Documente Academic
Documente Profesional
Documente Cultură
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
RSE Bridging 2.0:
Module Overview
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
RSE Bridging - Sections & Objectives
2.1 Configure Static and Default Routes
Explain the purpose of host routes.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
RSE Bridging 2.1:
Configure Static and
Default Routes
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Configure IPv4 Static Routes
Automatically Installed Local Host Routes
A host route is where the destination address is a specific device IP with
a subnet mask of /32 for IPv4 or /128 for IPv6.
Cisco IOS automatically installs a host route, also known as a local host
route, when an interface address is configured on the router:
A host route allows for a more efficient process for packets that are directed to the
router itself, rather than for packet forwarding.
This is in addition to the connected route, designated with a C in the routing table for
the network address of the interface.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Configure IPv4 Static Routes
Automatically Installed Local Host Routes
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Configure IPv4 Static Routes
Manually Configured IPv4 Host Routes
A host route can be a manually
configured static route to direct
traffic to a specific destination
device.
The static route uses a destination IP
address and a 255.255.255.255 (/32)
mask for IPv4 host routes and a /128
prefix length for IPv6 host routes.
Static routes are marked with S in the
output of the routing table.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
RSE Bridging 2.2:
Device Discovery
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Device Discovery with CDP
CDP Overview
Cisco Discovery Protocol (CDP) is a Cisco proprietary Layer 2 protocol that is
used to gather information about Cisco devices which share the same data link.
CDP is media and protocol independent and runs on all Cisco devices.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Device Discovery with CDP
Configure and Verify CDP
Various commands are used
to verify CDP output.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Device Discovery with LLDP
LLDP Overview
Link Layer Discovery Protocol (LLDP) is a vendor neutral neighbor discovery
protocol similar to CDP that can also run on Cisco devices.
This protocol advertises its identity and capabilities to other devices and receives
the information from a physically connected Layer 2 device.
To enable LLDP, use the following commands:
Globally enabled - Use the lldp run global configuration command.
Enabled / disabled on an interface - Use the lldp enable interface configuration command.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Device Discovery with LLDP
Configure and Verify LLDP
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
RSE Bridging 2.3:
Device Management
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
NTP
Setting the System Clock
The software clock on a router or switch starts when the system boots.
This is the primary source of time for the system. Time should be
synchronized across all devices on the network.
The date and time settings on a router or switch can be set using the
clock set command.
This method does not scale beyond one device. A better solution is to
configure the Network Time Protocol (NTP).
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
NTP
NTP Operation
NTP enables routers to synchronize time settings with an NTP server:
NTP uses UDP port 123 and is documented in RFC 1305.
NTP can be set up to synchronize to a private master clock or it can synchronize to a
publicly available NTP server on the Internet.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
NTP
Configure and Verify NTP
The show clock detail
displays the current time and
time source.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
NTP
Configure and Verify NTP
Next, S1 is configured for
NTP.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
RSE Bridging 2.4:
Device Maintenance
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Router and Switch File Maintenance
Password Recovery
If the enable secret password is lost or unknown, then password recovery
must be performed to access privileged EXEC mode. This process varies
between devices (e.g., router and switch recovery procedures are
different.)
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Router and Switch File Maintenance
Enter the ROMMON mode
ROMMON mode is the basic file system of the ISR.
To enter ROMMON mode, you must issue a break sequence during the
boot up process (within 30 seconds)
To do so, you must power off and then power on the device.
Within 30 seconds, press the break sequence (e.g., PuTTY = Ctrl+Break, Tera Term =
Alt-B).
The ROMMON prompt should eventually be displayed
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Router and Switch File Maintenance
Change the Configuration Register to 0x2142
The ROMMON software supports some basic commands, such as
confreg which is used to control basic device configuration settings.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Router and Switch File Maintenance
Make Necessary Changes to the Startup Config
After the device has finished reloading, copy the startup-config to running-
config.
copy startup-config running-config
Enter global config mode and change the enable secret password
Reset the configuration register to normal bootup using the confreg 0x2102 command.
Reload the ISR.
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Presentation_ID 2016 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34