Tuesday, March 12, 2013

Cisco CCNP Router – BGP Troubleshooting



Every time you troubleshoot your BGP (Border Gateway Protocol), always follow a tried and tested troubleshooting model. That way, you can work more efficiently and probably even resolve the problem much faster. We usually follow an 8-point troubleshooting model like the one below:
u      Define the problem
u      Gather the facts
u      Document the facts
u      Consider the possibilities
u      Create an action plan
u      Implement the action plan
u      Repeat until resolution
u      Document the solution

Just like in most protocols, there are some very specific, common issues and problems, as well as their corresponding solutions. Here in our article on BGP troubleshooting, we’ll be looking at these four potential problems/issues:
  1. Neighbor relationship problems
  2. Route advertisement issues
  3. Routes missing from the table
  4. Address summarization problems

Neighbor Relationship Problems
There are a number of possible reasons that may prevent neighbors from establishing a relationship. Here are some of the most common causes of neighbor relationship problems:Possible Cause: Layer 2 or Interface is down

If the Layer 2 process or Interface is down, it may prevent a neighbor relationship from forming. The easiest way to determine that this is the problem when it’s stuck in the Active or Idle state is by executing the show interface <slot/port>. For example, execute: show interfaces fastethernet 0/0 or show interfaces gigabitethernet 0/0 When the output is displayed, look at the interface that’s facing the BGP peer. You should be able to see a line where it says something like:
Fast Ethernet 0/0 is up, line protocol is up.

The first part (Fast Ethernet 0/0 is up) is talking about the physical hardware portion, while the second part (line protocol is up) is talking about the Layer 2 process.

So if you see something like: Fast Ethernet 0/0 is up, line protocol is down, that means the physical interface is fine but Ethernet keepalive are not sent/received on the interface. Sometimes, the reason is that something isn’t plugged-in on the other side. Another reason could be you simply have a bad cable.

If, however, the interface shows to be administratively down, then you can remedy that by simply issuing the no shutdown command on the interface.

In figuring out Layer 1 and Layer 2 problems, always start at Layer 1 and work your way up. Troubleshoot and solve the Layer 1 and Layer 2 issues on that particular interface. If it’s a hardware failure, if it’s a cable failure, or something more subtle, this method will be the best way to take care of this particular cause. Possible Cause: Incorrect IP address used in neighbor statement in BGP An incorrect IP address in the neighbor statement in BGP may also cause neighbor relationship problems.

Consider this diagram: 

So, for example, in router R1, the configuration should be: router bgp 65001 neighbor 10.99.99.6 remote-as 65006 (this is the neighbor statement for R6, for peering)

Conversely, on router R6, the statement in the configuration should be: router bgp 65006neighbor 10.99.99.1 remote-as 65001 If, for example, the IP address on either R1 or R6 is wrong, the relationship will not form. So the easiest way to figure out if there’s a problem is to first execute the show ipbgp summary command. It will show you the state of the neighbor relationship, how many prefixes if any are being received, and whether the neighbor is stuck in Idle or Active state.

In addition to that, you can also execute the show running config command to verify that the peer address in the neighbor statements are correctly configured in BGP.

One of the things that’s going to be helpful is to: go in using PuTTY, SecureCRT, Tera Term or whatever terminal services program you’re most comfortable with; highlight the BGP section; paste the configuration into Notepad; and then go into the neighbor router and do the same thing. See if the neighbor configuration statements are in fact correct. If they’re not correct, delete the neighbor statement and recreate them with the correct IP addresses.   Possible Cause: Configured eBGP peers are not directly connected although eBGP peers that aren’t directly connected can still have neighbor relationships, an additional command must be used and a special path must be in place for the neighbor relationship to work.

You can determine whether the neighbor is more than one hop away by executing thetraceroute<peer ip> command. You’ll be able to tell very easily by the number of different sections and hops shown in the output.

Once you discover that the neighbor is in fact more than one hop away, you can go back into the BGP configuration and put in the statement: neighbor <peer ip>ebgp-multihop<ttl>ttlstands for time-to-live, which can be a value from 1 to 255 and which refers to the maximum number of hops that can be taken to reach the peer. If it’s 2 hops away, you put 2. If it’s 3 hops away, you put 3, and so on. You may also leave that parameter blank. If you do that, the default value of 255 will be applied.

Another thing you can use is the show tcp command, which you execute in the command-line. It will show you whether a TCP connection is up and in progress with that particular neighbor. Subsequently, it will allow you to verify establishment of a TCP session on port 179 toward a BGP peer. Possible Cause: Misconfigured neighbor authentication Another cause that’s very common for neighbor relationships not forming in BGP is the failure to configure the correct key in the password statement.

If you do a show ipbgp summary and you see that the neighbor relationships are indeed stuck in Active or Idle, the easiest way to resolve this is to execute the show running configcommand and then verify that the neighbor <peer ip> password <key> command is present on both peers and that the configured keys match.

Again, it would help if you copy those snippets and paste them into Notepad. That way, you can view the snippets all by themselves as you try to compare them and spot anything missing or mistyped. Remember that the key is case-sensitive. If that statement is incorrect, you don’t have to delete the entire configuration. Just recreate the neighbor <peer ip> password <key> statements on both BGP peers. Possible Cause: Unicast traffic being blocked between devices this possible cause for neighbor relationships not forming is not as common as those mentioned earlier. However, it’s still a possible cause nevertheless. In this case, Unicast traffic between the peers is being blocked. Blocking can be caused by a firewall, an access list, or a variety of different things.

Most likely, it’s going to be something configured on one or the other peers that may be blocking it but if there’s an intermediate device, then you’ll have to take a good look at that device’s configuration as well.

But in the particular device in question, execute the show ip interface and show access listcommands. Look at all the access lists, see if anything is being applied on the interface facing that particular neighbor, and if there is, either alters the access list to allow the traffic or you may have to alter it altogether.

Once you’re done with that, make sure everything is correct, make sure that the statements for peering are correct, and make sure show interface shows up/up. Possible Cause: Neighbor statement misconfigured under BGP There may be other things in the neighbor statement that may cause problems in neighbor relationships. For instance, timers may be mismatched.

To check whether something’s incorrect with the neighbor statement in BGP, start by executing the show ipbgp summary.  You’ll want to know first whether the neighbor relationships aren’t even shown. If they aren’t shown, then that means the neighbor relationship is not being established and it has not been configured at all.

If it has been configured, you’re going to see at least Active or Idle as a result of that command. At that point, you can also execute the show running-config in order to be able to go through and parse through the configuration. If there are only a few entries, this task is going to be very easy.

However, if it’s really long, then it can be difficult. If so, then paste it to Notepad so you can use the search function to find specifically what you’re looking for. If you know a specific IP that’s correct, you can go to that particular IP where you’ll find the entire string of numbers and commands, which will be listed in order. From that you can gather some information and determine possible causes.

Once you’ve pinpointed what’s wrong, you can delete and recreate the neighbor statements with the correct IP address combinations.

Route Advertisement Issues
Possible Cause: Automatic network summarization is in effect Although there can be a number of things that may prevent routes from being advertised correctly, one of the primary culprits is the auto-summary command.

Both BGP and EIGRP have automatic summarization enabled by default. If you don’t execute the no-auto summary command when you configure BGP, it’s going to automatically summarize into a classical boundary.

To check whether summarization is enabled, use the show ip protocols command. Look for the statement that says, Automatic route summarization is <disabled | enabled>. In EIGRP, it will say, “... is in effect” or “... is not in effect”.

So in BGP, you’ll want to see “disabled”. If it says something different, then you will need to go back into the BGP router configuration and execute the no auto-summary command.Possible Cause: The advertisement does not match a route in the IP routing table If the particular route being injected into BGP by the network statement is not matching a route in the IP routing table, then you can encounter route advertisement problems.

To remedy this, execute the show ip route command to discover whether the route exists in the current routing table. If it is not there, troubleshoot the local router and the IGP to determine the cause. See whether it was even configured in the router or check the IGP to see if there is a particular issue that’s preventing the route from being installed in the routing table.

Once you see the cause of the problem, correct it. Possible Cause: Route synchronization is enabled By default, route synchronization is enabled in BGP. Synchronization means that it has to exist in the IP routing table through an IGP, static routes, or other means, or BGP will not advertise the route.

To solve this problem, first execute the show ip protocols command and check whether the statement says IGP synchronization is enabled. If so, go back into the BGP configuration and put in the no synchronization command in order for that behavior to be turned off. Possible Cause: Route redistribution is not configured or is misconfigured One more cause for a problem with route advertisement issues may have to do with redistribution. Basically, if redistribution has not been configured, BGP won’t pull those routes in. The table has to be populated either through direct injection into BGP using the network statement or through redistribution.

You may use the show ip protocols command and look to see if redistribution has been configured. If it has, then investigate some more to see where the problem lies. It could be that you may have put in an incorrect AS number or a process ID relating to OSPF.

Routes Missing from Table
Now, aside from routes not being advertised correctly in BGP, you may find that certain routes are not showing up in the routing table, which is a little bit of a different issue. They sound the same but route advertisement is actually the BGP process announcing something out, and whether or not something’s being installed in the routing table is a separate issue altogether.Possible Cause: Default route misconfigured If the default route is not showing up, then it’s probably simply because it was not configured correctly. To investigate, execute the show iproute and see whether there is a route to 0.0.0.0 network to begin with. If it’s missing from the table, it won’t be injected or advertised from BGP.

You may also execute the show running-config and verify whether the network 0.0.0.0 and the default-information originate statements are existing and correctly configured in BGP. Add those statements if you find them missing. Possible Cause: Route synchronization is enabled We discussed this earlier as a possible cause for route advertisement issues, so just review that section if you want. Possible Cause: iBGP neighbors not fully meshed You may have a problem with iBGP neighbors because these neighbors are not full meshed. Remember, when the routes are being advertised among iBGP peers, it has a ttl of 1. If they’re not all fully meshed, you won’t be able to propagate routes correctly.

To verify that peerings are happening correctly, use the show ipbgp neighbors command. You may also use the show running-config command and do a little bit more investigative work in order to determine whether or not the neighbors are in fact fully meshed.

If there are connections that are missing, configure them using the <peer ip> remote-as <ASN> command. For example, let’s bring back the diagram we showed you earlier. 
If these were IBGP routers and there were direct connections between the Internet Router and Router 1 as well as between Router 1 and Router 6, but there was no connection between the Internet Router and Router 6, that would be a missing leg to a fully-meshed environment.

So if you have that kind of missing connection, you can then use the <peer ip> remote-as <ASN> command to remedy the problem.

Finally, execute the show ipbgp summary command, make sure that all the other peers that you’re looking for are indeed there and that each one of the neighbors shows all the other peers that are required. That will be your best way of determining whether or not a fully meshed relationship has been configured. Possible Cause: iBGP next-hop is not reachable One of the ways for you to check whether this is an issue is to do the show ip route command and examine the IP routing table for the required static/IGP route. And this is true with even eBGP. If the next-hop route is not reachable, it’s not going to be advertised.

If a static route is required, configure it using the ip route <prefix><mask><next-hop>command. Now, if for some reason, the IGP is failing to install the route leading to the iBGP next-hop address, you may have a whole other set of issues just related to the IGP.

In that instance, you have to make sure you’re looking at BGP as one sort of troubleshooting domain and the IGP as another. They depend on each other but they can have different issues.

Address Summarization Problems
Possible Cause: No subnets in the routing table in the range of the aggregate address In terms of address summarization problems, one common cause for an aggregate not being advertised is because there isn’t some part of the IP address range within the aggregate that exists already in the routing table.

The easiest way to check that is to execute the show ip route. See if any networks within that range currently exist. If you were advertising an aggregate address 216.145.0.0 and the mask is 255.255.252.0 and there are no 216.145-any type addresses in terms of the routing table, it’s not going to advertise the aggregate.

Execute the show running-config to verify that the aggregate address statement is correctly configured. If it is not, delete and recreate the statement that need corrections.

Relevant Debug and Show Commands
The troubleshooting process in BGP requires the use of several Show and a couple of Debugcommands that you should be familiar with. BGP Show Commands Show ip protocols This will show the BGP status of your neighbor, your Autonomous System Number (ASN), timer intervals, networks being advertised, and neighbors/gateways. Consequently, it will be helpful in troubleshooting neighbor relationships, missing routes, summarization issues, and filtering problems.

Here’s a portion of an output resulting from a show ip protocols command: 
Show ip route bgp This will show BGP routes advertised by neighbors, the administrative distance, MED value (if any), and the route source/interface. These information will be helpful in troubleshooting missing routes, summarization issues, filtering problems, and general troubleshooting tasks. 
Show ipbgpsummaryThis will show your configured peer IP addresses, your ASN, the number of messages received and sent, how long the session has been up, the state (Active, Idle, etc.), and prefixes received. This will be helpful in troubleshooting neighbor relationship issues, local configuration issues, and routing problems.

 Show ipbgpneighborsThere are two forms of this command. The first one is just show ipbgp neighbors, which will show you the IP address of neighbors, router ID of neighbors, state of a neighbor, peer-group (if configured), BGP messages/types received, and so forth.

However, you can also specify the peer ip address and then add either of these two optional parameters received-routes and advertised-routes. Received-routes is for routes being received by that particular neighbor, while advertised-routes is for routes advertised out to a particular neighbor.

Here’s the syntax: show ipbgp neighbors [peer ip address] {received-routes | advertised-routes} That will show you how many routes you are actually advertising or receiving and can be extremely helpful in attacking problems associated with routes missing and so forth. It can also be helpful in troubleshooting neighbor relationships, local configuration issues, and other issues associated with BGP routes.

Here’s part of what I got when I issued the command: show ipbgp neighbors 10.6.6.6 
Now, here’s part of what I got when I used show ipbgp neighbors 10.6.6.6
advertised-routes instead: 
Notice the default route that’s being advertised at the top, followed by a whole host of prefixes.

Lastly, here’s part of what I got when I used show ipbgp neighbors 10.6.6.6 received-routes 

 It’s practically the same type of information but it’s showing what’s being received. Show ipbgp This shows the entire contents of the routing information base. It will show your network mask/prefix, next-hop router, MED value, Local Preference Value, Weight Value, AS path, and so forth.

In turn, that information is going to be helpful in troubleshooting missing routes, filtering problems, and general troubleshooting tasks.
Now we go to the Debug commands.

BGP Debug Commands Debug commands display results that are more real-time views of the situation compared to the results of the show commands, which mostly allow you only to look at settings.
  
debugipbgp<peer ip> updates This will show you everything that has to do with neighbor adjacencies and relationships. So it’s good for troubleshooting neighbor relationships and routing update issues.

debugipbgp events

This is helpful in looking at different network events like interfaces that go up and down, processes that change, neighbor relationships that change, and so forth. It can help in troubleshooting routing update issues, convergence issues, and interface flapping.

Conclusion
That wraps up our discussion on BGP troubleshooting. I hope you learned a lot and I look forward to having you here again.

More Cisco Certification Info, please visit Router-switch.com

Friday, October 12, 2012

What Router-switch.com Prepared for Its 10th Anniversary?



Router-switch.com is ten years old, happy 10th Anniversary! It is a vital phase for all router-switch.com staff in 2012. How to celebrate its 10th anniversary? What Router-switch.com Prepared for Its tenth birthday to thank its regulars and new clients? Let’s have a look!

Router-switch.com, ten years old, happy birthday! 2012 marks the tenth anniversary of router-switch.com, which is an exciting moment for all router-switch’s staff and clients.

What Router-switch.com Prepared for Its 10th Anniversary?

In 2012, router-switch.com welcomes its 10th anniversary. For router-switch.com, it has been a worldwide leading Cisco supplier during the past 10 years. To celebrate 10 years, it prepares big gifts for its regulars and new clients, such as Cisco AIR-AP1131AG-A-K9, limited edition T-shirts and 20PC U disk. Some popular Cisco products(including Cisco routers: Cisco 2900&3900 Routers, Cisco switches: Catalyst 3560x Series, Cisco Catalyst 3750x Series, Catalyst 3560V2/3750V2Cisco firewall, Cisco Access Points and network cards) will have big discounts (up to 75% off).The activity date is from September to October. Wow, if you wanna buy Cisco equipment, don’t miss it.

Router-switch.com has become a world’s leading Ciscosupplier over the past ten years with the help of its staff and customers. To celebrate its 10 years, router-switch.com offers some activities for all the old and new clients, for example, big discount (save up to 75% off) for the popular Cisco items (including Catalyst 3560x Series, Cisco Catalyst 3750x Series, Catalyst 3560V2/3750V2, Cisco 2900&3900 Routers, Network Cards, etc.), fill out a simple survey to win a big gift (Cisco AIR-AP1131AG-A-K9, limited edition T-shirts and 20PC U disk). The activity date is from September. 01. 2012 to October. 31. 2012. Wow, if you are a Cisco buyer, don’t miss this chance. Let’s join the party to celebrate the 10th birthday together.

Monday, September 17, 2012

Cisco Layer 3 Switches Review: Cisco 3750-X



The Cisco 3750 range has been around for many years now, and has a vast following. The Cisco 3750-X is the new kid on the Cisco block, and it combines plenty of stuff that will be familiar to users of its predecessors with some funky new features that are clearly a step forward.

Cisco 3750 switch comes in a number of flavors – between 24 and 48 ports, with or without Power over Ethernet. Cisco 3750 with 48Pis the PoE variant of the 48-port device. Now, the traditional Cisco 3750 had four 1Gbit/s SFP ports in addition to the 48 10/100/1000 copper ports; the Cisco 3750-X instead has a slot into which you can slot either a four-port 1Gbit/s SFP daughter-board or a two-port 10Gbit/s alternative.

Alongside the port combinations, there are three software installs. The LAN Base software is a layer-2 only software image, and quite frankly I wouldn't ever expect to buy one of these if I only wanted layer-2 functionality. More sensible is the IP Base image which makes the device a proper Layer-3 routing switch, albeit with a limited selection of routing protocols. At the top is the IP Services image, which makes the unit a full-blown router (just like its ancestors – two of my BGP-shouting WAN routers are actually 3750Gs, in fact). The main market will of course be for the IP Base version.

The rear panel is interesting too, of course. As with the older 3750s the rear panel has a pair of “stack” ports. Each stack port provides a 16Gbit/s backplane connection, and by stacking your devices in a loop you end up with a resilient 32Gbit/s backplane. From a management and configuration point of view a stack is a single virtual switch – you manage it rather like a chassis product with a number of blades. So port 1 of switch 1 is Gi1/0/1, port 3 of switch 2 is Gi2/0/3, and so on.

The important rear-panel innovation with the new CISCO 3750-X model is the provision for redundant power supplies. In the old model you had a single, non-removable power supply along with an RPS (Redundant Power Supply) connection; to use the latter and give yourself some resilience you had to buy something like an RPS2300 – an external device that was a stupid shape that didn't fit into a rack very well, had buttons on the front whose only purpose seemed to be to make things break, and on a brighter note provided up to six switches with resilient power. The new model has dual slots for removable PSUs, of which one is populated by default; it's a ten-second job to slip a second one in beside it. One of the downsides of the old 3750 was the bloody awful reliability of the internal (fixed) PSU, and I've spent rather too many hours swapping out units with duff power units, so the removable units in the -X are most welcome.

Along with the redundant PSU facility is the power stacking capability. Just as you have your data stack cables, you also now have a pair of power-stack cables on each unit, so that the total power available via all the PSUs in the stack is available for negotiated use across the whole stack, for switch power and PoE.

As with the older devices, you can add and remove stack devices on the fly. Adding a switch to a stack is a simple case of settings its ID, telling the stack to expect a new member, and plumbing it in (although in theory the stack will deal with firmware mismatches in the new member, I prefer not to tempt fate so I always pre-install the right version). If a unit fails the stack will keep on humming while you pull out the duff one and stick in the replacement, and the config will be automatically migrated to the new unit.

The only downside I've found so far, in fact, is with trying to get the new -X model to co-exist in a stack with the old 3750-G (in short, I've not persuaded it to actually work yet) but I've no doubt I'll persuade it to play before long.

The Cisco 3750-X is a really sensible evolution in an already popular family of switches in the Cisco family. Being an IOS device there's really not a great deal of difference management-wise between the old and the new, so you get new functionality with almost zero additional training requirements. I've recently added seven 48-port non-PoE versions in three of my server installations, and have just received two new pairs of the PoE variant in a couple of offices, and I'm pretty happy thus far.

Pro
New power stacking capability is an excellent evolution.
32Gbit/s backplane should be sufficient for most modest installations.
10Gbit/s Ethernet support for uplinking or connecting to blade servers.


Sample Pricing for Popular Cisco 3750 Models:
Catalyst 3750X 24 Port Data LAN Base: US$2,236.00(57.00% off list price)
Catalyst 3750X 48 Port Data LAN Base: US$3,827.00(57.00% off list price)
Catalyst 3750X 24 Port Data IP Base: US$2,795.00(57.00% off list price)
Catalyst 3750X 48 Port Data IP Base: US$4,945.00(57.00% off list price)
Catalyst 3750X 24 Port PoE IP Base: US$3,139.00(57.00% off list price)
WS-C3750X-48P-S: Stackable 48 10/100/1000 Ethernet PoE+ ports, with 715W AC Power Supply: US$5,590.00(57.00% off list price)

Supplier
Router-switch.com ((Yejian Technologies Co., Ltd), a World's Leading Cisco Supplier

Tuesday, July 31, 2012

How to Verify and Troubleshoot NAT Configurations?


The most common mistake in troubleshooting is not the inability to use commands but the laxity in the examination of entries and configuration. Solving network problems requires careful and proper examination of routing entries and configuration.

There are several useful router commands to verify NAT translations. Cisco routers are equipped with NAT verifying tools.
1. The command: show ipnat translations display the details of NAT assignments; it will enable you to verify that correct translations exist in the translation table.  It’s recommended that you clear any dynamic NAT translation entries that might still be on the router.

2. To view additional details about each translation us the following command;
              R1#show ipnat translation sverbose

This command will display additions information, which includes creation dates and usage of each translation.

To clear NAT translations use the command:  clear ipnat translation
e.g.

R1#clear ipnat translation

3.Verify the operations of NAT by checking details about every packet that is translated by the router. To view this information use the:
                R1#debug ipnat  or
               R1#debug ipnat detailed

The later command debug ipnat detailed Provide a description of each packet that had been considered for translation. It also displays information on some errors such as failure to assign a global IP address.cisco product

4.The show ipnat statistics command display:
Details of all the active translation entries
NAT configuration parameters
Number of IP addresses in the pool
Total number of assigned IP addresses.

Another useful command for NAT verification is the show run command. With this command, you can view the;
Access command lists
Interfaces and other configurations

The most common mistake in troubleshooting is not the inability to use commands but the laxity in the examination of entries and configuration.

Thursday, July 5, 2012

Cisco Catalyst 2960, 2960-S and 2960-C switches Support Your Business Needs


Cisco Catalyst 2960, 2960-C and 2960-S switchesare the leading Layer 2 edge, providing improved ease of use, highly secure business operations, improved sustainability, and a borderless network experience.Cisco Catalyst 2960 series support voice, video, data, and highly secure access. They also deliver scalable management as your business needs change.

Cisco Catalyst 2960, 2960-C and 2960-S Series Switches support:
All-in-one Communications: Data, wireless, and voice support so when you are ready to deploy these you have one network that supports all your business needs.
Intelligence: Prioritize voice traffic or data exchange so delivery of information is aligned with your business requirements.
Enhanced Security: Protect important information, keep unauthorized users off the network, and maintain uninterrupted operation.
Reliability: Take advantage of standards-based methods or FlexStack stacking for increasing dependability and rapid recovery from problems. You can also add redundant power supply for extra reliability.
Easy Configuration: Use Cisco Catalyst Smart Operations and Cisco Network Assistant to simplify set-up, upgrades, and troubleshooting.
Peace of Mind: All Catalyst 2960, 2960-C and 2960-S Series switches are protected for the life of the product by the Cisco Limited Lifetime Hardware Warranty and unlimited software updates.

Cisco Catalyst 2960, 2960-C, and 2960-S Series Switches offer outstanding switching features:
  • Data, wireless, and voice communications support so you can install a single network for all your network and communication needs
  • Offers 8-, 24- or 48-port models with optional PoE, offering up to 15W per port, to power network end-points
  • Advanced security such as, identity services and sophisticated access control to protect your critical assets
  • Redundancy and resiliency features to protect the availability of your critical applications at all times
  • Limited lifetime hardware warranty including Software updates at no additional charge

Cisco Catalyst 2960 -C Series does it all in a compact form factor:
  • Power over Ethernet pass-through, powers devices and extends your network to workspaces with limited power supply available
  • Compact size for placement in space-constrained areas
  • Fanless, silent operations, allowing the switch to blend seamlessly into the work environment
  • USB storage for file backup, distribution, and simplified operations
  • Enhanced Limited Lifetime Hardware Warranty, including next-business-day replacement and 90-day service and support

Cisco Catalyst 2960 -S Series offers all features of the 2960 plus extra connectivity options:
  • Gigabit Ethernet and 10 Gigabit Ethernet uplink flexibility offering business continuity and fast transition to 10 Gigabit Ethernet
  • Cisco FlexStack stacking allowing you to manage multiple switches using a single, common interface
  • PoE+ with up to 30W per port that allows you to support the latest PoE+ capable devices
  • USB storage for file backup, distribution, and simplified operations
Enhanced Limited Lifetime Hardware Warranty, including next-business-day replacement and 90-day service and support.

related articles:WS-C2960S-48TS-L

Tuesday, May 15, 2012

How to Create a LAN Connection Using an Ethernet Cable?

Having multiple computers at home doesn't mean you need to have multiple Internet connections. If you have a router and a few Ethernet Cisco cable, you can share an Internet connection among all your computers and even transfer files between them without having to use a CD, floppy disk or jump drive.

What you need to create a LAN connection using an Ethernet cable is Router Ethernet cables

How to Create a LAN Connection Using an Ethernet Cable? Follow these steps:
1. Insert the software disc that came with your router into your computer's CD or DVD drive. Follow the on-screen instructions to install the software.

2. Plug the AC power cable from the router to an electrical wall outlet. Connect an Ethernet cable from the port on the router that says either "WAN" or "Internet" to the outgoing port on your broadband modem.

3. Connect an Ethernet cable from the Ethernet port on the back of your computer to one of the open ports on the router.

4. Run Ethernet cables from any other open port on the router to any other computers you want to be added to the network.

5. Click on the "Start" bar at the bottom of your desktop and then choose the "Control Panel" button. Click on the link that says "Network Sharing Center" and then click on the button that says "Set up A Network Connection."

6. Check the radio box that is marked "Connect to the Internet through a gateway" and then click "Next." Type in a name for your network and then hit "Next" again. Press "Finish" to set up the network.

7. Go to the other computers on the network and navigate to the Control Panel again and then choose the Network Sharing Center. Click on "Connect to a Network" and then choose the network you set up on the first computer.

Tips & Warnings
It doesn't matter which open port you use on the router to connect an Ethernet cisco cable price to your computer, as long as you don't connect it to the "WAN" port reserved for the modem.

Keep the Ethernet cable in an area where it can't be tripped over or accidentally pulled out. Running it across the ceiling or on top of a wall using tape or a cable runner will keep the cords out of the way.

Tuesday, April 10, 2012

Cisco Router Products Feature

Cisco routers are for teleworkers, small offices, small to medium-sized businesses, and enterprise branch and head offices.
Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications.
Cisco Integrated Services Routers: Cisco 860, 880, 890, Cisco 1800 (fixed), Cisco 1800 (modular), Cisco 1900, Cisco 2800, 2900, 3800, 3900 Series
Cisco Aggregation Routers: Cisco 7200, 7301, 7304, ASR 1000, Cisco 7600, Catalyst 6500 Series
   
Cisco Integrated Services Routers: Increase the power of the network and optimize branch services on a single platform, while gaining a superior user experience.
Featured Cisco Routers: Cisco ISR G2
Cisco 3900 Series, for Medium-sized to Large Businesses and Enterprise Branch Offices
•    Delivers scalable rich-media services including TelePresence, highest density of service virtualization, and lowest TCO with energy efficiency
•    Ideal for high-end deployments requiring business continuity, WAN flexibility, superior collaboration capabilities, and investment protection
•    Field-upgradeable motherboard, circuit-speed WAN performance up to 350 Mbps with services such as security, mobility, WAN optimization, unified communications, video, and customized applications
•    3 RU modular form factor

Cisco 2900 Series, for Small- to Medium-sized and Enterprise Branch Offices
•    Provides rich-media services including TelePresence, service virtualization, and lower TCO with energy efficiency
•    Ideal for mid-range deployments requiring business agility, WAN flexibility, and secure collaboration
•    Circuit-speed WAN performance up to 75 Mbps with services such as security, mobility, WAN optimization, unified communications, video, and customized applications
•    1-2 RU modular form factor

Cisco 1900 Series, Small Offices and Small Enterprise Branch Offices
•    Entry-level secure WAN deployments, offers service virtualization, and low TCO
•    Ideal for small offices requiring modular flexibility for highly secure mobility and customizable applications
•    Circuit-speed performance up to 25 Mbps with concurrent services
•    Factory-selectable 802.11n access point and double-wide HWIC support; desktop form factor

Cisco 800 Series, for Small Offices and Teleworker Deployments
•    Provides secure WAN connectivity with desktop form factor
•    Ideal for telecommuters and small offices
•    Wire-speed performance with secure data services for xDSL, cable, and Ethernet WAN environments
•    Factory-selectable 802.11n access point, 3G WAN, and Survivable Remote Site Telephony (SRST) options

Cisco Integrated Services Routers G1:
Cisco 1800 Integrated Services Routers:
•    Designed for small to medium-sized businesses and small enterprise branch offices
•    Available in both fixed and modular configurations
•    Wire-speed performance with secure data services enabled at up to T1,E1, or xDSL rates
•    Business-class security with stateful firewall with URL filtering, VPN 3DES encryption and Advanced Encryption Standard (AES), Dynamic Multipoint VPN, IPS, and secure wireless LAN option
•    Secure WLAN option for simultaneous 802.11a and 802.11b/g operation with use of multiple antennas

Cisco 2800 Series Integrated Services Routers
•    Designed for small to medium-sized businesses and enterprise branch offices
•    Wire-speed performance up to multiple T1/E1/ xDSL rates, increased services density for security, voice, caching, video, network analysis, and L2; and switching
•    Security features include hardware-based VPN acceleration antivirus defense, IPS, and SDM support

Cisco 3800 Series Integrated Services Routers
•    Designed for medium-sized to large businesses and enterprise branch offices
•    Wire-speed performance with services enabled at up to T3/E3 rates; increased services density for security, voice, caching, video, network analysis, and L2
•    Security features include hardware-based VPN acceleration, antivirus defense through Network Admission Control, IPS, and SDM support

Cisco Aggregation Routers:Differentiate your service portfolio and increase revenues by delivering end-to-end scalable solutions and subscriber-aware services.
Cisco 7200 Series Routers
•    Application versatility supports managed network services, WAN and broadband aggregation, MPLS, VPN, QoS, and multiservice environments
•    Business-class security includes stateful inspection firewall, software and hardware VPN encryption, service-level validation features, and intrusion detection
•    Multiservice data/voice features include analog and digital voice, Survivable Remote Site Telephony, and multiservice interchange (MIX)-enabled backplane

Cisco 7600 Series Routers
•    Ideal for enterprise wide-area or metropolitan-area network aggregation or service-provider environments
•    Business-class security supports services modules including IPSec, firewall, SSL VPN, and IPS
•    Supports up to four slots for redundant supervisors and line cards; 6-, 9-, and 13-slot chassis available
•    Support for up to 12 Shared Port Adapter (SPA) bays and SPA Interface Processors (SIP) for intelligent services

Cisco ASR 1000 Series Routers
•    Ideal for service providers and enterprises seeking leading performance with compact form factor
•    Allows current and future services to be switched on instantly, at line rate, without compromising network performance or availability, using the Innovative Cisco QuantumFlow processor
•    Delivers highly secure, high-performance, and integrated software-enabled services (no service blades required), including multi-gigabit encryption, broadband, 20 and 40 Gbps firewall, Network- Based Application Recognition (NBAR), Flexible Packet Matching and session border control
•    Establishes new price and performance class for edge routers that deliver service integration for personalized, residential "any play" and complex business services
•    Provides powerful resiliency with convenient and cost-saving in-service software upgrade (ISSU) capability
•    Offers software redundancy on non-redundant hardware with ASR 1002 and ASR 1004 routers
•    Offers highly scalable, redundant hardware and 40 Gbps services and interface processors in the ASR 1006 and ASR 1013 routers

ASR 9000 Series Aggregation Services Routers
•    Offers nonstop video, enhanced scalability, and reduced carbon footprint
•    Ideal for carriers offering residential, mobile and business services
•    Scales up to 96 Tbps per system with comprehensive system redundancy
•    Offers unique service- and application-level intelligence

Cisco XR 12000/12000 Series Router
•    Extends highly secure virtualization and integral service delivery
•    Ideal for large enterprises and service providers
•    Features Cisco I-Flex (PDF - 677 KB), which prioritizes voice, video, and data services
•    Offers continuous system operation and multiservice scale