
2.6.2. Verify OSPF protocol settings ............................................................................................. 30
2.6.3. Verify OSPF process information ........................................................................................ 31
2.6.4. Verify OSPF interface settings ............................................................................................. 31
Extra slides OSPFv3 ............................................................................................................................... 31
Single area OSPFv3............................................................................................................................ 31
Extra slides multi-area OSPF ................................................................................................................. 34
Multiarea OSPF operation ................................................................................................................ 34
Configuring multiarea OSPF .............................................................................................................. 37

,H4: ACL concepts .................................................................................................................................. 40
4.1. Purpose of ACLs ......................................................................................................................... 40
4.1.1. What is an ACL? .................................................................................................................. 40
4.1.2. Packet filtering .................................................................................................................... 41
4.1.3. ACL operation...................................................................................................................... 41
4.2. Wildcard masks in ACLs.............................................................................................................. 42
4.2.1. Wildcard mask overview ..................................................................................................... 42
4.2.2. Wildcard mask types ........................................................................................................... 42
4.2.3. Wildcard mask calculation .................................................................................................. 43
4.2.4. Wildcard mask keywords .................................................................................................... 43
4.3. Guidelines for ACL creation ....................................................................................................... 43
4.3.1. Limited number of ACLs per interface ................................................................................ 43
4.3.2. ACLs best practices.............................................................................................................. 44
4.4. Types of IPv4 ACLs...................................................................................................................... 44
4.4.1. Standard and extended ACLs .............................................................................................. 44
4.4.2. Numbered and named ACLs ............................................................................................... 44
4.4.3. Where to place ACLs ........................................................................................................... 45
4.4.4. Standard ACL placement example ...................................................................................... 45
4.4.5. Extended ACL placement example ..................................................................................... 45
H5: ACLs for IPv4 configuration ............................................................................................................ 46
5.1. Configure standard IPv4 ACLs .................................................................................................... 46
5.1.1. Create an ACL ...................................................................................................................... 46
5.1.2. Numbered standard IPv4 ACL syntax .................................................................................. 46
5.1.3. Named standard IPv4 ACL syntax ....................................................................................... 47
5.1.4. Apply a standard IPv4 ACL .................................................................................................. 47
5.1.5. Numbered standard IPv4 ACL example .............................................................................. 47
5.1.6. Named standard IPv4 ACL example .................................................................................... 48
5.2. Modify IPv4 ACLs........................................................................................................................ 48
5.2.1. Two methods to modify an ACL .......................................................................................... 48
5.2.2. Text editor method ............................................................................................................. 48
5.2.3. Sequence numbers method ................................................................................................ 48
5.2.4. Modify a named ACL example ............................................................................................ 49
5.2.5. ACL statistics ....................................................................................................................... 49
5.3. Secure VTY ports with a standard IPv4 ACL ............................................................................... 49
5.3.1. The access-class command ................................................................................................. 49
5.3.2. Secure VTY access example................................................................................................. 50

, 5.3.3. Verify the VTY port is secured ............................................................................................. 50
5.4. Configure extended IPv4 ACLs ................................................................................................... 50
5.4.1. Extended ACLs ..................................................................................................................... 50
5.4.2. Numbered extended IPv4 ACL syntax ................................................................................. 50
5.4.3. Protocols and ports ............................................................................................................. 51
5.4.4. Protocols and port numbers configuration examples ........................................................ 52
5.4.5. Apply a numbered extended IPv4 ACL ................................................................................ 52
5.4.6. TCP established extended ACL ............................................................................................ 52
5.4.7. Named extended IPv4 ACL syntax ...................................................................................... 52
5.4.8. Named extended IPv4 ACL example ................................................................................... 53
5.4.9. Edit extended ACLs ............................................................................................................. 53
5.4.10. Another named extended IPv4 ACL example ................................................................... 53
5.4.11. Verify extended ACLs ........................................................................................................ 54
Extra slides ACL IPv6 ............................................................................................................................. 55
IPv6 ACLs configuration .................................................................................................................... 55
Troubleshoot IPv6 ACLs .................................................................................................................... 57
H6: NAT for IPv4 .................................................................................................................................... 58
6.1. NAT characteristics .................................................................................................................... 58
6.1.1. IPv4 private address space .................................................................................................. 58
6.1.2. What is NAT......................................................................................................................... 58
6.1.3. How NAT works ................................................................................................................... 59
6.1.4. NAT terminology ................................................................................................................. 59
6.2. Types of NAT .............................................................................................................................. 60
6.2.1. Static NAT ............................................................................................................................ 60
6.2.2. Dynamic NAT ....................................................................................................................... 60
6.2.3. Port address translation ...................................................................................................... 60
6.2.4. Next available port .............................................................................................................. 60
6.2.5. NAT and PAT comparison.................................................................................................... 61
6.2.6. Packets without a layer 4 segment ..................................................................................... 61
6.3. NAT advantages and disadvantages .......................................................................................... 62
6.3.1. Advantages of NAT .............................................................................................................. 62
6.3.2. Disadvantages of NAT ......................................................................................................... 62
6.4. Static NAT ................................................................................................................................... 63
6.4.1. Static NAT scenario ............................................................................................................. 63
6.4.2. Configure static NAT ........................................................................................................... 63
6.4.3. Analyze static NAT............................................................................................................... 63
$7.86
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
SophieDW

Conoce al vendedor

Seller avatar
SophieDW Hogeschool Gent
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
7
Miembro desde
3 año
Número de seguidores
5
Documentos
7
Última venta
9 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes