Jul 15, 2014

Idea of Spanning Tree Protocol..!!!

0 comments
Dear Valued Reader,
Today we are discuss important protocol of STP. We are think, this protocol is very important our networking sector. So, develop our knowledge……………
Spanning Tree Protocol

Spanning Tree Protocol

Spanning trees accomplish the goal of allowing physical redundancy, but with only one currently active path through a bridged network. Spanning tree uses the following features to accomplish the goal:
A)     All bridge interfaces eventually stabilize at either forwarding or blocking state. The forwarding interfaces are considered a part of the spanning tree.
B)      One of the bridges is elected as root. The election process includes all bridges claiming to be the root, until one bridge is considered best by all. All root bridge interfaces are in forwarding state.
C)      Each bridge receives hello BPDUs from the root, either directly or forwarded by another bridge. Each bridge can receive more than one such message on its interfaces. The port on which the least-cost BPDU is received is called the bridge’s root port. That port is placed in forwarding state.
D)     For each LAN segment, one bridge sends the forwarded BPDU with the lowest cost. That bridge is the designated bridge for that segment. That bridge’s interface on that segment is placed in forwarding state.
E)      All other interfaces are placed in blocking state.
F)      The root sends BPDUs every hellow time seconds. The other bridges expect to receive copies of these BPDUs so that they know that nothing has changed. The hellow time is defined in the BPDU itself, so all bridges use the same value.
G)     If a bridge does not receive a BPDU for Max Age seconds, it begins the process of causing the spanning tree to change. The reaction can vary from topology.(Max Age is defined in the BPDU itself,so all bridges use the same value.)
H)     One or more bridges decide to change interfaces from blocking to forwarding, or vice versa, depending on the change in the network. when moving from blocking to forwarding, the interim listening state is entered first. After the Forward Delay amount of time (another timer defined in the root BPDU), the state is changed to learning. After another Forward Delay amount of time, the interfaces is placed in forwarding state.
I)        When a switch first transitions to a listening state, the switch sends a TCN BPDU over the new path to the root, forcing switches to quickly remove invalid entries from their MAC address tables.
J)       The Spanning Tree Protocol includes these delays to help ensure that no temporary loops occur.

VLAN Trunking Protocol (VTP) …!!!

0 comments
Today we are discuss VTP protocol. This protocol is very cisco switch platform. So,  develop an idea……………
VLAN Trunking Protocol
Cisco switches use the proprietary VTP to exchange VLAN configuration information between switches.VTP defines a Layer 2 messaging protocol that allows the switches to exchange VLAN configuration information so that the VLAN configuration stays consistent throughout a network. For instance, if you want to use VLAN 3 and name it “accounting,” you can configure that information in one switch, and VTP will distribute that information to the rest of the switches.VTP manages the additions, deletions, and name changes of VLANs across multiple switches, minimizing misconfigurations and configuration inconsistencies that can cause problems, such as duplicate VLAN names or incorrect VLAN-type settings.
VTP makes VLAN configuration easier. However, you have not yet seen how to configure VLANs, so to better appreciate VTP, consider this example: If a network has ten interconnected switches, and parts of VLAN 3 were on all ten switches, you would have to enter the same config command on all ten switches to create the VLAN. With VTP, you would create VLAN 3 on one switch, and the other nine switches would learn about VLAN 3 dynamically.
The VTP process begins with VLAN creation on a switch called a VTP server. The changes are distributed as a broadcast throughout the network. Both VTP clients and servers hear the VTP messages and update their configuration based on those messages. So VTP allows switched network solutions to scale to large sizes by reducing the manual configuration needs in the network.

Apr 8, 2014

Important Process of Password Recovery – Cisco Router …!!

0 comments
Today we are discuss important process of password recovery for cisco router. This information is very important every network professional. So, develop your idea……………
The two keys to password recovery are knowing that ROMMON (Remote Monitor;a minimal Cisco IOS that allows router access incase the IOS is damaged or unavailable) enables you to reset the configuration register and that a console user can get into ROMMON mode by pressing the Break Key during the first 60  seconds after power-on.Knowing how to reset the configuration register enables you to boot the router (ignoring NVRAM),allowing the console user to see or change the system passwords.

Here are the basic steps associated with password recovery:

1.Turn the router off and then back on again.
2.Press the Break key within the first 60 seconds.
3. Change the configuration register so that bit 6 is 1 (CONFREG COMMAND).
4. Cause the router to load an IOS.(RELOAD command or just power off and on).
5. Avoid setup mode,which will be automatically prompted.
6. Enter privileged mode.
7. View startup configuration to see unencrypted passwords.(EX:SHOW STARTUP-CONFIG).
8. Use the appropriate commands to reset  any encrypted passwords (EX:ENABLE SECRET).
9. Change the configuration register back to the original value.
10. Save the new configuration to active changes (EX:COPY RUNNING-CONFIG STARTUP-CONFIG).
11. Reboot the router.

Do you know Access List Testing Process …!!

0 comments

Access List Testing Process:

1) Access lis statements operate in a sequential,logical order.They  evaluate packets from the top down,one statement at a time.Placing more frequent access list statements at the top statements at the top will reduce CPU overhead for the router.
2) If a packet header and an access list statement match,the rest of the statements are skipped,and the packet is either permitted or denied.
3) If a packet header does not match an access l,it is tested against the next statement in the list until the end of the list is reached,at which time the packet is denied by an implicit deny.

 Access List rules/notes:

Access lists do not act on packets originating from the router itself (Telnet to another router).
When an IP packet is discarded,ICMP returns a special packet to notify the sender that the destination is unreachable.
There can be only one accss list per protocol,per direction,per port or interface.
IP access list should be created with the ACCESS-LIST command before being applied to an interface.After the list is created,it may be applied with the IP ACCESS-GROUP[ command.
Announced in Cisco IOS 11.2,the named IP access list feature allows IP standard and extended access list to be identified with an alphanumeric string instead of the current numeric (1 to 199) representations.

 An example to remove an access list from an interface:

1. INTERFACE S0
2. NO ACCEESS-GROUP 105

Idea of Access Lists Using for Cisco Router…!!

0 comments

ACCESS LISTS

 IP access lists are a sequential list of permit and deny conditions that apply to IP addresses or upper-layer protocols. Access Control Lists are used in routers to identify and control traffic.
 Put standard access lists as near the destination as possible and extended access lists as close to the source as possible.

 Access lists have an implicit deny at the end of them automatically. Because of this, an access list should have at least one permit statement in it; otherwise the access list will block all remaining traffic.

 Access lists applied to interfaces default to outbound if no direction is specified.
 -1 is used with IPX access lists to specify wildcard networks.
 Limiting broadcast traffic is important because a broadcast frame is more likely to cause a collision than a unicast frame.

There are two types of access lists
 Standard access lists; standard IP access lists check source address of packets. The result permits or denies the packet output for the ENTIRE PROTOCOL SUITE based on the only source address. Standard access lists do not specify destination addresses. Standard access list have a number from 1 to 99.IPX Standard access lists are numbered from 800 to 899.
 Extended access lists; extended IP access lists check for both source and destination packet addreses.They can also check for SPECIFIC PROTOCOLS,port numbers,and other parameters,which give administrators more flexibility and control. Extended access lists have a number from 100 to 199.IPX extended access lists  are numbered from 900 to 999.

Types of routing protocols – know RIP and IGRP for CCNA Exam ..!!

0 comments
Today we are discuss important dynamic routing protocol RIP & IGRP. So, develop your knowledge…..

RIP(Routing Information Protocol):

Distance  Vector
Two versions: RIP1 and RIP2
RIP1 and IGRP include a feature called auto summary that cannot be disabled.Auto summary is a feature of the IOS that helps to reduce the size of routing tables.
RIP2 transmits the mask with each route.This feature allows VLSM by passing the mask along with each route so that the subnet is exactly defined.
RIP2 provides clear text and MD% encryption to authenticate the source of a routing update.
RIPs metric is hop count.The maximum hop count is 15.16 is considered to be an infinite metric.

Entire routing tables are broadcast every 30 seconds for RIP;60 seconds for IPX RIP.
If a router running RIP does not receive an update from another router for 180 seconds,it marks the routes served by the non-updating router as being invalid.
A RIP1 only and a RIP2 only router will not be able to exchange routing information.
There are differences between IPX RIP and IP RIP.
Novell RIP uses timer ticks and hops as metrics.
Novell RIP has a 60 second update timer.
IP RIP has a 30 second update timer.
IP RIP has a 180 second hold-down timer.

IGRP (Interior Gateway Routing Protocol) was produced by Cisco in the mid-1980s

Distance Vector
Increased Scalability (works better in large networks than RIP)
More sophisticated metric provide for more accurate routing).Metrics included:bandwidth,delay,reliability,load,and MTU.By  default,omly bandwidth and delay are used.Bandwidth and delay are not measured values,but are set by the DELAY and BANDWIDTH commands.

Supports multiple paths (maintains up to six unequal cost paths).
Requires an  autonomous system number. It does not have t be registered, but all routers within an autonomous system must use the same number to communicate. An “autonomous system” is a set of routers under a common administration.
Supports Load balancing and load Sharing.
4,294.967,295 (over four billion) is considered to be an infinite metric.
255maximum hop count.

MTU (Maximum Transmission Unit);maximum frame length in actetes of a L3PDU that is acceptable to all links on the path.If an inbound router interface receives a frame that is larger than the outbound router’s interface MTU,the router will fragment the packet into units allowed by the outbound router interface.If the DF (Don’t Fragment)bit is set,and the packet is too large for the destination network,the packet will be dropped.ethernet has a MTU of 1500 bytes.
administrativeDistance is an integer value used to determine a preference between two equal routing metrics learned by different routing protocols.It is only important if multiple routing protocols are in use in a single router.When this is true,both routing protocols  can learn routes to the same subnets.because the metric values are different,there is no way to know which routing protocol’s routes are better.This is also considered the rating of trustworthiness.

Idea of Essentially Three classes of Routing Protocols ..!!

0 comments
We are discuss most essential three classes of routing protocols. This protocol is very important our network technological platform. So, develop our idea…………..

There are essentially three classes of routing protocols:

1) Distance Vector (hops);uses frequent broadcasts on all interfaces to determine the direction and distance to other links and accumulate distance vector.As this process continues,routers discover the best path to non-directly connected networks.The metric values are cumulative.each distance vector protocol uses a different routing algorithm to determine the best route,which generates a number called the metric value for each path through the network.Typically,the smaller the metric,the better the path.EX:RIP and IGRP.

Benefits of Distance  Vector protocols:

Simple design for smaller networks
2) Link State;recreates the exect topology of the entire network for route computation. .Link State takes bandwidth into account using a cost metric. .Link State protocols only send updates when a change occurs,which makes them more attractive for larger networks. .Link –Statealgorithm maintain a complex database of topology information including LSPs (link-State Packets),a topological database,the SPF (Shortest Path First) algorithm,the resulting SPF tree,and finally,a routing table of paths and ports to each network.Bandwidth and delay are the most heavily weighed parts of the metric when using .Link –State protocols.EX:OSPF and NLSP.

Benefits of Link- State protocols:

Allows the use of a more robust addressing scheme
Allows for a larger scalable network
Reduces convergence time
Allows “supernetting”
3) Balanced Hybrid;combines aspects of Link State and Distance Vector routing protocols.Balanced Hybrid uses distance vectors with more accurate metrics to determine the best path to destination networks.EX:EIGRP.

How to router learns forward a packet ….!!

0 comments

Dear viewers,

Today we are discuss some important information for router platform. This concept is very important router learns how to forward a packet. I think this information is helpful our professional. So, develop our knowledge and comment………….

There are two ways a router learns how to forward a packet:

1) Static Routes;configured by the administrator manually.The administrator must also update the table manually every time a change to the network takes place.Static routes are commonly used when routing from a network to a stub (a network with a single route)network.The default route (gateway of last resort)is a special type of static route used for situations when a route is not known or is infeasible.Be creful,multiple gateways of last resorts can lead to a routing loop.To add a static route use the ROUTER command,and then the NETWORK command.
2) Dynamic Routes;routes that are automatically learned by the router after an administrator configures a router protocol.As soon as dynamic routing is enabled,the routing tables are automatically updated.dynamic routing sues broadcasts and multicasts to communicate with other routers.Each route entry includes a subnet number,the interface out to that subnet,and the IP address of the next router that should receive the packet.

Goals of routing protocols:

Dynamically learn and fill the routing table with a route to all subnets in a network.
If more than one route exists,place the best route in the routing table.
To notice when routes in the table are no longer valid,and to remove those routes  from the table.The types of router protocols that use HELLO are EIGRP,IS-IS,and OSPF.
If a route is removes from the table and another is available,to add the route to the table.
To add new routes,or replace lost routes,with the best currenetly available route as quickly as possible.
Prevent routing loops.
Routed protocols vs. routing protocols:  
Routed protocols use end nodes to encapsulate layer 3 packets along with addressing information(EX :Appletalk,IP,and IPX).
Routing protocols are used to build,share,and maintain routing tables and are used by routers (EX:OSPF and RIP).There are two basic categories of routing protocols:distance vector and link-state.

Idea of Cisco IOS command-line interface-(Part-6)

0 comments
Today we are discuss most important features of cisco CLI platform. Every professional is very helpful. So, buildup your idea……………….
ROUTER <PROTOCOL> [keyword];starts the routing process.Once routing is enabled,you must use the NETWORK command to indicate which interfaces will be used.
ROUTER RIP;starts RIP.
ROUTER IGRP <AS NUMBER>;starts IGRP,but you must have an AS (Autonomous System)number.All routers within an AS system must use the same number.
NETWORK <NETWORK –NUMBER>;used after ROUTER command to allow the routing process to determine which interfaces will participate in the sending and receiving of routing updates.EX:NETWORK 172.16.0.0
PORT SECURE(enables port security and limits the number of MAC addresses that can be learned on a single port;prevents hackers from simply plugging in).
ERASE STARTUP-CONFIG or WRITE ERASE;erases NVRAM configuration by writing zeros into NVRAM.
BOOT SYSTEM;global command that allows you to specify the source of the IOS software image to load.Attempts are made to load the IOS from the first command in the configuration to the last.If the first fails,the second boot command is used.
BOOT SYSTEM ROM;IOS from ROM is loaded.
BOOT SYSTEM FLASH;the first file from flash memory is loaded.
BOOT SYSTEM TFTP x.x.x.x <FILENAME>;IOS with a filename is loaded from a TFTP server.
SNMP-SERVER ENABLE TRAPS;enables SNMP sysylog messages to be sent as SNMP traps.
DUPLEX;changes duplex mode for an interface.
BANNER MOTD <DELIMETER>;sets the message. of the day on the router.Use the #sign as a delimiter to start and stop the message.
PROMPT <NEW SETTING> ;changes the prompt character.
CONFIGURE TERMINAL;starts global configuration mode from privileged exec mode and allows you to use global commands.Global commands are commands that effect the entire router.
LOGOUT;logs user out of the router.
TERMINAL HISTORY SIZE X;the default history buffer size is 10,but this command will change the history size to a valuebetween 0 and 256.
HISTORY;displays a history of previous commands.Use the up and down arrow keys to navigate.
HISTORY SIZE;sets the maximum number of commands stored in the history buffer.
Stay with us                                                                               (Continue)——————-

Mar 20, 2014

Idea of Cisco IOS command-line interface-(Part-5)

0 comments
Dear Viewers,
Today we are discuss IP features. This information is very important cisco router CLI platform. So, buildup your idea……………….
IP ADDRESS; configures the IP address for that device.
IP DEFAULT –GATEWAY; configures the default gateway address.
IP SUBNET-ZERO; enables the user of zero subnet.
IP HOST;  global configuration command to manually assign host names to addresses.
IP NAME-SERVER; allows entries for up to six name servers (DNS).
IP ROUTE <destination subnet><subnet mask>IP of next-hop router; global command used for static routing. The permanent option will ensure the entry remains in the table even if the path is not active.
IP ACCESS-GROUP; activates an access list on an interface.
IP CLASSLESS; allows packets to use the default route of 0.0.0.0.
IP RIP SEND VERSION; tells the router whether to send RIP1, RIP2,or both style of updates.
IP RIP RECEIVE VERSION; tells the router whether to receive RIP1, RIP2, or both style of updates.
IP MAXIMUM-PATHS; by default, the IOS supports four equal-cost routes to the same IP subnet in the routing table at the same time. This number cannot be changed to between 1 and 6.
IP DOMAIN-NAME; assigns a domain name to a router.
                                                                                       (Continue)......

Idea of Cisco IOS command-line interface-(Part-4)

0 comments
Dear Viewers,
Today we are discuss  copy features. This information is very important cisco router CLI platform. So, buildup your idea……………….
COPY (copies configuration information to specified location );when a configuration is copy into RAM from ANY SOURCE ,it is merged.If a configuration file is being copied into NVRAM or a TFTP server,it is copied.
COPY RUNNING-CONFIGURATION STARTUP-CONFIGURATION or WRITE MEMORY;saves the current configuration to NVRAM.
COPY RUNNING STARTUP;copies configuration from RAM to NVRAM.
COPY STARTUP RUNNING; merges configuration from NVRAM TO RAM.
COPY TFTP RUN ;merges configuration from TFTP to RAM.
COPY TFTP START;copies configuration from TFTP to NVRAM.
COPY RUN TFTP; copies configuration from RAM to TFTP.You will need to copy a router’s configuration to a TFTP server if it is larger than 32,000 bytes,which is the largest configuration that can fit into RAM.
COPY START TFTP; copies configuration from NVRAM to TFTP.
COPY FLASH TFTP;copies current IOS from router flash memory to network server.
COPY TFTP FLASH;copies image file from TFTP server to flash.This is used to upgrade the IOS image file to a newer version,or if your IOS  image becomes corrupt.
                                                                                   (Continue).......

Idea of Cisco IOS command-line interface-(Part-3)

0 comments
Dear Viewers,
Today we are discuss disable cisco IOS features. This information is very important cisco router CLI platform. So, buildup your idea……………….

No (Disables Cisco IOS features)

No CDP RUN ;a global command that disables CDP at the device level and prevents other non-DCP capable devices from getting information about your device.
NO CDP ENABLE ;disables CDP on a given interface.
NO IP ADDRESS (resets the default  gateway IP address).
NO PORT SECURE (disables ort security).
NO DEBUG ALL or UNDEBUG ALL ;turns off all debugging.
NO IP ACCESS-GROUP ;removes an Access list from an interface.
NO ACCESS –LIST ; removes an Access list from the router.
NO IP-ROUTE CACHE ;disables fast-switching for IP on an Ethernet interface.
                                                                             (Continue)........

Mar 4, 2014

Idea of Cisco IOS command-line interface-(Part-2)

0 comments
CLI_Part_2
Dear Viewers,
Today we are discuss show command. This command is very important cisco router CLI platform. So, buildup your knowledge……………….
SHOW INTERFACES ;shows status and configuration information of the local interfaces.The first line says something to the effect of “Token Ring 1 is up,the line protocol is up”.The first part “Token Ring 1 is up describes the physical layer components (proper electrical cabling and signaling.The second part “line protocol is up” means that the router is detecting keep-alive messages.The router may be put into administratively down status,at which point the line would read,”Token Ring  is administratively down,line protocol is down”.
SHOW INTERFACES SERIAL 0 ;shows the serial 0 configuration.
SHOW INTERFACES ;displays statistics for all interfaces configured on the switch.
SHOW PROCESS ;displays a router’s CPU utilization.
SHOW HISTORY ;shows last  ten commands used.
SHOW CONFIG ;displays information on the startup configuration.
SHOW VERSION ; displays information about the system hardware (RAM/ROM),software version,names of configuration files,and boot-images.This command will alsoshow the current configuration register value.
SHOW RUNNING –CONFIGURATION ;used in privileged exec mode,this command displays the switch’s active configuration file,passwords,system name,and interface settings.
SHOW IP ;displays access list 1.
SHOW IP ROUTE LIST 1 ;displays values associated with routing timers and network information associated with the entire router.
SHOW  IPINTERFACES ;displays  information on the IP interfaceand access lists.
SHOW CDP NEIGHBORS ; displays information about the devices and their associated networks directly connected to the local device.Information displayed:device identifiers,address lists,port identifiers ,capabilities,and platforms.
SHOW CDP NEIGHBORS DETAIL ;yields a greater amount of information regarding neighbor devices.
SHOW CDP TRAFFIC ; displays information about interface trafiic.
SHOW  CDP INTERFACE ;displays interface status and configuration information about the local device.
SHOW CDP ENTRY <HOSTNAME> ;shows information on a specific node.
SHOW SESSION ;displays all active Telnet sessions by session number.
SHOW FLASH ;shows router memory,size of image file,etc.
SHOW MAC-ADDRESS-TABLE ;displays the MAC address table and helps to determine how many dynamic (learned by switch),permanent (administratively assigned to certain ports),and static addresses (restricts traffic to a particular MAC address from a specific source)are present.
SHOW HOSTS ;displays a cached list of host name to IP address mappings.
SHOW ACCESS-LIST ;displays the access lists and their contents.
SHOW ISDN ACTIVE ;shows if call is in progress and lists the number called.
SHOW ISDN STATUS ;shows the statistics of the ISDN connection.
SHOW FRAME-RELAY PVC ;displays the status of each configured Frame relay connection as well as traffic statistics.
SHOW COMPRESS ;shows compression ratios for WAN serial links.
SHOW IPX INTERFACE ;IPX status and parameters on all IPX interfaces.
SHOW IPX ROUTE ;displays IPX routing table.
SHOW IPX SERVERS ;lists all the IPX servers discovered through the SAP advertisements.
SHOW IPX TRAFFIC ;displays the number and type of IPX packets being routed.
                                                                   (Continue).........

Feb 26, 2014

How to apply access list to the CISCO router …!!!!

0 comments

Access List:

You can use the console or telnet to one of the interfaces in your router.
Example 1: Applying access list 102 (Inbound) to Serial 0.
Router>enable
Router#Config term
Router(config)# interface serial 0
Router(config-if)# ip access-group 102 in
Router(config-if)#exit
(config)#exit
Example 2 : Applying access list 101 (Outbound) to Ethernet 0 .
Router# config term
Router (Config)# interface Ethernet 0
Router (Config-if)# ip access-group 101 out
Router (config-if)#exit
(Config)#exit
Example 3 : To remove access list from Serial 0
Router>Config term
Router(config)# interface Serial 0
Router(config-if)# no ip access-group 101 out
Router(config-if)#exit
(config)#exit

Some helpful commands to monitor and verify the access list.

Show running-config                            {displays active configuration and presence of
access group}.
show access-list                                  {displays all access-list}
show access-list 1xx                            {displays access list 1xx only}
show ip access-list                              {displays IP access-list}
show interface serial 0                        {displays info on serial 0 interface)
no access-list 1xx                               {remove access-list 1xx only}
copy running-config start-up config      {save the active configuration to NVRAM}

Access List Guidelines :

1. Access List numbers indicate which protocol is filtered. Extended IP is from 100-199
2. Only one access list per protocol, per direction, per interface is allowed.
3. Top-down processing. Most restrictive statements should be at the top.
4. At the end of the access list is an implicit deny all. Due to the implicit deny, there
should be at least one permit statement on every access list.
5. New Entries are added to the bottom. Any new access list are added to the bottom of the list. If modifications are necessary, delete access list and recreate the entire access list off-line such as with text editor and upload any changes from TFTP server or Cut and Paste from a computer.
6. Create access list before applying it to the interface.
7. Access lists only filter traffic going through the router. It does not apply to traffic

Cisco IOS Command Line Interface Shortcuts …!!!!

0 comments
cisco-logo
1. The Cursor movement Shortcuts are given below :
Cursor Movement Shortcuts
Shortcut Description Mnemonic
Ctrl+A Move cursor to the beginning for the line Alpha, First letter == beginning
Ctrl+E Move cursor to the end of the line E for End
Ctrl+F Move cursor forward one character F for Forward
Ctrl+B Move cursor backward B for Backward
Esc+F Moves forward one word Always forget the escape version
Esc+B Moves backwards one word Ditto
Ctrl+P Previous command P for Previous – also up arrow
Ctrl+N Next command N for Next – also down arro
2. The editing Shortcuts are given below :
Editing Shortcuts
Shortcut Description Mnemonic
Ctrl+W Delete the word to the left from the cursor W for Word
Ctrl+U Delete the whole line ??
Ctrl+T Swap or transpose the current character with the one before it T for Transpose
Ctrl+K Erase characters from the cursor to end of the line ??
Ctrl+X Erase characters from the cursor to beginning of the line ??
Esc+D Delete from Cursor to end of word  
Delete Removes the character to the right of the cursor  
Backspace Removes the character to the left of the cursor  
Up Arrow Allows you to scroll forward through previous commands  
Down Arrow Allows you to scroll backwards through previous commands
3. The functional shortcuts are given below :
Functional Shortcuts
Shortcut Description Mnemonic
Ctrl+L Reprint the line L for Line
Ctrl+R Refresh R for Repeat – starts a new line, with the same command shown (If the system sends a message to the screen while a command is being entered and your are not using line synchonisation
Tab Command autocomplete No Comment
Ctrl+C Exit. Exit from config mode  
Ctrl+Z Apply the command line and exit from config mode ie. return to privileged EXEC mode.  
Ctrl+Shift+6 (X) CTRL-SHIFT-6 is one action, the X is the second action  
4. The Less common shortcuts are listed below :
Less Common Shortcuts
Shortcut Description Mnemonic
Esc, C Makes the letter at the cursor uppercase. C for Capital
Esc, L Changes the word at the cursor to lowercase L for Lower
Esc, U Makes letters from the cursor to the end of the word uppercase. U for Uppercase
5. Using the delete buffer are listed below :
Using the Delete Buffer
Shortcut Description Mnemonic
The buffer stores the last ten items that have been deleted using Ctrl-K, Ctrl-U, or Ctrl-X
Ctrl-Y Paste the most recent entry in the delete buffer Y for “Yank” as in Yank from buffer
Esc-Y Paste the Previous entry in the history buffer Y for “Yank” as in Yank from buffer

Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers …!!!

0 comments

Site to Site IPSec VPN Tunnel :

Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data, voice and video between two sites (e.g offices or branches). The VPN tunnel is created over the Internet public network and encrypted using a number of advanced encryption algorithms to provide confidentiality of the data transmitted between the two sites.
This article will show how to setup and configure two Cisco routers to create a permanent secure site-to-site VPN tunnel over the Internet, using the IPSec protocol.
ISAKMP (Internet Security Association and Key Management Protocol) and IPSec are essential to building and encrypting the VPN tunnel. ISAKMP, also called IKE (Internet Key Exchange), is the negotiation protocol that allows two hosts to agree on how to build an IPsec security association. ISAKMP negotiation consists of two phases:
1. Phase 1 : creates the first tunnel, which protects later ISAKMP negotiation messages.
2. Phase 2 : creates the tunnel that protects data. IPSec then comes into play to encrypt the data using encryption algorithms and provides authentication, encryption and anti-replay services.
IPSec VPN Requirements :
To help make this an easy-to-follow exercise, we have split it into two steps that are required to get the Site-to-Site IPSec VPN Tunnel to work.
These steps are :
(1)  Configure ISAKMP (ISAKMP Phase 1)
(2)  Configure IPSec  (ISAKMP Phase 2, ACLs, Crypto MAP)
Our example setup is between two branches of a small company, these are Site 1 and Site 2. Both the branch routers connect to the Internet and have a static IP Address assigned by their ISP as shown on the diagram :
2
#. Site 1 is configured with an internal network of 10.10.10.0/24, while Site 2 is configured with network 20.20.20.0/24. The goal is to securely connect both LAN networks and allow full communication between them, without any restrictions.
#. Configure ISAKMP (IKE) – (ISAKMP Phase 1) :
To begin, we’ll start working on the Site 1 router (R1).
First step is to configure an ISAKMP Phase 1 policy :
R1(config)#  crypto isakmp policy 1
R1(config-isakmp)# encr 3des
R1(config-isakmp)# hash md5
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 2
R1(config-isakmp)# lifetime 86400
#.The above commands define the following (in listed order) :
3DES - The encryption method to be used for Phase 1.
MD5 - The hashing algorithm
Pre-share - Use Pre-shared key as the authentication method
Group 2 - Diffie-Hellman group to be used
86400 – Session key lifetime. Expressed in either kilobytes (after x-amount of traffic, change the key) or seconds. Value set is the default value.
Next we are going to define a pre shared key for authentication with our peer (R2 router) by using the following command:
R1(config)# crypto isakmp key firewallcx address 1.1.1.2
The peer’s pre shared key is set to firewallcx and its public IP Address is 1.1.1.2. Every time R1 tries to establish a VPN tunnel with R2 (1.1.1.2), this pre shared key will be used.
Configure IPSec :
To configure IPSec we need to setup the following in order :
Create extended ACL
Create IPSec Transform
Create Crypto Map
Apply crypto map to the public interface
#.Creating Extended ACL :
Next step is to create an access-list and define the traffic we would like the router to pass through the VPN tunnel.  In this example, it would be traffic from one network to the other, 10.10.10.0/24 to 20.20.20.0/24.  Access-lists that define VPN traffic are sometimes calledcrypto access-list or interesting traffic access-list.
R1(config)# ip access-list extended VPN-TRAFFIC
R1(config-ext-nacl)# permit ip 10.10.10.0  0.0.0.255  20.20.20.0  0.0.0.255
Create IPSec Transform (ISAKMP Phase 2 policy)Next step is to create the transform set used to protect our data. We’ve named this TS:
R1(config)# crypto ipsec transform-set TS esp-3des esp-md5-hmac
The above command defines the following :
ESP-3DES - Encryption method
-   MD5         -  Hashing algorithm
Create Crypto Map :The Crypto map is the last step of our setup and connects the previously defined ISAKMP and IPSec configuration together.
R1(config)# crypto map CMAP 10 ipsec-isakmp
R1(config-crypto-map)# set peer 1.1.1.2
R1(config-crypto-map)# set transform-set TS
R1(config-crypto-map)# match address VPN-TRAFFIC
Apply Crypto Map to the Public Interface :The final step is to apply the crypto map to the outgoing interface of the router. Here, the outgoing interface is FastEthernet 0/1.
R1(config)# interface FastEthernet0/1
R1(config- if)# crypto map CMAP
Note : You can assign only one crypto map to an interface .
#. We now move to the Site 2 router to complete the VPN configuration. The settings for Router 2 are identical, with the only difference being the peer IP Addresses and access lists : R2(config)# crypto isakmp policy 1
R2(config-isakmp)# encr 3des
R2(config-isakmp)# hash md5
R2(config-isakmp)# authentication pre-share
R2(config-isakmp)# group 2
R2(config-isakmp)# lifetime 86400

R2(config)# crypto isakmp key firewallcx address 1.1.1.1
R2(config)# ip access-list extended VPN-TRAFFIC
R2(config-ext-nacl)# permit ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255
R2(config)# crypto ipsec transform-set TS esp-3des esp-md5-hmac
R2(config)# crypto map CMAP 10 ipsec-isakmp
R2(config-crypto-map)# set peer 1.1.1.1
R2(config-crypto-map)# set transform-set TS
R2(config-crypto-map)# match address VPN-TRAFFIC
R2(config)# interface FastEthernet0/1
R2(config- if)# crypto map CMAP

Important Idea of Cisco Router Startup Procedure …!!!

0 comments
Cisco Router Startup Procedure
Cisco Router
1.         POST; hardware tests
2.        Load and run bootstrap code; subsequent events
3.        Find the IOS software;
4.        Load the IOS software
5.        Find the configuration; default location is NVRAM or TFTP
6.       Load the configuration
7.       Run
In-Band management is the process of using your network for management of a device (Ex: local subnet). Out-of-band management would be a modem dialing into a router’s auxiliary interface. The AUX port must be configured using the console port before it will function. A router contains five virtual terminal lines (0-4 VTY lines) to accept incoming Telnet sessions for in-band management. A Telnet session can also come from any interface. Every Cisco router has a console port that can be directly connected to a PC or terminal so that you can type commands at the keyboard and receive output on a terminal screen through a communications program, such as HyperTerminal. To set up out-of-band management with the connection between your terminal and Cisco console port you need to do the following:
1.     Cable the device using a rollover cable. You may need an RJ-45 to DB-9 or an RJ-45 to DB-25 adapter for your PC or terminal.
2.   Configure terminal emulation with the following COM port settings: 9600bps, 8 data bits, no parity, 1 stop bit, and no flow control.
There are two configuration files for Cisco routers one that is active and volatile (RAM), and one that the router uses to get configuration parameters during startup (stored in NVRAM).
A multi-protocol router maintains a separate routing table for each router protocol.
If a router does not know how to forward a packet, it will drop the packet. If it does know how to forward a packet, it changes the destination physical address to that of the next hop and transmits the packet. As the packet moves along the internetwork, its physical address changes but its protocol address remains constant. Routers each make independent routing decisions based on the local routing table. This is a hop-by-hop process, one step at a time.
Syslog messages are event messages that occur when the user is at the command line.
Cisco routers have the ability to copy its configuration to and from a TFTP (Trivial File Transfer Protocol) server. This is normally used in a WAN for remote router configuration. Cisco IOS does not support FTP. TFTP is UDP-based.
Cisco routers need at least four passwords set for minimal security: an enable password (primary router password), a console password, an auxiliary line password, and a VTY password (incoming telnet sessions).
Every Cisco router has a 16-bit configuration register, which is stored in a special memory location in NVRAM which allows the following functions: Force bootstarp program, select boot source, enable or disable the console break function, set terminal baud rate, load OS from ROM, and enable booting from TFTP.
Cisco routers can set the boot sequence by the BOOT command (EX: BOOT SYSTEM FLASH, BOOT SYSTEM ROM) (not as many features as the full IOS in flash), BOOT SYSTEM TFTP xxx.xxx.xxx.xxx). There may be as many BOOT TFTP commands as you would like for redundancy. Be careful of the order used to boot the router!
“Router” is the default hostname for all Cisco routers; the character following the hostname tells you what mode you are in. The part of Cisco IOS that provides the user interface and interprets the commands you type is called the command executive, or EXEC.
MD5 (Message Direct 5) is a one-way cryptographic algorithm used for encoding data, particularly passwords.
Enabling IPX routing automatically enables IPX RIP, Enabling Appletalk routing automatically enables RTMP. IP Routing must be manually configured.

Idea of Most important Cisco Router Environment ..!!

0 comments

Cisco Router Environment

Dear viewers,
Today we are discuss some important cisco router mode and some router elements. This information is very important our professional sector because when we are properly maintain the cisco router.  So, build our knowledge……….

Router>

EXEC (user) mode; LOWEST level of access. This allows router examination of router status, examination of router configurable components, see routing tables, and do non-destructive troubleshooting. However, you cannot change the configuration, view the configuration files, or control the router in any way.

Router#

Privileged (enable) EXEC mode; FULL router access. This mode allows you to have all the privileges of EXEC (user) mode plus commands that enable you to change the configuration, perform testing that could potentially disrupt traffic, reboot, and view configuration files.
From here you may enter Global Configuration Mode (command: ‘CONFIGURE TERMINAL’ to enter and ‘EXIT’ or ‘CTRL-Z’ to exit). The prompt will become Router (config)#. This allows you to perform tasks that affect the entire router, such as naming the router, configuration of banner messages, enabling routed protocols, and generally anything that affects the operation of the entire router. Setup mode is different from configuration mode in that setup mode appears when there is no configuration file present. Upon entering setup mode, Cisco IOS will ask for basic configuration parameters.

Router Elements:

RAM (Random Access Memory); stores the running configuration, routing tables, and packet buffers. Some routers, such as the 2500 series, run IOS from Flash, not RAM.
Flash Memory; stores the compressed OS (IOS) image. Flash memory is either EEPROM or PCMCIA card.
NVRAM (Non-Volatile Ram); memory that does not lose information when power is lost. Stores the system’s startup configuration file and the configuration register. NVRAM uses a battery to maintain the data when power is off.
ROM (Read Only Memory); Memory containing micro-code for basic functions to start and maintain the router. ROM is not typically used after the IOS is loaded. RXBOOT is located here.
Configuration Register; a 16 bit register used to contrl how the router boots up, where the IOS image is, how to deal with the NVRAM configuration, setting the console baud rate, and enabling or disabling the break function. Changing bit 6 from 0 to 1 will bypass the NVRAM settings and allow access to the router in the event a password is lost.
The lowest four bits in the configuration register control the startup sequence. If a router does not find a valid configuration file when booting, it will enter a setup dialog with the prompt “Would you like to enter the initial configuration dialog?” This will allow you to set your router with minimal configuration (hostname, passwords, protocols, etc). When finished, the router writes the configuration to NVRAM and RAM.
Interfaces; the physical connections to the external world. These often include Ethernet connections. ATM, Token Ring, FDDI, Console, and auxiliary ports. For the console interface, a communications package (such as HyperTerminal) may be used. A console cable will be needed (DB-9 serial to RJ-45). Set the COM port settings to 9600bps, 8 data bits, NO parity, 1 stop bit, and NO flow control.

Idea of Cisco IOS command-line interface-(Part-1)

0 comments
The CLI (Cisco IOS command-line interface) can be accessed via a console connection, modem connection , or telnet session. These shortcuts have reportedly been on the test-learn them.

Shortcuts for Enhanced Editing:

CTRL-P; rewinds the history buffer
CTRL-N; forwards the history buffer
CTRL-B; moves cursor back one character
CTRL-F; go forward one character
CTRL-A; moves cursor to beginning
CTRL-E; moves cursor to end
ESC-B; moves to beginning of previous word.
ESC-F; moves to beginning of next word.
CTRL-R; creates new command prompt, followed by all the characters typed at the last one. This is useful for SYSLOG message.
ENABLE/DISABLE; enables or disables privileged exec mode.
ENABLE PASSWORD; a global command that restricts access to privileged exec mode. This is a no-encrypted password.
ENABLE SECRET; assigns an encrypted from of the ENABLE PASSWORD command. This secret password is used instead of the enable password when it exists.
CONFIG_REGISTER<REGISTER in hex>; global command to write a new configuration register. After changing, you must reboot for the changes to take effect.
BANDWIDTH; a global command that is used to compute routing metrics and the load of the link. This command has no actual effect on the speed of the link.
SERVICE PASSWORD-ENCRYPTION; a global command that encrypts passwords in the configuration file so they are not seen in clear text.
LOGGING<HOST>; sends syslog messages to a syslog capture server.
LOGGING SYNCHRONOUS; prevents console messages from interrupting your EXEC input.
                                                  (Continue)........

Jan 15, 2014

Description of Cisco Router – “Show commands” – Part-1

0 comments

Show commands:-

SHOW INTERFACE SERIAL 0 ;shows the serial 0 configuration.
SHOW INTERFACES ;displays statistics for all interfaces configured on the switch.
SHOW PROCESS ;displays a router’s CPU utilization.
SHOW HISTORY ;shows last ten commands used.
SHOW CONFIG ; displays information on the startup configuration.
SHOW VERSION ; displays information about the system hadware (RAM/ROM),software version,names of configuration files,and boot-images.This command will also show the current configuration register value.
SHOW RUNNING- CONFIGURATION ;used in privileged exec mode,this command displays the switch’s active configuration file,passwords,system name,and interface settings.
SHOW IP ;shows the current IP configuration.
SHOW IP PROTOCOL ;displays values associated with routing timers and network information associated with the entire router.
SHOW IP INTERFACE ;displays information on the IP interface and access lists.
SHOW CDF NEIGHBORS ; displays information about the devices and their associated networks directly connected to the local device.Information displayed :device identifiers,address lists,port identifiers,capabilities,and platforms.

Description of Cisco Router – “Show commands” – Part-2

0 comments


Show Commands:

Cisco Router show cmd part-2
SHOW CDF NEIGHBORS DETAIL ; yields a greater amount of information regarding neighbor devices.
SHOW CDF TRAFIC ;displays information about interface traffic.
SHOW CDF INTERFACE ;displays interface status and configuration information about the local device.
SHOW CDF ENTRY <HOSTNAME> ;shows information on a specific node.
SHOW USERS ;displays all active Telnet sessions by connection.
SHOW SESSION;displays all active Telnet sessions by session number.
SHOW FLASH ;shows router memory,size of image file,etc.
SHOW MAC-ADDRESS-TABLE ;displays the MAC address table and helps to determine how many dynamic (learned by switch ),permanent (administratively assigned to certain ports ),and static addresses (restricts traffic to a particular MAC address from a specific source) are present.
SHOW HOSTS ;displays a cached list of host name to IP address mappings.
SHOW ACCESS-LIST ;displays the access lists and their contents.

Idea of “NO (Disables Cisco IOS features)” …

0 comments

Disables Cisco IOS features

NO (Disables Cisco IOS features)

NO CDP RUN ;a global command that disables CDP at the device level and prevents other non-CDP capable devices from getting information about your device.
NO CDP ENABLE ;disables CDP on a given interface.
NO IP ADRESS (resets the IP address  for that device).
NO DEFAULT-GATEWAY (resets the default gateway IP address).
NO DEBUG ALL or UNDEBUG ALL ;turns off all debugging.
NO IP ACCESS-GROUP ;removes an Access list from an interface.
NO ACCESS-LIST ; removes an Access list from the router.
NO IP-ROUTE CACHE ;disables fast-switching for IP on an Ethernet interface.

Cisco Router – How to using COPY Command (copies configuration information to specified location)

0 comments

Cisco Router - Copy Command

COPY (copies configuration information to specified location)

When a configuration is copied into RAM from ANY SOURCE,it is merged.If a configuration file is being copied into NVRAM or a TFTP server,it is copied.
COPY RUNNING-CONFIGURATION STARTUP-CONFIGURATION or WRITE MEMORY ;saves the current configuration to NVRAM.
COPY RUNNING STARTUP ;copies configuration from RAM to NVRAM.
COPY STARTUP  RUNNING ;merges configuration from NVRAM to RAM.
COPY TFTP RUN ; merges configuration from TFTP to RAM.
COPY RUN TFTP ;copies configuration from RAM to TFTP.YOU will need to copy a router’s configuration to a TFTP server if it is larger than 32,000 bytes,which is the largest configuration that can fit into RAM.
COPY START TFTP ; copies configuration from NVRAM to TFTP.
COPY FLASH TFTP ;copies current IOS from router flash memory to network server.
COPY  TFTP FLASH ;copies image file from TFTP server to flash.This is used to upgrade the IOS image file to a newer version,or if your IOS image becomes corrupt.

How to Cascade a Cisco Router’s…!!!!!!

0 comments



cisco

Step 1 : Designate which one of your routers will be the primary router and which will be secondary. Your primary router should already be configured as, or with your modem.
Step 2 : Connect your computer directly to your secondary router using an Ethernet cable by plugging the cable into one of the numbered Ethernet ports on the back of the router and to an Ethernet port on your computer. Make sure it is not plugged into your primary router.
Step 3 : Access your router’s web-based configuration menu. Connect to the router’s IP address with a web browser.
  • Depending on the make of your router, you may have to navigate to a specific URL to access your router’s web-based configuration menu. Consult your router’s user manual to find out.
Step 4 : Look for the local IP settings and reset the router’s IP address from its default settings. The key here is to make sure that your secondary router has a different final digit than the IP address of your primary router.
  • An example IP for your primary router is 192.168.1.1. So an example of your secondary router’s IP address could be 192.168.1.2.
Step 5 : Locate the router’s DHCP Server settings and turn them off.
Step 6 : Make sure your router is set to router operating mode. This is often located in an advanced settings menu.
Step 7 : Plug another Ethernet cable into one of the numbered Ethernet ports on the back of the primary router. Plug the other end of that cable into a numbered Ethernet port on the back of the secondary router. Your routers are now cascaded.
Method 2 of 2 :
Connect Ethernet to Internet or LAN to WAN 
Step 1 : Connect your computer to your secondary router and access the web-based configuration menu.
Step 2 : Change the local IP address so that the second-to-last digit is different from your primary router.
  • If your primary IP address is 192.168.0.1 then your secondary router’s IP address should be something like 192.168.2.1.
Step 3 : Save your IP address changes.
  • Disconnect your secondary router from your computer.
Step 4: Plug an Ethernet cable into one of the numbered Ethernet ports on the back of your primary router.
Plug the other end of the cable into the Internet port of your secondary router. Your routers are now cascaded.

CCNA NAT Configuration with PAT

0 comments


PAT - Port Address translation. We use PAT in that condition when we have few Public IP & hundreds of inside local address need to translate. Pat use port numbers in transport layer to identify hosts. can translate up to 65,000 hosts with one real IP.Sometimes we called this overload operation also.
NAT1
In this example the internal network using 30.0.0.0 network.we will use one public ip 50.0.0.1.
Router(config)#hostname R0
R0(config)#enable secret open
R0(config)#int fa
R0(config)#int fastEthernet 0/1
R0(config-if)#ip add
R0(config-if)#ip address 30.0.0.1 255.0.0.0
R0(config-if)#no shut
R0(config-if)#exit
R0(config)#int serial 2/0
R0(config-if)#ip add
R0(config-if)#ip address 20.0.0.1 255.0.0.0
R0(config-if)#no shut
R0(config)#ip route 0.0.0.0 0.0.0.0 serial 2/0
R0(config)#access-list 1 permit 30.0.0.0 0.0.0.255
R0(config)#ip nat pool test 50.0.0.1 50.0.0.1 netmask 255.0.0.0
R0(config)#ip nat inside source list 1 pool test overload
R0(config)#int fastEthernet 0/1
R0(config-if)#ip nat inside
R0(config-if)#exit
R0(config)#int serial 2/0
R0(config-if)#ip nat outside
R0(config-if)#exit
R0(config)#exit
Now goto R1 Router
Router(config)#hostname R1
R1(config)#enable secret open
R1(config)#int fastEthernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#int serial 2/0
R1(config-if)#ip address 20.0.0.2 255.0.0.0
R1(config-if)#no shut
R1(config)#ip route 0.0.0.0 0.0.0.0 serial 2/0
Now ping from all host  PC to server(10.0.0.2) and goto R0 Router and apply below command.We can see port numbers with below report.
R0#sh ip nat translations
Pro  Inside global     Inside local       Outside local      Outside global
icmp 50.0.0.1:1024     30.0.0.2:1         10.0.0.2:1         10.0.0.2:1024
icmp 50.0.0.1:1025     30.0.0.2:2         10.0.0.2:2         10.0.0.2:1025
icmp 50.0.0.1:1026     30.0.0.2:3         10.0.0.2:3         10.0.0.2:1026
icmp 50.0.0.1:1027     30.0.0.2:4         10.0.0.2:4         10.0.0.2:1027
icmp 50.0.0.1:1        30.0.0.3:1         10.0.0.2:1         10.0.0.2:1
icmp 50.0.0.1:2        30.0.0.3:2         10.0.0.2:2         10.0.0.2:2
icmp 50.0.0.1:3        30.0.0.3:3         10.0.0.2:3         10.0.0.2:3
icmp 50.0.0.1:4        30.0.0.3:4         10.0.0.2:4         10.0.0.2:4
                                                                               ——————– Thanks Everyone

CCNA-Idea of Frame Relay ::Part-1

0 comments

 

What is Frame Relay?

Frame relay is a technology which work in layer 2 for switching packet by sharing users bandwidth. It’s using X.25 technology. Basically Frame relay used for WAN connection, to connect geographically separate located devices.
frame relay
We called frame relay devices as DTE device such as Computer,Data Terminal,Router, Bridge and other network devices.We use DCE such as converter managed by provider(ISP), devices to matching clock rate with DTE devices for communicate with another DTE devices of other end.
Virtual Circuit:Used in frame relay network to connect DTE devices using a circuit .There are two types of Virtual Circuit used in fame relay network.
1.PVCs- Permanent Virtual Circuits.For those connections which used for permanent.
2.SVCs- Switched Virtual Circuits set connection only when data need to send. not permanent.
DLCI- Data Link Connection Identifier. In frame relay network DTE devices identified by DLCI numbers.Used in frame relay Interface to communicate different virtual circuits.It’s use Inverse ARP similar to ARP but it MAP a DLCI to a IP address.
LMI- Local Management Interface- Used between your router and frame relay switch. Allow for passing information about  your network and virtual circuits.Three types of LMI use can use. a) Cisco b)ANSI c) ITU-T(Q.933A). It’s depend on which type of media you using.

CCNA-Using of Frame Relay ::Part-2

0 comments

 

 Frame Relay Point-to-point:

Used to connect two devices under same subnet. DLCI number can configure on Interface or Sub Interface.In this type of point to point connection no need Inverse Arp.
framerelay1
In this example we took two router and one frame relay cloud.Remember all routers are DTE.Assume that two router located in Dhaka And Chittagong.connected via ISP with frame relay cloud.Lets configure first  Chittagong then Dhaka
Router(config)#hostname Ctg
Ctg(config)#int serial 3/0
Ctg(config-if)#ip address 192.168.1.1 255.255.255.252
Ctg(config-if)#encapsulation frame-relay
Ctg(config-if)#bandwidth 64
Ctg(config-if)#frame-relay lmi-type cisco
Ctg(config-if)#frame-relay interface-dlci 100
Ctg(config-if)#no shut
Now Dhaka
Router(config)#hostname Dhk
Dhk(config)#int serial 2/0
Dhk(config-if)#ip address 192.168.1.2 255.255.255.252
Dhk(config-if)#encapsulation frame-relay
Dhk(config-if)#bandwidth 64
Dhk(config-if)#frame-relay lmi-type cisco
Dhk(config-if)#frame-relay interface-dlci 200
Dhk(config-if)#no shut
Now Frame Cloud -
Go to serial interface & add DLCI numbers.
DLCI
now go to frame relay option & add like below
cloud
In packet tracer it’s easy to configure frame relay cloud switch but  real configuration is different.Need to map ……..