2011-08-21

Cisco Router Password Recovery

Like annoyed if you want the router configuration lab, it turns out the router in the password? and pasword do not know? Never fear, there is no problem that there is no way out. Usually if the practicum in cisco networking academy, the password used if not "cisco" must have "class". Sometimes there's just a fun student wishes to change the password dewe. As a result, a friend who would practicum on the next turn on the dither because the router password. Here's the trick to perform password recovery.

    
* Build the console session with the router
    
* Enable hyperterminal (terminal emulation) on the PC
    
* Make sure the console has been connected with
    
* Turn on the router
    
* Press "Ctrl + Break" on the PC connected to the console
    
* Ensure the hyperterminal appear rommon>
    
* Then type the confreg 0 × 2142
    
* After typing reset
Display rommon> show routers work on the rom monitor mode of operation. Confreg command 0 × 2142 aims to change the configuration register value is 0 × 2142, where the value will make the router bypass reading configuration files in NVRAM, so that the configuration password is not legible. Reset command will make the router reset and do a startup again. Well now you can start the configuration without having to enter a password.
Do not forget after the router to boot normally, change the configuration register value back to 0 × 2102. Good luck.

Link State Routing Protocols

On this occasion we will discuss about the link-state routing protocols. But before we review the back of distance vector protocols and the difference is with a link-state routing protocols. To illustrate the difference in distance vector routing protocols and link state we can use an analogy. In distance vector analogous to a road signs that guide us in our journey towards the goal, where the information contained only distance and direction. In link state, routing protocol analogous to a map. With a map we can see all the potential routes and determine their own path that we want most.
Distance vector routing protocols such as road signs because the router must make decisions based on the most desirable path of a distance or metric into a network. Just as travelers trust a signpost that shows the exact directions to the next town, a distance vector router to believe that other routers have to inform the proper distance to the destination network.
Link-state routing protocol uses another approach. Link-state routing protocol is more like a road map because they make a map of the topology of a network and each router uses this map to determine the shortest path to each network. Similarly, when we refer to a map to find routes to other cities, router-router link-state using a map to determine the most desirable path to achieve the other goals.
Routers that run a link-state routing protocols send information about the status of its link to other routers in the routing area. Status of this link refers to the network that connects directly to him and include information about the types of networks and neighboring routers on the network, so-called link-state routing protocol.
Link-state routing protocol is also known as shortest path first protocol and is built on the shortest path first algorithm Edsger Dijkstra's.
Routing protocols are link-stater IP:

    
* Open Shortest Path First (OSPF)
    
* Intermediate System to Intermediate System (IS-IS)

2011-08-04

Introduction to VLAN (Virtual Local Area Network)

A VLAN allows an Administrator to create a group of logic devices that are connected to each other. With VLAN, we can divide the network switch to logically by function, department or project team.VLANs are a small part of a separate IP network logically. VLANs allow multiple IP networks and smaller networks (subnets) within the same switched network switched. In order for computers to communicate on the same VLAN, each computer must have an IP address and Subnet Mask corresponding to the VLAN. Switches must be configured with a VLAN and every port in the VLAN must be registered to a VLAN. A switch port that has been configured with a single VLAN is referred to as an access port.The advantages of a VLANApplication of a VLAN technology allows a network to be more flexible to support business goals. Here are some advantages of using VLANs:
• Security-Department who have sensitive data separate from the existing network, would reduce the chances of breach of access to confidential and important information.• Cost reduction - the cost savings resulting from not need an expensive cost for network upgrades and efficient use of available bandwidth and uplink.• Higher performance - With a split layer 2 network into multiple logical worksgroup (broadcast domain) to reduce unnecessary traffic on the network and improve performance.• Broadcast storm mitigation - By dividing a network into VLANs reduce the amount of equipment that participate in the broadcast storm.• Improved IT staff efficiency - With VLAN network management easier, because users with the needs of the same network share the same VLAN.• Simpler project or application management - Having separate functions simplify the management of a project or work with specific applications.
Sources:LAN Switching and Wireless, CCNA Exploration 4.0, Cisco Systems, 2007.

Calculate the Network ID (Identity Network)

Network ID (Identity Network) is an address is used as the identity of a network. Which is often a problem of course in determining the Network ID. This problem often found when configuring Routing. Be it a static routing and dynamic routing on. Where the static routing commands and dynamic routing is required to mention the Network ID (Network Prefix).

This time I will review how to determine the Network ID, which is considered by most students this is a difficult thing. Though it is!

To determine the Network ID formula used is:

Network ID = IP Address Subnet Mask AND

example:

A network consisting of 4 pieces each PC with the address 192.168.3.2, 192.168.3.3, 192.168.3.4 and 192.168.3.5 and the subnet mask used is the default class C subnet mask is 255.255.255.0, then it is a Network ID,

AND 192.168.3.2 255.255.255.0

AND 192.168.3.3 255.255.255.0

AND 192.168.3.4 255.255.255.0

AND 192.168.3.5 255.255.255.0

The fourth address will result in the same network ID is 192.168.3.0, loh kok? How can? yes of course you can, because before the IP Address and Subnet mask in binary converted into 32 bits which are grouped by eight bits, separated by dots.

eg for 192.168.3.4 255.255.255.0 to AND,

11000000.10101000.00000011.00000100 AND 11111111.11111111.11111111.00000000 11000000.10101000.00000011.00000000 result if converted into a dotted decimal 192.168.3.0

How? make it easy? Ok, good luck

2011-07-29

Router Cisco Basic Configuration

You want to learn how to configure cisco router? do not worry, this time I will give you a little experience on how to configure Cisco routers. But on this occasion I will only discuss the basic configuration, the configuration is generally done by an administrator. Ok, consider, the following discussion.

To configure the router is done, the first step that needs to be done is build a console session. Console session is formed by connecting the console port on the router with an available COM port on the PC.

After console session is formed, then activate the terminal emolusi, commonly used on Windows Operating System is hyperterminal (router configuration via minicom on linux see here). Activate hyperterminal, make sure the selected port is COM1, then the configuration:

    
* Bits per second: 9600 bps
    
* Data bits: 8
    
* Parity: none
    
* Stop bits: 1
    
* Flow control: none
Then turn on the router (power on), the router will do the boot up process, after the boot up process is complete the router will display the message "Would you like enter the initial configuration dialog?" Best answer "no". then the router displays the message "Press return to get your start". To begin, we press the "Enter". On a router that has not been configured then the router will display the prompt "router>" which indicates we are at the user EXEC mode of operation.
to start the configuration of typing "enable" such as the following example:
Router> enable
Router #
Currently we are at the privileged EXEC mode of operation, the configuration is usually done in global configuration mode, meaning that the configuration performed in this mode will affect the entire system. If ever we are at privillege EXEC mode then to switch to global configuration mode command is:
Router # config terminal or
Router # conf t
Some of the basic configuration that needs to be done is:
a. Hostname
Its function is to give names to the router
syntax:
router (config) # hostname name of the desired router
ie the desired name is cisco router, then the form of the command
router (config) # hostname cisco
cisco (config) #
b. Enable password
Its function is to activate the password on the command enable
syntax:
cisco (config) # enable password password diiinginkan words
eg word-desired password is cisco, then the form of the command
cisco (config) # enable password cisco
c. Enable secret
Its function is to activate the command enable secret word, the same function with the commands enable password, but the enable secret has a higher priority and the word secret in encrypted form.
syntax:
cisco (config) # enable secret-secret words which the desired
ie the desired secret word is a class, then the form of the command is
cisco (config) # class fosters secret
c. Line console
Enable password on the line console, so that only people who know / have a password I can access the router through console line. The router only has 1 piece of line console.
cisco (config) # line console 0
cisco (config-line) # password password-desired word
cisco (config-line) # exec-timeout 5
cisco (config-line) # login
d. Auxiliary line
Enable password on the line aux, so only people who know / have a password I can access the router via the aux line. The router only has 1 line aux fruits.
cisco (config) # line aux 0
cisco (config-line) # password password-desired word
cisco (config-line) # exec-timeout 5
cisco (config-line) # login
e. Virtual Terminal Line
Enable password on the virtual terminal line, so that only people who know / have a password I can access the router via a virtual terminal line. The router only has 5 line virtual terminal (VTY).
cisco (config) # line vty 0 4
cisco (config-line) # password password-desired word
cisco (config-line) # exec-timeout 5
cisco (config-line) # login
Good luck!

Discuss : Intermediate TCP/IP

Routers use IP address information on an IP packet header to determine the interface where the packet should be transferred based on its purpose. During the IP does not ensure the package reaches its destination, he is described as an unreliable protocol, which uses connectionless best-effort delivery. If the packets are placed on the route, arriving in the wrong direction, or transmitted faster than the receiver can accept it, IP alone can not fix the problem. To overcome this problem, the IP associated with TCP.
TCP OperationIP addressing to allow for routing packets between networks. However, IP makes no guarantees about the delivery. Transport layer is responsible for reliable transport and control data flow from source to destination. This is accomplished through the use of sliding window and sequencing numbers during the synchronization process. This process ensures that each host is ready and willing to communicate.
To understand the reliability and flow control, imagine a student who learns a foreign language for one year. Now imagine the students visit the country where the language is used. Students should ask people to repeat words for reliability and to speak slowly in order to understand, which is associated with the concept of flow control. Transport layer, which is a layer 4 of the OSI model, using TCP to provide these services to the layer 5.
Synchronization or three-way handshakeTCP is a connection-oriented protocol. During data transmission, two hosts communicating over the synchronization process to establish a virtual connection for each session between hosts. This synchronization process ensures that both sides are ready for data transmission and allow the equipment to determine the initial sequence number for that session. This process is known as a three-way handshake. This is a three-step process that forms a virtual connection between two pieces of equipment. It is also important to note that the three-way handshake initiated by the client host. To establish a TCP session, host client will use the service port number known to be reached on a host server.

 In the first step, initiating host (client) sends a synchronization packet (SYN flag set) to initialize the connection. This signifies that a packet has a start value Sequence Number which is valid in this segment for the session x. SYN bit in the header indicating a connection request. SYN bit is a single bit in the code field of the TCP segment header. Sequence Number is a 32 bit header fields TCP segments.
In the second step, the other host receives the packet, records the Sequence Number x of the client, and reply with an acknowledgment (ACK flag set). ACK control bit indicates a collection of Acknowledgment Number field contains a valid acknowledgment value. ACK flag is a single bit in the code field of the TCP segment header and Acknowledgment Number is a 32 bit header fields TCP segments. Once the connection is established, the ACK flag set for all segments during the session. Acknowledgment number field contains the next expected sequence number received by this host (x +1). Acknowledgment number x +1 means the host has received all bytes including x, and expects to receive next byte x +1. Host also filed a return session. This includes a TCP segment with sequence numbernya own initial values ​​of y and with the SYN flag set.
In the third step, initiating host responds with an acknowledgment number value of y +1, which is the value of the sequence number host B +1. This signifies that the acknowledgment has been received in advance and terminate the connection process for this session.
It's important to understand that the initial sequence number used to file a communication between two devices. They act as an initial reference value between the two devices. Sequence number to each host a way to declare that the recipient knows the sender responds to demand the right connections.
Windowing and window sizeThe amount of data to be transmitted is often too large to be shipped on a single data segment. In this case, the data must be broken down into smaller parts to allow the correct data transmission. This can be compared to feeding a child. Their food is cut into small pieces that can be accommodated their mouths. In addition, a piece of equipment will not be able to receive data as fast as can be the source to send. Equipment may be busy with another task or the sender is a tough labih equipment.
Once the data is segmented, it must be transmitted to the destination equipment. One of the services provided by TCP is flow control, which governs how data is sent over a given period. The process of flow control is known as windowing.
Window size determines the amount of data that can be transmitted at one time before the destination responds with an acknowledgment. Once a host transmits a number of bytes the size of the window, the host must receive an acknowledgment that the data has been received before he can send other data. For example, if the window size is 1, each byte must be the acknowledgment before the next byte is sent.

 TCP uses windowing to dynamically determine the size of the transmission. Equipment negotiate a window size to allow a certain number of bytes to be transmitted before an acknowledgment.
 This process is dynamically increase reliability window size. Window size may vary based on the acknowledgment.

Step by Step Configure RIP Routing on Cisco Routers

Objectives:
This tutorial aims to provide an overview / router configuration instructions. Configuration includes the standard configuration and the configuration of routing protocols (routing). Routing protocol used is RIP.

Scenario:
There are two LANs are interconnected through a router GAD and BHM routers .. Configure each router must be able to connect both the LAN. (BHM LAN and LAN GAD). Configuration declared successful if PC1 on the LAN BHM got reply from PC2 on the LAN GAD and vice versa.

Topology:

Configuration:Router BHM
Router>
Router> enable {Log into the mode privillege}
Router # conf t {Enter configuration mode global}
Router (config) # hostname BHM {router Naming}
BHM (config) # enable password cisco {Enable password for EXEC}
BHM (config) # enable secret class {Activating the command enable secret word}
BHM (config) # service password-encryption {For enable password encryption}
BHM (config) # banner motd # For Authrorized access ONLY! # {Enabling Message / Banner}
BHM (config) # line console 0 {Configure line console}
BHM (config-line) # password cisco
BHM (config-line) # login
BHM (config-line) # exit
BHM (config) # line vty 0 4 {Configure virtual line / line telnet}
BHM (config-line) # password cisco
BHM (config-line) # login
BHM (config-line) # exit
BHM (config) # line aux 0 line aux {Configure}
BHM (config-line) # password cisco
BHM (config-line) # login
BHM (config-line) # exit
BHM (config) # int Fa0/0 {Configuring interface FastEthernet0/0}
BHM (config-if) # ip add 192.168.4.1 255.255.255.0
BHM (config-if) # no shut
BHM (config-if) # exit
BHM (config) # int s0/0 {Configuring interface FastEthernet0/0}
BHM (config-if) # ip add 192.168.3.1 255.255.255.0
BHM (config-if) # no shut
BHM (config-if) # exit
BHM (config) # router rip {Configure Routing Protocol RIP}
BHM (config-router) # net 192.168.4.0
BHM (config-router) # net 192.168.3.0
BHM (config-router) # exit
BHM (config) # exit
BHM # copy run start {Saves the configuration to NVRAM}


Router GAD


Router>
Router> enable
Router # conf t
Router (config) # hostname GAD
GAD (config) # enable password cisco
GAD (config) # enable secret class
GAD (config) # service password-encryption
GAD (config) # banner motd # This is a secure system, access Authrorized ONLY! #
GAD (config) # line console 0
GAD (config-line) # password cisco
GAD (config-line) # login
GAD (config-line) # exit
GAD (config) # line vty 0 4
GAD (config-line) # password cisco
GAD (config-line) # login
GAD (config-line) # exit
GAD (config) # line aux 0
GAD (config-line) # password cisco
GAD (config-line) # login
GAD (config-line) # exit
GAD (config) # int Fa0 / 0
GAD (config-if) # ip add 192.168.5.1 255.255.255.0
GAD (config-if) # no shut
GAD (config-if) # exit
GAD (config) # int s0 / 0
GAD (config-if) # ip add 192.168.3.3 255.255.255.0
GAD (config-if) # clock rate 56000 {Just for DCE serial interface}
GAD (config-if) # no shut
GAD (config-if) # exit
GAD (config) # router rip
GAD (config-router) # net 192.168.4.0
GAD (config-router) # net 192.168.3.0
GAD (config-router) # exit
GAD (config) # exit
GAD # copy run start 


Command to check the configuration
sh run {checking running configuration /on RAM}
Sh ip protocol {Checking the active routing protocol} 
Sh ip route   {Checking the routing table entries}

Testing:

Test with a ping from PC1 to PC2 and vice versa, ping through command prompt on each PC.

example:

From PC1 to PC2
                 ping 192.168.5.5

From PC2 to PC1
                 ping 192.168.4.5