Friday, 11 April 2014

ACL

Salah satu keahlian penting seorang network administrator butuhkan adalah penguasaan access control lists(ACL).

Administrator menggunakan ACL untuk stop trafik atau permit hanya trafik yang ditetapkan sementara men-stop semua trafik lain.

Perancang jaringan menggunakan firewall (software atau hardware) untuk melindungi jaringannya dari akses yang tidak terotorisasi.

Firewall adalah software atau hardware yang memaksa (enforce) kebijakan keamanan jaringan.

Pikirkan sebuah lubang kunci pada sebuah pintu ke sebuah ruangan di dalam bangunan. Kunci itu hanya memungkinkan pengguna-pengguna yang terotorisasi dengan sebuah kunci atau kartu akses untuk bisa melewati pintu.

Demikian pula, sebuah firewall memfilter paket-paket yang tidak terotorisasi atau paket-paket yang berpotensi membahayakan untuk masuk kedalam jaringan.

Pada sebuah ruter Cisco, kamu dapat mengkonfigurasi sebuah firewall sederhana yang menyediakan kemampuan pemfilteran trafik menggunakan ACL-ACL.

Sebuah ACL adalah sebuah list terurut dari pernyataan permit atau pernyataan deny yang beraplikasi terhadap alamat-alamat atau protokol-protokol atas.

ACL menyediakan jalan yang dahsyat untuk mengatur trafik masuk dan trafik keluar pada jaringanmu. Kamu dapat mengkonfigurasi ACL untuk semua protokol jaringan yang bisa terutekan.

Alasan yang paling penting untuk mengkonfigurasi ACL adalah menyediakan keamanan bagi jaringanmu.

Berikut akan dijelaskan bagaimana menggunakan ACL standard dan ACL extended sebagai bagian dari solusi keamanan dan mengajarkan kamu bagaiaman cara mengkonfigurasi mereka pada sebuah ruter Cisco.
Termasuk tips, considerations, recommendations, dan guideline umum bagaimana cara menggunakan ACL.

 

Thursday, 10 April 2014

Soal-soal subnetting

Karya Aaron Balchunas (http://www.routeralley.com/ra/labs/subnetting_exercises.pdf)

Rancang alamat

Didalam 2 atau lebih jaringan yang saling terhubung (interconnected) tidak boleh ada alamat network atau alamat subnetwork yang sama.

Contoh:
Pada jaringan 1 ada alamat 192.168.1.0/24 dan di jaringan 2 ada alamat 192.168.1.0/25


Wednesday, 9 April 2014

Server:
- set ip address-nya secara static
- biasanya pakai private ip address tapi dibantu dengan mengkonfigurasi nat di ruter perimeter.


Pengalamatan IP statik dan dinamik

Alamat IP bisa diberikan secara statik atau secara dinamik.

Pemberian alamat IP secara statik
Statik berarti alamat IP host tidak berubah-ubah sampai perusahaan bubar.

Network administrator harus secara manual mengkonfigurasi informasi network untuk masing-masing host. Pada minimumnya, ini mencakup pengkonfigurasian alamat IP, subnetmask dan default-gateway. Ilustrasinya ada di gambar dibawah.

Static assignment ini bisa memberikan peningkatan kontrol terhadap sumber daya network dengan menggunakan access-list.

Akan tetapi pemberian alamat IP secara statik bisa menghabiskan waktu jika terdapat banyak users.

Pemberian alamat IP statik sangat berguna untuk printer-printer, server, and alat jaringan seperti switch, access-point yang perlu bisa diakses oleh klien di jaringan.

Akan tetapi untuk golongan perangkat end users seperti: PC, smart phone yang merupakan jumlah perangkat terbanyak di jaringan, dianjurkan menggunakan mode pemberian alamat IP secara dinamik karena akan sangat merepotkan network administrator apabila mengkonfigurasi perangkat-perangkat ini satu persatu.





Pemberian alamat IP secara dinamik


Beberapa tipe host dari jaringan IPv4

Dalam jaringan ada beberapa jenis host (pemakai alamat IP versi 4), yaitu:
1. End devices untuk users
2. Servers dan peripherals
3. Host-host yang bisa diakses dari intrnet
4. Intermediary devices

Host-host terasosiasi ke sebuah jaringan IPv4 dengan satu porsi network yang sama.

Contoh end devices: PC, IP Phone, Printer, dan smartphone

Monitoring performance

Monitoring performance adalah kegiatan memantau trafik-trafik di jaringan untuk melihat alamat IP mana yang menghasilkan atau alamat IP mana yang menerima paket berlebihan (excessive).

Keteraturan manajemen alamat IP sangat dibutuhkan di dalam jaringan untuk memudahkan pengenalan host yang tercurigai.


NAT

NAT: translator dari private address ke public address

Range dari alamat IPv4 terlindungi

Tipe-tipe alamat IPv4:
1. Alamat Host
Kegunaan: dipakai untuk alamat-alamat host IPv4
Range: 0.0.0.0 sampai 223.255.255.255

2. Alamat Multicast
Kegunaan: dipakai untuk alamat grup-grup multicast pada sebuah network lokal
Range: 224.0.0.0 sampai 239.255.255.255

3. Alamat Experimental
Kegunaan:
- Dipakai untuk research dan experimental
- Tidak bisa saat ini digunakan untuk host-host pada jaringan IPv4
Range: 240.0.0.0 sampai 255.255.255.254

Tuesday, 8 April 2014

Broadcast

Transmisi broadcast digunakan sebagai mode pengiriman paket kesemua host di network.

Ketika sebuah host menrima sebuah paket dengan alamat broadcast sebagai alamat tujuannya, host itu akan memproses paket itu seperti laiknya sebuah paket ke alamat unicast host itu.

Transmisi broadcast digunakan ketika:
- Alamat IP host penyedia layanan tidak diketahui.
Contoh:
Alamat IP host DHCP server tidak diketahui sementara host/PC dikonfigurasi untuk menggunakan alamat IP dinamis atau alamat IP nya tidak dikonfigurasi oleh administrator.

- Sebuah host butuh memberikan informasi ke semua host di jaringan

- Mempertukarkan informasi ruting oleh ruting protokol misal RIP

Ketika suatu host butuh informasi, host mengirimkan permintaan/pertanyaan, yang disebut query, ke alamat broadcast. Semua host di jaringan menerima dan memproses query ini. Satu atau lebih host yang memiliki informasi yang dibutuhkan oleh host penanya akan merespon, biasanya menggunakan unicast.

Broadcast paket biasanya dibatasi ke lokal saja, tidak seperti paket unicast, bisa di rutekan.

Pembatasan ini tergantung dari konfigurasi ruter yang membatasi network dan tipe dari broadcast itu sendiri (directed broadcast/limited broadcast)

directed broadcast / non-limited broadcast
contoh:
Misal host di network 172.16.5.0 ingin mengirimkan paket broadcast ke network 172.16.4.0, host 172.16.5.1 itu akan mengirimkan paket broadcast ke alamat tujuan 172.16.4.255

limited broadcast

Paket-paket limited broadcast menggunakan alamat IP tujuan: 255.255.255.255

Ruter tidak akan meneruskan paket ini.

Switch layer 2 contoh: catalyst 2960, meneruskan paket ini.

Paket-paket yang dialamatkan ke alamat limited broadcast hanya akan "muncul" pada network lokal. Oleh karena alasan ini, sebuah jaringan IPv4 disebut juga sebagai suatu broadcast domain. Ruter-ruter yang menjadi pembatas dari sebuah broadcast domain.

Jadi, kita butuh ruter untuk membatasi broadcast trafik yang tergolong berlebihan (excessive) yang sering terjadi pada jaringan switch (switched network) atau dengan kata lain jaringan yang hanya menggunakan switch-switch sebagai penghubung; tanpa ruter (karena hanya ruter yang memblok paket ini) dan biasanya jaringan seperti ini hanya menggunakan 1 alamat network (network address) IPv4 saja.

Multicast

1. Multicast transmision
2. Multicast client

1. Multicast transmission
Multicast dirancang untuk melestarikan bandwidth jaringan.

Multicast mengurangi trafik dengan cara mengizinkan/memperbolehkan 1 host/PC untuk mengirimkan 1 paket ke sekumpulan/multiple host yang terpilih.

Jika menggunakan unicast, pengiriman paket ke tujuan banyak host, pengirim harus mengirimkan 1 paket ke setiap host. Jadi jika ada 3 host sebagai tujuan maka host pengirim akan mengirimkan 3 paket.

Jika menggunakan multicast pengiriman paket ke banyak host, pengirim cukup mengirim satu paket saja.

Beberapa contoh dari pengiriman multicast seperti:
1. Video broadcast dan audio broadcast
2. Routing information exchange oleh protokol routing contoh: EIGRP
3. Pendistribusian software / perangkat lunak
4. News feed

2. Multicast client
Untuk bisa menikmati layanan multicast, sebuah PC harus men-subscribe dirinya ke suatu multicast group. Subscribe ini dilakukan oleh program/aplikasi Windows yang bisa/support streaming contoh: VLC media player.

Ketika sebuah PC sudah men-subscribe dirinya kedalam sebuah multicast group, maka PC itu bisa disebut multicast client.

Multicast client

Multicast group

Contoh: 224.0.0.1 adalah



Contoh
Source address: 172.16.4.1 Destination address: 224.0.0.1





WAN

Pengguna WAN harus mendaftar ke service provider/carier untuk bisa menggunakan jaringan WAN milik service provider itu. Contoh: pengguna modem flash telkomsel harus membeli pulsa telkomsel, pengguna modem smartfren harus membayar ke smarfren untuk bisa menggunakan/mengakses jaringan.

Contoh gambar posisi WAN:

Motivasi
Ucapan terimakasih
Permohonan maaf
Anjuran


Monday, 7 April 2014

Purpose

For + verb + object
Contoh tujuan:
Untuk menghasilkan report


Access

Access adalah

Simple database adalah database yang hanya mempunyai 1 tabel.

Tabel adalah list dari baris dan kolom-kolom yang menyerupai lembarkerja Microsoft office Excel


Access is a relational database management system. In a relational database, you divide your information into separate, subject-based tables. You then use table relationships to bring the information together as needed. 

Validation rule to validate data in field


Wednesday, 19 March 2014

Mathematic

Mathematic is 100% Geometry Analysis Algebra Statistic Calculus

Idea

Given a text:
- List all words on that tet
- count how many word
- persandingan: hitung berapa banyak kemunculan kata yang satu disandingkan dengan kata yang lain dalam satu kalimat yang dibatasi tanda titik (.).

 

Tuesday, 18 March 2014

Link-state routing protocol summary

Summary

Link-state routing protocols are also known as shortest path first protocols and are built around Edsger Dijkstra's shortest path first (SPF) algorithm. There are two link-state routing protocols for IP: OSPF (Open Shortest Path First) and IS-IS (Intermediate-System-to-Intermediate-System).

The link-state process can be summarized as follows:

1. Each router learns about its own directly connected networks.

2. Each router is responsible for "saying hello" to its neighbors on directly connected networks.

3. Each router builds a Link-State Packet (LSP) containing the state of each directly connected link.

4. Each router floods the LSP to all neighbors, who then store all LSPs received in a database.

5. Each router uses the database to construct a complete map of the topology and computes the best path to each destination network.

A link is an interface on the router. A link-state is the information about that interface including its IP address and subnet mask, the type of network, the cost associated with the link, and any neighbor routers on that link.

Each router determines its own link-states and floods the information to all other routers in the area. As a result, each router builds a link-state database (LSDB) containing the link-state information from all other routers. Each router will have identical LSDBs. Using the information in the LSDB, each router will run the SPF algorithm. The SPF algorithm will create an SPF tree, with the router at the root of the tree. As each link is connected to other links, the SPF tree is created. Once the SPF tree is completed, the router can determine on its own the best path to each network in the tree. This best path information is then stored in the router's routing table.

Link-state routing protocols build a local topology map of the network that allows each router to determine the best path to a given network. A new LSP is sent only when there is a change in the topology. When a link is added, removed or modified, the router will flood the new LSP to all other routers. When a router receives the new LSP, it will update is LSDB, rerun the SPF algorithm, create a new SPF tree, and update its routing table.

Link-state routing protocols tend to have a faster convergence time than distance vector routing protocols. A notable exception is EIGRP. However, link-state routing protocols do require more memory and processing requirements. This is usually not an issue with today's newer routers.

In the next and final chapter of this course, you will learn about the link-state routing protocol, OSPF.

Tips belajar sama orang

Jika kau belajar sama orang, catat apa saja yang ditanyanya kepada orang lain (yang berhubungan dengan pekerjaan mu)

Monday, 17 March 2014

Configure OSPF pada jaringan multiaccess(Ethernet/LAN)


Tugas 1: Mempersiapkan network
Di kondisi nyata: Mounting perangkat kedalam rak, colok-colok kabel dari perangkat satu ke perangkat yang lain sesuai dengan gambar topology diagram, colok kabel power, nyalakan perangkat (powering up).

Di kondisi simulasi (packet tracer): Keluarkan perangkat kepada main window, colok-colok kabel dari perangkat satu ke perangkat yang lain sesuai dengan gambar, tidak ada colok kabel power, tidak perlu nyalakan perangkat (karena sudah secara otomatis nyala)

Catatan: di topologi ini kita punya tiga ruter menggunakan jaringan multiakses ethernet yang sama.
  
Tugas 2: Konfigurasi alamat ethernet, alamat loopback and mengaktifkan interface
Langkah 1: Mengkonfigurasi interface tiap router dan mengaktifkannya
Pada tugas ini kita mengkonfigurasi interface ethernet tiap router (R1, R2 dan R3) dan mengaktifkannya atau meng-no shutdown-nya dan memberi alamat IP sesuai dengan tabel diatas.

Langkah 2: Memeriksa benar apa salah (verifikasi) alamat IP interface-interface yang kita konfigurasi pada step 1 sebelumnya
show ip interface brief

Jangan lupa untuk menyimpan konfigurasi ruter-ruter diatas ke NVRAM dengan perintah copy run start

Tugas 3: Mengkonfigurasi OSPF di setiap ruter (R1, R2, dan R3)

R1
R1(config)# router ospf 1
R1(config-interface)# network 192.168.1.0 0.0.0.0.255 area 0
R1(config-interface)# end

R2
R2(config)# router ospf 1
R2(config-router)# network 192.168.1.0 0.0.0.255 area 0
R2(config-router)# end

R3
R3(config)# router ospf 1
R3(config-router)# network 192.168.1.0 0.0.0.255 area 0
R3(config-router)# end

Tugas 4: Melihat ruter mana yang menjadi ruter DR dengan menggunakan perintah dibawah ini pada setiap ruter

R1# show ip interface ospf
R2# show ip interface ospf
R3# show ip interface ospf

Kenapa R3 menjadi DR? Karena R3 belum memiliki interface loopback dan mempunyai alamat IP tertinggi.

Contoh output show ip interface ospf pada R3

Tugas 5: mengganti siapa ruter DR dan siapa ruter BDR saat ini

R1# configure terminal
R1(config)# interface f0/0
R1(config-if)# ip ospf interface priority 255
R1(config-if)# end

R2# configure terminal
R2(config)# interface f0/0
R1(config-if)# ip ospf interface priority 0

R3# configure terminal
R3(config)# interface f0/0
R3(config-if)# ip ospf interface priority 100

Jika kamu tidak shutdown dan no shutdown interface, tidak akan terjadi perubahan (R3 tetap menjadi DR dan R2 tetap menjadi BDR). Kenapa? karena proses pemilihan DR atau BDR hanya terjadi ketika interface di-restart atau ketika router dikonfigurasi dengan perintah network ....


Tugas 6: Mencilukba (memverifikasi) siapa yang menjadi DR dan BDR sekarang
R1#show ip ospf interface
R2# show ip ospf interface
R3# show ip ospf interface







Task 4: Configure OSPF on the DR router
Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R3 router

R3(config)# router ospf 1
R3(config-router)# network 192.168.1.0 0.0.0.255 area 0
R3(config-router)# end
R3#



Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R3 is the DR

R3# show ip ospf interface

Task 5: Configure OSPF on the BDR router
Step 1: Use the router ospf command in global configuration mode to enable ospf on the R2 router
R2(config)# router ospf 1
R2(config-router)# network 192.168.1.0 0.0.0.255 area 0
R2(config-router)# end

Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R2 is the BDR

R2# show ip ospf interface

Step 3: Use the show ip ospf neighbors command in global configuration mode to view information about the other routers in the OSPF area

R2# show ip ospf neighbors

Task 6: Configure OSPF on the DRother router
Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R1 router
R1(config)# router ospf 1
R1(config-router)# network 192.168.1.0 0.0.0.255 area 0
R1(config-route)# end

Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R1 is a DRother

R1# show ip ospf interface

Step 3: use the show ip ospf neighbors command in global configuration mode to view information about the other routers in the OSPF area.

R1# show ip ospf neighbors

Task 7: Use the OSPF priority to determine the R1 sebagai DR and R3 sebagai BDR
Step 1: Use the ip ospf interface command to change the OSPF priority of the R1 router to 255

R1(config)# interface fastethernet 0/0
R1(config-if)# ip ospf priority 255
R1(config-if)# end

Step 2: Use the ip ospf priority interface command to change the OSFP priority of the R3 router to 100
R3(config)# interface f0/0
R3(config-if)# ip ospf priority 100
R3(config-if)# end
R3(config)#

Step 3: Use the ip ospf priority interface command to change the OSPF priority of the R2 router to 0
R2(config)#interface fastEthernet0/0
R2(config-if)#ip ospf priority 0
R2(config-if)#end

Step 4: Shut down and re-enable the fastethernet0/0 interfaces to force an OSPF election
R1(config)# interface fastethernet 0/0
R1(config-if)# shutdown

R2
R2(config)# interface fastethernet 0/0
R2(config-if)# shutdown

R3
R3(config)# interface fastethernet 0/0
R3(config-if)# shutdown

Step 5: Re-enable the fastethernet 0/0 interface on the R2 router
R2(config-if)# no shut
R2(config-if)# end

Step 6: Re-enable the fastethernet 0/0 interface on the R1 router
R1(config-if)# no shut

Step 7: Use show ip ospf neighbor command on the R1 router to view the OSPF neighbor information for that router

R1# show ip ospf neighbor

Step 8: Re-enable the fastethernet 0/0 interface on the R3 router
R3(config-if)# no shutdown

Step 9: Use the show ip ospf interface command on the R3 router to verify that R3 has become BDR
R3# show ip ospf interface




Saturday, 15 March 2014

OSPF General information/spec

1. Area
for scalability
the size of an area is measured with number of routers and the size of the link-state database

2. Process-id
Local significant, gak harus sama tiap ruter.

3. Router-id




2. OSPF metric
bandwidth
auto-cost reference-bandwidth


3. OSPF packet types:
Hello
Database Description (DD)
Link-state request
Link-state update: used interchangebly with term LSA
Link-state acknowledgment

Each packet serves a specific purpose.
Hello: Used to establish adjacency and maintain adjacency with other OSPF router
DBD: descriptor / teaser of the sending router's link-state database and is used by receiving routers to check against the local link-state database
LSR: Receiving routers can then request more information about any entry in the DBD by sending a Link-state Request (LSR)
LSU: Link-state update used to reply LSR; to announce new information (routing updates)
LSAck: the router sends a link-state acknowledgement (LSAck) to confirm receipt of the LSU

4. Dissecting hello packet
Type, RouterID, AreaID, Network mask, Hello Interval, Router priority, Designated Router(DR), Backup designated router(BDR), List of neighbors.

5. Process of OSPF router

Processes (before sending/flood its link-states to other routers):
1. Determine if there are any neighbor on those links
Receiving an OSPF hello packet on an interface confirms for a router that there is another OSPF router on this link.
2. Establish adjacency
Before 2 routers can form an OSPF neighbor adjacency, they must agree on three values: hello interval, dead interval, and network type.
3. Keeps sending hello packet to check apakah neighbor masih hidup / mati?
4. Floods the link-state information about the "down" neighbor out all OSPF enabled interface.



6. OSPF Hello intervals and dead interval
OSPF hello interval indicate how often OSPF router transmit its hello packets.
10 seconds : multi-access network and point-to-point networ
30 seconds: NBMA(non-broadcast multiaccess) frame-relay, X.25, ATM

OSPF dead interval: 4 kali hello interval

7. Network type
- Point-to-point
- Broadcast multiaccess
- Nonbroadcast multiaccess (NBMA)
- Point-to-multipoint
- Virtual links

8. OSPF interface priority
Digunakan pada proses pemilihan DR dan BDR
DR Router: ruter dengan interface priority yang lebih tinggi
BDR: next tertinggi

Default nilai ospf interface priority = 1



8. Link-state database

If the Dead interval expires before the routers receive a Hello packet, OSPF will remove that neighbor from its link-state database.


10. OSPF algorithm

Any time a router receives new information about the topology (addition, deletion, or modification of a link), the router must rerun the SPF algorithm, create a new SPF tree, and update the routing table.

11. Tools show-show:
show ip protocols
show ip ospf
show ip ospf interface
show ip ospf neighbors:
- Untuk melihat siapa saja yang telah menjadi neighbor / tetangga
- Untuk melihat dead time counter

12. DR/BDR election

Bagaimana ruter DR atau ruter BDR terpilih? Dibawah ini kriteria yang dipakai dalam pemilihan ruter DR/BDR pada jaringan multiaccess(Ethernet):
1. DR: Router with the highest OSPF interface priority.
2. BDR: Router with the second highest OSPF interface priority.
3. If OSPF interface priorities are equal, the highest router ID is used to break the tie.


show ip protocols:

Adjacency troubleshooting:
Two routers may not form an OSPF adjacency if:
The subnet masks do not match, causing the routers to be on separate networks.
OSPF Hello or Dead Timers do not match.
OSPF Network Types do not match.
There is a missing or incorrect OSPF network command.

Friday, 14 March 2014

Discontiguocity

not in the same major address

Network

Multiaccess network: Ethernet, frame-relay

RIPv1, RIPv2, EIGRP, OSPF summary

RIPv1

RIP (version 1) is a classful, distance vector routing protocol. RIPv1 was one of the first routing protocols developed for routing IP packets. RIP uses hop count for its metric, with a metric of 16 hops meaning that route is unreachable. As a result, RIP can only be used in networks where there are no more than fifteen routers between any two networks.

RIP messages are encapsulated in a UDP segment, with source and destination ports of 520. RIP routers send their complete routing tables to their neighbors every 30 seconds except for those routes which are covered by the split horizon rule.

RIP is enabled by using the router rip command at the global configuration prompt. The network command is used to specify which interfaces on the router will be enabled for RIP along with the classful network address for each directly connected network. The network command enables the interface to send and receive RIP updates and also advertises that network in RIP updates to other routers.

The debug ip rip command can be used to view the RIP updates that are sent and received by the router. To prevent RIP updates from being sent out an interface, such on a LAN where there are no other routers, the passive-interface command is used.

RIP entries are displayed in the routing table with the source code of R and have an administrative distance of 120. Default routes are propagated in RIP by configuring a static default route and using the default-information originate command in RIP.

RIPv1 automatically summarizes subnets to their classful address when sending an update out an interface that is on a different major network than the subnetted address of the route. Because RIPv1 is a classful routing protocol, the subnet mask is not included in the routing update. When a router receives a RIPv1 routing update, RIP must determine the subnet mask of that route. If the route belongs to the same major classful network as the update, RIPv1 applies the subnet mask of the receiving interface. If the route belongs to a different major classful network than the receiving interface, RIPv1 applies the default classful mask.

The show ip protocols command can be used to display information for any routing protocol enabled on the router. Regarding RIP, this command displays timer information, status of automatic summarization, which networks are enabled on this router for RIP, and other information.

Because RIPv1 is a classful routing protocol, it does not support discontiguous networks or VLSM. Both of these topics are discussed in Chapter 7, "RIPv2".

RIPv2

RIPv2 is a classless, distance vector routing protocol, that is defined in RFC 1723. Because RIPv2 is a classless routing protocol, it includes the subnet mask with the network addresses in the routing updates. As with other classless routing protocols, RIPv2 supports CIDR supernets, VLSM and discontiguous networks.

We saw that classful routing protocols like RIPv1 can not support discontiguous networks because they automatically summarize at major network boundaries. A router that receives routing updates from multiple routers advertising the same classful summary route cannot determine which subnets belong to which summary route. This inability leads to unexpected results including misrouted packets.

The default version of RIP is version 1. The command version 2 is used to modify RIP to RIPv2.

Similar to RIPv1, RIPv2 automatically summarizes at major network boundaries. However, with RIPv2 automatic summarization can be disabled with the no auto-summary command. Automatic summarization must be disabled to support discontiguous networks. RIPv2 also supports CIDR supernets and VLSM because the specific subnet mask is included with the network address in every routing update. You can use the debug ip rip command to view the RIP update sending the subnet mask with the network address as part of the route entry.

The show ip protocols command will display that RIP is now sending and receiving version 2 updates and whether or not automatic summarization is in effect.

EIGRP
EIGRP (Enhanced Interior Gateway Routing Protocol) is a classless, distance vector routing protocol released in 1992 by Cisco Systems. EIGRP is a Cisco proprietary routing protocol and an enhancement of another Cisco propriety protocol IGRP (Interior Gateway Routing Protocol). IGRP is a classful, distance vector routing protocol which is no longer supported by Cisco. EIGRP uses the source code of "D" for DUAL in the routing table. EIGRP has a default administrative distance of 90 for internal routes and 170 for routes imported from an external source, such as default routes.

EIGRP used PDMs (Protocol Dependent Modules) giving it the capability to support different layer 3 protocols including IP, IPX and AppleTalk. EIGRP uses RTP (Reliable Transport Protocol) as the transport layer protocol for the delivery of EIGRP packets. EIGRP uses reliable delivery for EIGRP updates, queries and replies; and uses unreliable delivery for EIGRP hellos and acknowledgments. Reliable RTP means an EIGRP acknowledgment must be returned.

Before any EIGRP updates are sent, a router must first discover their neighbors. This is done with EIGRP hello packets. On most networks EIGRP sends hello packets every 5 seconds. On multipoint nonbroadcast multiaccess networks (NBMA) such as X.25, Frame Relay, and ATM interface with access links of T1 (1.544 Mbps) or slower, Hellos are sent every 60 seconds. The hold time is three times the hello, or 15 seconds on most networks and 180 seconds on low speed NBMA networks.

The hello and hold-down values do not need to match for two routers to become neighbors. The show ip eigrp neighbors command is used to view the neighbor table and verify that EIGRP has established an adjacency with its neighbors.

EIGRP does not send periodic updates like RIP. EIGRP sends partial or bounded updates, which includes only the route changes and only to those routers that are affected by the change. EIGRP composite metric uses bandwidth, delay, reliability and load to determine best path. By default only bandwidth and delay are used. The default calculation is the slowest bandwidth plus the sum of the delays of the outgoing interfaces from the router to the destination network.

At the center of EIGRP is DUAL (Diffusing Update Algorithm). The DUAL finite state machine is used to determine best path and potential backup paths to every destination network. The successor is a neighboring router that is used to forward the packet using the least-cost route to the destination network. Feasible distance (FD) is the lowest calculated metric to reach the destination network through the successor. A feasible successor (FS) is a neighbor who has a loop-free backup path to the same network as the successor, and also meets the feasibility condition. The feasibility condition (FC) is met when a neighbor's reported distance (RD) to a network is less than the local router's feasible distance to the same destination network. The reported distance is simply an EIGRP neighbor's feasible distance to the destination network.

EIGRP is configured with the router eigrpautonomous-system command. The autonomous-system value is actually a process-id and must be the same on all routers in the EIGRP routing domain. The network command is similar to that used with RIP. The network is the classful network address of the directly connected interfaces on the router. A wildcard mask is an optional parameter that can be used to include only specific interfaces.

There are several ways to propagate a static default route with EIGRP. The redistribute static command in EIGRP router mode is a common method.


OSPF

OSPF (Open Shortest Path First) is a classless, link-state routing protocol. The current version of OSPF for IPv4 is OSPFv2 introduced in RFC 1247 and updated in RFC 2328 by John Moy. In 1999, OSPFv3 for IPv6 was published in RFC 2740.

OSPF has a default administrative distance of 110, and is denoted in the routing table with a route source code of O. OSPF is enabled with the router ospf process-id global configuration command. The process-id is locally significant, which means that it does not have to match other OSPF routers in order to establish adjacencies with those neighbors.

The network command used with OSPF has the same function as when used with other IGP routing protocols, but with slightly different syntax.

Router(config-router)#network network-address wildcard-mask area area-id

The wildcard-mask is the inverse of the subnet mask, and the area-id should be set to 0.

OSPF does not use a transport layer protocol, as OSPF packets are sent directly over IP. The OSPF Hello packet is used by OSPF to establish neighbor adjacencies. By default, OSPF Hello packets are sent every 10 seconds on multiaccess and point-to-point segments and every 30 seconds on non-broadcast multiaccess (NBMA) segments (Frame Relay, X.25, ATM). The Dead interval is the period of time an OSPF router will wait before terminating adjacency with a neighbor. The Dead interval is four times the Hello interval, by default. For multiaccess and point-to-point segments, this period is 40 seconds. For NBMA networks, the Dead interval is 120 seconds.

For routers to become adjacent, their Hello interval, Dead interval, network types and subnet masks must match. The show ip ospf neighbors command can be used to verify OSPF adjacencies.

The OSPF router ID is used to uniquely identify each router in the OSPF routing domain. Cisco routers derive the router ID based on three criteria and with the following precedence:

1. Use the IP address configured with the OSPF router-id command.

2. If the router-id is not configured, the router chooses highest IP address of any of its loopback interfaces.

3. If no loopback interfaces are configured, the router chooses highest active IP address of any of its physical interfaces.

RFC 2328 does not specify which values should be used to determine the cost. Cisco IOS uses the cumulative bandwidths of the outgoing interfaces from the router to the destination network as the cost value.

Multiaccess networks can create two challenges for OSPF regarding the flooding of LSAs, including the creation of multiple adjacencies - one adjacency for every pair of routers, and extensive flooding of LSAs (Link-State Advertisements). OSPF elects a DR (Designated Router) to act as collection and distribution point for LSAs sent and received in the multiaccess network. A BDR (Backup Designated Router) is elected to take over the role of the DR should the DR fail. All other routers are known as DROthers. All routers send their LSAs to the DR, which then floods the LSA to all other routers in the multiaccess network.

The router with the highest router ID is the DR, and the router with the second highest router ID is the BDR. This can be superseded by the ip ospf priority command on that interface. By default, the ip ospf priority is "1" on all multiaccess interfaces. If a router is configured with a new priority value, the router with the highest priority value is the DR, and next-highest the BDR. A priority value of "0" means the router is ineligible to become the DR or BDR.

A default route is propagated in OSPF similar to that of RIP. The OSPF router mode command, default-information originate is used to propagate a static default route.

The show ip protocols command is used to verify important OSPF configuration information, including the OSPF process ID, the router ID and the networks the router is advertising.

default-route

static default-route also called 'quad-zero' static default route can be used with any currently supported routing protocols

static default-route biasanya dikonfigurasi pada ruter yang memiliki koneksi ke suatu network diluar dari domain routing EIGRP, contohnya ke network ISP.

Manual summerization

Kuncinya: jumlah bit yang match concecutively
Operasi apa yang cocok? and atau or?

Hasil sumerisasi berupa alamat network dan mask baru hasil sumerisasi




1. Write out the networks that you want to summarize in binary.

2. To find the subnet mask for summarization, start with the left-most bit.

3. Work your way to the right, finding all the bits that match consecutively.

4. When you find a column of bits that do not match, stop. You are at the summary boundary.

5. Now, count the number of left-most matching bits, which in our example is 22. This number becomes your subnet mask for the summarized route: /22 or 255.255.252.0

6. To find the network address for summarization, copy the matching 22 bits and add all 0 bits to the end to make 32 bits.

The result is the summary network address and mask for 192.168.0.0/22.

Function
summary routes lessen the number of total routes in routing tables, which makes the routing table lookup process more efficient. Summary routes also require less bandwidth utilization for the routing updates because a single route can be sent instead of multiple individual routes.

Routing table

Komponen:
Supernet, default route, child route, parent route

Pengisi ruting tabel:
- Cisco network engineer: directly connected network
- Routing protocol

null0 interface

Remember from Chapter 7, "RIPv2," that the Null0 interface is simply a route to nowhere, commonly known as "the bit bucket."

null0 interface dibahas di RIPv2 dan EIGRP.


Thursday, 13 March 2014

1. process ID
semua router eigrp yang bekerja sama harus menggunakan nomor process id yang sama.

contoh:
r1(config)

r2(config)


2. network command
1. interface mana saja pada router ini yang alamat clasful network address nya cocok dengan alamat network yang dimasukkan di dalam perintah network ini akan di enable untuk mengirim dan menerima EIGRP updates
2. dan, network ini (network yang dimasukkan di dalam perintah network) akan diikutsertakan pada updates routing.

3. network command dengan wildcard mask (optional)
ada kalanya administrator tidak menginginkan secara tidak sengaja semua interface yang mempunya alamat classful jadi termasuk kedalam interface yang berkirim dan berterima EIGRP. Caranya adalah dengan menggunakan wildcard mask

urutan kerja eigrp
- perform adjacencies
- kirim hello packet

- adjacencies ok?
- kirim eigrp updates

4. Null0 summary route
Timbul karena eigrp masih belum di konfigurasi auto-summary.

Semua paket yang match summary route akan dikirim ke blackhole walaupun ruter itu dikonfigurasi memiliki default route.

menghilangkan Null0 summary route memungkinkan EIGRP untuk memilih sebuah supernet atau default route ketika sebuah child route tidak cocok dengan alamat tujuan paket.


5. K values
show ip protocols untuk mencek nilai-nilai K yang digunakan routing protocol EIGRP.

6. Metric yang digunakan EIGRP
Default: bandwidth
Optional: delay, load,

7. Nilai metric
Gunakan show interface <interface> untuk melihat nilai aktual metrik berikut: bandwidth, delay, reliability, load.

Bandwidth
Nilai bandwidth suatu interface adalah nilai statik.
Nilai bandwith interface tidak merepresentasikan nilai aktual bandwidth link.
Nilai bandwidth harus dikonfigurasi agar sama dengan nilai bandwidth aktual link (dilapangan), untuk mengupayakan akurasi informasi-ruting EIGRP.

contoh:
Router(config-if)#bandwidth kilobits


Delay
Delay tidak diukur secara dinamik. Jadi nilai delay adalah nilai statik#
Nilai default delay bisa diubah-ubah oleh admin.

Reliability
Nilai reliability suatu interface

Load
Load merefleksikan jumlah trafik yang memanfaatkan link.
Seperti reliability, load diukur secara dinamis.
Load dinyatakan dengan pecahan 255.

 
8. DUAL
Terminologi/komponen: successor, feasible distance, feasible successor, feasible condition.

sucessor: ruter
feasible distance: metric
feasible successor: rute cadangan
feasible condition: feasible distance yang menjadi syarat.
reported distance (rd):

debug eigrp fsm

9. Static default-route
router-eigrp 1
redistribute static
ip default-network

10. hello and holdtime values
configurable per-interface basis and do not have to match among EIGRP routers
Router(config-if)#ip hello-interval eigrp as-number seconds
Router(config-if)#ip hold-time eigrp as-number seconds

Deploying an embedded web app

1. Create script
script.google.com

EIGRP

Configure and verify

RTP and network adjacencies are DUAL workhorse.

DUAL: computational engine that ensure loop-free paths and backup paths. How can DUAL selects a route to instal in the routing table and what DUAL does with potential backup routes.

Like RIPv2,

EIGRP yang tidak dimiliki oleh distance vector routing lainnya (RIPv1 dan RIPv2) adalah:
- RTP
- Bounded updates
- Diffusing Update Algorithm (DUAL)
- Establishing adjacencies
- Neighbor tables and topology tables (show ip eigrp neighbors) dan

By default, EIGRP automatically summarizes routes at the major network boundary.

Remember, because EIGRP is a classless routing protocol (includes the subnet mask in the routing update), it supports VLSM and CIDR

https://docs.google.com/spreadsheet/pub?key=0ApSl0ZstVGYFdE5oMDNLVU9raEY1c2IyYVJHeDBTcWc&output=html

Hosting / serving web site buatan sendiri menggunakan googledrive

With Drive, you can make web resources — like HTML, CSS, and Javascript files — viewable as a website. Here's how:
  1. Create a new folder in Drive and share it as "Public on the web."
  2. Upload your HTML, Javascript, and CSS files to this folder.
  3. Open the HTML file and click Open in the bottom-right corner.
  4. Click the "Preview" button in the toolbar.
  5. Share the URL that looks like "www.googledrive.com/host/..." from the preview window and anyone can view your web page.

Google Drive does not support web resources that make use of server-side scripting languages like PHP.

Source: https://support.google.com/drive/answer/2881970?hl=en

Wednesday, 12 March 2014

Loopback address


On OSPF
Loopback interface have a specific uses

On other then OSPF routing protocol
-to simulate a network

Finite state machine

This is very helpful concept.

In general terms, a finite state machine (FSM) is a model of behavior composed of a finite number of states, transitions between those states, and events or actions that create the transitions or trigger the state transits.

For instance:

RIPv1 vs RIPv2 vs EIGRP vs OSPF

RIPv2
- support classful or classless routing behaviour
- send its updates periodically
- use bellman ford algorithm
- Automatically summarizes at major network boundaries



EIGRP
- support classful or classless routing behaviour
- send its updates only when the metric for a route changes
- use DUAL algorithm
- menggunakan metric bandwidth, delay, load,
- Automatically summarizes at major network boundaries
- process-id itu all significant; artinya semua ruter ospf yang ada di dalam ruting domain diharuskan mempunyai/menggunakan process-id yang sama.
- Di EIGRP wildcard mask itu optional, berbeda dengan OSPF. Note: Like EIGRP, some IOS versions allow you to simply enter the subnet mask instead of the wildcard mask. The IOS then converts the subnet mask to the wildcard mask format.


OSPF
- menggunakan metric bandwidth
- process-id itu local significant; artinya semua ruter ospf yang ada di dalam ruting domain tidak diharuskan mempunyai/menggunakan process-id yang sama. Berbeda dengan EIGRP.
- Di OSPF wildcard mask itu required. Beda dengan EIGRP, optional. Note: Like EIGRP, some IOS versions allow you to simply enter the subnet mask instead of the wildcard mask. The IOS then converts the subnet mask to the wildcard mask format.
- OSPF does not automatically summarize at major network boundaries.

EIGRP LAB

1. Configure and verify EIGRP routing
Task 1: Configure EIGRP routing
Step 1: Enter router configuration mode
Step 2: Configure network to advertise
Step 3: Save the configuration

Task 2: Examine EIGRP neighbor adjacencies
show ip eigrp neighbors

Task 3: Verify EIGRP Routing
show ip protocols
show ip route

2. Calculating the EIGRP Metric
Task 1: Verify EIGRP Configuration
Step 1: Examine the routing table of each router and verify that there is a path to every network in the topology.
Step 2: Document the default K values used by EIGRP
Step 3: Document the EIGRP metric for every network on each router

Task 2: Change the EIGRP Metric Formula
Step 1: By default, EIGRP uses the K1 and K3 metrics. Change the EIGRP metric formula to use K1, K2, and K3. These values should be set to one. Make sure the values for K4 and K5 are set to zero.

Note: When the EIGRP metrics are changed, the routers will loose their neighbor adjacency. Do not let this concern you. When each router is configured with the same formula for calculating best path, the routers will reform their adjacencies.

Step 2: Verify that the correct K values are configured for each router
Step 3: Document the EIGRP metric for every network on each router
Step 4: Change the EIGRP metric formula to use K1, K2, K3 and K4. Make sure the value for K5 is set to zero.
Step 5: Verify that the correct K values are configured for each router.
Step 6: Document the EIGRP metric for every network on each router


3. Investigating Successor and Feasible successor
Task 1: Verify EIGRP Configuration
Step 1:  Examine the routing table of each router and verify that there is a path to every network in the topology.
Step 2: Verify that each router has two neighbors in its table
Step 3: Document which path in the Topology table that is the successor and feasible successor for each network.


Task 2: Observe the EIGRP finite state machine
Step 1: Turn on debugging feature that will display DUAL FSM notifications on each router
Step 2: Change the EIGRP metric formula on R1 to use only the K1 value.
Step 3: Based on the output from R2 and R3, the neighbor was down due to a k value mismatch
Step 4: document any change in the topology table
Step 5: Determine the difference in the routing table
Step 6: Document changes in each router's neighbor table.

Task 3: Observe Topology Notification Messages
Step 1: Turn off all debugging feature for R1 only
Step 2: Change the EIGRP metric formula on R1 back to the default values
Step 3: Observing the DUAL notification message on R1
Step 4: How did the DUAL FSM handle the change in topology when the route to R1 came back up?





EIGRP

Jika kamu mengubah bobot metric EIGRP, kamu mengubah nilai metric suatu rute didalam routing table. Artinya kamu mengubah penilain EIGRP suatu ruter terhadap suatu link.


R1
Network Metric
192.168.1.0 29090
192.168.1.0 2020202

Sunday, 9 March 2014

Jenis-jenis address IP

Host address

Subnets 
Subnets adalah hasil sumerisasi alamat-alamat host

Contoh-contoh subnet address:
192.168.1.128 /25
192.168.1.0 /25
192.168.1.0 /26
192.168.1.64/26

Major net
Majornet adalah hasil sumerisasi alamat-alamat subnets
Contoh-contoh major address:
192.168.1.0/24
192.168.2.0/24

172.16.0.0 /16
172.17.0.0 /16
172.18.0.0 /16
172.19.0.0 /16


10.0.0.0 /8

Supernet
Aggregasi beberapa major network.
 

Membolak-balik subnet mask

Diberikan notasi alamat subnet:
172.30.200.16 /28

Konversikan ke notasi dengan mask decimal:
28 to the next boundary = 32
32 - 28 = 4
2 ^ 4 = 16

Interesting octet = 4th octet
Mask value for that octet = 256 - 16 = 240

jadi mask decimalnya:
255.255.255.240

Konversikan dari mask notasi desimal ke mask notasi prefix
1. Cari 255 terakhir berhenti di oktet keberapa = 3
2. Apa nilai oktet mask setelah itu = 240
3. kurang hasil proses 2 dengan 256: 256 - 240 = 16
4. Nilai akar dari proses (3):  4
5. ada berapa jumlah 255 pada mask? 3
6. Kalikan hasil proses (4) dengan 8: 3 x 8 = 24
7. tambahkan hasil proses (5) dengan hasil proses (4): 24 + 4 = 28

Tips membaca IP address

 1. Alamat IP network/subnetwork selalu genap
Nilai pada interesting octet selalu genap / habis dibagi 2
Contoh benar:
192.168.1.2 /

Step analisa:
Interesting octetnya? Oktet ke empat.
Genap? (Ya/Tidak) = Ya
Alamat IP benar

2.. Alamat IP host(PC windows, interface router, interface vlan switch, dll.)





Saturday, 8 March 2014

passive-interface
pada dasarnya letakkan passive-interface dimana router rip tidak ingin mengirimkan update?
R1(config-if)#ip address 209.165.200.289 255.255.255.252
                         ^
% Invalid input detected at '^' marker.

Apa yang salah pada command ip address diatas sehingga muncul pesan error?

RIP V.2

RIP v2 is classless routing protocol.
RIP v2 provide subnet mask information in routing updates.
RIP will allow VLSM subnet information to be propagated throughout the network.

show ip protocols
untuk melihat interface mana yang ikut dalam proses pengiriman update
untuk melihat network / subnetwork apa saja yang dikirimkan sebagai route update

debug ip rip
what this router receive, what this router sent
who is sent what
untuk melihat apa yang dikirim dan terima suatu ruter
untuk melihat proses sumerisasi route updates

Automatic summerization
RIPv2 by default still automatically do summerization.

The routers will summarize routes at major network boundaries