28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BGP table version is 24, local router ID is 210.1.1.2<br />

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal<br />

Origin codes: i - IGP, e - EGP, ? - incomplete<br />

<strong>Network</strong> Next Hop Metric LocPrf Weight Path<br />

*> 192.168.1.0 0.0.0.0 0 32768 ?<br />

*> 192.168.2.0 0.0.0.0 0 32768 ?<br />

*> 192.168.3.0 192.168.2.2 2195456 32768 ?<br />

*> 193.168.1.0 210.1.1.1 0 0 100 i<br />

* 210.1.1.0 210.1.1.1 0 0 100 i<br />

*> 0.0.0.0 0 32768 i<br />

deadcow#sh ip bgp<br />

% BGP not active<br />

Supplemental Lab or Challenge Activities:<br />

1. Go out to <strong>CISCO</strong> and find out what are the definitions and descriptions of the<br />

metrics.<br />

2. Find out what is the difference between IBGP and EBGP.<br />

3. How would you redistribute BGP with IGRP? RIP?<br />

4. Try using your protocol inspector to capture BGP packets. Examine their<br />

structure carefully.<br />

5. For what is the “no synchronization” command used? What about the<br />

“passive-interface” command?<br />

6. When we use a clockrate command we have been using 56000. We know T-1<br />

lines are much faster than that…what is the upper limit of our clockrate<br />

command? (hint: it’s in the millions)<br />

So What Have I Learned Here?<br />

In this lab you learned the very basics of the BGP routing protocol. Trust me…you just<br />

touched on the tip of the iceberg here.<br />

Guest Router Name<br />

Cult of the Dead Cow (CdC) is a hacking gang who have been publishing their hacking<br />

materials since the 1980’s. One of their more famous contributions is the software<br />

known as “Back Orifice tool for Windows.” This program, when installed on a<br />

computer, makes it very easy for a hacker to manipulate the workstation just like a<br />

puppeteer does with a puppet.<br />

321

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!