Chapter 1 Routing Services 1
Complex Enterprise Network Frameworks, Architectures, and Models 1
Traffic Conditions in a Converged Network 1
Cisco IIN and SONA Framework 3
Cisco IIN 3
Cisco SONA Framework 4
Cisco Network Models 6
Cisco Enterprise Architecture 6
Cisco Hierarchical Network Model 8
Cisco Enterprise Composite Network Model 9
Creating, Documenting, and Executing an Implementation Plan 13
Approaches to Creating an Implementation Plan 14
Creating an Implementation Plan 15
Implementation Plan Documentation 17
Implementation Plan Example 18
Example Network Scenario 18
Example Network Requirements 18
Example Network Implementation Plan 19
Reviewing IP Routing Principles 21
IP Routing Overview 22
Principles of Static Routing 22
Principles of Dynamic Routing 26
Principles of On-Demand Routing 28
Characteristics of Routing Protocols 30
Distance Vector, Link-State, and Advanced Distance Vector
Routing Protocols 30
Classful Routing Protocol Concepts 31
Classless Routing Protocol Concepts 35
RIPv2 and EIGRP Automatic Network-Boundary Summarization 35
RIP 38
Characteristics of RIPv1 38
Characteristics of RIPv2 38
RIP Configuration Commands 39
Populating the Routing Table 41
Administrative Distance 41
Routing Protocol Metrics 43
Criteria for Inserting Routes into the IP Routing Table 45
Floating Static Routes 45
IP Routing Protocol Comparisons 46
Routing and Routing Protocols Within the Enterprise Composite
Network Model 48
Summary 49
Review Questions 51
Chapter 2 Configuring the Enhanced Interior Gateway Routing Protocol 57
Understanding EIGRP Terminology and Operation 58
EIGRP Capabilities and Attributes 58
EIGRP Terminology 61
EIGRP Operation 63
Populating EIGRP Tables 63
EIGRP Packets 65
EIGRP Neighbors 67
Initial Route Discovery 69
DUAL 71
Advertised Distance and Feasible Distance 71
Successor and Feasible Successor 72
DUAL Example 75
EIGRP Metric Calculation 80
Planning EIGRP Routing Implementations 83
Configuring and Verifying EIGRP 84
Planning and Configuring Basic EIGRP 85
Planning for Basic EIGRP 85
Basic EIGRP Configuration 86
Basic Configuration Example 88
Another Basic EIGRP Configuration Example 89
Verifying EIGRP Operation 90
Verifying EIGRP Neighbors 93
Verifying EIGRP Routes 94
Verifying EIGRP Operations 96
Using the passive-interface Command with EIGRP 104
Propagating an EIGRP Default Route 107
EIGRP Route Summarization 109
Configuring Manual Route Summarization 110
Verifying Manual Route Summarization 112
Configuring and Verifying EIGRP in an Enterprise WAN 113
EIGRP over Frame Relay and on a Physical Interface 113
Frame Relay Overview 113
EIGRP on a Physical Frame Relay Interface with
Dynamic Mapping 114
EIGRP on a Frame Relay Physical Interface with Static Mapping 116
EIGRP over Frame Relay Multipoint Subinterfaces 118
Frame Relay Multipoint Subinterfaces 118
EIGRP over Multipoint Subinterfaces 119
EIGRP Unicast Neighbors 121
EIGRP over Frame Relay Point-to-Point Subinterfaces 123
Frame Relay Point-to-Point Subinterfaces 123
EIGRP on Frame Relay Point-to-Point Subinterfaces 123
EIGRP over MPLS 125
MPLS 125
MPLS Operation 126
Service Provider Offerings 127
Layer 2 and Layer 3 MPLS VPN Solutions 128
Layer 3 MPLS VPNs 128
Layer 2 MPLS VPNs 132
EIGRP Load Balancing 134
EIGRP Equal-Cost Load Balancing 134
EIGRP Unequal-Cost Load Balancing 136
EIGRP Bandwidth Use Across WAN Links 139
EIGRP Link Utilization 139
Examples of EIGRP on WANs 140
Configuring and Verifying EIGRP Authentication 144
Router Authentication 144
Simple Authentication Versus MD5 Authentication 144
MD5 Authentication for EIGRP 146
Planning for EIGRP Authentication 147
Configuring EIGRP MD5 Authentication 147
MD5 Authentication Configuration Example 148
Verifying MD5 Authentication for EIGRP 152
EIGRP MD5 Authentication Verification 153
Troubleshooting MD5 Authentication 154
Optimizing EIGRP Implementations 156
EIGRP Scalability in Large Networks 156
EIGRP Queries and Stuck-in-Active 158
Stuck-in-Active Connections in EIGRP 158
Preventing SIA Connections 160
EIGRP Query Range 161
Limiting the EIGRP Query Range 164
Graceful Shutdown 173
Summary 174
References 179
Review Questions 179
Chapter 3 Configuring the Open Shortest Path First Protocol 185
Understanding OSPF Terminology and Operation 186
Link-State Routing Protocols 186
OSPF Area Structure 188
OSPF Areas 191
Area Terminology 192
OSPF Adjacencies 193
OSPF Metric Calculation 195
Link-State Data Structures 196
OSPF Packets 197
Establishing OSPF Neighbor Adjacencies: Hello 199
Exchange Process and OSPF Neighbor Adjacency States 201
OSPF Neighbor States 204
Maintaining Routing Information 205
OSPF Link-State Sequence Numbers 207
Verifying Packet Flow 208
Configuring and Verifying Basic OSPF Routing 209
Planning and Configuring OSPF 209
Planning OSPF Routing Implementations 209
Configuring Basic OSPF 211
Single-Area OSPF Configuration Example 212
Multiarea OSPF Configuration Example 213
OSPF Router ID 214
Loopback Interfaces 215
OSPF router-id Command 215
Verifying the OSPF Router ID 216
Verifying OSPF Operations 217
The show ip ospf interface Command 218
The show ip ospf neighbor Command 219
The show ip route ospf Command 221
The show ip protocols Command 221
The debug ip ospf events Command 222
Understanding OSPF Network Types 222
Types of OSPF Networks 222
Electing a DR and BDR and Setting Priority 223
Adjacency Behavior for a Point-to-Point Link 224
Adjacency Behavior for a Broadcast Network 224
Adjacency Behavior over a Layer 2 MPLS VPN 225
Adjacency Behavior over a Layer 3 MPLS VPN 226
Adjacency Behavior for an NBMA Network 227
DR Election in an NBMA Topology 228
OSPF over Frame Relay Topology Options 228
OSPF over NBMA Topology Modes of Operation 229
Selecting the OSPF Network Type for NBMA Networks 229
OSPF Configuration in Cisco Broadcast Mode 231
OSPF Nonbroadcast Mode Configuration 231
OSPF Configuration in Point-to-Multipoint Mode 233
OSPF Configuration in Cisco Point-to-Multipoint
Nonbroadcast Mode 236
Using Subinterfaces in OSPF over Frame Relay Configuration 236
OSPF Configuration in Cisco Point-to-Point Mode 239
OSPF over NBMA Modes of Operation Summary 240
Displaying OSPF Adjacency Activity 241
Understanding OSPF LSAs 244
LSA Type 1: Router LSA 246
LSA Type 2: Network LSA 247
LSA Type 3: Summary LSA 247
LSA Type 4: Summary LSA 248
LSA Type 5: External LSA 249
Example OSPF LSAs in a Network 250
Interpreting the OSPF LSDB and Routing Table 250
OSPF LSDB 250
OSPF Routing Table and Types of Routes 254
Calculating the Costs of E1 and E2 Routes 255
Configuring OSPF LSDB Overload Protection 256
Configuring and Verifying Advanced OSPF Features 258
Using the passive-interface Command with OSPF 258
Propagating an OSPF Default Route 260
Configuring OSPF Route Summarization 263
Configuring Inter-area OSPF Route Summarization on an ABR 265
Interarea Route Summarization Configuration Example
on an ABR 266
Configuring External OSPF Route Summarization on an ASBR 267
External Route Summarization Configuration Example
on an ASBR 268
OSPF Virtual Links 269
Configuring OSPF Virtual Links 270
Verifying OSPF Virtual Link Operation 272
OSPF LSDB for Virtual Links 275
Changing the Cost Metric 278
Configuring OSPF Special Area Types 279
Configuring Stub Areas 281
Configuring Totally Stubby Areas 284
Interpreting Routing Tables in Different Types of OSPF Areas 286
Configuring NSSAs 289
Configuring Totally Stubby NSSAs 294
Example OSPF Area Types in a Network 295
Verifying All Area Types 296
Configuring and Verifying OSPF Authentication 297
Planning for OSPF Authentication 297
Configuring, Verifying, and Troubleshooting OSPF Simple Password
Authentication 297
Configuring OSPF Simple Password Authentication 297
Simple Password Authentication Example 299
Verifying Simple Password Authentication 300
Troubleshooting Simple Password Authentication 301
Configuring OSPF Simple Password Authentication for Virtual Links 304
Configuring, Verifying, and Troubleshooting MD5 Authentication 305
Configuring OSPF MD5 Authentication 305
MD5 Authentication Example 307
Verifying MD5 Authentication 308
Troubleshooting MD5 Authentication 309
Summary 311
References 314
Review Questions 315
Chapter 4 Manipulating Routing Updates 325
Assessing Network Routing Performance Issues 326
Routing Protocol Performance Issues 326
Routing Protocol Performance Solutions 327
Using Multiple IP Routing Protocols on a Network 329
Understanding a Network with Complex Routing 329
Understanding Route Redistribution 330
Redistribution Overview 330
Redistributed Routes 332
Redistribution Implementation Considerations 334
Selecting the Best Route in a Redistribution Environment 335
Redistribution Techniques 338
One-Point Redistribution 339
Multipoint Redistribution 340
Preventing Routing Loops in a Redistribution Environment 342
Implementing Route Redistribution 344
Configuring Route Redistribution 344
Redistributing into RIP 346
Redistributing into OSPF 347
Redistributing into EIGRP 350
The default-metric Command 352
The passive-interface Command 353
Route Redistribution Example 355
Using Administrative Distance to Influence
the Route-Selection Process 358
Selecting Routes with Administrative Distance 358
Modifying Administrative Distance 361
Redistribution Using Administrative Distance Example 363
Verifying Redistribution Operation 369
Controlling Routing Update Traffic 370
Static and Default Routes 371
Using Route Maps 373
Route Map Applications 373
Understanding Route Maps 374
Configuring Route Maps to Control Routing Updates 376
Configuring Route Maps for Policy Based Routing 377
Configuring Route Redistribution Using Route Maps 379
Using Route Maps with Redistribution 380
Using Route Maps to Avoid Route Feedback 381
Using Route Maps with Tags 382
Using Route Maps with Redistribution and Tags 382
Using Distribute Lists 384
Configuring Distribute Lists to Control Routing Updates 386
Controlling Redistribution with Distribute Lists 389
Using Prefix Lists 390
Prefix List Characteristics 390
Filtering with Prefix Lists 391
Configuring Prefix Lists 391
Verifying Prefix Lists 397
Using Multiple Methods to Control Routing Updates 398
Comprehensive Example of Controlling Routing Updates 398
Summary 412
References 415
Review Questions 416
Chapter 5 Implementing Path Control 419
Understanding Path Control 419
Assessing Path Control Network Performance 419
Path Control Tools 421
Implementing Path Control Using Offset Lists 424
Using Offset Lists to Control Path Selection 424
Configuring Path Control Using Offset Lists 424
Verifying Path Control Using Offset Lists 426
Implementing Path Control Using Cisco IOS IP SLAs 426
Using Cisco IOS IP SLAs to Control Path Selection 427
Cisco IOS IP SLAs Operation 429
Cisco IOS IP SLAs Sources and Responders 429
Cisco IOS IP SLAs Operations 430
Cisco IOS IP SLAs Operation with Responders 430
Cisco IOS IP SLAs with Responder Time Stamps 432
Configuring Path Control Using IOS IP SLAs 432
Configuring Cisco IOS IP SLAs Operations 433
Configuring Cisco IOS IP SLAs Tracking Objects 436
Configuring the Action Associated with the Tracking Object 436
Verifying Path Control Using IOS IP SLAs 437
Examples of Path Control Using Cisco IOS IP SLAs 438
Tracking Reachability to Two ISPs 438
Tracking DNS Server Reachability in the Two ISPs 440
Implementing Path Control Using Policy-Based Routing 446
Using PBR to Control Path Selection 447
Configuring PBR 448
PBR match Commands 448
PBR set Commands 449
Configuring PBR on an Interface 452
Verifying PBR 454
PBR Examples 454
Using PBR When Connecting Two ISPs 454
Using PBR Based on Source Address 457
Alternative Solution IP SLAs Configuration Example Using PBR 459
Advanced Path Control Tools 460
Cisco IOS Optimized Edge Routing 460
Virtualization 461
Cisco Wide Area Application Services 462
Summary 463
References 467
Review Questions 467
Chapter 6 Implementing a Border Gateway Protocol Solution for ISP Connectivity 471
BGP Terminology, Concepts, and Operation 471
Autonomous Systems 471
BGP Use Between Autonomous Systems 474
Comparison with Other Scalable Routing Protocols 475
Connecting Enterprise Networks to an ISP 477
Public IP Address Space 478
Connection Link Type and Routing 478
Connection Redundancy 482
Using BGP in an Enterprise Network 485
BGP Multihoming Options 486
Multihoming with Default Routes from All Providers 487
Multihoming with Default Routes and Partial Table from All Providers 488
Multihoming with Full Routes from All Providers 491
BGP Path Vector Characteristics 492
When to Use BGP 494
When Not to Use BGP 495
BGP Characteristics 495
BGP Neighbor Relationships 497
External BGP Neighbors 497
Internal BGP Neighbors 498
IBGP on All Routers in a Transit Path 500
IBGP in a Transit Autonomous System 500
IBGP in a Nontransit Autonomous System 501
BGP Partial-Mesh and Full-Mesh Examples 501
TCP and Full Mesh 502
Routing Issues If BGP Not on in All Routers in a Transit Path 503
BGP Synchronization 504
BGP Tables 506
BGP Message Types 508
Open and Keepalive Messages 508
Update Messages 509
Notification Messages 509
BGP Attributes 510
Well-Known Attributes 511
Optional Attributes 511
Defined BGP Attributes 512
The AS-Path Attribute 513
The Next-Hop Attribute 514
The Origin Attribute 517
The Local Preference Attribute 518
The Community Attribute 519
The MED Attribute 519
The Weight Attribute (Cisco Only) 520
The Route-Selection Decision Process 521
BGP Route-Selection Process 522
The Path-Selection Decision Process with a Multihomed
Connection 525
Configuring BGP 526
Planning BGP Implementations 527
Peer Groups 527
Entering BGP Configuration Mode 529
Defining BGP Neighbors and Activating BGP Sessions 529
Shutting Down a BGP Neighbor 531
Defining the Source IP Address 531
EBGP Multihop 534
Changing the Next-Hop Attribute 536
Defining the Networks That BGP Advertises 538
BGP Neighbor Authentication 540
Configuring BGP Synchronization 542
Resetting BGP Sessions 542
Hard Reset of BGP Sessions 543
Soft Reset of BGP Sessions Outbound 544
Soft Reset of BGP Sessions Inbound 544
BGP Configuration Examples 546
Basic BGP Examples 546
Peer Group Example 547
IBGP and EBGP Examples 549
Verifying and Troubleshooting BGP 552
show ip bgp Command Output Example 552
show ip bgp rib-failure Command Output Example 554
show ip bgp summary Command Output Example 554
debug ip bgp updates Command Output Example 556
Understanding and Troubleshooting BGP Neighbor States 557
Idle State Troubleshooting 558
Active State Troubleshooting 558
Established State 559
Basic BGP Path Manipulation Using Route Maps 559
BGP Path Manipulation 560
Changing the Weight 562
Changing the Weight for All Updates from a Neighbor 562
Changing the Weight Using Route Maps 562
Setting Local Preference 564
Changing Local Preference for All Routes 564
Local Preference Example 565
Changing Local Preference Using Route Maps 567
Setting the AS-Path 568
Setting the MED 570
Changing the MED for All Routes 571
Changing the MED Using Route Maps 572
Implementing BGP in an Enterprise Network 575
Filtering BGP Routing Updates 576
BGP Filtering Using Prefix Lists 578
Planning BGP Filtering Using Prefix Lists 578
BGP Filtering Using Prefix Lists Example 578
BGP Filtering Using Route Maps 580
Planning BGP Filtering Using Route Maps 580
BGP Filtering with Route Maps Example 580
Summary 582
References 587
Review Questions 587
Chapter 7 Implementing Routing Facilities for Branch Offices and Mobile Workers 591
Planning the Branch Office Implementation 591
Branch Office Design 591
Upgrade Scenario 595
Implementation Plan 596
Deploying Broadband Connectivity 597
Satellite Broadband Information 598
Cable Background Information 601
DSL Background Information 603
PPPoA 606
Configuring Static Routing 609
Routing to the Internet 611
Floating Static Route 615
Verifying Branch Services 618
Configuring NAT 619
Verifying NAT 623
Verifying Other Services 629
Verifying and Tuning IPsec VPNs 631
IPsec Technologies 632
Encapsulation Process 633
IPsec Site-to-Site VPN Configuration 635
ISAKMP Policy 636
IPsec Details 637
VPN Tunnel Information 637
VPN ACL 638
Apply the Crypto Map 638
Verifying an IPsec VPN 639
Impact on Routing 647
Configuring GRE Tunnels 647
Generic Routing Encapsulation 649
Configuring GRE 650
Example of GRE Configuration 652
Planning for Mobile Worker Implementations 661
Connecting a Mobile Worker 661
Components for Mobile Workers 662
Business-Ready Mobile Worker and VPN Options 663
Routing Traffic to the Mobile Worker 664
VPN Headend Configuration 665
Allowing IPsec Traffic 666
Defining Address Pools 670
Providing Routing Services for VPN Subnets 672
Tuning NAT for VPN Traffic Flows 675
Verifying IPsec VPN Configuration 677
Reviewing Alternatives for Mobile Worker Connectivity 683
Summary 685
References 688
Review Questions 688
Chapter 8 Implementing IPv6 in an Enterprise Network 691
Introducing IPv6 691
IPv4 Issues 692
Features of IPv6 693
IPv6 Packet Header 695
Extension Headers 696
MTU Discovery 698
IPv6 Addressing 698
IPv6 Addressing in an Enterprise Network 698
IPv6 Address Representation 700
Interface Identifiers in IPv6 Addresses 701
IPv6 Address Types 704
IPv6 Global Unicast Addresses 705
IPv6 Link-Local Unicast Addresses 707
IPv6 Site-Local Unicast Addresses: Deprecated 708
IPv6 Multicast Addresses 708
Solicited-Node Multicast Addresses 710
IPv6 Anycast Addresses 711
Comparing IPv6 Addresses with IPv4 Addresses 712
Configuring and Verifying IPv6 Unicast Addresses 716
IPv6 Unicast Address Configuration and Verification Commands 717
Static IPv6 Address Assignment 719
Static Global Aggregatable Address Assignment 719
Assigning Multiple Global Aggregatable Addresses 721
IPv6 Unnumbered Interfaces 723
Static Link-Local Address Assignment 723
Stateless Autoconfiguration of IPv6 Addresses 724
Unicast Connectivity on Different Connection Types 733
Unicast Connectivity on Broadcast Multiaccess Links 733
Unicast Connectivity on Point-to-Point Links 738
Unicast Connectivity on Point-to-Multipoint Links 742
Routing IPv6 Traffic 746
IPv6 Routing Protocols 747
Static Routing 747
Static Route Configuration and Verification Commands 747
Static Route Configuration and Verification Example 750
RIPng 751
RIPng Configuration and Verification Commands 752
RIPng Configuration and Verification Example 752
OSPFv3 759
Similarities Between OSPFv2 and OSPFv3 760
Differences Between OSPFv2 and OSPFv3 761
OSPFv3 Configuration and Verification Commands 763
OSPFv3 Configuration and Verification Examples 767
EIGRP for IPv6 773
EIGRP for IPv6 Configuration and Verification Commands 773
EIGRP for IPv6 Configuration and Verification Example 774
MBGP 782
MBGP Configuration and Verification Commands 783
MBGP Configuration and Verification Example 784
IPv6 Policy-Based Routing 785
IPv6 PBR Configuration and Verification Commands 785
IPv6 PBR Configuration and Verification Example 788
IPv6 Redistribution 791
RIPng Redistribution 791
RIPng and OSPFv3 Redistribution 799
RIPng, OSPFv3, and MBGP Redistribution 814
Transitioning IPv4 to IPv6 824
Dual Stack 826
Tunneling 828
Translation 829
Tunneling IPv6 Traffic 830
Manual IPv6 Tunnels 830
Manual IPv6 Tunnel Configuration and Verification Commands 831
Manual IPv6 Tunnel Configuration and Verification Example 832
GRE IPv6 Tunnels 838
GRE IPv6 Tunnel Configuration and Verification Commands 839
GRE IPv6 Tunnel Configuration and Verification Examples 839
6to4 Tunnels 846
6to4 Tunnel Configuration and Verification Commands 848
6to4 Tunnel Configuration and Verification Example 848
IPv4-Compatible IPv6 Tunnels 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Example 854
ISATAP Tunnels 857
ISATAP Tunnel Configuration and Verification Commands 859
ISATAP Tunnel Configuration and Verification Example 859
Translation Using NAT-PT 864
Static NAT-PT for IPv6 865
Static NAT-PT Operation 865
Static NAT-PT Configuration and Verification Commands 866
Static NAT-PT Configuration and Verification Example 867
Dynamic NAT-PT for IPv6 871
Dynamic NAT-PT Configuration and Verification Commands 872
Dynamic NAT-PT Configuration and Verification Examples 873
Summary 885
References 897
Review Questions 897
Appendix A Answers to Review Questions 901
Online Supplemental Material:
Appendix B IPv4 Supplement
Appendix C BGP Supplement
Acronyms and Abbreviations
TOC, 9781587058820, 5/25/10
Sunday, August 8, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment