| Chapter 1:
Overview of Scalable Networks |
Chapter
Overview
|
|
| 1.1 |
The Hierarchical Network Design Model
| 1.1.1 |
The
three-layer hierarchical design model |
| 1.1.2 |
Router
function in the hierarchy |
| 1.1.3 |
Core
layer example |
| 1.1.4 |
Distribution
layer example |
| 1.1.5 |
Access
layer example |
|
|
| 1.2 |
Key Characteristics of
Scalable Internetworks
| 1.2.1 |
Five
characteristics
of a scalable network |
| 1.2.2 |
Making the
network reliable and available |
| 1.2.3 |
Making the
network responsive |
| 1.2.4 |
Making the
network efficient, 1 |
| 1.2.5 |
Making the
network efficient, 2 |
| 1.2.6 |
Making the
network adaptable |
| 1.2.7 |
Making the
network accessible but secure |
|
|
| 1.3 |
Case Study
| 1.3.1 |
The
International Travel Agency |
|
|
| 1.4 |
Basic Router Configuration Lab Exercises
| 1.4.1 |
Getting Started and Building Start.TXT |
| 1.4.2 |
Capturing HyperTerminal and Telnet Sessions |
| 1.4.3 |
Access Control List Basics and Extended Ping |
|
|
| 1.5 |
Load Balancing Lab Exercises
| 1.5.1 |
Equal-Cost
load balancing with RIP |
| 1.5.2 |
Unequal-Cost
load balancing with IGRP |
|
|
| Chapter
Summary
|
|
| Chapter
Quiz
|
|
|
|
| Chapter 2: IP Addressing |
Chapter
Review
|
|
Chapter
Overview
|
|
| 2.1 |
IPv4 Addressing
| 2.1.1 |
Internet's
address architecture |
| 2.1.2 |
Classes
of IP addresses |
| 2.1.3 |
Classes
of IP addresses (con't.) |
| 2.1.4 |
Subnet
masking |
|
|
| 2.2 |
IP Addressing Crisis
and Solutions
| 2.2.1 |
IP
addressing crisis |
| 2.2.2 |
Classless
Interdomain Routing (CIDR) |
| 2.2.3 |
Route
aggregation and supernetting |
| 2.2.4 |
Supernetting
and address allocation |
|
|
| 2.3 |
VLSM
| 2.3.1 |
Variable-Length
Subnet Masks |
| 2.3.2 |
Classless
and classful routing protocols |
|
|
| 2.4 |
Route Summarization
| 2.4.1 |
An
overview of route summarization |
| 2.4.2 |
Route
flapping |
|
|
| 2.5 |
Private addressing and
NAT
| 2.5.1 |
Private
IP addresses (RFC 1918) |
| 2.5.2 |
Discontiguous
subnets |
| 2.5.3 |
Network
Address Translation (NAT) |
|
|
| 2.6 |
IP Unnumbered
| 2.6.1 |
Using
IP unnumbered |
|
|
| 2.7 |
DHCP and Easy IP
|
|
| 2.8 |
Helper Addresses
| 2.8.1 |
Using
helper addresses |
| 2.8.2 |
Configuring
IP helper addresses |
| 2.8.3 |
IP
helper address example |
|
|
| 2.9 |
IPv6
| 2.9.1 |
IP
address issues solutions |
| 2.9.2 |
IPv6
address format |
|
|
| 2.10 |
Advanced IP Addressing
Management Lab Exercises
| 2.10.1 |
Configuring
VLSM and IP Unnumbered |
| 2.10.2 |
VLSM |
| 2.10.3 |
Using
DHCP and IP Helper Addresses |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 3:
Routing Overview |
| Chapter
Review |
|
| Chapter
Overview |
|
| 3.1 |
Routing
| 3.1.1 |
Routing
fundamentals |
| 3.1.2 |
Static
routing |
| 3.1.3 |
Configuring
dynamic routing |
| 3.1.4 |
Distance-vector
routing protocols |
| 3.1.5 |
Link-state
routing protocols |
| 3.1.6 |
Hybrid
routing: EIGRP |
|
|
| 3.2 |
Default Routing
| 3.2.1 |
Default
routing overview |
| 3.2.2 |
Configuring
static default routes |
| 3.2.3 |
Default
routing with IGRP |
| 3.2.4 |
Default
route caveats |
|
|
| 3.3 |
Floating Static
Routes
| 3.3.1 |
Configuring
floating static routes |
|
|
| 3.4 |
Convergence
|
|
| 3.5 |
Route Calculation
| 3.5.1 |
Route
calculation fundamentals |
| 3.5.2 |
The
initiation of routing updates |
| 3.5.3 |
Routing
metrics |
|
|
| 3.6 |
Routing Process
Configuration Lab Exercises
| 3.6.1 |
Migrating
from RIP to EIGRP |
| 3.6.2 |
Configuring
IGRP |
| 3.6.3 |
Configuring
default routing with RIP and IGRP |
| 3.6.4 |
Configuring
floating static routes |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
|
| Chapter 4: OSPF |
| Chapter
Review |
|
| Chapter
Overview |
|
| 4.1 |
OSPF Overview
| 4.1.1 |
Issues
addressed by OSPF |
| 4.1.2 |
OSPF
terminology |
| 4.1.3 |
OSPF
states |
| 4.1.4 |
OSPF
network types |
| 4.1.5 |
The
OSPF Hello protocol |
|
|
| 4.2 |
OSPF Operation
| 4.2.1 |
Steps
of OSPF operation |
| 4.2.2 |
Step
1: Establish router adjacencies |
| 4.2.3 |
Step
2: Elect a DR and a BDR |
| 4.2.4 |
Step
3: Discover routes |
| 4.2.5 |
Step
4: Select appropriate routes |
| 4.2.6 |
Step
5: Maintain routing information |
|
|
| 4.3 |
Configuring OSPF
| 4.3.1 |
Configuring
OSPF on routers within a single area |
| 4.3.2 |
Optional
configuration commands |
| 4.3.3 |
Optional
configuration commands (con't.) |
|
|
| 4.4 |
Configuring OSPF
Over NBMA
| 4.4.1 |
NBMA
overview |
| 4.4.2 |
Full-Mesh
Frame Relay |
| 4.4.3 |
Partial-Mesh
Frame Relay |
| 4.4.4 |
Point-to-Multipoint
OSPF |
|
|
| 4.5 |
Verifying OSPF
Operation
| 4.5.1 |
Show
commands |
| 4.5.2 |
Clear
and debug commands |
|
|
| 4.6 |
OSPF
Configuration Lab Exercises
| 4.6.1 |
Configuring
OSPF |
| 4.6.2 |
Examining
the DR/BDR election process |
| 4.6.3 |
Configuring
Point-to-Multipoint OSPF over Frame Relay |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
|
|
| Chapter 5:
Multiarea OSPF |
| Chapter
Review |
|
| Chapter
Overview |
|
| 5.1 |
Multiple OSPF Areas
| 5.1.1 |
Creating
multiple OSPF areas
|
| 5.1.2 |
OSPF router
types |
| 5.1.3 |
OSPF LSA and
area types |
|
|
| 5.2 |
Multiarea OSPF Operation
| 5.2.1 |
Configuring OSPF
operation across multiple areas
|
| 5.2.2 |
Flooding LSUs
to multiple areas |
| 5.2.3 |
Updating the
routing table |
|
|
| 5.3 |
Multiarea OSPF Configuration
| 5.3.1 |
Using and
configuring OSPF multiarea components
|
| 5.3.2 |
Configuring
OSPF route summarization |
|
|
| 5.4 |
Stub and Totally Stubby
Areas
| 5.4.1 |
Using stub and
totally stubby areas |
| 5.4.2 |
Stub and
totally stub area criteria |
| 5.4.3 |
Configuring
stub and totally stubby areas |
| 5.4.4 |
OSPF stub
area configuration example |
| 5.4.5 |
OSPF totally
stubby configuration example |
|
|
| 5.5 |
Virtual Links
| 5.5.1 |
Meeting the
backbone area requirements |
| 5.5.2 |
Configuring
virtual links |
| 5.5.3 |
Virtual link configuration example |
|
|
| 5.6 |
Not-So-Stubby Areas
|
|
| 5.7 |
Monitoring Multiarea OSPF
| 5.7.1 |
Verifying
multiarea OSPF operation |
|
|
| 5.8 |
OSPF Verification and
Configuration Lab Exercises
| 5.8.1 |
Multiarea OSPF |
| 5.8.2 |
Configuring a
stub area and a totally stubby area |
| 5.8.3 |
Configuring
an NSSA |
| 5.8.4 |
Configuring
virtual links |
|
|
| 5.9 |
Creating Multiarea OSPF
Challenge Lab
| 5.9.1 |
Creating
multiarea
OSPF |
|
|
| Chapter
Summary |
|
| Chapter
Quiz
|
|
|
|
| Chapter 6: EIGRP |
| Chapter
Review |
|
| Chapter
Overview |
|
| 6.1 |
EIGRP Fundamentals
| 6.1.1 |
EIGRP and IGRP compatibility |
| 6.1.2 |
EIGRP design |
| 6.1.3 |
EIGRP support
for Novell IPX and AppleTalk |
| 6.1.4 |
EIGRP
terminology |
|
|
| 6.2 |
EIGRP Features
| 6.2.1 |
EIGRP technologies |
| 6.2.2 |
Neighbor discovery and recovery |
| 6.2.3 |
Reliable
transport protocol |
| 6.2.4 |
DUAL finite-state machine |
| 6.2.5 |
Protocol-dependent
modules |
|
|
| 6.3 |
EIGRP Components
| 6.3.1 |
EIGRP packet types |
| 6.3.2 |
EIGRP tables |
| 6.3.3 |
EIGRP tables
(con't.) |
| 6.3.4 |
Route tagging with EIGRP |
|
|
| 6.4 |
EIGRP Operation
| 6.4.1 |
Convergence using EIGRP |
|
|
| 6.5 |
Configuring EIGRP
| 6.5.1 |
Configuring EIGRP for IP networks |
| 6.5.2 |
EIGRP and the bandwidth command |
| 6.5.3 |
The bandwidth-percent command |
| 6.5.4 |
Configuring EIGRP for IPX networks |
| 6.5.5 |
Controlling SAP updates |
| 6.5.6 |
Summarizing EIGRP routes for IP |
| 6.5.7 |
Summarizing EIGRP routes for IP |
|
|
| 6.6 |
Monitoring EIGRP
| 6.6.1 |
Verifying EIGRP operation |
|
|
| 6.7 |
EIGRP Configuration Lab
Exercises
| 6.7.1 |
Configuring
EIGRP with IGRP |
| 6.7.2 |
Configuring
EIGRP fault tolerance |
|
|
| 6.8 |
Configuring EIGRP
Challenge Lab Exercise
| 6.8.1 |
EIGRP
challenge lab |
|
|
| Chapter
Summary |
|
| Chapter
Quiz
|
|
|
|
| Chapter 7:
Route Optimization |
Chapter
Review
|
|
Chapter
Overview
|
|
| 7.1 |
Controlling Routing Updates
| 7.1.1 |
Controlling routing updates |
| 7.1.2 |
Passive interfaces |
| 7.1.3 |
Filtering routing updates with distribute-list |
|
|
| 7.2 |
Policy Routing
| 7.2.1 |
Policy routing overview |
| 7.2.2 |
Policy routing example |
|
|
| 7.3 |
Route Redistribution
| 7.3.1 |
Redistribution overview |
| 7.3.2 |
Redistribution overview
(con't.) |
| 7.3.3 |
Administrative distance |
| 7.3.4 |
Modifying administrative distance by using the distance command |
| 7.3.5 |
Redistribution guidelines |
| 7.3.6 |
Configuring one-way redistribution |
| 7.3.7 |
Configuring two-way redistribution |
| 7.3.8 |
Redistributing connected and static routes |
| 7.3.9 |
Verifying redistribution operation |
|
|
| 7.4 |
Redistribution Example
| 7.4.1 |
Phase 1: Configuring a RIP network |
| 7.4.2 |
Phase 2: Adding OSPF to the Core of a RIP Network |
| 7.4.3 |
Phase 3: Adding OSPF areas |
|
|
| 7.5 |
Route Optimization
Configuration Lab Exercises
| 7.5.1 |
Configuring
distribute lists and passive interfaces |
| 7.5.2 |
Configuring
route maps |
| 7.5.3 |
Redistributing
RIP and OSPF |
|
|
| 7.6 |
Route Optimization Challenge
Lab Exercise
| 7.6.1 |
Route
optimization challenge lab |
|
|
| Chapter
Summary
|
|
Chapter
Quiz
|
|
|
|
| Chapter 8: BGP |
Chapter
Review
|
|
Chapter
Overview
|
|
| 8.1 |
Autonomous Systems
| 8.1.1 |
Overview of autonomous systems |
| 8.1.2 |
Single-homed autonomous systems |
| 8.1.3 |
Multihomed nontransit autonomous systems |
| 8.1.4 |
Multihomed transit autonomous systems |
| 8.1.5 |
When not to use
BGP |
|
|
| 8.2 |
BGP Basic Operations
| 8.2.1 |
BGP routing updates |
| 8.2.2 |
BGP neighbors |
| 8.2.3 |
BGP message types |
| 8.2.4 |
BGP neighbor negotiation |
| 8.2.5 |
Network-layer
reachability information (NLRI) |
| 8.2.6 |
Path attributes |
|
|
| 8.3 |
Configuring BGP
| 8.3.1 |
Basic BGP configuration |
| 8.3.2 |
EBGP and IBGP |
| 8.3.3 |
EBGP and IBGP configuration example |
| 8.3.4 |
EBGP multihop |
| 8.3.5 |
Clearing the BGP table |
| 8.3.6 |
Peering |
| 8.3.7 |
How to maintain BGP continuity inside an AS |
| 8.3.8 |
Synchronization within an AS |
|
|
| 8.4 |
Monitoring BGP operation
| 8.4.1 |
Verifying BGP operation |
|
|
| 8.5 |
The BGP Routing Process
| 8.5.1 |
An overview of the BGP routing process |
| 8.5.2 |
The BGP routing process model |
| 8.5.3 |
Implementing BGP routing policy |
|
|
| 8.6 |
BGP Attributes
| 8.6.1 |
Controlling BGP routing with attributes |
| 8.6.2 |
The Next Hop
attribute |
| 8.6.3 |
Next Hop behavior on multiaccess media |
| 8.6.4 |
Next Hop behavior on NBMA networks |
| 8.6.5 |
The AS_Path
attribute |
| 8.6.6 |
AS_Path and
private AS numbers |
| 8.6.7 |
Manipulating routes with AS_Path |
| 8.6.8 |
The Atomic Aggregate
attribute |
| 8.6.9 |
The Aggregator
attribute |
| 8.6.10 |
The Local Preference
attribute |
| 8.6.11 |
Manipulating Local Preference |
| 8.6.12 |
The Weight
attribute |
| 8.6.13 |
The Multiple Exit Discriminator
attribute |
| 8.6.14 |
MED configuration example |
| 8.6.15 |
The Origin
attribute |
|
|
| 8.7 |
The BGP Decision Process
| 8.7.1 |
The BGP
decision process |
|
|
| 8.8 |
BGP Configuration Lab
Exercises
| 8.8.1 |
Configuring
BGP |
| 8.8.2 |
Configuring
IBGP and EBGP sessions |
| 8.8.3 |
Using the
AS_PATH attribute |
| 8.8.4 |
Using the
LOCAL_PREF and MED attributes |
|
|
| Chapter
Summary
|
|
| Chapter
Quiz
|
|
|
|
| Chapter 9:
Scaling BGP |
Chapter
Review
|
|
Chapter
Overview
|
|
| 9.1 |
Route Reflectors
| 9.1.1 |
Route
Reflector Basics |
| 9.1.2 |
Internal
peers without Route Reflectors |
| 9.1.3 |
Internal
peers with Route Reflectors |
| 9.1.4 |
Route reflector operation |
|
|
| 9.2 |
BGP Route Filtering and Policy
Routing
| 9.2.1 |
BGP route filtering |
| 9.2.2 |
Using filters to implement routing policy |
| 9.2.3 |
Using distribute-list to filter BGP routes |
| 9.2.4 |
The ip prefix-list command |
| 9.2.5 |
Example ip prefix-list configuration |
|
|
| 9.3 |
The Community Attribute
| 9.3.1 |
Community attribute overview |
| 9.3.2 |
Community attribute configuration example |
|
|
| 9.4 |
Peer Groups
| 9.4.1 |
Overview of peer groups |
| 9.4.2 |
Peer group configuration example |
|
|
| 9.5 |
Redundancy, Symmetry, and Load Balancing
| 9.5.1 |
Issues with
redundancy, symmetry, and load balancing |
| 9.5.2 |
Redundancy |
| 9.5.3 |
Default routing in BGP networks |
| 9.5.4 |
Symmetry |
| 9.5.5 |
Load balancing |
| 9.5.6 |
Redundancy, symmetry, and load balancing in a single-homed AS |
| 9.5.7 |
Multihomed connections |
|
|
| 9.6 |
BGP Redistribution
| 9.6.1 |
BGP redistribution overview |
| 9.6.2 |
Injection of unwanted or faulty information |
| 9.6.3 |
Injecting information statically into BGP |
| 9.6.4 |
BGP redistribution configuration example |
|
|
| 9.7 |
Scaling BGP Lab Exercises
| 9.7.1 |
BGP route
relectors and route filters |
| 9.7.2 |
The BGP COMMUNITIES attribute |
| 9.7.3 |
BGP peer
groups |
|
|
| 9.8 |
Configuring BGP Challenge Lab
Exercise
|
|
| Chapter
Summary
|
|
| Chapter
Quiz
|
|
|
|
| Chapter
10: Security |
Chapter
Review
|
|
Chapter
Overview
|
|
| 10.1 |
Access Lists
| 10.1.1 |
Standard and extended access lists syntax |
| 10.1.2 |
Named access list syntax |
| 10.1.3 |
Time-based extended access list syntax |
| 10.1.4 |
Configuring access list descriptions with the remark command |
| 10.1.5 |
Syntax for applying access lists |
|
|
| 10.2 |
Securing Router Access
| 10.2.1 |
Using access lists to secure virtual terminal access |
| 10.2.2 |
Using access lists to secure access to the IOS web interface |
|
|
| 10.3 |
Dynamic Access Lists:
Lock-and-Key
| 10.3.1 |
Lock-and-key overview |
| 10.3.2 |
Lock-and-key operation |
| 10.3.3 |
Configuring lock-and-key |
| 10.3.4 |
Configuring lock-and-key authentication |
|
|
| 10.4 |
Session Filtering
| 10.4.1 |
Using extended access lists with the established argument |
| 10.4.2 |
Reflexive access lists |
| 10.4.3 |
How reflexive access lists work |
| 10.4.4 |
Restrictions on using reflexive access lists |
| 10.4.5 |
Configuring reflexive access lists |
| 10.4.6 |
Reflexive access list configuration example |
|
|
| 10.5 |
Context-Based Access Control
| 10.5.1 |
Context-Based Access Control
(CBAC) |
| 10.5.2 |
CBAC operation |
| 10.5.3 |
When and where to configure CBAC |
| 10.5.4 |
Choosing an interface |
| 10.5.5 |
Defining CBAC inspection rules |
| 10.5.6 |
Configuring global timeouts |
| 10.5.7 |
Verifying CBAC |
| 10.5.8 |
A CBAC configuration example |
|
|
| 10.6 |
Using an Alternative to Access Lists
|
|
| 10.7 |
Configuring Router Security
Lab Exercises
|
|
| Chapter
Summary
|
|
| Chapter
Quiz
|
|
|
|