
Wednesday, December 31, 2008
IPV6 Ebooks

MPLS Ebooks

Selecting MPLS VPN Services
Selecting MPLS VPN Services helps you analyze migration options, anticipate migration issues, and properly deploy IP/MPLS VPNs. Detailed configurations illustrate effective deployment while case studies present available migration options and walk you through the process of selecting the best option for your network.
Selecting MPLS VPN Services By Chris Lewis and Steve Pickavance
By Ivan Pepelnjak, Jim Guichard, and Jeff Apcar
Understand the business case for deploying MPLS-based services and solutions
- Provides network managers and architects a precise MPLS primer
- Defines MPLS service problems and their associated solutions
- Includes ROI models for MPLS-based solutions
- Discusses pros and cons of various options for each MPLS service
MPLS
Traditional IP networks are connectionless: when a packet is received, the router determines the next hop using the destination IP address on the packet alongside information from its own forwarding table. The router's forwarding tables contain information on the network topology. They use an IP routing protocol, such as OSPF, IS-IS, BGP, RIP or static configuration, to keep their information synchronized with changes in the network.
MPLS also uses IP addresses, either v4 or v6, to identify end points and intermediate switches and routers. This makes MPLS networks IP-compatible and easily integrated with traditional IP networks. However, unlike traditional IP, MPLS flows are connection-oriented and packets are routed along pre-configured Label Switched Paths (LSPs).
How does MPLS work?
A different label is used for each hop, and it is chosen by the router or switch performing the forwarding operation. This allows the use of very fast and simple forwarding engines, as the router can select the label to minimize processing.
Ingress routers at the edge of the MPLS network use the packet's destination address to determine which LSP to use. Inside the network, the MPLS routers use only the LSP labels to forward the packet to the egress router.

In the diagram above, LSR (Label Switched Router) A uses the destination IP address on each packet to select the LSP, which determines the next hop and initial label for each packet (21 and 17). When LSR B receives the packets, it uses these labels to identify the LSPs, from which it determines the next hops (LSRs D and C) and labels (47 and 11). The egress routers (LSRs D and C) strip off the final label and route the packet out of the network.
As MPLS uses only the label to forward packets, it is protocol-independent, hence the term "Multi-Protocol" in MPLS. Packet forwarding has been defined for all types of layer-2 link technologies, with a different label encoding used in each case.
MPLS Protocols
MPLS defines only the forwarding mechanism; it uses other protocols to establish the LSPs. Two separate protocols are needed to perform this task: a routing protocol and a signaling protocol.
MPLS Routing Protocols:
The routing protocol distributes network topology information through the network so that the LSP can be calculated. An interior gateway protocol, such as OSPF or IS-IS, is normally used, as MPLS networks typically cover a single administrative domain.
Mechanisms to extend this traffic engineering to inter-area and inter-carrier routing are still being agreed. Our White Paper on "Inter-Area Routing, Path Selection and Traffic Engineering" provides a detailed discussion of this topic.
MPLS Signaling Protocols
- RSVP-TE is used where traffic engineering is required. LDP is used when traffic engineering is not required, as it needs less management.
BGP is also used as a combined routing and MPLS signaling protocol in some situations. An example of this is BGP/MPLS VPNs.
Advanced MPLS Applications:
Optical MPLS
The concept of a label has been extended in Generalized MPLS (GMPLS). In GMPLS, the label no longer needs to be carried as an identifier on the data flow, but may be implicit. For example, time-slots (in SONET/SDH) and wavelengths (in DWDM) can be labels. In these cases, the label switching operations translate to operations such as "switch this incoming wavelength onto this outgoing wavelength."
GMPLS is therefore ideal for optical networking, and many extensions to the protocols have been defined, including user-to-network interfaces and network-to-network interfaces.
MPLS in Hierarchical Networks
MPLS is ideal for hierarchical networks, where lower-layer switching entities (for example packets) are aggregated into a higher-layer entity, for example a time-slot, and then once again into a wavelength and a whole fiber. MPLS allows a label stack to be defined so that switches can switch higher-layer aggregations and ignore the lower levels of the label stack. When the flow arrives at a switch capable of handling lower-layer entities, the switch strips off the outer label and examines the next lower level in the stack.

One example of the use of label stacking is in BGP/MPLS VPNs, where a two-deep label stack is used.
A transport label is used to route aggregated VPN traffic to the destination edge router in the provider's network. This is conventional MPLS, using either RSVP-TE or LDP signaling.
Once at the destination edge router, the transport label is stripped off and the second label examined. This label identifies the specific VPN to which the flow belongs. These VPN labels are signaled in extensions to the BGP protocol.
Tuesday, December 30, 2008
CCNA 640-802 Dumps
You can pass the CCNA 640-802 certification exam by using the dumps listed below...................Please keep in mind practice makes man perfect (Labs should be practiced before taking the exams).
Pass4Sure Solutions:

Pass4Sure 640-802 version 3.22 Q-402
Pass4Sure 640-802 V 3.22 (Doubtful Question Explanation)
Pass4Sure 640-802 version 3.20 Q-394
Pass4Sure 640-802 Version 3.15 Q-347
Pass4Sure 640-802 Version 3.10 Q-254
Pass4Sure 640-802 Version 2.95 Q-254
Pass4Sure 640-802 Version 2.93 Q-254
If you have any type of missing main class error, follow the link and download JRE.
Enjoy
Cisco Router Password Recovery Procedure
-----------------------------------
Attach a terminal or PC with terminal emulation to the console port of the router. Use the following terminal settings:
9600 baud rate No parity 8 data bits 1 stop bit No flow control
Type show version and record the setting of the configuration register. Click here to see output of a show version command.
The configuration register setting is usually 0x2102 or 0x102.
Using the switch, turn off the router and then turn it on.
Press Break on the terminal keyboard within 60 seconds of the powerup to put the router into ROMMON.
If the break sequence doesn't work, try CTRL+BREAK or use the terminal program to send the break as an ascii code.
Type o/r 0x2142 at the > prompt to boot from Flash without loading the configuration.
Type i at the > prompt.
The router reboots but ignores its saved configuration.
Type no after each setup question or press Ctrl-C to skip the initial setup procedure.
Type enable at the Router> prompt.
You'll be in enable mode and see the Router# prompt.
Important Type config mem or copy start running to copy the nonvolatile RAM (NVRAM) into memory. Do not type config term.
Type wr term or show running.
The show running and wr term commands show the configuration of the router. In this configuration you see under all the interfaces the shutdown command, which means all interfaces are currently shutdown. Also, you can see the passwords either in encrypted or unencrypted format.
Type config term and make the changes.
The prompt is now hostname(config)#.
Type enable secret
Issue the no shutdown command on every interface that is used. If you issue a show ip interface brief command, every interface that you want to use should be "up up".
Type config-register 0x2102, or the value you recorded in step 2.
Press Ctrl-z to leave the configuration mode.
The prompt is now hostname#.
Type write mem or copy running startup to commit the changes.
Example of Password Recovery on a Cisco 2500
The example shown here is password recovery on a Cisco 2500.
Router>en
Password:
Password:
Password:
% Bad secrets
Router>show version
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(7)T, RELEASE SOFTWARE (fc2)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 06-Dec-99 17:10 by phanguye
Image text-base: 0x0306C4E0, data-base: 0x00001000
ROM: System Bootstrap, Version 5.2(8a), RELEASE SOFTWARE
BOOTFLASH: 3000 Bootstrap Software (IGS-RXBOOT), Version 10.2(8a), RELEASE SOFTWARE (fc1)
Router uptime is 5 minutes
System returned to ROM by power-on
System image file is "flash:/c2500-js-l.120-7.T"
cisco 2500 (68030) processor (revision D) with 8192K/2048K bytes of memory.
Processor board ID 02315272, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
1 Ethernet/IEEE 802.3 interface(s)
1 Token Ring/IEEE 802.5 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read ONLY)
Configuration register is 0x2102
Router>
!--- The router was just powercycled and during bootup a
!--- break sequence was sent to the router.
!
Abort at 0x10EA83C (PC)
>o/r 0x2142
>i
System Bootstrap, Version 5.2(8a), RELEASE SOFTWARE
Copyright (c) 1986-1995 by cisco Systems
2500 processor with 8192 Kbytes of main memory
F3: 13626872+197596+780568 at 0x3000060
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(7)T, RELEASE SOFTWARE (fc2)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 06-Dec-99 17:10 by phanguye
Image text-base: 0x0306C4E0, data-base: 0x00001000
cisco 2500 (68030) processor (revision D) with 8192K/2048K bytes of memory.
Processor board ID 02315272, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
1 Ethernet/IEEE 802.3 interface(s)
1 Token Ring/IEEE 802.5 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read ONLY)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]:
!--- Ctrl-C pressed
!
Press RETURN to get started!
00:00:08: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
00:00:08: %LINK-3-UPDOWN: Interface Serial0, changed state to up
00:00:08: %LINK-3-UPDOWN: Interface Serial1, changed state to up
00:00:09: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up
00:00:09: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
00:01:29: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
00:01:29: %LINK-3-UPDOWN: Interface Ethernet0Translating "Router"...domain server (255.255.255.255)
, changed state to up
00:01:30: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
00:01:31: %SYS-5-RESTART: System restarted --
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(7)T, RELEASE SOFTWARE (fc2)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 06-Dec-99 17:10 by phanguye
00:01:32: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to down
00:01:33: %LINK-5-CHANGED: Interface Ethernet0, changed state to administratively down
00:01:33: %LINK-5-CHANGED: Interface Serial0, changed state to administratively down
00:01:33: %LINK-5-CHANGED: Interface Serial1, changed state to administratively down
00:01:33: %LINK-5-CHANGED: Interface TokenRing0, changed state to administratively down
00:01:34: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to down
00:01:34: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to down
00:01:34: %LINEPROTO-5-UPDOWN: Line protocol on Interface TokenRing0, changed state to down
Router>en
Router#copy start run
Destination filename [running-config]?
1278 bytes copied in 10.448 secs (127 bytes/sec)
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#enable secret Cisco
Router(config)#int e0
Router(config-if)#no shut
*Mar 1 00:04:12.863: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
*Mar 1 00:04:13.947: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
Router(config-if)#int s0
Router(config-if)#no shut
*Mar 1 00:04:18.107: %LINK-3-UPDOWN: Interface Serial0, changed state to up
*Mar 1 00:04:19.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up
Router(config-if)#int s1
Router(config-if)#no shut
Router(config-if)#
*Mar 1 00:04:27.055: %LINK-3-UPDOWN: Interface Serial1, changed state to up
*Mar 1 00:04:28.071: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
Router(config-if)#exit
Router(config)#config-register 0x2102
Router(config)#^Z
Router#wr mem
*Mar 1 00:05:09.035: %SYS-5-CONFIG_I: Configured from console by console
Building configuration...
[OK]
Router#
Router#
Disclaimer: The customer acknowledges that the examples provided in this document are solely for illustrative purposes. Further, the customer both understands and agrees that the information in the examples may need to be modified to assure proper functioning on his/her own computer system(s).
Verio is not liable for any negative consequences arising from the improper use or modification of the provided examples.
Wednesday, December 17, 2008
CCDA Study Material

Download Link:
CCDA Study Material
(thanks)
CIPT Dumps
Title: Implementing Cisco Unified Communications Manager Part 1 CIPT-1 V6.0
Actual Test Updated on: 15-10-2008
Exam: 642-456
Title: Implementing Cisco Unified Communications Manager Part 2 CIPT-1 V6.0
Actual Test Updated on: 21-07-2008
Download Links:
CIPT Part1
CIPT Part2
Friday, December 12, 2008
CCNA LABs
Download link:
P4S CCNA Preparation Labs
EIGRP (New):
After adding RTR_2 router, no routing updates are being exchanged between RTR_1 and the new location. All other inter connectivity and internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.
Access to the router CLI can be gained by clicking on the appropriate host.
All passwords on all routers are cisco.
interface FastEthernet0/1
- Wrong AS (EIGRP 22) provided at RTR_2 (New router),
- RTR_1 does not advertise the new network between RTR_1 and RTR_2 into EIGRP.
RTR_2(config-router)#network 192.168.60.0
Friday, December 5, 2008
CCNP Labs
Download Links
-----------------------
BSCI LABs
BCMSN LABs
ISCW LABs
ONT LABs
--------------------------
(thanks)
Wednesday, December 3, 2008
CCNA 640-802 Study Material
The first step in general Cisco Career Certifications begins either with CCENT as an interim step to Associate level, or directly with CCNA for network operations or CCDA for network design. Think of the Associate level as the apprentice or foundation level of networking certification.

CCENT
CCNA
CCDA
CCNA Voice
CCNA Wireless
CCNA Security
Study Material
ICND1 (640-822)
ICND2 (640-816)
CCNA Portable Command Guide 2008
CCNA 640-802: Sybex Study Guide 6th Edition
Monday, December 1, 2008
CCNP CBTs
CBT Nuggets Exam-Pack: 642-901 BSCI (Building Scalable Cisco Internetworks) :
BCMSN is all about deploying, managing, and optimizing Cisco switches. You'll learn the role of switches in your Cisco network, including smart network design for today's networking needs. Major topics in this series include VLANs, STP, Ether Channel, Layer 3 Switching, Redundancy, Wireless LANs, Campus VoIP, and Campus Security.
Download Links
In the ISCW series you'll learn how to create and manage secure, robust remote access solutions. In today's world of frequent telecommuting and distant offices throughout the globe, this topic is getting bigger than ever. Major topics you'll learn include understanding WAN technologies, Multiprotocol Label Switching, configuring IPSec VPNs, and securing your network.
CBT Nuggets Exam-Pack: 642-845 ONT (Optimizing Converged Cisco Networks)