SlideShare une entreprise Scribd logo
1  sur  55
Implementing Cisco
IP Routing (ROUTE)
Foundation Learning Guide
CCNP ROUTE 300-101
Basic Network and Routing Concepts
Chapter 1
Basic Network and Routing Concepts
• An overview of routing protocols that focuses on
characteristics that describe their differences.
• Describe how limitations of different underlying technologies
affect routing protocols.
• Closer look at how Layer 2 and Layer 3 VPNs affect routing
protocols.
• Dynamic Multipoint Virtual Private Network (DMVPN) is
introduced as a scalable VPN solution
• Configuration of a simple routing protocol RIPng, which
supports Internet Protocol version 6 (IPv6).
Differentiating Routing Protocols
Upon completing this section, you will be able to:
•Identify general enterprise network infrastructure
•Describe the role of dynamic routing protocols within the
enterprise network infrastructure
•Identify the major areas of differencesmajor areas of differences among routing protocols
•Describe the differences between IGP and EGP routing
protocols
•Describe the different types of routing protocols
•Identify the importance of convergence
•Describe route summarization
•Describe what influences routing protocol scalability
Enterprise Network Infrastructure
• Network infrastructure of enterprises today can be
complicated at first glance.
• A large number of interconnected devices and differences
between physical and logical topologies are just two reasons
for this complexity.
• Devices can be mapped into different areasDevices can be mapped into different areas according to the
functionality that they provide in the network infrastructure
Figure 1-1 Enterprise Network Infrastructure
Enterprise Campus provides access to the network communications services and resources to end usersprovides access to the network communications services and resources to end users
and devicesand devices. Single geographic location, designed using a hierarchical model: Access, Distribution and
Core layers
Enterprise edge provides remote sites with access to the same network services as users at the main site,provides remote sites with access to the same network services as users at the main site,
aggregates private WAN linksaggregates private WAN links, VPN connections & Internet connectivity
Figure 1-2 Role of Dynamic Routing Protocols
The basic objective of routing protocols is to exchangeexchange network reachability informationnetwork reachability information
between routers and dynamically adaptdynamically adapt to network changes.
Figure 1-3 IGP versus EGP
Interior Gateway Protocols (IGP): used within the organization, and they exchange the routes within anexchange the routes within an
AAS
Exterior Gateway Protocols (EGP): exchanging routes between different autonomous systemsexchanging routes between different autonomous systems. Border
Gateway Protocol (BGP)
Routing protocols can be divided into the following groups:
•Distance vector protocols Determines the:
• Direction (vector, Next hop or Exit interface)
• Distance (such as link cost or number of hops) to any link in the
network.
• Distance vector protocols use routers as signposts along the
path to the final destination. Uses Bellman-Ford algorithm
•Link-state protocols: The link-state approach uses the Shortest Path First
(SPF) algorithm to create an abstract of the exact topology of the
entire network or at least within its area. A link-state routing
protocol is like having a complete map of the network topology.
Convergence describes the process of when routers notice change in the
network, exchange the information about the change, and perform necessary
calculations to reevaluate the best routes.
A converged network describes the state of the network in which allall
routers have the same view on the network topologyrouters have the same view on the network topology.
Convergence time describes how fast network devices can reach the state ofhow fast network devices can reach the state of
convergence after a topology change.convergence after a topology change.
Convergence time affected by:
Routing protocol timers
Route summarization
• Route summarization enables you to reduce routing overhead and improve
stability and scalability of routing by reducing the amount of routingreducing the amount of routing
information that is maintained and exchanged between routersinformation that is maintained and exchanged between routers.
• The purpose of route summarization is to squeeze several subnets into onesqueeze several subnets into one
aggregate entry that describes all of themaggregate entry that describes all of them. As shown in Figure 1-5 , route
summarization reduces the size of routing tables
• Different routing protocols support different route summarization options.
• IP addresses must be hierarchically assigned in contiguous blocks across
the network.
Route Protocol Scalability
•As a network grows and becomes larger, the risk of routing protocol
instability or long convergence times becomes greaterinstability or long convergence times becomes greater.
•Scalability describes the ability of a routing protocol to support
further network growth.
Scalability factors include:
•Number of routes
•Number of adjacent neighbors
•Number of routers in the network
•Network design
•Frequency of changes
•Available resources (CPU and memory)
OSPF supports the use of hierarchical areas that divide one large network intodivide one large network into
several subdomainsseveral subdomains.
EIGRP supports the configuration of stub routers to optimize
information exchange process and improve scalability.
Understanding Network Technologies
You can establish routing protocols over a variety of different networkestablish routing protocols over a variety of different network
technologiestechnologies.
It is important to consider the limitations of a specific solutionconsider the limitations of a specific solution and how it
affects routing protocol deployments and operation.
Upon completing this section, you will be able to:
•Differentiate traffic types
•Differentiate IPv6 address types
•Describe ICMPv6 neighbor discovery
•Differentiate network types
•Describe the impact of NBMA (Non-broadcast Multiaccess) on routing
protocols
•Describe how the Internet breaks enterprise routing
Traffic types:
•Unicast: Unicast addresses are used in a one-to-one contextused in a one-to-one context. Unicast traffic is exchangedexchanged
only between one sender and one receiveronly between one sender and one receiver.
•Multicast: Multicast addresses identify a group of interfaces across different devicesaddresses identify a group of interfaces across different devices.
Traffic that is sent to multiple destinations at the same time.
• IPv4 multicast addresses is 224.0.0.0–239.255.255.255.
• IPv6 reserved multicast addresses have the prefix FF00::/8.
•Anycast: IPv6 anycast address is assigned to an interface on more than one nodeassigned to an interface on more than one node. Packet
is routed to the nearest interface that has this address.
• A common use case for anycast is the Internet DNS server.
•Broadcast: IPv4 broadcast addresses are used when sending traffic to all devices in the
subnet. IPv6 does not use a broadcast addressIPv6 does not use a broadcast address
• Local broadcast address 255.255.255.255.
• Directed broadcast address N.N.N.255
Traffic Types
•Early routing protocols used only broadcasts to exchange routing
information.
•All modern IGPs use multicast addresses to perform neighbor discovery,
exchange routing information, and send updates.
IPv6 Address Types
There are several different basic types of IPv6 addresses. It is important that you
are familiar with them, since some of them are also used by routing protocols.
RFC 3587 specifies 2000::/3 to be global unicast address space that the IANA may
allocate to the Regional Internet Registries (RIRs).
 The following displays how IPv6 global unicast addresses
are allocated by the IANA.
• Only a small portion (12.5%) of the IPv6 address space is being
allocated to the Registries in the range of 2001::/16.
IPv6 Global Unicast Address
IPv6 Global Unicast Address
• The global unicast address typically consists of:
• A 48-bit global routing prefix
• A 16-bit subnet ID
• A 64-bit interface ID (typically in EUI-64 bit format discussed later).
Global Routing Prefix
Subnet
ID Interface ID
2001
0010
0008 21B:D5FF:FE5B:A408
/23
Registry
/32
ISP Prefix
/48
Site Prefix
/64
Subnet Prefix
Network Types
Not all Layer 2 network topologies support all traffic types. Because unsupported traffic
types influence the operation of routing protocols, it is important to be aware of the
limitations of specific network topologies.
Point-to-point network: A network that
connects a single pair of routers.
A serial link is an example of a point-to-point
connection.
Broadcast network: A network that can
connect many routers along with the
capability to address a single message to all of
the attached routers. Ethernet is an
example of a broadcast network.
Non-broadcast Multiaccess (NBMA)
network: A network that can support many
routers but does not have broadcast
capability. (ex: Frame Relay)
The sender needs to create an individual copy of the same packet for each recipient if it
wishes to inform all connected neighbors.
Frame Relay NBMA Operation
Frame Relay Star Topologies
Star Topology (Hub and Spoke)
The simplest WAN topology is a star. In this topology, SPAN Engineering
Company has a central site in Chicago that acts as a hub and hosts the primary
services.
Frame Relay Operation
Frame Relay Mesh Topologies
Using Frame Relay Mesh, a network designer can build multiple connectionsbuild multiple connections
simply by configuring additional VCs on each existing physical linksimply by configuring additional VCs on each existing physical link.
This software upgrade grows the star topology to a full mesh topology
without the expense of additional hardware or dedicated lines.
Split horizon: For distance vector routing protocols, the split-horizon rule reduces
routing loops. As illustrated in Figure 1-9, it prevents a routing update that is received
on an interface from being forwarded out of the same interface.
The hub router receives the update on its physical interface but cannot
forward it through the same interface to other spoke routers.
Split horizon is not a problem if there is a single PVC on a physical interface because
this type of connection would be point-to-point.
If you use a single Frame Relay, multipoint interfacesingle Frame Relay, multipoint interface to interconnect multiple sites,
reachability issues may be a problemreachability issues may be a problem because of the NBMA nature of Frame Relay.
The Frame Relay NBMA topology can cause the following issues:
NBMA Networks
Neighbor discovery:
OSPF over NBMA networks works in a nonbroadcast network mode by
default, and neighbors are not automatically discovered. You can statically
configure neighbors, but an additional configuration is required to manually
configure the hub as a Designated Router (DR).
OSPF treats an NBMA network like Ethernet by default, and on Ethernet, a DR is
needed to exchange routing information between all routers on a segment. Therefore,
only the hub router can act as a DR because it is the only router that has PVCs with
all other routers.
Broadcast replication:
For multipoint connections over a single interface that terminates at multiple
PVCs, the router must replicate broadcast packets, such as routingsuch as routing
update broadcastsupdate broadcasts, on each PVC to the remote routerson each PVC to the remote routers.
These replicated broadcast packets consume bandwidth and cause significant
latency variations in user traffic.
Subinterfaces:
Subinterfaces overcome some limitations of NBMA networks.
You can choose between two different types of subinterfacestwo different types of subinterfaces:
•Point-to-point subinterfaces: Each subinterface, which provides
connectivity between two routers, uses its own subnet for addressing.
Connectivity looks just like several physical point-to-point links, no issues with
neighbor discovery and the split-horizon rule.
•Point-to-multipoint subinterfaces: One subnet is shared between all virtual
circuits. Because private address space is normally used for addressing, saving
address space is not a significant benefit.
Point-to-point subinterfaces are the preferred and recommended choice.
Figure 1-11 Configuring Static Routing
Routing Over the Internet
Principles of Static Routing
A static route can be used in the following circumstances:
•When it is undesirable to have dynamic routing updates forwarded across slow
bandwidth links, such as a dialup link.
•When the administrator needs total control over the routes used by the router.
•When a backup to a dynamically recognized route is necessary.
•When it is necessary to reach a network accessible by only one path (a stub
network).
•When a router connects to its ISP and needs to have only a default route
pointing toward the ISP router, rather than learning many routes from the ISP.
•When a router is underpowered and does not have the CPU or memory resources
necessary to handle a dynamic routing protocol.
Configuring a Static Default Route
•In some circumstances, a router does not need to recognize the details of remote
networks.
•The router is configured to send all traffic in a particular direction; this is known
as a default route.
•To create a static default route, use the normal ip route command, but with the
destination network and its subnet mask both set to 0.0.0.0.
• In Figure 1-12 , to reach the 172.16.1.0/24 network, Router B still needs a static
route pointing out its S0/0/0 interface.
• Entering the show ip route command on Router A in Figure 1-12 returns the
information shown in Example 1-1 .
Basic PPP Overview
•Point-to-Point Protocol (PPP) has several advantages over its predecessor High-Level
Data Link Control (HDLC).
The following example enables PPP encapsulation on interface serial 0/0/0:
R1# configure terminal
R1(config)# interface serial 0/0/0
R1(config-if)# encapsulation ppp
PPP Authentication Overview
RFC 1334 defines two protocols for authentication, PAP and CHAP.
•PAP is a very basic two-way process, there is no encryption. The username and
password are sent in plaintext.
•CHAP authentication sends a challenge to the remote device.
•The remote device must encrypt the challenge value with a shared secret and return
the encrypted value and its name to the local router in a response message.
•LCP (Link Control Protocol) establishes the link & chooses the authentication protocol.
PPPoE
•PPP can be used on all serial links including those links created with older dialup
analog and ISDN modems.
•In addition, ISPs often use PPP as the data-link protocol over broadband
connections like DSL.
•With PPP enabled, ISPs can use PPP to assign each customer one public IPv4
address.
•During the CHAP to authenticate customers ,ISPs can check accounting records.
Ethernet links do not natively support PPP.
A solution to this problem was created: PPP over Ethernet (PPPoE).
•PPPoE allows the sending of PPP frames encapsulated inside Ethernet frames.
•The modem converts the Ethernet frames to PPP frames by stripping the Ethernet
headers.
•The modem then transmits the PPP frames on the ISP’s DSL network.
•ISP could continue to use the same authentication model as with analog and ISDN.
To create a PPP tunnel, the configuration uses a dialer interface.
•The PPP configuration is placed on the dialer interface, not on the physical interface.
•The PPP CHAP configuration usually defines one-way authentication.
•The physical Ethernet interface then enabled with the command pppoe enable
•The maximum transmission unit (MTU) should be reduced to 1492, versus the
default of 1500, to accommodate the PPPoE headers.
• Frame Relay is a switched WAN technology where virtual circuits (VCs) are
created by a service provider (SP) through the network.
• VCs provide a bidirectional communication path from one device to another.
• VCs are identified by DLCIs
• DLCI values typically are assigned by the Frame Relay service provider
• Frame Relay allows multiple logical VCs to be multiplexed over a single physical
interface.
• Frame Relay is statistically multiplexed, meaning that it transmits only one frame at
a time, but that many logical connections can co-exist on a single physical line.
Star Topology (Hub and Spoke)
The simplest WAN topology is a star. In
this topology, SPAN Engineering Company
has a central site in Chicago that acts as a
hub and hosts the primary services.
Using Frame Relay Mesh, a network
designer can build multiple
connections simply by configuring
additional VCs on each existing link
This software upgrade grows
the star topology to a full
mesh topology without the
expense of additional
hardware or dedicated lines.
Figure 1-16 EIGRP on a Physical Frame Relay Interface
• Split horizon is disabled by default on Frame Relay physical interfaces.
• Therefore, routes from Router R2 can be sent to Router R3, and vice versa.
• Note that Inverse ARP does not provide dynamic mapping for the communication
between Routers R2 and R3 because they are not connected with a PVC.
• You must configure this mapping manually.
192.168.1.101 255.255.255.0
192.168.1.102 102 broadcast
MPLS
•MPLS (Multiprotocol Label Switching) is a transport mechanism that is developed to
carry data over the packet-switched network.
•Designed to offer a great level of flexibility to operate seamlessly with any Layer 3 or
Layer 2 technology.
•VPN service enables service providers and large enterprises to build flexible, scalable,
and secure VPNs.
• MPLS is a switching mechanism.
• A 32 bit header (label) is inserted by the provider (PE) router.
• Packets are switched through the MPLS network.
• The label is removed by the PE at the other end of the MPLS network.
• To the customer, it looks like a Layer 2 or Layer 3 connection.
Figure 1-17 Layer 3 MPLS VPN Solutions
Two types of MPLS VPNs have been developed:
1. The Layer 2 MPLS VPN backbone
solution is providing the Layer 2 service
across the
backbone, R1 and R2 are connected together
directly using the same IP subnet. If you
deploy a routing protocol over the Layer 2
MPLS VPN, neighbor adjacency is established
between your R1 and R2 routers. The figure
presents the connectivity through the
backbone.
2. The Layer 3 MPLS VPN backbone solution is
providing the Layer 3 service across the
backbone, R1 and R2 are connected to ISP edge
routers. A separate IP subnet is used on each side.
If you deploy a routing protocol over this VPN,routing protocol over this VPN,
service providers need to participate in itservice providers need to participate in it. Neighbor
adjacency is established between your R1 and theR1 and the
closest PE router and between your R2 and it’sclosest PE router and between your R2 and it’s
closest PE router.closest PE router.
A GRE tunnel (Generic Routing Encapsulation) a point-to-point tunnel developed by Ciscopoint-to-point tunnel developed by Cisco
that allows a wide variety of passenger protocols to be transported over the IP network.
It comprises three main components:
1.A passenger protocol or encapsulated protocol, such as IPv4 or IPv6 that is beingthat is being
encapsulated.encapsulated.
2.A carrier protocol, GRE in this example, that is defined by Cisco as a multiprotocol
carrier protocol and described in RFC 2784.
3.A transport protocol, such as IP, that carries the encapsulated protocolcarries the encapsulated protocol.
GRE has the following characteristics:
•GRE uses a protocol-type field in the GRE header to support the encapsulation of any
OSI Layer 3 protocol (IPv4, IPv6, IPX, AppleTalk).
•GRE itself is stateless. It does not include any flow-control mechanisms, by default.
•GRE does not include any strong security mechanisms to protect its payload.
•The GRE header, along with the tunneling IP header, creates at least 24 bytes of
additional overhead for tunneled packets.
With a generic hub-and-spoke topology, youyou
can typically implement static tunnelscan typically implement static tunnels
(typically GRE with IPsec) between central
hub and remote spokes, as shown in Figure
Dynamic Multipoint Virtual Private Network:
The main characteristics of the mGRE configuration are as follows:
•OnlyOnly one tunnel interface needs to be configured on a router to supportone tunnel interface needs to be configured on a router to support
multiple remote GRE peersmultiple remote GRE peers. In a hub-and-spoke network, a single mGREa single mGRE
tunnel interface on the hub accommodates many spoke GRE peerstunnel interface on the hub accommodates many spoke GRE peers.
•In order to learn about the IP addresses of other peer, devices using mGRE
require NHRP to build dynamic GRE tunnels. Peers can also use dynamically
assigned addresses that will then be used by NHRP when registering with the
hub. (NHRP - Next Hop Resolution Protocol)
•mGRE interfaces also support unicast, multicast, and broadcast traffic.
Multipoint GRE
An important characteristic of the DMVPN solution is scalabilityDMVPN solution is scalability, which is enabled by
deploying Multipoint GRE (mGRE). mGRE technology enables a single GRE interfacesingle GRE interface
to support multiple GRE tunnelsto support multiple GRE tunnels and simplifies the complexity of the configuration.
Figure 1-20 shows two options for implementing mGRE functionality:
•The left diagram shows the hub that is optimized with an mGRE interface. In this
setup, only a single interface is required on the hub. However, you must deploy NHRPmust deploy NHRP
for the hub to learn spoke addressesfor the hub to learn spoke addresses and correctly provision the spoke-to-hub GRE
tunnels.
•In the right diagram, all devices in a hub-and-spoke network use the mGRE interface.
Using NHRP, these devices can establish a partial mesh or full mesh of GRE tunnels. By
only configuring a single mGRE interface on each device, the configuration is greatlyconfiguration is greatly
simplified and manageability improved.simplified and manageability improved.
• NHRP is a client-server protocol, the hub acts as the server, and the spokes are clients.
• NHRP is used by routers to determine the IP address of the next hop in IP tunneling networks.
• NHRP creates a mapping for a tunnel IP address to the physical interface IP address for each
spoke at the hub.
Client-Server Protocol
Authentication
• Ensures that a message:
• Comes from an authentic source and
• Goes to an authentic destination
Data confidentiality
• Protecting data from eavesdroppers (encryption)
• Aims at protecting the message contents from being intercepted by unauthenticated or
unauthorized sources.
Data integrity
• Across the Internet, there is always the possibility that the data has been modified.
Antireplay protection:
• Antireplay protection verifies that each packet is unique and not duplicated.
• VPN with IPsec supports
• IP unicast only
• IPsec with GRE supports
• IP multicast
• dynamic IGP routing protocols
• non-IP protocols
• IPsec has two encryption modes:
• Tunnel mode
• Transport mode
Secure VPN
 IPsec is best thought of as a set of features that protects IP data
as it travels from one location to another.
 IPsec can protect only the IP layer and up (transport layer and
userdata).
 IPsec cannot extend its services to the data link layer.
 If protection of the data link layer is needed, then some form
of link encryption is needed.
 Encryption, Authentication and data integrity are NOT a
requirement of IPsec, they’re optional (although heavily
implemented) feature of IPsec.
IPsec
Security is also an important part of the DMVPN solution.
•Security services are enabled by the use of the IPsec framework.
•IPsec is a framework of open standards that define how to provide secure
communications.
•It relies on existing algorithms to implement the:
• Encryption
• Authentication
• key exchange.
IPsec provides four important security services:
•Confidentiality (encryption): The sender can encrypt the packets before
transmitting them across a network.
•Data integrity: The receiver can verify that the data was transmitted through
the path without being changed or altered in any way.
•Authentication: Authentication ensures that the connection is made with the
desired communication partner.
•Antireplay protection: Verifies that each packet is unique and not duplicated.
• IPsec packets are protected by comparing the sequence number of the
received packets with a sliding window on the destination host.
Routing and TCP/IP Operations
•Routing protocols are part of the TCP/IP protocol suite, specifically at Layer 3.
•Network communications requires a wide range of protocols responsible for a
wide variety of tasks to ensure communications between devices.
MSS (Maximum Segment Size) , Fragmentation, and PMTUD (Path MTU Discovery)
•Most transmission links enforce a small maximum packet length, 1500 Bytes, called
the maximum transmission unit (MTU).
•When a router receives an IPv4 packet larger than the MTUIPv4 packet larger than the MTU of the outgoing
interface, it must fragment the packet unless the DFmust fragment the packet unless the DF (Don’t Fragment) bit is set in the
IPv4 header.
Fragmentation causes several issues including the following:
•CPU and memory overhead in fragmentation of the packet
•CPU and memory overhead in destination devices during reassembly of packets
•Retransmission of the entire packet when one fragment is dropped
•Firewalls that do Layer 4 through Layer 7 filtering may have trouble processing
IPv4 fragments correctly
To avoid fragmentation of an IPv4 packet
•TCP MSS Sets the MTU of the outgoing interface minus 40 bytes.
•The 40 bytes take into account the 20-byte IPv4 header and 20-byte TCP header.
Example: a TCP MSS of 1460, which is 1500 bytes for the Ethernet MTU, minus 20
bytes for the IPv4 header, and minus 20 bytes for the TCP header.
MSS Maximum Size Segment
Path MTU Discovery (PMTUD) was developed for the purpose of determining the
lowest MTU along a path from the packet’s source to destination. PMTUD is only
supported by TCP.
PMTUD is performed by a host using the full MSS on the outgoing interface:
•When the TCP packets that exceeds the MTU cannot be fragmented; DF (Don’t
Fragment) bit is set.
•The router along the path will drop the packet and send an ICMP “Destination
Unreachable” message back to the originator of the packet.
•The ICMP Destination Unreachable message contains the code indicating
“fragmentation needed and DF set” and the packet was dropped.
•The source receives the ICMP message, reduces the size of the MSS to be within
the MTU, and retransmits the message.
*The PMTUD operations for IPv6 are similar to that of PMTUD for IPv4
TCP Starvation
TCP incorporates mechanisms for reliability, flow control, and congestion avoidance.
• TCP tries to do its part by backing off on bandwidth, called slow start .
UDP is faster and simpler data transmissions protocol, does not include these features.
• UDP without any flow control mechanisms continues, potentially using up the
available bandwidth given up by TCP.
This is known as TCP starvation/UDP dominance .
ICMP Redirect
ICMP Redirect messages are used by routers to notify the sender of a packet that
there is a better route available for a particular destination.
• R1 and R2, are connected to the same Ethernet segment as host PCA.
• The IPv4 default gateway of PCA is the IPv4 address of router R1.
• PCA sends a packet for PCX to its default gateway R1.
• R1 examines its routing table and determines the next hop as router R2, on the same
Ethernet segment as PCA.
• R1 forwards the packet out the same interface used to receive the packet from PCA.
• R1 also sends an ICMP Redirect message informing PCA of a better route to PCX by
way of R2.
The ICMPv6 Redirect message functions the same way as the Redirect message for
ICMPv4, with one additional feature. PCA can now send IPv6 packets directly to PCB
even though it is on a different IPv6 network.
Figure 1-23 ICMP Redirect
Implementing RIPng
•RIP is an IGP that is used in smaller networks.
•A distance vector routing protocol that uses hop count (15 Max) as a
routing metric.
•There are three versions of RIP: RIPv1 & RIPv2 (IPv4) ,and RIPng (IPv6).
Upon completing this section, you will be able to:
• Describe general RIP characteristics
• Describe how to configure and verify basic RIPng
• Describe how to configure RIPng to share default routes
• Analyze the RIPng database
As a routing loop-prevention technique, RIP implements:
•Split horizon, prevents routing information from being sent out the same
interface from which it was received.
•Split horizon with poison reverse is a similar technique but sends the
update with a metric of 16, which is considered unreachable by RIP.
•RIP is also capable of load balancing traffic over equal-cost paths. The
default is four equal-cost paths.
• RIP will choose the direct path—the one over the 100-Mbps link—
because the destination is only 2 hops away. The hop count over the
three 1-Gbps links is 4.
• In this case, RIP will choose the worse path.
• A more advanced protocol, such as OSPF or EIGRP, would not choose the
path over the weak, 100-Mbps link. Traffic would be forwarded over the
1-Gbps links.
• By default, RIPv2 automatically summarizes networks at major networkautomatically summarizes networks at major network boundariesboundaries,
summarizing routes to the classful network addressto the classful network address.
• To modify the default RIPv2 behavior of automatic summarization, use the
no auto-summary router configuration mode command:
Router(config-router)#Router(config-router)# no auto-summaryno auto-summary
The ip summary-address rip ip-address network-mask interface command is used to
summarize an address or subnet under a specific interface. AKA manual summarization
Router(config-if)# ip summary-address rip 102.0.0 255.255.0.0Router(config-if)# ip summary-address rip 102.0.0 255.255.0.0
There are two major differences between RIPv2 and RIPng:
•RIPv2 advertises routes for IPv4 and uses IPv4 for transport,
while RIPng advertises routes for IPv6 and uses IPv6 for
transport.
•The configuration of RIPng is quite different when
compared to RIPv2 configuration
Configuring RIPng
•We will begin by configuring basic RIPng on R2 using the topology in Figure 1-26 .
•RIPng is already preconfigured on R1.
•On R1, there is a static default route that is already configured, which routes all the
unknown traffic toward the Internet.
Basic RIPng Configuration
Next, IPv6 routing is enabled using the ipv6 unicast-routing command.
While IPv4 routing is enabled by default on Cisco routers, IPv6 routing is not.
Set the name of the process to “CCNP_RIP.”
The routing process name does not need to
match between neighbor routers. AS
RIPng process name has local significance
Enable RIPng on interfaces Ethernet 0/1 and Loopback0 with the:
ipv6 rip name enable interface subcommand, as shown in Example above .
•f IPv6 is not enabled on the interface and you are trying to enable this same
interface for RIPng, the ipv6 rip namename enable command will be rejected.
•If you forgot to create a routing processIf you forgot to create a routing process using the ipv6 router rip name command
and you enable RIPng on an interfaceenable RIPng on an interface, the command will be accepted. In this case,
the RIPng process will be automatically created by Cisco IOS SoftwareRIPng process will be automatically created by Cisco IOS Software.
IPv6 RIP summary-address Command
•The concept of classful networks doesn’t exist in IPv6, so there isn’t any
automatic route summarization in RIPng.
•To configure RIPng to advertise summarized IPv6 addresses on an
interface, manual summarization, use the:
ipv6 rip summary-address command in interface configuration
mode.
In the Example below , the two loopback interfaces on R1 are summarized
out the Ethernet 0/3 interface for the RIPng process CCNP_RIP.
Propagating a Default Route
In Figure 1-27 , R1 has a
configured static default route
that that sends all the
unknown traffic toward the
Internet.
There are two ways of sharing information about default routes through RIPng:
•The first way is specified through the originate keyword. In this case, R1 shares
the default route information alongside the information about every other route.
•The second way of sharing default route information is to use the only keyword.
With only , R1 will only share the default route with R2.
The show ipv6 rip next-hops output:
•Next hops are either the addresses of
IPv6 RIP neighbors from which you have
learned routes or explicit next hops that
are received in IPv6 RIP advertisements.
The show ipv6 rip database output:
•The RIP process
•The route prefix.
•The route metric
•Installed and expired, the keyword “installed”
means the route is in the routing table.
•Expires in, in which if the countdown timer
reaches 0, the route is removed from the routing
table and marked expired
Summary
In this chapter, you learned about differentiating routing protocols, various network
technologies, connecting remote locations to a central location and RIPng. The chapter focused
on the following topics:
•The role of static routes and dynamic routing protocols in enterprise networks.
•The differences between IGP and EGP routing protocols.
•The three types of routing protocols: distance vector, link-state and path vector.
•The importance of convergence time and how route summarization reduced convergence time
and improves scalability.
•The four traffic types: unicast, multicast, anycast, and broadcast.
•The differences between point-to-point, broadcast, and NBMA networks.
•How point-to-point subinterfaces are used to overcome the limitations of NBMA networks.
•How VPNs are used to provide security of a public Internet.
•Common types of VPNs: MPLS-based VPNs, GRE+IPsec, and DMVPN.
•How a customer establishes connectivity with a service provider using a routing protocol and a
layer 3 MPLS VPN.
•How static GRE tunnels can establish virtual point-to-point links and support dynamic routing
protocols.
•Using DMVPN to provide fully meshed VPN connectivity with a simple hub-and -spoke
configuration.
•How DMVPN relies on NHRP, mGRE, and IPsec.
•The differences and similarities between RIPv2 and RIPng.
•How to configure RIPng.
•How to propagate a default route in RIPng.

Contenu connexe

Tendances

Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Sachin Morya
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guideAbel Saduwa
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)Ann Joseph
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switchingSumita Das
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 

Tendances (20)

Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
Mpls
MplsMpls
Mpls
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Ospf
OspfOspf
Ospf
 
Ospf routing protocol
Ospf routing protocolOspf routing protocol
Ospf routing protocol
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 

Similaire à CCNP Route

NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questionsrajasekar1712
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksReliance Comm
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Sasank Chaitanya
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterRobb Boyd
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 

Similaire à CCNP Route (20)

NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
Ospf
OspfOspf
Ospf
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
 
C0343015019
C0343015019C0343015019
C0343015019
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Networking
NetworkingNetworking
Networking
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Chapter07
Chapter07Chapter07
Chapter07
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

CCNP Route

  • 1. Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide CCNP ROUTE 300-101 Basic Network and Routing Concepts Chapter 1
  • 2. Basic Network and Routing Concepts • An overview of routing protocols that focuses on characteristics that describe their differences. • Describe how limitations of different underlying technologies affect routing protocols. • Closer look at how Layer 2 and Layer 3 VPNs affect routing protocols. • Dynamic Multipoint Virtual Private Network (DMVPN) is introduced as a scalable VPN solution • Configuration of a simple routing protocol RIPng, which supports Internet Protocol version 6 (IPv6).
  • 3. Differentiating Routing Protocols Upon completing this section, you will be able to: •Identify general enterprise network infrastructure •Describe the role of dynamic routing protocols within the enterprise network infrastructure •Identify the major areas of differencesmajor areas of differences among routing protocols •Describe the differences between IGP and EGP routing protocols •Describe the different types of routing protocols •Identify the importance of convergence •Describe route summarization •Describe what influences routing protocol scalability
  • 4. Enterprise Network Infrastructure • Network infrastructure of enterprises today can be complicated at first glance. • A large number of interconnected devices and differences between physical and logical topologies are just two reasons for this complexity. • Devices can be mapped into different areasDevices can be mapped into different areas according to the functionality that they provide in the network infrastructure
  • 5. Figure 1-1 Enterprise Network Infrastructure Enterprise Campus provides access to the network communications services and resources to end usersprovides access to the network communications services and resources to end users and devicesand devices. Single geographic location, designed using a hierarchical model: Access, Distribution and Core layers Enterprise edge provides remote sites with access to the same network services as users at the main site,provides remote sites with access to the same network services as users at the main site, aggregates private WAN linksaggregates private WAN links, VPN connections & Internet connectivity
  • 6.
  • 7. Figure 1-2 Role of Dynamic Routing Protocols The basic objective of routing protocols is to exchangeexchange network reachability informationnetwork reachability information between routers and dynamically adaptdynamically adapt to network changes.
  • 8. Figure 1-3 IGP versus EGP Interior Gateway Protocols (IGP): used within the organization, and they exchange the routes within anexchange the routes within an AAS Exterior Gateway Protocols (EGP): exchanging routes between different autonomous systemsexchanging routes between different autonomous systems. Border Gateway Protocol (BGP)
  • 9. Routing protocols can be divided into the following groups: •Distance vector protocols Determines the: • Direction (vector, Next hop or Exit interface) • Distance (such as link cost or number of hops) to any link in the network. • Distance vector protocols use routers as signposts along the path to the final destination. Uses Bellman-Ford algorithm •Link-state protocols: The link-state approach uses the Shortest Path First (SPF) algorithm to create an abstract of the exact topology of the entire network or at least within its area. A link-state routing protocol is like having a complete map of the network topology.
  • 10. Convergence describes the process of when routers notice change in the network, exchange the information about the change, and perform necessary calculations to reevaluate the best routes. A converged network describes the state of the network in which allall routers have the same view on the network topologyrouters have the same view on the network topology. Convergence time describes how fast network devices can reach the state ofhow fast network devices can reach the state of convergence after a topology change.convergence after a topology change. Convergence time affected by: Routing protocol timers Route summarization
  • 11. • Route summarization enables you to reduce routing overhead and improve stability and scalability of routing by reducing the amount of routingreducing the amount of routing information that is maintained and exchanged between routersinformation that is maintained and exchanged between routers. • The purpose of route summarization is to squeeze several subnets into onesqueeze several subnets into one aggregate entry that describes all of themaggregate entry that describes all of them. As shown in Figure 1-5 , route summarization reduces the size of routing tables • Different routing protocols support different route summarization options. • IP addresses must be hierarchically assigned in contiguous blocks across the network.
  • 12. Route Protocol Scalability •As a network grows and becomes larger, the risk of routing protocol instability or long convergence times becomes greaterinstability or long convergence times becomes greater. •Scalability describes the ability of a routing protocol to support further network growth. Scalability factors include: •Number of routes •Number of adjacent neighbors •Number of routers in the network •Network design •Frequency of changes •Available resources (CPU and memory) OSPF supports the use of hierarchical areas that divide one large network intodivide one large network into several subdomainsseveral subdomains. EIGRP supports the configuration of stub routers to optimize information exchange process and improve scalability.
  • 13. Understanding Network Technologies You can establish routing protocols over a variety of different networkestablish routing protocols over a variety of different network technologiestechnologies. It is important to consider the limitations of a specific solutionconsider the limitations of a specific solution and how it affects routing protocol deployments and operation. Upon completing this section, you will be able to: •Differentiate traffic types •Differentiate IPv6 address types •Describe ICMPv6 neighbor discovery •Differentiate network types •Describe the impact of NBMA (Non-broadcast Multiaccess) on routing protocols •Describe how the Internet breaks enterprise routing
  • 14. Traffic types: •Unicast: Unicast addresses are used in a one-to-one contextused in a one-to-one context. Unicast traffic is exchangedexchanged only between one sender and one receiveronly between one sender and one receiver. •Multicast: Multicast addresses identify a group of interfaces across different devicesaddresses identify a group of interfaces across different devices. Traffic that is sent to multiple destinations at the same time. • IPv4 multicast addresses is 224.0.0.0–239.255.255.255. • IPv6 reserved multicast addresses have the prefix FF00::/8. •Anycast: IPv6 anycast address is assigned to an interface on more than one nodeassigned to an interface on more than one node. Packet is routed to the nearest interface that has this address. • A common use case for anycast is the Internet DNS server. •Broadcast: IPv4 broadcast addresses are used when sending traffic to all devices in the subnet. IPv6 does not use a broadcast addressIPv6 does not use a broadcast address • Local broadcast address 255.255.255.255. • Directed broadcast address N.N.N.255
  • 15. Traffic Types •Early routing protocols used only broadcasts to exchange routing information. •All modern IGPs use multicast addresses to perform neighbor discovery, exchange routing information, and send updates.
  • 16. IPv6 Address Types There are several different basic types of IPv6 addresses. It is important that you are familiar with them, since some of them are also used by routing protocols. RFC 3587 specifies 2000::/3 to be global unicast address space that the IANA may allocate to the Regional Internet Registries (RIRs).
  • 17.  The following displays how IPv6 global unicast addresses are allocated by the IANA. • Only a small portion (12.5%) of the IPv6 address space is being allocated to the Registries in the range of 2001::/16. IPv6 Global Unicast Address
  • 18. IPv6 Global Unicast Address • The global unicast address typically consists of: • A 48-bit global routing prefix • A 16-bit subnet ID • A 64-bit interface ID (typically in EUI-64 bit format discussed later). Global Routing Prefix Subnet ID Interface ID 2001 0010 0008 21B:D5FF:FE5B:A408 /23 Registry /32 ISP Prefix /48 Site Prefix /64 Subnet Prefix
  • 19. Network Types Not all Layer 2 network topologies support all traffic types. Because unsupported traffic types influence the operation of routing protocols, it is important to be aware of the limitations of specific network topologies. Point-to-point network: A network that connects a single pair of routers. A serial link is an example of a point-to-point connection. Broadcast network: A network that can connect many routers along with the capability to address a single message to all of the attached routers. Ethernet is an example of a broadcast network. Non-broadcast Multiaccess (NBMA) network: A network that can support many routers but does not have broadcast capability. (ex: Frame Relay) The sender needs to create an individual copy of the same packet for each recipient if it wishes to inform all connected neighbors.
  • 20. Frame Relay NBMA Operation Frame Relay Star Topologies Star Topology (Hub and Spoke) The simplest WAN topology is a star. In this topology, SPAN Engineering Company has a central site in Chicago that acts as a hub and hosts the primary services.
  • 21. Frame Relay Operation Frame Relay Mesh Topologies Using Frame Relay Mesh, a network designer can build multiple connectionsbuild multiple connections simply by configuring additional VCs on each existing physical linksimply by configuring additional VCs on each existing physical link. This software upgrade grows the star topology to a full mesh topology without the expense of additional hardware or dedicated lines.
  • 22. Split horizon: For distance vector routing protocols, the split-horizon rule reduces routing loops. As illustrated in Figure 1-9, it prevents a routing update that is received on an interface from being forwarded out of the same interface. The hub router receives the update on its physical interface but cannot forward it through the same interface to other spoke routers. Split horizon is not a problem if there is a single PVC on a physical interface because this type of connection would be point-to-point. If you use a single Frame Relay, multipoint interfacesingle Frame Relay, multipoint interface to interconnect multiple sites, reachability issues may be a problemreachability issues may be a problem because of the NBMA nature of Frame Relay. The Frame Relay NBMA topology can cause the following issues: NBMA Networks
  • 23. Neighbor discovery: OSPF over NBMA networks works in a nonbroadcast network mode by default, and neighbors are not automatically discovered. You can statically configure neighbors, but an additional configuration is required to manually configure the hub as a Designated Router (DR). OSPF treats an NBMA network like Ethernet by default, and on Ethernet, a DR is needed to exchange routing information between all routers on a segment. Therefore, only the hub router can act as a DR because it is the only router that has PVCs with all other routers.
  • 24. Broadcast replication: For multipoint connections over a single interface that terminates at multiple PVCs, the router must replicate broadcast packets, such as routingsuch as routing update broadcastsupdate broadcasts, on each PVC to the remote routerson each PVC to the remote routers. These replicated broadcast packets consume bandwidth and cause significant latency variations in user traffic.
  • 25. Subinterfaces: Subinterfaces overcome some limitations of NBMA networks. You can choose between two different types of subinterfacestwo different types of subinterfaces: •Point-to-point subinterfaces: Each subinterface, which provides connectivity between two routers, uses its own subnet for addressing. Connectivity looks just like several physical point-to-point links, no issues with neighbor discovery and the split-horizon rule. •Point-to-multipoint subinterfaces: One subnet is shared between all virtual circuits. Because private address space is normally used for addressing, saving address space is not a significant benefit. Point-to-point subinterfaces are the preferred and recommended choice.
  • 26. Figure 1-11 Configuring Static Routing Routing Over the Internet Principles of Static Routing A static route can be used in the following circumstances: •When it is undesirable to have dynamic routing updates forwarded across slow bandwidth links, such as a dialup link. •When the administrator needs total control over the routes used by the router. •When a backup to a dynamically recognized route is necessary. •When it is necessary to reach a network accessible by only one path (a stub network). •When a router connects to its ISP and needs to have only a default route pointing toward the ISP router, rather than learning many routes from the ISP. •When a router is underpowered and does not have the CPU or memory resources necessary to handle a dynamic routing protocol.
  • 27. Configuring a Static Default Route •In some circumstances, a router does not need to recognize the details of remote networks. •The router is configured to send all traffic in a particular direction; this is known as a default route. •To create a static default route, use the normal ip route command, but with the destination network and its subnet mask both set to 0.0.0.0. • In Figure 1-12 , to reach the 172.16.1.0/24 network, Router B still needs a static route pointing out its S0/0/0 interface. • Entering the show ip route command on Router A in Figure 1-12 returns the information shown in Example 1-1 .
  • 28. Basic PPP Overview •Point-to-Point Protocol (PPP) has several advantages over its predecessor High-Level Data Link Control (HDLC). The following example enables PPP encapsulation on interface serial 0/0/0: R1# configure terminal R1(config)# interface serial 0/0/0 R1(config-if)# encapsulation ppp PPP Authentication Overview RFC 1334 defines two protocols for authentication, PAP and CHAP. •PAP is a very basic two-way process, there is no encryption. The username and password are sent in plaintext. •CHAP authentication sends a challenge to the remote device. •The remote device must encrypt the challenge value with a shared secret and return the encrypted value and its name to the local router in a response message. •LCP (Link Control Protocol) establishes the link & chooses the authentication protocol.
  • 29. PPPoE •PPP can be used on all serial links including those links created with older dialup analog and ISDN modems. •In addition, ISPs often use PPP as the data-link protocol over broadband connections like DSL. •With PPP enabled, ISPs can use PPP to assign each customer one public IPv4 address. •During the CHAP to authenticate customers ,ISPs can check accounting records. Ethernet links do not natively support PPP. A solution to this problem was created: PPP over Ethernet (PPPoE). •PPPoE allows the sending of PPP frames encapsulated inside Ethernet frames. •The modem converts the Ethernet frames to PPP frames by stripping the Ethernet headers. •The modem then transmits the PPP frames on the ISP’s DSL network. •ISP could continue to use the same authentication model as with analog and ISDN. To create a PPP tunnel, the configuration uses a dialer interface. •The PPP configuration is placed on the dialer interface, not on the physical interface. •The PPP CHAP configuration usually defines one-way authentication. •The physical Ethernet interface then enabled with the command pppoe enable •The maximum transmission unit (MTU) should be reduced to 1492, versus the default of 1500, to accommodate the PPPoE headers.
  • 30. • Frame Relay is a switched WAN technology where virtual circuits (VCs) are created by a service provider (SP) through the network. • VCs provide a bidirectional communication path from one device to another. • VCs are identified by DLCIs • DLCI values typically are assigned by the Frame Relay service provider • Frame Relay allows multiple logical VCs to be multiplexed over a single physical interface. • Frame Relay is statistically multiplexed, meaning that it transmits only one frame at a time, but that many logical connections can co-exist on a single physical line.
  • 31. Star Topology (Hub and Spoke) The simplest WAN topology is a star. In this topology, SPAN Engineering Company has a central site in Chicago that acts as a hub and hosts the primary services. Using Frame Relay Mesh, a network designer can build multiple connections simply by configuring additional VCs on each existing link This software upgrade grows the star topology to a full mesh topology without the expense of additional hardware or dedicated lines.
  • 32. Figure 1-16 EIGRP on a Physical Frame Relay Interface • Split horizon is disabled by default on Frame Relay physical interfaces. • Therefore, routes from Router R2 can be sent to Router R3, and vice versa. • Note that Inverse ARP does not provide dynamic mapping for the communication between Routers R2 and R3 because they are not connected with a PVC. • You must configure this mapping manually. 192.168.1.101 255.255.255.0 192.168.1.102 102 broadcast
  • 33. MPLS •MPLS (Multiprotocol Label Switching) is a transport mechanism that is developed to carry data over the packet-switched network. •Designed to offer a great level of flexibility to operate seamlessly with any Layer 3 or Layer 2 technology. •VPN service enables service providers and large enterprises to build flexible, scalable, and secure VPNs. • MPLS is a switching mechanism. • A 32 bit header (label) is inserted by the provider (PE) router. • Packets are switched through the MPLS network. • The label is removed by the PE at the other end of the MPLS network. • To the customer, it looks like a Layer 2 or Layer 3 connection.
  • 34. Figure 1-17 Layer 3 MPLS VPN Solutions Two types of MPLS VPNs have been developed: 1. The Layer 2 MPLS VPN backbone solution is providing the Layer 2 service across the backbone, R1 and R2 are connected together directly using the same IP subnet. If you deploy a routing protocol over the Layer 2 MPLS VPN, neighbor adjacency is established between your R1 and R2 routers. The figure presents the connectivity through the backbone. 2. The Layer 3 MPLS VPN backbone solution is providing the Layer 3 service across the backbone, R1 and R2 are connected to ISP edge routers. A separate IP subnet is used on each side. If you deploy a routing protocol over this VPN,routing protocol over this VPN, service providers need to participate in itservice providers need to participate in it. Neighbor adjacency is established between your R1 and theR1 and the closest PE router and between your R2 and it’sclosest PE router and between your R2 and it’s closest PE router.closest PE router.
  • 35. A GRE tunnel (Generic Routing Encapsulation) a point-to-point tunnel developed by Ciscopoint-to-point tunnel developed by Cisco that allows a wide variety of passenger protocols to be transported over the IP network. It comprises three main components: 1.A passenger protocol or encapsulated protocol, such as IPv4 or IPv6 that is beingthat is being encapsulated.encapsulated. 2.A carrier protocol, GRE in this example, that is defined by Cisco as a multiprotocol carrier protocol and described in RFC 2784. 3.A transport protocol, such as IP, that carries the encapsulated protocolcarries the encapsulated protocol. GRE has the following characteristics: •GRE uses a protocol-type field in the GRE header to support the encapsulation of any OSI Layer 3 protocol (IPv4, IPv6, IPX, AppleTalk). •GRE itself is stateless. It does not include any flow-control mechanisms, by default. •GRE does not include any strong security mechanisms to protect its payload. •The GRE header, along with the tunneling IP header, creates at least 24 bytes of additional overhead for tunneled packets.
  • 36. With a generic hub-and-spoke topology, youyou can typically implement static tunnelscan typically implement static tunnels (typically GRE with IPsec) between central hub and remote spokes, as shown in Figure Dynamic Multipoint Virtual Private Network: The main characteristics of the mGRE configuration are as follows: •OnlyOnly one tunnel interface needs to be configured on a router to supportone tunnel interface needs to be configured on a router to support multiple remote GRE peersmultiple remote GRE peers. In a hub-and-spoke network, a single mGREa single mGRE tunnel interface on the hub accommodates many spoke GRE peerstunnel interface on the hub accommodates many spoke GRE peers. •In order to learn about the IP addresses of other peer, devices using mGRE require NHRP to build dynamic GRE tunnels. Peers can also use dynamically assigned addresses that will then be used by NHRP when registering with the hub. (NHRP - Next Hop Resolution Protocol) •mGRE interfaces also support unicast, multicast, and broadcast traffic.
  • 37. Multipoint GRE An important characteristic of the DMVPN solution is scalabilityDMVPN solution is scalability, which is enabled by deploying Multipoint GRE (mGRE). mGRE technology enables a single GRE interfacesingle GRE interface to support multiple GRE tunnelsto support multiple GRE tunnels and simplifies the complexity of the configuration. Figure 1-20 shows two options for implementing mGRE functionality: •The left diagram shows the hub that is optimized with an mGRE interface. In this setup, only a single interface is required on the hub. However, you must deploy NHRPmust deploy NHRP for the hub to learn spoke addressesfor the hub to learn spoke addresses and correctly provision the spoke-to-hub GRE tunnels. •In the right diagram, all devices in a hub-and-spoke network use the mGRE interface. Using NHRP, these devices can establish a partial mesh or full mesh of GRE tunnels. By only configuring a single mGRE interface on each device, the configuration is greatlyconfiguration is greatly simplified and manageability improved.simplified and manageability improved.
  • 38. • NHRP is a client-server protocol, the hub acts as the server, and the spokes are clients. • NHRP is used by routers to determine the IP address of the next hop in IP tunneling networks. • NHRP creates a mapping for a tunnel IP address to the physical interface IP address for each spoke at the hub. Client-Server Protocol
  • 39. Authentication • Ensures that a message: • Comes from an authentic source and • Goes to an authentic destination Data confidentiality • Protecting data from eavesdroppers (encryption) • Aims at protecting the message contents from being intercepted by unauthenticated or unauthorized sources. Data integrity • Across the Internet, there is always the possibility that the data has been modified. Antireplay protection: • Antireplay protection verifies that each packet is unique and not duplicated. • VPN with IPsec supports • IP unicast only • IPsec with GRE supports • IP multicast • dynamic IGP routing protocols • non-IP protocols • IPsec has two encryption modes: • Tunnel mode • Transport mode Secure VPN
  • 40.  IPsec is best thought of as a set of features that protects IP data as it travels from one location to another.  IPsec can protect only the IP layer and up (transport layer and userdata).  IPsec cannot extend its services to the data link layer.  If protection of the data link layer is needed, then some form of link encryption is needed.  Encryption, Authentication and data integrity are NOT a requirement of IPsec, they’re optional (although heavily implemented) feature of IPsec.
  • 41. IPsec Security is also an important part of the DMVPN solution. •Security services are enabled by the use of the IPsec framework. •IPsec is a framework of open standards that define how to provide secure communications. •It relies on existing algorithms to implement the: • Encryption • Authentication • key exchange. IPsec provides four important security services: •Confidentiality (encryption): The sender can encrypt the packets before transmitting them across a network. •Data integrity: The receiver can verify that the data was transmitted through the path without being changed or altered in any way. •Authentication: Authentication ensures that the connection is made with the desired communication partner. •Antireplay protection: Verifies that each packet is unique and not duplicated. • IPsec packets are protected by comparing the sequence number of the received packets with a sliding window on the destination host.
  • 42. Routing and TCP/IP Operations •Routing protocols are part of the TCP/IP protocol suite, specifically at Layer 3. •Network communications requires a wide range of protocols responsible for a wide variety of tasks to ensure communications between devices. MSS (Maximum Segment Size) , Fragmentation, and PMTUD (Path MTU Discovery) •Most transmission links enforce a small maximum packet length, 1500 Bytes, called the maximum transmission unit (MTU). •When a router receives an IPv4 packet larger than the MTUIPv4 packet larger than the MTU of the outgoing interface, it must fragment the packet unless the DFmust fragment the packet unless the DF (Don’t Fragment) bit is set in the IPv4 header. Fragmentation causes several issues including the following: •CPU and memory overhead in fragmentation of the packet •CPU and memory overhead in destination devices during reassembly of packets •Retransmission of the entire packet when one fragment is dropped •Firewalls that do Layer 4 through Layer 7 filtering may have trouble processing IPv4 fragments correctly To avoid fragmentation of an IPv4 packet •TCP MSS Sets the MTU of the outgoing interface minus 40 bytes. •The 40 bytes take into account the 20-byte IPv4 header and 20-byte TCP header. Example: a TCP MSS of 1460, which is 1500 bytes for the Ethernet MTU, minus 20 bytes for the IPv4 header, and minus 20 bytes for the TCP header. MSS Maximum Size Segment
  • 43. Path MTU Discovery (PMTUD) was developed for the purpose of determining the lowest MTU along a path from the packet’s source to destination. PMTUD is only supported by TCP. PMTUD is performed by a host using the full MSS on the outgoing interface: •When the TCP packets that exceeds the MTU cannot be fragmented; DF (Don’t Fragment) bit is set. •The router along the path will drop the packet and send an ICMP “Destination Unreachable” message back to the originator of the packet. •The ICMP Destination Unreachable message contains the code indicating “fragmentation needed and DF set” and the packet was dropped. •The source receives the ICMP message, reduces the size of the MSS to be within the MTU, and retransmits the message. *The PMTUD operations for IPv6 are similar to that of PMTUD for IPv4 TCP Starvation TCP incorporates mechanisms for reliability, flow control, and congestion avoidance. • TCP tries to do its part by backing off on bandwidth, called slow start . UDP is faster and simpler data transmissions protocol, does not include these features. • UDP without any flow control mechanisms continues, potentially using up the available bandwidth given up by TCP. This is known as TCP starvation/UDP dominance .
  • 44. ICMP Redirect ICMP Redirect messages are used by routers to notify the sender of a packet that there is a better route available for a particular destination. • R1 and R2, are connected to the same Ethernet segment as host PCA. • The IPv4 default gateway of PCA is the IPv4 address of router R1. • PCA sends a packet for PCX to its default gateway R1. • R1 examines its routing table and determines the next hop as router R2, on the same Ethernet segment as PCA. • R1 forwards the packet out the same interface used to receive the packet from PCA. • R1 also sends an ICMP Redirect message informing PCA of a better route to PCX by way of R2. The ICMPv6 Redirect message functions the same way as the Redirect message for ICMPv4, with one additional feature. PCA can now send IPv6 packets directly to PCB even though it is on a different IPv6 network. Figure 1-23 ICMP Redirect
  • 45. Implementing RIPng •RIP is an IGP that is used in smaller networks. •A distance vector routing protocol that uses hop count (15 Max) as a routing metric. •There are three versions of RIP: RIPv1 & RIPv2 (IPv4) ,and RIPng (IPv6). Upon completing this section, you will be able to: • Describe general RIP characteristics • Describe how to configure and verify basic RIPng • Describe how to configure RIPng to share default routes • Analyze the RIPng database As a routing loop-prevention technique, RIP implements: •Split horizon, prevents routing information from being sent out the same interface from which it was received. •Split horizon with poison reverse is a similar technique but sends the update with a metric of 16, which is considered unreachable by RIP. •RIP is also capable of load balancing traffic over equal-cost paths. The default is four equal-cost paths.
  • 46. • RIP will choose the direct path—the one over the 100-Mbps link— because the destination is only 2 hops away. The hop count over the three 1-Gbps links is 4. • In this case, RIP will choose the worse path. • A more advanced protocol, such as OSPF or EIGRP, would not choose the path over the weak, 100-Mbps link. Traffic would be forwarded over the 1-Gbps links.
  • 47.
  • 48. • By default, RIPv2 automatically summarizes networks at major networkautomatically summarizes networks at major network boundariesboundaries, summarizing routes to the classful network addressto the classful network address. • To modify the default RIPv2 behavior of automatic summarization, use the no auto-summary router configuration mode command: Router(config-router)#Router(config-router)# no auto-summaryno auto-summary The ip summary-address rip ip-address network-mask interface command is used to summarize an address or subnet under a specific interface. AKA manual summarization Router(config-if)# ip summary-address rip 102.0.0 255.255.0.0Router(config-if)# ip summary-address rip 102.0.0 255.255.0.0
  • 49. There are two major differences between RIPv2 and RIPng: •RIPv2 advertises routes for IPv4 and uses IPv4 for transport, while RIPng advertises routes for IPv6 and uses IPv6 for transport. •The configuration of RIPng is quite different when compared to RIPv2 configuration
  • 50. Configuring RIPng •We will begin by configuring basic RIPng on R2 using the topology in Figure 1-26 . •RIPng is already preconfigured on R1. •On R1, there is a static default route that is already configured, which routes all the unknown traffic toward the Internet. Basic RIPng Configuration Next, IPv6 routing is enabled using the ipv6 unicast-routing command. While IPv4 routing is enabled by default on Cisco routers, IPv6 routing is not.
  • 51. Set the name of the process to “CCNP_RIP.” The routing process name does not need to match between neighbor routers. AS RIPng process name has local significance Enable RIPng on interfaces Ethernet 0/1 and Loopback0 with the: ipv6 rip name enable interface subcommand, as shown in Example above . •f IPv6 is not enabled on the interface and you are trying to enable this same interface for RIPng, the ipv6 rip namename enable command will be rejected. •If you forgot to create a routing processIf you forgot to create a routing process using the ipv6 router rip name command and you enable RIPng on an interfaceenable RIPng on an interface, the command will be accepted. In this case, the RIPng process will be automatically created by Cisco IOS SoftwareRIPng process will be automatically created by Cisco IOS Software.
  • 52. IPv6 RIP summary-address Command •The concept of classful networks doesn’t exist in IPv6, so there isn’t any automatic route summarization in RIPng. •To configure RIPng to advertise summarized IPv6 addresses on an interface, manual summarization, use the: ipv6 rip summary-address command in interface configuration mode. In the Example below , the two loopback interfaces on R1 are summarized out the Ethernet 0/3 interface for the RIPng process CCNP_RIP.
  • 53. Propagating a Default Route In Figure 1-27 , R1 has a configured static default route that that sends all the unknown traffic toward the Internet. There are two ways of sharing information about default routes through RIPng: •The first way is specified through the originate keyword. In this case, R1 shares the default route information alongside the information about every other route. •The second way of sharing default route information is to use the only keyword. With only , R1 will only share the default route with R2.
  • 54. The show ipv6 rip next-hops output: •Next hops are either the addresses of IPv6 RIP neighbors from which you have learned routes or explicit next hops that are received in IPv6 RIP advertisements. The show ipv6 rip database output: •The RIP process •The route prefix. •The route metric •Installed and expired, the keyword “installed” means the route is in the routing table. •Expires in, in which if the countdown timer reaches 0, the route is removed from the routing table and marked expired
  • 55. Summary In this chapter, you learned about differentiating routing protocols, various network technologies, connecting remote locations to a central location and RIPng. The chapter focused on the following topics: •The role of static routes and dynamic routing protocols in enterprise networks. •The differences between IGP and EGP routing protocols. •The three types of routing protocols: distance vector, link-state and path vector. •The importance of convergence time and how route summarization reduced convergence time and improves scalability. •The four traffic types: unicast, multicast, anycast, and broadcast. •The differences between point-to-point, broadcast, and NBMA networks. •How point-to-point subinterfaces are used to overcome the limitations of NBMA networks. •How VPNs are used to provide security of a public Internet. •Common types of VPNs: MPLS-based VPNs, GRE+IPsec, and DMVPN. •How a customer establishes connectivity with a service provider using a routing protocol and a layer 3 MPLS VPN. •How static GRE tunnels can establish virtual point-to-point links and support dynamic routing protocols. •Using DMVPN to provide fully meshed VPN connectivity with a simple hub-and -spoke configuration. •How DMVPN relies on NHRP, mGRE, and IPsec. •The differences and similarities between RIPv2 and RIPng. •How to configure RIPng. •How to propagate a default route in RIPng.

Notes de l'éditeur

  1. 4.1.2.4 Frame Relay Topologies 4.1.2.5 Frame Relay Topologies (Cont.)
  2. 4.1.2.4 Frame Relay Topologies 4.1.2.5 Frame Relay Topologies (Cont.)