Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views27 pages

Network Theory

The document provides an overview of IP addresses, including types (static and dynamic), versions (IPv4 and IPv6), and their configurations. It also discusses VLANs, switching protocols, routing protocols, and DHCP, detailing their functions and configurations. Additionally, it outlines various operating systems and their types, emphasizing the differences between server and client operating systems.

Uploaded by

raonadeemmahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views27 pages

Network Theory

The document provides an overview of IP addresses, including types (static and dynamic), versions (IPv4 and IPv6), and their configurations. It also discusses VLANs, switching protocols, routing protocols, and DHCP, detailing their functions and configurations. Additionally, it outlines various operating systems and their types, emphasizing the differences between server and client operating systems.

Uploaded by

raonadeemmahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Ip address

Internet protocol address

It is Logical Equipment of Connectivity

Ip address use to connect networking devices

Two types Of Ip address Configuration Methods

- Static it means Manually


- Static Ip configure by Engineer
- Static ip Implemented on Small Network

- Dynamic it means Automatically


- dynamic ip configure by DHCP Protocol ( Dynamic Host configuration protocol )
- Dynamic IP Implemented on Large network

Ip address Available in Two version

# Ipv4
- Ipv4 is in 32 Bit
- Ipv4 In Decimal Format
# Ipv6
- ipv6 Is in 128 bit
- ipv6 in Hexadecimal format

Ipv4 example

192.168.0.1
___..._____
8 8 8 8
Ipv4 has 4 Octets

And every Octets has 8 bit

Ipv4 Divided into 2 parts

Network ID - Network ID should be same

Host ID - Host ID Should be Different


Class Of Ipv4
Class A - 10.0.0.0 to 10.255.255.255
1 Octet Network ID, 3 Host Host ID
8 Network Bit

Class B - 172.16.0.0 to 172.16.255.255


2 Octets Network ID , 2 Octets Host ID
16 Network Bit

Class C - 192.168.0.1 to 192.168.0.255


3 Octets Network ID , 1 Octet Host ID
24 Network Bit

Class d - It Reserved for Multicasting

Class e - It Reserved For R & D Purpose

Public Ip address Belongs to Global Communications

Such as Google, Yahoo, Rediff, Facebook Etc..

Private ip address Belongs to Personal Communication.

Such as small Offices, College network, School lab etc.

Network Range

Class A - 1-126
Class B - 128-191
Class C - 192-223
Class D - 224-239
Class E - 240-254

127.0.0.0 this Range is Called a s Loopback ip

Loopback ip is used for Network Card Testing

255.255.255.255 is used For Broadcasting purpose


Switching
Default VLAN –
When the switch initially starts up, all switch ports become a member of the default VLAN
(generally all switches have default VLAN named as VLAN 1), which makes them all part of the
same broadcast domain.

Using default VLAN allows any network device connected to any of the switch port to connect
with other devices on other switch ports. One unique feature of Default VLAN is that it can’t be
rename or delete.

Data VLAN –
Data VLAN is used to divide the whole network into 2 groups. One group of users and other
group of devices. This VLAN also known as a user VLAN, the data VLAN is used only for
user-generated data. This VLAN carrying data only. It is not used for carrying management
traffic or voice.

Voice VLAN –
Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly given high transmission
priority over other types of network traffic. To ensure voice over IP (VoIP) quality (delay of less
than 150 milliseconds (ms) across the network), we must have separate voice VLAN as this will
preserve bandwidth for other applications.

Management VLAN –
A management VLAN is configured to access the management capabilities of a switch (traffic
like system logging, monitoring). VLAN 1 is the management VLAN by default (VLAN 1 would
be a bad choice for the management VLAN). Any of a switch VLAN could be define as the
management VLAN if admin as not configured a unique VLAN to serve as the management
VLAN. This VLAN ensures that bandwidth for management will be available even when user
traffic is high.

Native VLAN –
This VLAN identifies traffic coming from each end of a trunk link. A native VLAN is allocated only
to an 802.1Q trunk port. The 802.1Q trunk port places untagged traffic (traffic that does not
come from any VLAN) on the native VLAN. It is a best to configure the native VLAN as an
unused VLAN.

Types of Switchport
Access Mode - Single Vlan Data Carry
Trunk Mode - Multiple vlan Data Carry
Trunk encapsulation Protocol
IT Is Used to Tagging vlan number to the data packet while sending.

Types of Trunking Protocol


IsL Inter switch link
Dot 1 Q

Isl
IT is Cisco Proprietary protocol
Dot 1 Q
It is Open Standard Protocol

IsL
Doesn't support untag Traffic
Dot 1 Q
Support untag Traffic

Isl
Doesn't support native Vlan
Dot 1 Q
It support native Vlan

Isl
MTU size 1530 byte
Dot 1 Q
MTU size 1504 Byte

Isl
No traffic priority
Dot 1 Q
Maintain Traffic Priority

Isl
Extra information size 30 byte
Dot 1 Q
Extra Information Size 4 Byte

VTP
Vlan Trunking Protocol
Cisco Proprietary protocol
Layer 2 Protocol
By default VTP is enabled on all Cisco Switches
It is used to propagate the information of vlan database
To centralised vlan management
It uses multicast mac address
0100.0ccc.cccc

Requirements of VTP
Trunking must be enabled between switches
VTP Domain name must match
VTP password must match ( Optional )

Types of VTP mode


Server mode
Client mode
Transparent mode

Server mode
We can add , Remove,Edit vlans
It is Default VTP mode on Server
It can Generate VTP Update
It work As a Replay Agents

VTP Client mode


We can not create add , Remove, edit vlan In this mode
It can receive vlan Info from server mode
It work as a relay agents

Transparent mode
We can create add , Remove, edit vlans
It is also default mode in some platform of Switches
It is also called stand alone switch
It can't generate vlan update
It can receive vlan update , relay that update to the next switch without updating itself.

What is VTP?
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used by Cisco switches to
exchange
VLAN information. VTP is used to synchronize VLAN information (Example:-VLAN ID or VLAN
Name) with switches inside the same VTP domain.

What are different VTP modes?


VTP Server mode - By default every switch is in server mode. Switch in VTP Server Mode can
create, delete VLANs and will propagate VLAN changes.
VTP Client mode - Switch in VTP client mode cannot create or delete VLANs. VLAN Trunking
Protocol (VTP) client mode switches listen to VTP advertisements from other switches and
modify their VLAN configurations accordingly. It listens and forwards updates.
VTP Transparent mode - Switch in VTP Transparent mode does not share its VLAN database
but it forwards received VTP advertisements. we can create and delete VLANs on a VTP
transparent switch but these changes are not sent to other switches.

What are the requirements to exchange VTP messages between two switches?
* Switch should be configured as either a VTP server or VTP client.
* VTP domain name must be same on both switches.
* VTP versions must match.
* link between the switches should be a trunk link.

Routing protocol
Routing protocol

- work on Routers

- routing Protocol generate Routing table

- Routing table Provide Source Network And Destination Network Details

- Routing Table Provide more Detail Information about Network

- Routing Protocol is Front End Protocol

- Routing Protocol is More Secure protocol

- Routing Protocol Implemented on Large network

- example of Routing Protocol


Static, Dynamic, Rip, Eigrp, Ospf , Is-Is, BGP, IGRP etc.

Routed Protocol

- work on all devices

- Routed protocol Generate Network Table

- Routed Protocol Provide Source Network and Destination Network Details

- Network Table Provide less Detail Information about Network

- Routed Protocol is Back end Protocol


- Routed Protocol is Less Secure Protocol

- Routed Protocol Implemented on Small Network

- Example Of Routed protocol


TCP, Ip , UDP, ICMP , SMTP, POP3, Igmp, DnS, DHCP , Ftp etc.
AD value

Administrative Distance

- It is used To Select the best path in entire Network.


- The lowest AD value is Select as a best path.
- AD Value Is Modified by Engineer.
- Every Protocol has Fixed AD Value.
- Range of AD Value is 0-255

List of AD value

Directly Connected - 0

Static Routing protocol - 1

Rip - Routing Information Protocol- 120

Eigrp - Enhanced Interior Gateway Routing protocol Internal - 90 , External - 170

IS-IS - Intermediate system - Intermediate system - 115

Ospf - Open Shortest path First - 110

IGRP - Interior Gateway Routing protocol - 100

BGP - Border Gateway protocol - Internal - 200, External - 20

Dynamic Routing Protocol

# Rip - Routing Information protocol

- Rip protocol belongs to Distance vector Routing Protocol Category

- Distance vector Routing Protocol select the best path based on Distance

- Routing metric - metric Used by a routers to make Routing Decisions


- Rip Protocol use Hop count as a metric

- Hop count it means Number of devices bypassing to reach the Destination

- Less Number Of hop Count is used as a Best path

- Rip protocol hop count limit is 15 , Number of 16th device is Consider as a Unreachable

- Rip Ad Value is 120

- Rip protocol work on application layer

- rip use port number 520

- Rip Use Multicast Ip 224.0.0.9

Basic Troubleshooting Command On System

- Ipconfig ( Ip address Status )


- Ipconfig /all ( Ip Address Details )
- Arp -a ( MaC Table )
- Ping ( Reachability )
- Tracert ( Next Hop List / Route )

Basic Troubleshooting Command On Router

- Ping
- Traceroute
- Show Ip Interface brief
- Show running-Config
- Show Arp
- Show ip route
- Show ip Protocol

Eigrp

- Enhanced interior gateway routing protocol

- It is Hybrid protocol category

- it is Combination of Distance vector and Link-state

- Eigrp ad value internal 90 , External 170


- Eigrp port number 88

- Eigrp Work on network Layer

- Eigrp Protocol use K value As a metric


- k1 - Bandwidth
- K2 - Loading
- K3 - Delay
- K4 - Reliability
- K5 - MTU

- Eigrp Support Classless Routing Protocol

- Eigrp Multicast ip 224.0.0.10

- By default, Auto Summary is Enabled in Eigrp

- Eigrp Use As Number


# As Number - Autonomous System Number
# AS Number Range 1 - 65535
# As Number is used To defined neighbourship

- same As number = Internal Ad value

Different as Number = External Ad value..

- Eigrp Used k1 and K3 value for Calculating Best Path

- Router select best route in Eigrp Is called Successor

- Router Select second Best Route in Eigrp is called Feasible Successor

- Router select Maximum 4 Path In Eigrp

- Successor Installed in Routing Table

- Feasible Successor Installed in Topology Table

- The lowest Metric Is Always select as a Best path

- From Source router To Neighbour router Value As called FD - Feasible Distance..

- From Neighbour Router To Destination Router Value as called RD - Reported Distance...


Ospf

- Open Shortest Path First

- Ospf belongs To Link-state routing protocol

- Ospf use Cost As a metric

- Cost List
# Serial link - 64
# Ethernet - 10
# Fastethernet - 1
# Gigabitethernet - 1

- Ospf is a IGP protocol... Interior Gateway protocol

- Ospf use Protocol number 89

- ospf Ad value 110

- Ospf Multicast ip 224.0.0.5 for All Routers / 224.0.0.6 for Dr and BDR Routers

- ospf Use SpF Algorithm For best Path Selection

- The Lowest Cost Select as a Best Path

ospf use As Number To Defined Neighbourship

- As Number Is also Known as Process ID

- Ospf Use Area ID to Defined Network Group

As number Range - 1 - 65535


Area ID Range - 0 - 255

Wild Card Mask

Class a - 255.0.0.0 - 0.255.255.255

Class B - 255.255.0.0 - 0.0.255.255

Class C - 255.255.255.0 - 0.0.0.255


In ospf Route Generate DR and BDR

- Dr It means Designated Router


- BDR It means Back-up Designated Router

- DR And BDR Election Process on Two-Way States

- Every Router Send Update To Another Router and That Process Generate Duplicate
information In network

- To Avoid Generate Duplicate Information, Router Use DR And BDR..

Dr and BDR Election Criteria

- Highest Priority
Priority range 0-255

By Default Fastethernet link Priority is 1

No priority on Serial link

Priority 0 it means Drother ( No Participate in Election)

- Highest Router ID

- Highest Ip address and Highest Loopback

OSPF routers need to go through several state before establishing a neighbor relationship -

1. Down - No Hello packets have been received on the interface.

2. Attempt - In Attempt state neighbors must be configured manually. It applies only to


nonbroadcast multi-access (NBMA) networks.

3. Init - Router has received a Hello message from the other OSFP router.

4. 2way - the neighbor has received the Hello message and replied with a Hello message of his
own.
Bidirectional Communication has been established. In Broadcast network DR-BDR election can
occur after this point.
5. Exstart - DR & BDR establish adjacencies with each router in the network. Master-slave
election
will takes place (Master will send its DBD first).

6. Exchange - Routing information is exchanged using DBD (Database Descriptor) packets,


LinkState Request (LSR) and Link-State Update packets may also be sent.

7. Loading - LSRs (Link State Requests) are send to neighbors for every network it doesn't
know
about. The Neighbor replies with the LSUs (Link State Updates) which contain information about
requested networks. After all the requested information have been received, other neighbor
goes
through the same process.

8. Full - All neighbor routers have the synchronized database and adjacencies has been
established.

DHCP

Dynamic Host Configuration protocol

There are two Types of Ip Configuration Methods

# Static - It means Manually


- Static Configuration implemented on Small Network.

# Dynamic - It means Automatically


- Dynamic Configuration implemented on Large network.
- Dynamic protocol Operating Centrally
- Easy To handle and Easy to Configure

DHCP Server Port number 67

DHCP client port number 68

- Windows based DHCP Send Packets With Unicast

- Routing Based DHCP Send Packets with Broadcast

Client Machine Send Mac Address to The Server


For Requesting ip address
Media Access Controller

Mac is Also known physical address

What is the reason for getting APIPA address?


With APIPA, DHCP clients can automatically self-configure an IP address and subnetmask
when a
DHCP server is not available. When DHCP client boots up, it first looks for a DHCP server in
order to
obtain an IP address and subnet mask.
A client uses the self-configured IP address until a DHCP server becomes available. The APIPA
service also checks regularly for the presence of a DHCP server. If it detects a DHCP server on
the
network, APIPA stops and the DHCP server replaces the APIPA networking addresses with
dynamically assigned addresses.

What is the range of APIPA address?


The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself
with a default Class B subnet mask of 255.255.0.0

Operating system

It is used to operate machine ( Devices ). Machine can Reacting with the help of operating
System.

Operating system is also known as system software..

Types of operating system

# windows
- Windows operating system used in Companies and Home user.

# Red hat
- Red hat operating system used in MNC. It is used for security.

# Mac
- Mac operating system is specifically used for Apple Phone.

Windows operating system made by Microsoft.


Types of windows operating system

# Server operating system


- server operating system can handled entire network.
- server operating system provide Security, Rules, Policies Etc.

# Client Operating system


- client operating system only worked on home computer.
- Client operating system do not have security.

# Types of windows server operating system


- windows server 2000
- windows server 2003
- windows server 2008
- windows server 2012
- windows server 2016
- windows server 2019

# types of Client operating system


- dos
- windows 92
- windows 96
- windows 98
- windows xp
- windows 7
- windows 8
- Windows 10
- Windows 11

Windows server operating system used in MNC Company, Bank Infrastructure , IT


infrastructure, railway opration etc.

Windows client operating system used in home users, classes, College lab etc.

# Server Base Network


- Highly Secure Network Plan. Company want's to Protection from Unwanted Networks ,
Engineers Can Provide Server Base Network..

# Client Base Network


- Low level Security provided in Client Base Network. Every Computer Access Another
Computer Data without Permission...
# Server Base Network
- Server Base Network Provide High Security
* User Authentication
* Devices Authentication
* Network Authentication

- Server Base Network Provide Centralised Operation.

- server Base Network implemented on Large Network.

- Server Base Network Provide Back-up Option Automatically

- Server Base Network is more Costly

# Client Base Network


- Client Base Network Provide Low Security
* No authentication Available

- Client Base Network Do not Provide Centralised Operation.

- Client Base Network Implemented on Small Network.

- Client Base Network Do not Provide Back-up Option Automatically

- Client Base Is Less Costly


Interview Questions For Preparation

1. Define networking.
Networking can be defined as computing devices that are connected together and can easily
share resources and exchange information between them.

2. How do network devices communicate with each other?


The network devices communicate with each other by using a set of system rules. These
system rules are called communication protocols.

3. Define protocols.
Protocols are defined as rules basis on which the transmission of data and resources takes
place between interconnected computer devices.

4. What is a switch in networking?


A switch can be defined as a hardware device that allows connecting various devices within a
network.

5. Define data packet.


A data packet can be defined as the basic unit of information. The unit of information can be
transferred throughout the network.

6. What is the use of routers in networking?


Routers in networking allow transferring data packets to their right place. They allow connecting
more than one network together. The flow of information between network devices is managed
by routers.

7. What is a hub in networking?


A hub can be defined as a device that allows connecting various other devices together in a
network.

8. Define the OSI model.


The OSI model stands for Open Systems Interconnection Model. It can be defined as a model
that allows systems to communicate with each other with the help of standard protocols. The
OSI model is made by ISO(International Organization for Standardization).

9. How many layers are there in the OSI model?


There are seven layers in the OSI model. These are as follows.

Physical Layer

Data Link Layer


Network Layer

Transport Layer

Session Layer

Presentation Layer

Application Layer

10. How many ports are there in switches? Name them.


There are two ports in switches. These are as follows.

Access Port: It only carries traffic for a single VLAN.

Trunk Port: It carries traffic for multiple VLANs.


11. How do routers work in a network?
Routers work in such a way that they focus on looking for information using IP addresses. Then
routers allow computing devices to request files or information from the server by accessing the
internet. Then, routers make sure that the requested file or information must be received at the
device that requested it.

12. What are the functions of routing?


There are many functions of routing in networking. A few of them are as follows.

Routing allows computer networks in sending and receiving information.

Routing helps in connecting more than one device to connect to the internet.

With the help of routing, we can easily configure network ports.

13. How can network connectivity issues troubleshooting?


There are many ways of troubleshooting issues in network connectivity. A few of them are as
follows.

We can check whether physical connectivity is proper or not. The physical connections include
switches, cables, hubs, routers, and so on.

We must check whether the device configuration is correct or not. The device configuration
includes IP addresses, DNS servers, and so on.

We can check for security issues as well. This includes checking firewalls, MAC address
filtering, and so on.
what is classful routing protocol.
Classful routing protocols DO NOT send the subnet mask along with their updates.

what is classless routing protocol.


Classless
routing protocols
DO send the subnet mask along with their updates.

what is auto summary.


Auto
summarization is a feature which allows Routing Information Protocol (RIP)
to
summarize
its routes to their classful networks automatically

what is protocol number of eigrp.


It uses protocol number 88

eigrp works on which osi layer.


It works on Layer 3

what is successor.
A successor is the route with the best metric to reach a destination (best path). That route is
stored in the routing table ..

what is feasible successor.


A feasible
successor is a backup path to reach that same destination that can be used
immediately if the
successor
route fails. These backup routes are stored in the topology table.

what is FD in eigrp.
The Feasible Distance (FD) is the metric from the current router to the destination router.

what is RD/AD in eigrp.


The Advertised Distance (AD) is the Metric from a given neighbor to the destination router.
OSPF works in which layer.
It works on layer 3

what is protocol number of OSPF.


Its protocol number is 89

what is SPF algorithm.


Shortest path first
Used by ospf protocol for best path selection

what is cost.
Open Shortest Path First (
OSPF ) uses "
Cost" as the value of metric and uses a Reference
Bandwidth of 100 Mbps for
cost
calculation. The formula to calculate the
cost is Reference
Bandwidth divided by interface bandwidth

what is TCP port number of BGP.


TCP port number 179

what is ad value of BGP.


20/200

what is AD value of RIP.


AD value of RIP is 120

what is AD value of EIGRP.


AD value of EIGRP is 90/170

what is AD value of OSPF.


AD value of OSPF is 110

what is IBGP Neighborship.


Neighborship between two bgp routers who are using same as number
what is EBGP Neighborship.
Neighborship between two bgp routers who are using different as number

BGP works on which layer of OSI model.


It works on layer 7

what is the use of hello msg in eigrp.


Hello, the message is the first message
which is sent to a neighbor router in order to become an EIGRP neighbor. In EIGRP, Hello
message is responsible for: Hello, the message is used for neighbor discovery. It is used for
Keep
alive purpose. It is always multicast on every type of link.

what is the use of hello msg in ospf.


The Hello message contains a list of information needed to form an OSPF neighbor relation
between two neighboring routers, the following a list of information contained the Hello
messages: OSPF Router ID. The router's ID which is configured or automatically selected
by OSPF (analyzed below) Hello Interval Timer.

what is query msg in eigrp.


A QUERY message looks similar to an UPDATE packet but contains metrics which make the
route unreachable. When a router looses its best route (successor) for a network and there is no
backup route (feasible successor) for it, the router sends an EIGRP query message to locate
any
alternate routes for that network.

what are the states in ospf.


The states are Down, Attempt, Init, 2-Way, Exstart, Exchange, Loading, and Full.

what is SIA state in eigrp.


The SIA state means that an EIGRP router has not received a reply to a query from one or more
neighbors within the time allotted (approximately 3 minutes). When this happens, EIGRP clears
the neighbors that did not send a reply and logs a DUAL-3-SIA error message for the route that
went active.

explain LSA 1 in OSPF.


LSA Type 1 (Router LSA) packets are sent between routers within the same area of origin and
do not leave the area. An OSPF router uses LSA Type 1 packets to describe its own interfaces
but also carries information about its neighbors to adjacent routers in the same area.

explain LSA 2 in ospf.


LSA Type 2 (Network LSA) packets are generated by the Designated Router (DR) to describe
all
routers connected to its segment directly. LSA Type 2 packets are flooded between neighbors in
the same area of origin and remain within that area.

what are the DR and BDR election criteria in ospf.

highest priority

highest router id

what is DR and BDR in ospf.


OSPF uses a DR (Designated Router) and BDR (Backup Designated Router) on each
multiaccess network. OSPF uses a DR (Designated Router) and BDR (Backup Designated
Router) on
each multi-access network.

what is LSA 3 in ospf.


OSPF summary LSA (Type 3 LSA) ... Type 3 LSAs are generated by ABR. They represent
networks from an area and are sent to the rest of the areas in OSPF domain. Type 1 LSAs don't
cross area boundary, so Area Border Router (ABR) uses type 3 LSA to inform other areas about
networks learned in its area.

what is ABR router in ospf.


A router who’s minimum one interface is in backbone area and at least one interface is in
regular
area
An area border router (ABR) is a kind of router that is located near the border between one or
more Open Shortest Path First (OSPF) areas. It is used to establish a connection between
backbone networks and the OSPF areas.

what are the election criteria of router id in ospf.

* manual configured
* highest ip address of loopback interface

* highest IP address of physical interface

what is backbone area.


The backbone area (also known as area 0 or area 0.0. 0.0) forms the core of an OSPF network.
All other areas are connected to it, either directly or through other routers. Inter-area routing
happens via routers connected to the backbone area and to their own associated areas.

what is regular area.


Regular (nonbackbone) areas can have several subtypes: standard area, stub area, totally
stubby area, not-so-stubby area (NSSA), and totally stubby NSSA. Standard Area – a
nonbackbone area that must be connected to the backbone area; it accepts intra-area,
inter-area,
external and a default route.’

what is backbone router.


A router which all interfaces are only in area 0 will be backbone router

what is internal router.


A router who’s all interfaces are only in regular are will be internal router

what is ASBR router.


A router who will perform redistribution will become asbr router ..

what is LSA 4 in OSPF.


It is generated by an ABR. It is flooded from area 0 into a non-transit area and vice versa. It
represents the ABR's reachability to ASBRs in other areas where in it includes cost but hides
the
ABR's actual path to the destination

what is LSA 5 in OSPF.


OSPF creates a type 5 LSA for a subnet that is injected into OSPF from an external source. To
inject the route, the autonomous System Border Router (ASBR), which is by definition a router
that connects to a non-OSPF routing domain, uses the redistribute command.

what is LSA 7.
This is a type 7 LSA that is generated by an NSSA ASBR. Type 5 LSAs are not allowed in
NSSA areas, so the NSSA ASBR generates a type 7 LSA instead, which remains within the
NSSA. This type 7 LSA gets translated back into a type 5 by the NSSA ABR.

# Access Control list

- Set Rules which will allow or Deny the Specific traffic moving through the Router

- IT is Layer 3 Security, which is Control the flow of traffic from One Router to another

- IT is Also Called Packet Filtering Firewall


# There are two types of ACL

- Standard ACL

- Extended ACL

# There are Two types of Configuration Methods

- Number ACL

- Named ACL

# Standard ACL
- Number Range 1-99
- Block Network, Host And Subnet
- Two way Communication is Block
- Block All Services
- Implement on Closest to Destination
- Filtering only Source Ip address

# Extended ACL
- Number Range 100-199
- Block Network, Host, Subnet and Services ( Protocol )
- one Way Communication is Block
- Block Selected Services
- Implemented on Closest to Source
- Filtering Source , Destination, protocol And Port no.

You might also like