Skip to main content

Posts

Showing posts with the label Routing Commands

What is VRF? Introduction about Virtual Routing forwarding

VRF - Virtual Routing Forwarding Virtual routing and forwarding (VRF) is a technology included in IP (Internet Protocol) network routers that allows multiple instances of a routing table to exist in a router and work simultaneously. This increases functionality by allowing network paths to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also increases network security and can eliminate the need for encryption and authentication. Internet service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs) for customers; thus the technology is also referred to as VPN routing and forwarding. VRF - Virtual Routing Forwarding The VRF device combined with ip rules provides the ability to create virtual routing and forwarding domains (aka VRFs, VRF-lite to be specific) in the Linux network stack. One use case is the multi-tenancy problem where each tenant has their own unique routing tables and in the ver...

What is ACL? - Access-Lists

Access control list (ACL) is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects or you can say for each rule we have two conditions and that is Permit or Deny. Access List Access-list (ACL) is a set of rules defined for controlling the network traffic and reducing network attack. ACLs are used to filter traffic based on the set of rules defined for the incoming or out going of the network. Types of ACL: Standard Access List: Extended Access List: Standard Access List- These are the Access-list which are made using the source IP address only. These ACLs permit or deny the entire protocol suite. They don’t distinguish between the IP traffic such as TCP, UDP, Https etc. By using numbers 1-99 or 1300-1999, router will understand it as a standard ACL and the specified address as source IP address. Extended Access List- These are the ACL which uses b...

Top Basic troubleshooting commands for Routings

Routing Commands Well as per my 2.5 + years of experience I know that the Troubleshooting is about three big things: predicting what can happen, determining the anomalies, and investigating why that anomalies happened. also the many network admins break down network infrastructure problems by analyzing the Layer 3 path through the network, hop by hop, in both directions. Below are the basic commands which can help you with Troubleshooting Ping   Show Interface   Show IP Interface   Traceroute   Show Protocols   Show IP Protocols   Telnet   Show running-config   show IP route   Show IP protocol database PING The first most commonly used command is Ping. The ping stands for Packet Internet Groper. It operates in the network layer of the OSI Model and uses the ICMP protocol. It is the first command you must use while troubleshooting a network. The ping command allows you to test whether there is a co...