Cours Reseau
Cours Reseau
Cours Reseau
2.3 Addressing
2.3.1 IP Terminology
I. Subnetting Basic
a) How to create subnets
b) Subnet Mask
d) IP Subnet-Zero
Chapter 5: IP Routing
Introduction
Routing protocol (RIP, RIPv2, EIGRP, and OSPF): routers use routing
and to ensure that all routers have the same routing table. Routing
protocole are also employed to determine the best path a packet should
Routed protocol (IP and IPv6): once all routers know about all
I. Routing Basics
The term routing refers to taking a packet from one device and
network.
Here’s an important list of the minimum factors a router must know to abble
● Destination address
● Neighbor routers from which it can learn about remote networks
Corp#config t
Corp(dhcp-config)#default-router 192.168.10.1
Corp(dhcp-config)#dns-server 4.4.4.4
Corp(dhcp-config)#exit
Corp#copy run start
Now i’m pretty sure i configured DHCP correctly. The hosts are remote
across a router, so what would i need to do that would allow them to get an
address from a DHCP server? If you concluded that i’ve got to configure the
LA#config t
LA(config)#int f0/0
a) Static Routing
Static routing is the process that ensues when you manually add routes in
Starting at the beginning, here’s the command syntax you use to add a
you use an exit interface instead of a next-hope address. You can change
command.
the next-hope router, the route will automatically be discarted from the
The SF and LA routers that I’ve connected to the Corp router are
considered stub routers. A stub indicates that the networks in this design
have only one way out to reach all other networks, which means that
instead of creating multiple static routes, we can just use a single default
destination not found in the routing table, which is why it is also called a
LA#config t
c) Dynamic Routing
update routing tables on routers. The routing protocol i’m going to talk
protocols (IGPs) and exterior gateway protocols (EGPs). IGPs are used
routers sharing the same routing-table information are in the same AS.
Administrative Distances
most trusted and 255 means no trafic will be passed via this route. If the
router receives two updates listing the same remote network, the firs thing
If one of the advertised routes has a lower AD than the other, then
the route with the lowest AD will be chosen and placed in the routing table.
If both advertised routes to the same network have the same AD,
then routing protocol metrics like hop count and/or the badwidth of the lines
will be used to find the best path to the remote network. The advertised
route with the lowest metric will be placed in the routing table, but if both
advertised routes have the same AD as well as the same metrics, then the
Routing Protocols
the best path to a remote network by judging distance. In RIP routing, each
intance where a packet goes through a router is called a hop, and the route
with the least number of hop to the network will be chosen as the best one.
The vector indicates the direction to the remote network. RIP is a distance-
vector routing protocol and periodically sends out the entire routing table to
(SPF) protocols, the routers each create three separate tables. One of these
topology of the entire internetwok, and one is used as the routing table.
Link-state routers know more about the internetwork than any distance-
completely link-state.
RIP sends the complete routing table out of all active interfaces every
but it’s super inefficient on large networks with WAN links or on networks
RIP version 1 uses only classful routing, which means that all devicess in
the network must use the same subnet mask. This is because RIP version 1
doesn’t send updates with subnet mask information in tow. RIP version 2
provides something called prefix routing and does send subnet mask
You probably don’t want your RIP network advertised everywhere on your
Corp#config t
Corp(config)#router rip
This command will prevent RIP updates from being propagated out of
Now i’m going to guide you through how to advertise a way out of your
autonomous system to other routers, and you’ll see this is completed the
Corp(config)#router rip
Corp(config-router)#default-information originate
Chapter 6: Open Shortest Path First (OSPF)
You see this a lot typically in medium to large enterprise networks the
various strategies for security are based on some mix of internal and
network. they achieve this by using access lists. In this figure, you can see
I’ll use the terms trusted network and untrusted network throughout this
chapter, so it’s important that you can see where the’re found in typical
can create VLAN with switches on the inside, trusted network. Multilayer
and they really come in handy when you need to exercise control over
network traffic. An ACL would be your tool of choice for decision making in
these situation.
There are three important rules that a packet follows when it’s being
➢ The packet is always compared with each line of the access list in
sequential order it will always start with the first line of the access list,
➢ The packet is compared with lines of the access list only until a match is
made. Once it matches the condition on a line of the access list, the
➢ There is an implicit “deny” at the end of each access list this means that
if a packet doesn’t match the condition on any of the lines in the access
➢ Standard access lists: these ACLs use only the source IP address in an IP
packet as the condition test. All decisions are made based on the source
the many types of IP traffic such as web, telnet, udp and so on.
➢ Extended access lists: can evaluate many of the other fields in the layer
the router where you want the traffic filtered. And you’ve got to specify
which direction of traffic you want the ACLs applied to. By specifying the
direction of traffic, you can and must use different access lists for inbound
before being routed to the outbound interface. Any packets that are
process is invoked.
and then processed through the access list before being queued.
There are some general access list guidelines that you should keep in
√ You can assign only one access list per interface per protocol per
direction. This means that when applying IP access lists, you can have
only one inbound access list and one outbound access list per interface.
√ Organize your access lists so that the more specific tests are at the top.
√ Anytime a new entry is added to the access list, it will be placed at the
bottom of the list, which is why i highly recommend using a text editor
√ You can’t remove one line from an access list. If you try to do this, you
will remove the entire list. This is why it’s best to copy the access list to
√ Unless your access list end with a permit any command, all packets will
be discarded if they do not meet any of the list’s test. This means every
list should have at least one permit statement or it will deny all traffic.
√ Create access list permit and deny statements first and then apply them
√ Access lists are designed to filter traffic going through the router. They
will not filter traffic that has originated from the router.
The most common attack is a denial of service (DoS) attack. Although ACLs
can help with a DoS, you really need an intrusion detection system (IDS)
and intrusion prevention system (IPS) to help prevent these common attack.
Here’s a list of the many security threats you can mitigate with ACLs:
● Denying/filtering Traceroute
It’s generally a bad idea to allow any external IP packets that contain the
source address of any internal hosts or networks into a private network just
don’t permit it
Here’s a ist of rules to live by when configuring ACLs from the Internet to
You create a standard IP access list by using the access-list numbers 1-99 or
Corp(config)#access-list ?
Corp(config)#access-list 10 ?
Corp(config)#access-list 10 deny ?
This tells the list to deny any packets from host 172.16.30.2. The default
parameter is host.