A Practical Guide To Advanced Networking

2y ago
33 Views
5 Downloads
1.24 MB
89 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Isobel Thacker
Transcription

A PRACTICAL GUIDE TOADVANCED NETWORKINGJEFFREY S. BEASLEY AND PIYASAT NILKAEWPearson800 East 96th StreetIndianapolis, Indiana 46240 USA

A PRACTICAL GUIDE TO ADVANCED NETWORKINGASSOCIATE PUBLISHERCopyright 2013 by Pearson Education, Inc.EXECUTIVE EDITORAll rights reserved. No part of this book shall be reproduced, stored in a retrieval system,or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed withrespect to the use of the information contained herein. Although every precaution has beentaken in the preparation of this book, the publisher and author assume no responsibility forerrors or omissions. Nor is any liability assumed for damages resulting from the use of theinformation contained herein.ISBN-13: 978-0-7897-4904-8ISBN-10: 0-7897-4904-1Dave DusthimerBrett BartowSENIOR DEVELOPMENT EDITORChristopher ClevelandMANAGING EDITORSandra SchroederPROJECT EDITORMandie FrankThe Library of Congress Cataloging-in-Publication Data is on file.Printed in the United States of AmericaCOPY EDITORSheri CainFirst Printing: November 2012INDEXERTrademarksAll terms mentioned in this book that are known to be trademarks or service marks havebeen appropriately capitalized. Pearson IT Certification cannot attest to the accuracy ofthis information. Use of a term in this book should not be regarded as affecting the validityof any trademark or service mark.Warning and DisclaimerEvery effort has been made to make this book as complete and as accurate as possible, butno warranty or fitness is implied. The information provided is on an “as is” basis. The authors and the publisher shall have neither liability nor responsibility to any person or entitywith respect to any loss or damages arising from the information contained in this book orfrom the use of the CD or programs accompanying it.Ken JohnsonPROOFREADERSLeslie JosephDan KnottTECHNICAL EDITORSIantha Finley MalbonWayne RandallPUBLISHING COORDINATORVanessa EvansINTERIOR DESIGNERBulk SalesGary AdairPearson IT Certification offers excellent discounts on this book when ordered in quantityfor bulk purchases or special sales. For more information, please contactCOVER DESIGNERU.S. Corporate and Government or sales outside of the U.S., please contactInternational Salesinternational@pearsoned.comiiChuti PrasertsithCOMPOSITORBronkella Publishing

CONTENTS AT A GLANCEIntroduction1 Network Infrastructure Designxvi22 Advanced Router Configuration I523 Advanced Router Configuration II984 Configuring Juniper Routers1585 Configuring and Managing the Network Infrastructure1886 Analyzing Network Data Traffic2267 Network Security2668 IPv63069 Linux Networking33610 Internet Routing39611 Voice over IP428Glossary456Index472iii

TABLE OF CONTENTSIntroductionCHAPTER 1 Network Infrastructure DesignChapter OutlineObjectivesKey TermsINTRODUCTION1-1 PHYSICAL NETWORK DESIGNCoreDistribution LayerAccess LayerData FlowSelecting the Media1-2 IP SUBNET DESIGNIP Address RangeDetermining the Number of Subnetworks Needed for the NetworkDetermining the Size or the Number of IP Host Addresses Needed for the NetworkIP Assignment1-3 VLAN NETWORKVirtual LAN (VLAN)VLAN ConfigurationVLAN Tagging802.1Q ConfigurationNetworking Challenge: Static VLAN ConfigurationConfiguring the HP Procurve Switch1-4 ROUTED NETWORKRouterGateway AddressNetwork SegmentsMultilayer SwitchLayer 3 Routed NetworksRouted Port ConfigurationInterVLAN Routing ConfigurationSerial and ATM Port ConfigurationSummaryQuestions and 6272829303132333335374446

CHAPTER 2 Advanced Router Configuration I52Chapter OutlineObjectivesKey TermsIntroduction2-1 CONFIGURING STATIC ROUTINGGateway of Last ResortConfiguring Static RoutesLoad Balancing and RedundancyNetworking Challenge—Static Routes2-2 DYNAMIC ROUTING PROTOCOLSDistance Vector ProtocolsLink State Protocols2-3 CONFIGURING RIPv2Configuring Routes with RIPConfiguring Routes with RIP Version 2Networking Challenge—RIP2-4 TFTP—Trivial File Transfer ProtocolConfiguring TFTPSummaryQuestions and APTER 3 Advanced Router Configuration II98Chapter OutlineObjectivesKey TermsINTRODUCTION3-1 CONFIGURING LINK STATE PROTOCOLS—OSPFLink State ProtocolsConfiguring Routes with OSPFLoad Balancing and Redundancy with OSPFNetworking Challenge—OSPF3-2 CONFIGURING LINK STATE PROTOCOLS—IS-ISConfiguring Routes with IS-ISLoad Balancing and Redundancy with IS-ISNetworking Challenge: IS-IS999999101101102103109111112113117118CONTENTSv

3-3CONFIGURING HYBRID ROUTING PROTOCOLS—EIGRPConfiguring Routes with EIGRPLoad Balancing and RedundancyNetworking Challenge: EIGRP3-4 ADVANCED ROUTING REDISTRIBUTIONRoute Redistribution into RIPRoute Redistribution into OSPFRoute Redistribution into EIGRPRoute Redistribution into IS-IS3-5 ANALYZING OSPF “HELLO” PACKETSSummaryQuestions and ProblemsCHAPTER 4 Configuring Juniper RoutersChapter OutlineObjectivesKey TermsINTRODUCTION4-1 OPERATIONAL MODE4-2 ROUTER CONFIGURATION MODEDisplaying the Router InterfacesHostname ConfigurationAssigning an IP Address to an Interface4-3 CONFIGURING ROUTES ON JUNIPER ROUTERSConfigure STATIC Routes on Juniper RoutersConfigure RIP on Juniper RoutersConfigure OSPF on Juniper RoutersConfigure IS-IS on Juniper Routers4-4 CONFIGURING ROUTE REDISTRIBUTION ON JUNIPER ROUTERSSummaryQuestions and 78182182

CHAPTER 5 CONFIGURING AND MANAGING THE NETWORKINFRASTRUCTURE188Chapter OutlineObjectivesKey TermsIntroduction5-1 DOMAIN NAME AND IP ASSIGNMENT5-2 IP MANAGEMENT WITH DHCPDHCP Data PacketsDHCP Deployment5-3 SCALING THE NETWORK WITH NAT AND PATConfiguring NAT5-4 DOMAIN NAME SERVICE (DNS)DNS Tree HierarchyDNS Resource RecordsSummaryQuestions and 220CHAPTER 6 Analyzing Network Data Traffic226Chapter OutlineObjectivesKey TermsINTRODUCTION6-1 PROTOCOL ANALYSIS/FORENSICSBasic TCP/UDP ForensicsARP and ICMP6-2 WIRESHARK PROTOCOL ANALYZERUsing Wireshark to Capture Packets6-3 ANALYZING NETWORK DATA TRAFFICConfiguring SNMPNetFlow6-4 FILTERINGFTP FilteringRight-Click Filtering Logic RulesFiltering DHCPSummaryQuestions and 258260262262CONTENTSvii

CHAPTER 7 Network SecurityChapter OutlineObjectivesKey TermsINTRODUCTION7-1 DENIAL OF SERVICEDistributed Denial of Service Attacks (DDoS)7-2 FIREWALLS AND ACCESS LISTSNetwork Attack PreventionAccess Lists7-3 Router SecurityRouter AccessRouter ServicesRouter Logging and Access-List7-4 Switch SecuritySwitch Port SecuritySwitch Special Features7-5 Wireless Security7-6 VPN SecurityVPN Tunneling ProtocolsConfiguring a VPN Virtual Interface (Router to Router)Troubleshooting the VPN Tunnel LinkSummaryQuestions and ProblemsCHAPTER 8 IPv6Chapter OutlineObjectivesKey TermsIntroduction8-1 Comparison of IPv6 and IPv48-2 IPV6 ADDRESSING8-3 IPv6 Network Settings8-4 Configuring a Router for IPv68-5 IPv6 RoutingIPv6: StaticIPv6: RIPIPv6: 308308311315320324324324325

IPv6: EIGRPIPv6: IS-IS8-6 Troubleshooting IPv6 ConnectionSummaryQuestions and Problems325326327329329CHAPTER 9 Linux Networking336Chapter OutlineObjectivesKey TermsINTRODUCTION9-1 LOGGING ON TO LINUXAdding a User Account9-2 LINUX FILE STRUCTURE AND FILE COMMANDSListing FilesDisplaying File ContentsDirectory OperationsFile OperationsPermissions and Ownership9-3 LINUX ADMINISTRATION COMMANDSThe man (manual) CommandThe ps (processes) CommandThe su (substitute user) CommandThe mount CommandThe shutdown CommandLinux Tips9-4 ADDING APPLICATIONS TO LINUX9-5 LINUX NETWORKINGInstalling SSHThe FTP ClientDNS Service on LinuxChanging the Hostname9-6 TROUBLESHOOTING SYSTEM AND NETWORK PROBLEMS WITH LINUXTroubleshooting Boot ProcessesListing Users on the SystemNetwork SecurityEnabling and Disabling Boot NTENTSix

9-7 MANAGING THE LINUX SYSTEMSummaryQuestions and ProblemsCHAPTER 10 Internet RoutingChapter OutlineObjectivesKey TermsINTRODUCTION10-1 INTERNET ROUTING—BGPConfiguring a WAN ConnectionConfiguring an Internet Connection10-2 CONFIGURING BGPConfiguring BGPNetworking Challenge: BGP10-3 BGP BEST PATH SELECTION10-4 IPv6 OVER THE INTERNET10-5 CONFIGURE BGP ON JUNIPER ROUTERSSummaryQuestions and ProblemsCHAPTER 11 Voice over IPChapter OutlineObjectivesKey TermsINTRODUCTION11-1 THE BASICS OF VOICE OVER IP11-2 VOICE OVER IP NETWORKSReplacing an Existing PBX Tie LineUpgrading Existing PBXs to Support IP TelephonySwitching to a Complete IP Telephony Solution11-3 QUALITY OF SERVICEJitterNetwork LatencyQueuingQOS Configuration 436438438439439440

11-4ANALYZING VoIP DATA PACKETSAnalyzing VoIP Telephone Call Data Packets11-5 VoIP SECURITYSummaryQuestions and Problems442446449452452Key Terms Glossary456Index472CONTENTSxi

ABOUT THE AUTHORSJeffrey S. Beasley is with the Department of Engineering Technology and Surveying Engineering at NewMexico State University. He has been teaching with the department since 1988 and is the co-author of ModernElectronic Communication and Electronic Devices and Circuits, and the author of Networking.Piyasat Nilkaew is a network engineer with 15 years of experience in network management and consulting,and has extensive expertise in deploying and integrating multiprotocol and multivendor data, voice, and videonetwork solutions on limited budgets.xii

DEDICATIONSThis book is dedicated to my family, Kim, Damon, and Dana. —Jeff BeasleyThis book is dedicated to Jeff Harris and Norma Grijalva. Not only have you given me my networking career, butyou are also my mentors. You inspire me to think outside the box and motivate me to continue improving myskills. Thank you for giving me the opportunity of a lifetime. I am very grateful. —Piyasat NilkaewACKNOWLEDGMENTSI am grateful to the many people who have helped with this text. My sincere thanks go to the following technicalconsultants: Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded twistedpair cabling, and Don Yates for his help with the initial Net-Challenge Software. Abel Sanchez, for his review of the Linux Networking chapter.I also want to thank my many past and present students for their help with this book: David Potts, Jonathan Trejo, and Nate Murillo for their work on the Net-Challenge Software. Josiah Jones,Raul Marquez Jr., Brandon Wise, and Chris Lascano for their help with the Wireshark material. Also,thanks to Wayne Randall and Iantha Finley Malbon for the chapter reviews.Your efforts are greatly appreciated.I appreciate the excellent feedback of the following reviewers: Phillip Davis, DelMar College, TX; Thomas D.Edwards, Carteret Community College, NC; William Hessmiller, Editors & Training Associates; Bill Liu, DeVryUniversity, CA; and Timothy Staley, DeVry University, TX.My thanks to the people at Pearson for making this project possible: Dave Dusthimer, for providing me with theopportunity to work on this book, and Vanessa Evans, for helping make this process enjoyable. Thanks to BrettBartow, Christopher Cleveland, and all the people at Pearson, and to the many technical editors for their help withediting the manuscript.Special thanks to our families for their continued support and patience.—Jeffrey S. Beasley and Piyasat Nilkaewxiii

ABOUT THE TECHNICAL REVIEWERSWayne Randall started working in the Information Technology field in 1994 at Franklin Pierce College (nowFranklin Pierce University) in Rindge, NH, before becoming a Microsoft Certified Trainer and a consultant atEnterprise Training and Consulting in Nashua, NH.Wayne acquired his first certification in Windows NT 3.51 in 1994, became an MCSE in NT 4.0 in 1996, was aCertified Enterasys Network Switching Engineer in 2000, and then worked as a networking and systems consultant from 2001 to 2006 before becoming a director of IT for a privately held company. Wayne currently works forBodycote, PLC, as a network engineer/solutions architect. Bodycote has 170 locations across 27 countries with43 locations in North America. Wayne has taught for Lincoln Education since 2001 and developed curricula for itsince 2011. Mr. Randall holds a BA in American Studies from Franklin Pierce University.Iantha Finley Malbon’s teaching career has spanned 20 years from middle school to collegiate settings andis currently a CIS professor at Virginia Union University. She is also an adjunct professor at ECPI University,having previously served as CIS Department Chair, teaching Cisco routing, networking, and Information Technology courses. She implemented the Cisco Academy for Hanover Schools and was the CCAI for the Academy.She earned her master’s degree in Information Systems from Virginia Commonwealth University and bachelor’sdegree in Technology Education from Virginia Tech. She holds numerous certifications including CCNA,Network , A , and Fiber Optic Technician.xiv

WE WANT TO HEAR FROM YOU!As the reader of this book, you are our most important critic and commentator. We value your opinion and wantto know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any otherwords of wisdom you’re willing to pass our way.As the associate publisher for Pearson IT Certification, I welcome your comments. You can email or write medirectly to let me know what you did or didn’t like about this book—as well as what we can do to make ourbooks better.Please note that I cannot help you with technical problems related to the topic of this book. We do have a UserServices group, however, where I will forward specific technical questions related to the book.When you write, please be sure to include this book’s title and author as well as your name, email address, andphone number. I will carefully review your comments and share them with the author and editors who worked onthe book.Email: feedback@pearsonitcertification.comMail:Dave DusthimerAssociate PublisherPearson IT Certification800 East 96th StreetIndianapolis, IN 46240 USAREADER SERVICESVisit our website and register this book at www.pearsonitcertification.com/register for convenient access to anyupdates, downloads, or errata that might be available for this book.xv

INTRODUCTIONThis book looks at advanced computer networking. It first guides readers through network infrastructure design.The readers are then introduced to configuring static, RIPv2, OSPF, ISIS, EIGRP routing protocols, techniquesfor configuring Juniper router, managing the network infrastructure, analyzing network data traffic usingWireshark, network security, IPv6, Linux networking, Internet routing, and Voice over IP. After covering theentire text, readers will have gained a solid knowledge base in advanced computer networks.In my years of teaching, I have observed that technology students prefer to learn “how to swim” after they havegotten wet and taken in a little water. Then, they are ready for more challenges. Show the students the technology,how it is used, and why, and they will take the applications of the technology to the next level. Allowing them toexperiment with the technology helps them to develop a greater understanding. This book does just that.ORGANIZATION OF THE TEXTThis textbook is adapted from the second edition of Networking. This third volume has been revised and reorganized around the needs of advanced networking students. This book assumes that the students have been introduced to the basics of computer networking. Throughout the text, the students are introduced to more advancedcomputer networking concepts. This involves network infrastructure design, advanced router configuration, network security, analyzing data traffic, Internet routing, and Voice over IP.xvi

Key Pedagogical Features Chapter Outline, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goalsfor the reader. An example of these features is shown in Figure P-1.Chapter OutlineIntroduction: Chapter openersclearly outline specific goalsChapter ObjectivesChapter OutlineINTRODUCTIONIntroduction4-1 Operational Mode4-2 Router Configuration Mode4-3 Configuring Routes on Juniper Routers4-4Configuring Route Redistribution onJuniper RoutersSummaryQuestions and ProblemsJUNOSThe operating systemused by Juniper routers.Objectives Understand and identify the difference between the operational and configurationmodes Understand the basic steps for working in theoperational mode Operational mode Understand the steps for configuring the router’s interface Configuration mode Explain how to configure static, RIP, OSPF,and IS-IS routingThe basic commands used in the operational mode of the JUNOS command-lineinterface (CLI) are presented in Section 4-1. In this chapter, you learn about the{master} prompt and the , indicating you are now in the operational mode. Youalso learn about the re0 { and re1 { . notations that are used to identify the systemconfiguration for the routing engines 0 and 1. In Section 4-2, the steps for configuring the router interface are examined. In addition, the commands for displayingthe router interface, configuring the hostname, and assigning an IP address to aninterface are examined. Section 4-3 introduces route configuration featuring static,RIP, OSPF, and IS-IS. Section 4-4 examines route redistribution. Juniper takes adifferent approach when it comes to route redistribution. In the JUNOS software,there is no redistribute command. Unlike Cisco where a route distribution is done ina routing process, Juniper uses its routing policy to inject routing protocols. Understand the steps for route redistributionKey TermsJUNOS{master}re0 { and re1 { .Out of Band ManagementPICmulti-services cardt3/ds3 cardatoc-3oc-12permanent interfacesManagement EthernetInterfaceThis chapter examines the steps for basic configuration of a Juniper router.There are distinct differences between the Juniper router configurations compared to Cisco IOS; however, many of the steps and prompts are similar toCisco router configuration, as you’ll learn. The operating system (OS) used byJuniper routers is called JUNOS. The JUNOS software has two different command modes:Internal Ethernet interfacetransient interfacesInetpreferrededit routing-optionsstaticedit protocols ripshow rip neighborcommitcommit and- quitshow routeshow route protocol ripset protocols ospf areaarea interface interfacehello-interval secondsdead-interval secondsset metric valueset protocols isis interface interfaceshow isis adjancencyedit policy-optionsset policy-statementtopexport4-1 OPERATIONAL MODEThe operational mode is the first mode encountered after logging in to the Juniperrouter. This mode allows for the following:1. Monitoring network connectivity (for example, using the ping command)2. Troubleshooting the router interface and network connections3. Entry point for router configurationThe following examples demonstrate the basic commands used in the operationalmode of the JUNOS command-line interface (CLI). The connection to the Juniper router demonstrated in this section is being made via an SSH session (securetelnet); however, a console serial connection can also be made directly with theJuniper router, and this connection is used to make the initial router interface configurations.159160CHAPTER 4: CONFIGURING JUNIPER ROUTERSKey Terms for this ChapterFIGURE P-1xvii

Net-Challenge Software provides a simulated, hands-on experience in configuring routers and switches.Exercises provided in the text (see Figur

A PRACTICAL GUIDE TO ADVANCED NETWORKING . This book is dedicated to my family, Kim, Damon, and Dana. —Jeff Beasley This book is dedicated to Jeff Harris and Norma Grijalva. Not only have you given me my networking career, but you are also my mentors. You inspire me to think

Related Documents:

work/products (Beading, Candles, Carving, Food Products, Soap, Weaving, etc.) ⃝I understand that if my work contains Indigenous visual representation that it is a reflection of the Indigenous culture of my native region. ⃝To the best of my knowledge, my work/products fall within Craft Council standards and expectations with respect to

Advanced metering for SMEs The Impact of advanced metering for SMEs 0 Executive summary 02 Introduction to advanced metering 7.06 The potential benefits 06 .2 Use of advanced metering in businesses 06 .3 SupplierPrinciples of advanced metering 07 .4 Analysing advanced metering data 07 .5 Sources of energy savings 08 .6 Advanced metering technology 08 .7 Advanced metering services 09

akuntansi musyarakah (sak no 106) Ayat tentang Musyarakah (Q.S. 39; 29) لًََّز ãَ åِاَ óِ îَخظَْ ó Þَْ ë Þٍجُزَِ ß ا äًَّ àَط لًَّجُرَ íَ åَ îظُِ Ûاَش

Collectively make tawbah to Allāh S so that you may acquire falāḥ [of this world and the Hereafter]. (24:31) The one who repents also becomes the beloved of Allāh S, Âَْ Èِﺑاﻮَّﺘﻟاَّﺐُّ ßُِ çﻪَّٰﻠﻟانَّاِ Verily, Allāh S loves those who are most repenting. (2:22

City Colleges of Chicago School of Nursing Practical Nursing Program is a one-year Advanced Certificate program, preparing individuals to function in the practical nurse role. Individuals completing the practical nursing program meet the education requirements and are eligible to sit for the NCLEX-PN exam to become a licensed practical nurse (LPN).

C5051 / C5045 / C5035 / C5030 advanced authentication advanced adobe integrations advanced storage advanced integration to enterprise systems advanced color quality advanced scanning Advanced made simple for you. . Canon’s new built-in document sharing solution simply makes sense. Multiple users can collaborate easily on a shared

Advanced Screen Systems Advanced Screen Systems Advanced Screen Systems Advanced Screen Systems Advanced Screen Systems Read completely through the installation instructions before proceeding with installation Installation requires two people Use appropriate protective equipment, including safety glasses Children should not be .

CFI Checkride Gregg Brightwell THE PRACTICAL EXAM GUIDE SERIES SECOND EDITION. THE PRACTICAL EXAM GUIDE SERIES Practical Guide to the CFI Checkride by Gregg Brightwell Second Edition Aviation Supplies & Academics, Inc. 7005 132nd Place SE Newcastle, Washington 98059-3153 asa@asa2fly.com www.asa2fly.com