The IP Services section introduces essential networking functions that enhance IP-based communication.
DHCP is a protocol that automates the assignment of network configurations such as:
www.google.com) into IP addresses.Without DHCP:
With DHCP:
The DHCP process consists of four key steps, often remembered as DORA:
Discover:
Offer:
192.168.1.10."Request:
192.168.1.10."Acknowledge:
192.168.1.10."Let’s walk through a DHCP configuration example on a Cisco router.
Scenario:
192.168.1.11 - 192.168.1.254.192.168.1.1.8.8.8.8.Configuration Steps:
Exclude Certain IPs:
Reserve specific IPs (e.g., for the router or servers):
ip dhcp excluded-address 192.168.1.1 192.168.1.10
Create a DHCP Pool:
Define the range of assignable IP addresses:
ip dhcp pool MY_POOL
network 192.168.1.0 255.255.255.0
Set the Default Gateway:
Specify the router’s IP as the gateway:
default-router 192.168.1.1
Specify the DNS Server:
Provide a DNS server for name resolution:
dns-server 8.8.8.8
Verify the DHCP Configuration:
Check active leases:
show ip dhcp binding
Display DHCP statistics:
show ip dhcp pool
Setting Lease Time:
Configure how long a device can keep its assigned IP:
lease 1 12
DHCP Relay:
Used when the DHCP server is on a different subnet.
Enable DHCP relay on the router:
interface GigabitEthernet0/1
ip helper-address 192.168.2.1
NAT translates private IP addresses (used within a local network) into public IP addresses (used for internet communication). It’s essential for conserving public IP addresses and hiding internal network details.
Private IPs Are Not Routable:
192.168.x.x) cannot directly communicate with the internet.Public IP Conservation:
Enhanced Security:
Static NAT:
192.168.1.10 → Public: 203.0.113.10.Dynamic NAT:
203.0.113.10 - 203.0.113.20.PAT (Port Address Translation):
192.168.1.10:12345 → 203.0.113.10:54321.Static NAT:
Map a private IP to a public IP:
ip nat inside source static 192.168.1.10 203.0.113.10
Dynamic NAT:
Define a pool of public IPs:
ip nat pool MY_POOL 203.0.113.10 203.0.113.20 netmask 255.255.255.0
Specify which private IPs can use the pool:
access-list 1 permit 192.168.1.0 0.0.0.255
ip nat inside source list 1 pool MY_POOL
PAT:
Configure PAT to use a single public IP:
ip nat inside source list 1 interface GigabitEthernet0/1 overload
Show active translations:
show ip nat translations
Display NAT statistics:
show ip nat statistics
An Access Control List (ACL) is a set of rules applied to a network interface to allow or deny specific traffic. These rules filter traffic based on criteria such as:
Standard ACLs:
Extended ACLs:
Standard ACL Example:
Permit traffic from 192.168.1.0/24:
access-list 10 permit 192.168.1.0 0.0.0.255
Apply the ACL to an interface:
interface GigabitEthernet0/0
ip access-group 10 in
Extended ACL Example:
Permit HTTP traffic from 192.168.1.0/24 to 192.168.2.0/24:
access-list 100 permit tcp 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 80
Apply the ACL:
interface GigabitEthernet0/1
ip access-group 100 in
Named ACLs:
Create a named ACL for better manageability:
ip access-list extended WEB_FILTER
permit tcp 192.168.1.0 0.0.0.255 any eq 80
deny tcp any any
Apply the named ACL:
interface GigabitEthernet0/2
ip access-group WEB_FILTER in
Display all configured ACLs:
show access-lists
Check which ACL is applied to an interface:
show running-config | include access-group
QoS manages network bandwidth by prioritizing traffic to ensure critical services (e.g., voice, video) receive sufficient resources. This prevents issues like jitter, latency, and packet loss in real-time applications.
Classification:
Marking:
Queueing and Scheduling:
Traffic Shaping and Policing:
Classification and Marking:
Identify and mark VoIP traffic:
class-map VOIP
match protocol rtp
policy-map VOIP_POLICY
class VOIP
set dscp ef
Queueing and Scheduling:
Prioritize voice traffic:
policy-map PRIORITY_POLICY
class VOIP
priority 1000
Apply the policy to an interface:
interface GigabitEthernet0/0
service-policy output PRIORITY_POLICY
Traffic Shaping:
Limit traffic to 1 Mbps:
policy-map SHAPE_POLICY
class WEB
shape average 1000000
Traffic Policing:
Drop packets exceeding 500 Kbps:
policy-map POLICE_POLICY
class WEB
police 500000 conform-action transmit exceed-action drop
Check QoS policies applied to an interface:
show policy-map interface GigabitEthernet0/0
View DSCP markings:
show running-config | include dscp
| Feature | Purpose | Key Concepts | Configuration Example |
|---|---|---|---|
| DHCP | Automates IP assignment for devices. | - DORA process: Discover, Offer, Request, Acknowledge.- Assigns IP, subnet mask, gateway, DNS server. | plaintext<br>ip dhcp pool MY_POOL<br>network 192.168.1.0 255.255.255.0<br>default-router 192.168.1.1<br>dns-server 8.8.8.8 |
| NAT (Network Address Translation) | Translates private IPs to public IPs for internet access. | - Types: Static NAT, Dynamic NAT, PAT.- Conserves public IPs, adds security. | plaintext<br>ip nat inside source static 192.168.1.10 203.0.113.10<br>ip nat inside source list 1 pool MY_POOL |
| ACLs (Access Control Lists) | Filters traffic based on IP, port, or protocol. | - Types: Standard ACLs (source IP), Extended ACLs (source/destination IP, port, protocol). | plaintext<br>access-list 10 permit 192.168.1.0 0.0.0.255<br>ip access-group 10 in |
| QoS (Quality of Service) | Prioritizes important traffic to ensure smooth performance. | - Mechanisms: Classification, Marking (DSCP), Queueing, Shaping, Policing.- Ensures voice/video priority. | plaintext<br>policy-map PRIORITY_POLICY<br>class VOICE<br>priority 1000<br>service-policy output PRIORITY_POLICY |
DHCP Snooping is a Layer 2 security feature that protects the network from rogue DHCP servers distributing unauthorized IP addresses.
Differentiates between trusted (e.g., uplinks to legitimate DHCP servers) and untrusted ports (e.g., user ports).
Drops DHCP responses from untrusted sources.
Maintains a DHCP binding table that records MAC, IP, lease time, and interface.
ip dhcp snooping
ip dhcp snooping vlan 10
interface GigabitEthernet0/1
ip dhcp snooping trust
The DHCP lease process includes two key renewal stages:
T1 Timer (50% of lease time): Client attempts renewal with original DHCP server.
T2 Timer (87.5% of lease time): If T1 fails, client broadcasts to any DHCP server.
Use Case in Exams: Identify when a client will attempt to contact other servers after initial renewal fails.
DHCP Starvation Attack: Flooding the DHCP server with fake requests to exhaust IP addresses.
MAC/IP Spoofing: Pretending to be another device to get a specific lease or access control.
Countermeasures:
DHCP Snooping + Port Security (limit MAC addresses per port)
Rate limiting on untrusted interfaces
In IPv6, DHCP has two modes:
Stateful DHCPv6: Similar to IPv4; server assigns full address and info.
Stateless DHCPv6: Devices generate their own IPs using SLAAC, and DHCP only provides extra info (e.g., DNS).
Router Advertisement controls which mode is used.
When configuring NAT, you must define traffic direction:
interface GigabitEthernet0/0
ip nat inside
interface GigabitEthernet0/1
ip nat outside
This tells the router which interface faces the private and which faces the public network.
PAT (Port Address Translation) = NAT Overload
Allows multiple private IPs to share a single public IP.
Distinguishes sessions using port numbers.
Example:
ip nat inside source list 1 interface GigabitEthernet0/1 overload
NAT modifies IP headers, which may break IPsec VPN tunnels by altering authenticated data.
Solution: Use NAT Traversal (NAT-T), which encapsulates IPsec in UDP packets to preserve integrity.
Exposes an internal service (e.g., web server) to the internet.
Example:
ip nat inside source static tcp 192.168.1.100 80 interface GigabitEthernet0/1 8080
This maps external port 8080 to internal server at 192.168.1.100:80.
All ACLs end with an invisible deny all rule, meaning:
deny ip any any
If no permit rule matches, traffic is denied by default — a common exam trick.
ACLs cannot inspect encrypted payloads (e.g., VPN or SSL/TLS content), as they match on IPs, ports, and protocols — not application data.
Standard ACLs: Place close to the destination (filters only by source IP).
Extended ACLs: Place close to the source (filters by source, destination, and port).
To block HTTP from 192.168.1.0/24 to 10.0.0.0/24:
access-list 100 deny tcp 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255 eq 80
Apply inbound on a source-facing interface to avoid wasting bandwidth.
Restrict Telnet/SSH access to specific hosts:
line vty 0 4
access-class 10 in
priority:
Assigns strict priority queue
Ideal for voice (VoIP)
Risk: starving other queues
bandwidth:
Allocates guaranteed bandwidth
Used for less time-sensitive traffic
Example Use:
class-map VOICE
match ip dscp ef
policy-map QOS_POLICY
class VOICE
priority 1000
class OTHER
bandwidth 2000
EF (Expedited Forwarding): dscp ef – Used for VoIP (High priority)
AF (Assured Forwarding): e.g., af31 – Used for video or business-critical data
BE (Best Effort): Default traffic with no priority
Handling mixed traffic types in a single policy:
class-map VOICE
match ip dscp ef
class-map WEB
match protocol http
policy-map ENTERPRISE_POLICY
class VOICE
priority 1000
class WEB
bandwidth 500
class class-default
fair-queue
This shows how different traffic is classified and shaped — typical on exams.
Command:
show policy-map interface GigabitEthernet0/0
Key Fields:
Matched Packets/Bytes: Indicates traffic volume
Drops: Congestion or policing effects
Rate: Current bandwidth usage
DHCP Snooping secures DHCP from rogue servers
PAT = NAT Overload, mapping multiple devices to one public IP
ACLs obey "implicit deny all" — crucial to remember
QoS uses priority for VoIP, bandwidth for general traffic
DSCP values must be matched correctly to traffic types
access-class restricts management access, not just data plane
Which NAT type permanently maps a private IP address to a single public IP address?
Static NAT.
Static NAT creates a fixed one-to-one mapping between a private internal IP address and a public external IP address. This mapping remains constant and is commonly used when an internal server must be reachable from the internet. Because the translation never changes, external hosts can consistently reach the internal device using the assigned public address. Static NAT differs from dynamic NAT or PAT, which allocate addresses temporarily from a pool when connections are initiated.
Demand Score: 78
Exam Relevance Score: 90
What is the primary function of DHCP relay in a routed network?
Forward DHCP broadcast requests to a DHCP server on another network.
DHCP clients initially send broadcast messages to locate a DHCP server. However, routers do not forward broadcast traffic by default. DHCP relay solves this problem by intercepting the broadcast request and forwarding it as a unicast message to a specified DHCP server on another subnet. This allows a centralized DHCP server to provide IP address assignments for multiple networks without requiring a separate server on every subnet.
Demand Score: 71
Exam Relevance Score: 88
Which protocol synchronizes time across network devices to ensure consistent timestamps in logs?
Network Time Protocol (NTP).
Network Time Protocol allows devices to synchronize their system clocks with reliable time sources. Accurate time is essential for log correlation, security auditing, and troubleshooting network events. In Cisco networks, devices can operate as NTP clients or servers. Clients request time updates from upstream servers and adjust their clocks gradually to avoid sudden time changes that could disrupt processes or logs.
Demand Score: 65
Exam Relevance Score: 85