ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Cisco IOS Interface Configuration Guide

kraft_061220 de Febrero de 2012

3.347 Palabras (14 Páginas)651 Visitas

Página 1 de 14

IC-169

Cisco IOS Interface Configuration Guide

Configuring Logical Interfaces

Use the information in this chapter to understand and configure the types of logical, or virtual, interfaces

supported on Cisco routers and access servers. This chapter includes the following sections:

• Configuring a Loopback Interface

• Configuring a Null Interface

• Configuring a Tunnel Interface

For examples of configuration tasks, see the “Logical Interface Configuration Examples” section.

For hardware technical descriptions and information about installing interfaces, refer to the hardware

installation and configuration publication for your product. For complete descriptions of the logical

interface commands, refer to the “Interface Commands” chapter of the Cisco IOS Interface Command

Reference. To locate documentation of other commands that appear in this chapter, use the command

reference master index or search online.

To identify the hardware platform or software image information associated with a feature, use the

Feature Navigator on Cisco.com to search for information about the feature or refer to the software

release notes for a specific release. For more information, see the Identifying Supported Platforms in

“Using Cisco IOS Software.”

Configuring a Loopback Interface

You can specify a software-only interface called a loopback interface to emulate an interface. Loopback

interfaces are supported on all platforms. A loopback interface is a virtual interface that is always up and

allows Border Gateway Protocol (BGP) and remote source-route bridging (RSRB) sessions to stay up

even if the outbound interface is down.

You can use the loopback interface as the termination address for BGP sessions, for RSRB connections,

or to establish a Telnet session from the device’s console to its auxiliary port when all other interfaces

are down. You can also use a loopback interface to configure IPX-PPP on asynchronous interfaces. To

do so, you must associate an asynchronous interface with a loopback interface configured to run IPX. In

applications in which other routers or access servers attempt to reach this loopback interface, you should

configure a routing protocol to distribute the subnet assigned to the loopback address.

Packets routed to the loopback interface are rerouted back to the router or access server and processed

locally. IP packets routed out the loopback interface but not destined to the loopback interface are

dropped. This means that the loopback interface serves as the Null 0 interface also.

Configuring Logical Interfaces

Configuring a Null Interface

IC-170

Cisco IOS Interface Configuration Guide

Note Loopback does not work on an X.21 DTE because the X.21 interface definition does not include a

loopback definition.

To specify a loopback interface and enter interface configuration mode, use one of the following

commands in global configuration mode:

For more general information about loopback interfaces, see the “Running Interface Loopback

Diagnostics” section in the “Features for Any Interface” chapter.

Configuring a Null Interface

The Cisco IOS software supports a “null” interface. This pseudo-interface functions similarly to the null

devices available on most operating systems. This interface is always up and can never forward or

receive traffic; encapsulation always fails. The only interface configuration command that you can

specify for the null interface is no ip unreachables.

The null interface provides an alternative method of filtering traffic. You can avoid the overhead involved

with using access lists by directing undesired network traffic to the null interface.

To specify the null interface, use the following command in global configuration mode:

Specify null 0 (or null0) as the interface type and number. The null interface can be used in any command

that has an interface type as an argument. The following example configures a null interface for IP route

127.0.0.0:

ip route 127.0.0.0 255.0.0.0 null 0

Configuring a Tunnel Interface

Tunneling provides a way to encapsulate arbitrary packets inside a transport protocol. This feature is

implemented as a virtual interface to provide a simple interface for configuration. The tunnel interface

is not tied to specific “passenger” or “transport” protocols, but rather, it is an architecture that is designed

to provide the services necessary to implement any standard point-to-point encapsulation scheme.

Because tunnels are point-to-point links, you must configure a separate tunnel for each link.

Command Purpose

Router(config)# interface loopback number Enters interface configuration.

Router(config)# interface loopback

slot/port

Enters interface configuration for Cisco 7200 series or Cisco 7500

series routers.

Router(config)# interface loopback

slot/port-adapter/port

Enters interface configuration for Cisco 7500 series routers.

Command Purpose

Router(config)# interface null 0 Enters interface configuration.

Configuring Logical Interfaces

Configuring a Tunnel Interface

IC-171

Cisco IOS Interface Configuration Guide

Tunneling has the following three primary components:

• Passenger protocol, which is the protocol that you are encapsulating (AppleTalk, Banyan VINES,

CLNS, DECnet, IP, or IPX)

• Carrier protocol, which is one of the following encapsulation protocols:

– Generic route encapsulation (GRE), Cisco’s multiprotocol carrier protocol

– Cayman, a proprietary protocol for AppleTalk over IP

– EON, a standard for carrying CLNP over IP networks

– NOS, IP over IP compatible with the popular KA9Q program

– Distance Vector Multicast Routing Protocol (DVMRP) (IP in IP tunnels)

• Transport protocol, which is the protocol used to carry the encapsulated protocol (IP only)

Figure 22 illustrates IP tunneling terminology and concepts.

Figure 22 IP Tunneling Terminology and Concepts

To understand the process of tunneling, consider connecting two AppleTalk networks with a

non-AppleTalk backbone, such as IP. The relatively high bandwidth consumed by the broadcasting of

Routing Table Maintenance Protocol (RTMP) data packets can severely hamper the backbone’s network

performance. This problem can be solved by tunneling AppleTalk through a foreign protocol, such as IP.

Tunneling encapsulates an AppleTalk packet inside the foreign protocol packet, which is then sent across

the backbone to a destination router. The destination router then removes the encapsulation from the

AppleTalk packet and, if necessary, routes the packet to a normal AppleTalk network. Because the

encapsulated AppleTalk packet is sent in a directed manner to a remote IP address, bandwidth usage is

greatly reduced. Furthermore, the encapsulated packet benefits from any features normally enjoyed by

IP packets, including default routes and load balancing.

802.3 802.2 CLNP TP4 VT

Ethernet IP GRE CLNP TP4 VT

Normal packet

Tunnel packet

Passenger protocol

Encapsulation protocol

Transport protocol

S1535a

Configuring Logical Interfaces

Configuring a Tunnel Interface

IC-172

Cisco IOS Interface Configuration Guide

Advantages of Tunneling

The following are several situations in which encapsulating traffic in another protocol is useful:

• To provide multiprotocol local networks over a single-protocol backbone.

• To provide workarounds for networks containing protocols that have limited hop counts;

for example, AppleTalk (see Figure 23).

• To connect discontinuous subnetworks.

• To allow virtual private networks across WANs.

Figure 23 Providing Workarounds for Networks with Limited Hop Counts

Special Considerations for Configuring Tunnel Interfaces

The following are considerations and precautions to observe when you configure tunneling:

• Encapsulation and the removal of encapsulation at the tunnel end points are slow operations; in

general, only processor switching is supported. However, fast switching of GRE tunnels was

introduced in Cisco IOS Release 11.1 for the Cisco 2500 series and the Cisco 4000 series of routers.

• Consider security and topology issues. Be careful not to violate access control lists. You can

configure a tunnel with a source and destination that are not restricted by firewall routers.

• Tunneling might create problems with transport protocols that have limited timers (for example,

DECnet) because of increased latency.

• Be aware of the environments across which you create tunnels. You might be tunneling across fast

FDDI rings or through slow 9600-bps phone lines; some passenger protocols function poorly in

mixed media networks.

• Multiple point-to-point tunnels can saturate the physical link with routing information.

S2299

If the path between two computers has more than 15 hops, they cannot communicate with each other,

but it is possible to hide some of the hops inside

...

Descargar como (para miembros actualizados) txt (26 Kb)
Leer 13 páginas más »
Disponible sólo en Clubensayos.com