| Chapter 1:
Overview of Scalable Internetworks |
| Chapter
Overview
|
|
| 1.1 |
The Hierarchical Network
Design Model
| 1.1.1 |
Core, Distribution and
Access Layer |
| 1.1.2 |
Defining the Router's Role
in a Hierarchy |
| 1.1.3 |
Defining the Router's Role
in a Hierarchy (cont.) |
|
|
| 1.2 |
Key Characteristics of
Scalable Internetworks
| 1.2.1 |
Key
Characteristics |
| 1.2.2 |
Make the Network Reliable
and Available |
| 1.2.3 |
Make the Network
Responsive |
| 1.2.4 |
Make the Network Efficient |
| 1.2.5 |
Make the Network Efficient
(cont.) |
| 1.2.6 |
Make the Network Adaptable |
| 1.2.7 |
Make the Network
Accessible but Secure |
|
|
| Chapter
Summary
|
|
| Chapter
Quiz
|
|
|
|
| Chapter 2:
Advanced IP Addressing Management |
| Chapter
Review |
|
| Chapter
Overview |
|
| 2.1 |
Classful Addressing
| 2.1.1 |
Internet's
Address Architecture |
| 2.1.2 |
Advertising
Network Addresses |
| 2.1.3 |
IPv4
Address Formats |
|
|
| 2.2 |
Classless Interdomain
Routing
| 2.2.1 |
Why
Classless Interdomain Routing? |
| 2.2.2 |
Classless
Addressing |
| 2.2.3 |
How
CIDR Works |
|
|
| 2.3 |
IP Address Issues and
Solutions
| 2.3.1 |
Addressing
Issues |
| 2.3.2 |
Using
Addressing Hierarchies |
| 2.3.3 |
Slowing
IP Address Depletion |
| 2.3.4 |
IP
Version 6 (IPv6) |
|
|
| 2.4 |
Variable-Length Subnet
Masks
| 2.4.1 |
Variable-Length
Subnet Mask Overview |
| 2.4.2 |
Classless
and Classful Updates |
| 2.4.3 |
Calculating
VLSMs |
| 2.4.4 |
VLSM
Examples |
|
|
| 2.5 |
Route Summarization
Overview
| 2.5.1 |
What is
Route Summarization? |
| 2.5.2 |
Summarizing
Within an Octet |
| 2.5.3 |
Summarizing
Addresses in a VLSM-Designed Network |
| 2.5.4 |
Route
Sumarization Implementation Considerations |
|
|
| 2.6 |
Private IP Addresses
and NAT
| 2.6.1 |
Using
Private Addressing |
| 2.6.2 |
Translating
Inside Local Addresses |
| 2.6.3 |
NAT
Implementation Considerations |
|
|
| 2.7 |
Using IP Unnumbered
| 2.7.1 |
Understanding
IP Unnumbered |
| 2.7.2 |
Configuring
IP Unnumbered on Serial Interfaces |
| 2.7.3 |
RIP
with IP Unnumbered Configured Properly |
| 2.7.4 |
Host
Routers |
| 2.7.5 |
RIP
with IP Unnumbered Configured Improperly |
| 2.7.6 |
Examples
of Routing Updates |
| 2.7.7 |
Using a
Different Subnet Mask and a Different Major Net |
|
|
| 2.8 |
Easy IP/DHCP
| 2.8.1 |
What is
Easy IP? |
| 2.8.2 |
Cisco
IOS DHCP Server |
| 2.8.3 |
Configuration
of the Cisco IOS DHCP Server |
|
|
| 2.9 |
Using Helper Address
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 3:
Routing Protocols Overview |
| Chapter
Review |
|
| Chapter
Overview |
|
| 3.1 |
Routing
|
|
| 3.2 |
Convergence
| 3.2.1 |
Change
in a Network Topology |
| 3.2.2 |
Accommodating
Topological Changes |
| 3.2.3 |
Convergence
Time |
|
|
| 3.3 |
Route Calculation
| 3.3.1 |
Communication
among Routers |
| 3.3.2 |
Initiating
Updates |
| 3.3.3 |
Routing
Metrics |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 4: OSPF
in a Single Area |
| Chapter
Review |
|
| Chapter
Overview |
|
| 4.1 |
OSPF Overview
| 4.1.1 |
Issues
Addressed by OSPF |
| 4.1.2 |
OSPF
Terminology |
| 4.1.3 |
OSPF
Packet Formats |
|
|
| 4.2 |
Steps to OSPF Operation
| 4.2.1 |
List of
Steps |
| 4.2.2 |
Step 1:
Establishing Router Adjacencies |
| 4.2.3 |
Step 2:
Electing the DR and BDR |
| 4.2.4 |
Step 3:
Discovering Routes |
| 4.2.5 |
Step 4:
Choosing Routes |
| 4.2.6 |
Step 5:
Maintaining Routing Information |
|
|
| 4.3 |
Configuring OSPF on
Routers within a Single Area
| 4.3.1 |
Basic
Configuration Steps |
| 4.3.2 |
Optional
Configuration Commands |
|
|
| 4.4 |
OSPF Over Non-Broadcast
Networks
| 4.4.1 |
Non-Broadcast
Multiple Access (NBMA)
Overview |
| 4.4.2 |
Configuring
OSPF for Nonbroadcast Networks |
| 4.4.3 |
Point-to-Point
Subinterfaces |
| 4.4.4 |
Point-to-MultiPoint
Mode |
| 4.4.5 |
Point-to-Multipoint
Interfaces |
| 4.4.6 |
Broadcast
Interfaces |
|
|
| 4.5 |
Verifying OSPF
Operation
| 4.5.1 |
Show
Commands |
| 4.5.2 |
Clear
and Debug Commands |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 5: OSPF
with Multiple Areas |
| Chapter
Review |
|
| Chapter
Overview |
|
| 5.1 |
Creating Multiple OSPF
Areas
| 5.1.1 |
Issues
with Large One-Area OSPF Networks |
| 5.1.2 |
OSPF
Hierarchical Routing |
| 5.1.3 |
OSPF
Multi-Area Components |
| 5.1.4 |
OSPF
Packet Formats |
| 5.1.5 |
Types
of LInk-States Advertisements (LSAs) |
| 5.1.6 |
Types
of Area |
| 5.1.7 |
Calculating
Costs for External Routes |
|
|
| 5.2 |
Configuring OSPF
Operation Across Multiple Areas
| 5.2.1 |
Forwarding
Packets in a Multi-Area Network |
| 5.2.2 |
Flooding
LSUs to Multiple Areas |
| 5.2.3 |
Updating
the Routing Table |
|
|
| 5.3 |
Using and Configuring
OSPF Multi-Area Component
| 5.3.1 |
Configuring
OSPF ABRs |
| 5.3.2 |
Using
Route Summarization |
| 5.3.3 |
Configuring
Route Summarization |
|
|
| 5.4 |
Using Stub and Totally
Stubby Areas
| 5.4.1 |
What
Are Stub and Totally Stubby Areas |
| 5.4.2 |
Stub
and Totally Stub Area Restrictions |
| 5.4.3 |
Configuring
Stub and Totally Stubby Areas |
| 5.4.4 |
OSPF
Stub Area Configuration Example |
| 5.4.5 |
OSPF
Totally Stubby Configuration Example |
|
|
| 5.5 |
Meeting the Backbone
Area Requirements
| 5.5.1 |
Creating
a Virtual Link |
| 5.5.2 |
Configuring
Virtual Links |
| 5.5.3 |
OSPF
Virtual Link Configuration Example |
|
|
| 5.6 |
Using and Configuring
NSSA
|
|
| 5.7 |
Verifying OSPF
Operation
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 6:
Configuring EIGRP |
| Chapter
Review |
|
| Chapter
Overview |
|
| 6.1 |
EIGRP Concepts
| 6.1.1 |
Backward
Compatibility with IGRP |
| 6.1.2 |
EIGRP
Design |
| 6.1.3 |
EIGRP
Support for Novell IPX RIP and SAP |
| 6.1.4 |
EIGRP
Terminology |
|
|
| 6.2 |
EIGRP Technology
| 6.2.1 |
EIGRP
Features |
| 6.2.2 |
Neighbour
Discovery and Recovery |
| 6.2.3 |
Reliable
Transport Protocol |
| 6.2.4 |
The
Diffused Update Algorithm |
| 6.2.5 |
Protocol-Specific
Modules |
|
|
| 6.3 |
EIGRP Data Structure
|
|
| 6.4 |
Convergence Using EIGRP
| 6.4.1 |
DUAL
Algorithm and Feasible Secession |
| 6.4.2 |
Alternative
Paths |
|
|
| 6.5 |
Enhanced IGPR Operation
| 6.5.1 |
Building
the Neighbor Table |
| 6.5.2 |
Discovering
Routes |
| 6.5.3 |
Choosing
Routes |
| 6.5.4 |
Maintaining
Routes |
|
|
| 6.6 |
Configuring EIGRP
| 6.6.1 |
Configuring
EIGRP for IP |
| 6.6.2 |
Configuring
EIGRP Support for IPX |
| 6.6.3 |
Configuring
EIGRP for IPS SAP Updates |
| 6.6.4 |
EIGRP
for IPX SAP Configuration Example |
|
|
| 6.7 |
Summarizing EIGRP
Routes for IP
| 6.7.1 |
Classful
Boundary |
| 6.7.2 |
Manual
Summarization Example |
|
|
| 6.8 |
Verifying Enhanced IGRP
Operation
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 7:
Route Optimization |
| Chapter
Review |
|
| Chapter
Overview |
|
| 7.1 |
Controlling Routing
Update Traffic
| 7.1.1 |
How to
prevent routing update exchange and propagation |
| 7.1.2 |
Using
and Configuring the Passive-Interface Command |
| 7.1.3 |
Using
and Configuring Route Filters |
| 7.1.4 |
Route
Filtering Configuration Example |
|
|
| 7.2 |
Default Routing
| 7.2.1 |
Gateway
of Last Resort |
| 7.2.2 |
Gateway
of Last Resort for a Non-Local Domain |
| 7.2.3 |
Gateway
of Last Resort Fails for a Local Domain |
| 7.2.4 |
The
Solution |
| 7.2.5 |
Gateway
of Last Resort Still Works When Links Fails |
| 7.2.6 |
Using
IP Classless |
|
|
| 7.3 |
Static Routes and
Gateways of Last Resort
| 7.3.1 |
Improper
use of static routes and gateways of last resort |
| 7.3.2 |
Using
Default and Static Routes in Complicated Networks |
| 7.3.3 |
Dealing
with Too Much Default Routing Information |
| 7.3.4 |
Fixing
a Default Gateway Loop |
| 7.3.5 |
Policy
Routing |
|
|
| 7.4 |
The 0.0.0.0 Default
Route
| 7.4.1 |
RIP and
0.0.0.0 |
| 7.4.2 |
Scenario |
| 7.4.3 |
Using
0.0.0.0 with IGRP |
| 7.4.4 |
What to
Do Instead of Using 0.0.0.0 with IGRP |
| 7.4.5 |
Using
Floating Static Routes |
| 7.4.6 |
The
default-information originate command |
|
|
| 7.5 |
Using Multiple Routing
Protocols
| 7.5.1 |
What
is Redistribution |
| 7.5.2 |
Redistribution
Implementation Considerations |
| 7.5.3 |
Selecting
the Best Path |
| 7.5.4 |
Redistribution
Guidelines |
| 7.5.5 |
Redistribution
and EIGRP |
| 7.5.6 |
Modifying
Administrative Distance (Optional) |
| 7.5.7 |
IP
Static Route Filtering Configurations Example |
| 7.5.8 |
Redistribution
Example Using ip default-network |
| 7.5.9 |
Redistribution
Example Using distance |
| 7.5.10 |
Verifying
Redistribution Operation |
|
|
| 7.6 |
RIP and OSPF
Redistribution
| 7.6.1 |
Case
Study: Configuring a RIP Network |
| 7.6.2 |
Adding
OSPF to the Center of a RIP Network |
| 7.6.3 |
Adding
OSPF to the Center of a RIP Network |
| 7.6.4 |
Configuration
File Examples |
| 7.6.5 |
Adding
OSPF Areas |
| 7.6.6 |
Configuration
File Examples |
| 7.6.7 |
Setting
Up Mutual Redistribution |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 8:
Basic BGP |
| Chapter
Review |
|
| Chapter
Overview |
|
| 8.1 |
Autonomous Systems
| 8.1.1 |
Segregation
of the Internet into Autonomous Systems |
| 8.1.2 |
Static
Routing, Default Routing and Dynamic Routing |
| 8.1.3 |
Characteristics
of an Autonomous System |
| 8.1.4 |
Stub
Autonomous System |
| 8.1.5 |
Multihomed
Nontransit AS |
| 8.1.6 |
Multihomed
Transit AS |
| 8.1.7 |
BGP and ISP
Connectivity Basics |
| 8.1.8 |
When Not to
Use BGP to Connect to an ISP |
|
|
| 8.2 |
BGP Basic Operations
|
|
| 8.3 |
BGP Neighbor Negotiation
| 8.3.1 |
OPEN Message
Format |
| 8.3.2 |
Finite State
Machine Perspective Example |
| 8.3.3 |
NOTIFICATION
Message |
| 8.3.4 |
KEEPALIVE
Message |
| 8.3.5 |
UDATE
Message and Routing Updates |
| 8.3.6 |
Network Layer
Reachability Information |
| 8.3.7 |
Withdrawn
Routes |
| 8.3.8 |
Path
Attributes |
|
|
| 8.4 |
BGP Basic Configuration
| 8.4.1 |
EBGP and IBGP |
| 8.4.2 |
Configuring
EBGP for a Single Connection to an ISP |
| 8.4.3 |
Simple BGP
Configuration Example |
| 8.4.4 |
Compare and
Contrast EBGP and IBGP Configurations |
|
|
| 8.5 |
Verifying BGP Operation
|
|
| 8.6 |
Peering
| 8.6.1 |
Configuration
Example: Building Peering Sessions |
| 8.6.2 |
How to
Maintain BGP Continuity Inside an AS |
| 8.6.3 |
How Synchronization
within an AS Occurs |
|
|
| 8.7 |
The Routing Process
| 8.7.1 |
Route
Exchange |
| 8.7.2 |
Routes
Received from Peers |
| 8.7.3 |
A Routing
Environment Example |
| 8.7.4 |
BGP Route
Maps |
| 8.7.5 |
CIDR and
Aggregate Addresses |
| 8.7.6 |
How to
Control BGP Routes with BGP Attributes |
| 8.7.7 |
The Next-Hop Attribute |
| 8.7.8 |
Next-Hop
Behavior on Multiaccess Media |
| 8.7.9 |
Next-Hop Behavior over NBMA |
| 8.7.10 |
Describe the
AS_path Attribute |
|
|
| 8.8 |
Issue with Using Private AS
Numbers
| 8.8.1 |
Conserving AS
Numbers |
| 8.8.2 |
Configuration
Example: Removing Private AS Numbers |
| 8.8.3 |
Why and How
to Manipulate AS_path Information |
| 8.8.4 |
Configuration
Example: AS_path Manipulation |
| 8.8.5 |
The Local
Preference Attribute |
| 8.8.6 |
Configuration
Example: Setting The Local Preference Attribute |
| 8.8.7 |
The Multiexit
Discriminator (MED) Attribute |
| 8.8.8 |
Configuration
Example: MED |
| 8.8.9 |
ORIGIN Attribute |
| 8.8.10 |
The BGP
Decision Process |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 9:
Integrating BGP into ISP Networks |
| Chapter
Review |
|
| Chapter
Overview |
|
| 9.1 |
Route Reflectors
| 9.1.1 |
Route
Reflector Basics |
| 9.1.2 |
Internal
Peers without Route Reflectors |
| 9.1.3 |
Internal
Peers with Route Reflectors |
| 9.1.4 |
Naming
Conventions and Rules of Operation |
|
|
| 9.2 |
Route Filtering and
Manipulation Process (Policies)
| 9.2.1 |
Route
Filtering and Attribute Manipulation |
| 9.2.2 |
Route
Filtering and Manipulation Process Actions |
| 9.2.3 |
How to
ID and Filter Routes Based on NLRI |
| 9.2.4 |
Configuring
BGP Filtering Using Prefix Lists |
| 9.2.5 |
Route
Filtering Configuration Example Using a Single Prefix List |
| 9.2.6 |
The Community
Attribute |
| 9.2.7 |
Configuration
Example: Communities |
| 9.2.8 |
Peer Group |
| 9.2.9 |
Configuration
Example: Peer Groups |
|
|
| 9.3 |
Issues of
Redundancy, Symmetry and Load Balancing
| 9.3.1 |
Introduction
to Redundancy, Symmetry, and Load Balancing |
| 9.3.2 |
Why
Redundancy is Desired |
| 9.3.3 |
How to
Use Dynamically Learned Default Routes |
| 9.3.4 |
Configuration
Example: Dynamically Learned Defaults |
| 9.3.5 |
How to
Use Statically Set Default Routes |
| 9.3.6 |
Configuration
Example: Statically Set Default Routes |
| 9.3.7 |
Symmetry |
| 9.3.8 |
Loading
Balancing |
| 9.3.9 |
Single-Homed
Connections |
|
|
| 9.4 |
Describe Various
Multihomed Connections to a Single Provider and Multiple Providers
| 9.4.1 |
Describe
Multihomed Connections with A Single Provider |
| 9.4.2 |
Default Only, One Primary,
and One Backup Link Scenario |
| 9.4.3 |
Multihomed
Scenarios with Multiple Providers |
|
|
| 9.5 |
Configure BGP to
Interact with IGPs
| 9.5.1 |
Injecting
Information Dynamically into BGP |
| 9.5.2 |
Injection
of Unwanted or Faulty Information |
| 9.5.3 |
Injecting
Information Statically into BGP |
| 9.5.4 |
Inject
Information Dynamically into BGP (Configuration) |
| 9.5.5 |
Inject
Routing Information Statically into BGP |
|
|
| 9.6 |
Practical BGP Design
Example
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter
10: Managing IP Traffice |
| Chapter
Review |
|
| Chapter
Overview |
|
| 10.1 |
Traffic Management
Techniques
|
|
| 10.2 |
Configuring IP Standard
Access Lists
| 10.2.1 |
Filtering |
| 10.2.2 |
Inbound
Access List Processing |
| 10.2.3 |
Outbound
Access List Processing |
| 10.2.4 |
Access
Lists Use Wildcard Mask |
| 10.2.5 |
Access
List Configuration Tasks |
| 10.2.6 |
Implicit
Masks |
| 10.2.7 |
Configuration
Principles for Access Lists |
| 10.2.8 |
Location
of Standard Access Lists |
|
|
| 10.3 |
Restricting Virtual
Terminal Access
| 10.3.1 |
How to
Control vty Access |
| 10.3.2 |
Virtual
Terminal Line Commands |
|
|
| 10.4 |
Configuring Extended
Access Lists
| 10.4.1 |
Higher
Degree of Control |
| 10.4.2 |
Extended
Access List Processing |
| 10.4.3 |
Extended
IP Access List Command |
| 10.4.4 |
Extended
Access List Examples |
| 10.4.5 |
Configuring
Named Access Lists |
| 10.4.6 |
Location
of Extended Access Lists |
| 10.4.7 |
Verifying
Access-List Configuration |
|
|
| 10.5 |
Using an Alternative to
Access Lists
| 10.5.1 |
Configuring
Null Interface |
| 10.5.2 |
Null
Interface Command |
|
|
| 10.6 |
Configuration
Lock-and-Key Security (Dynamic Access Lists)
| 10.6.1 |
What is
Lock-and-Key |
| 10.6.2 |
Lock-and-Key
Configuration Tips |
| 10.6.3 |
Verify
Lock-and-Key Configuration |
| 10.6.4 |
Lock-and-Key
Configuration Examples |
|
|
| 10.7 |
Configuration IP
Session Filtering (Reflexive Access Lists)
| 10.7.1 |
About
Reflexive Access Lists |
| 10.7.2 |
How
Reflexive Access Lists Implement Session Filtering |
| 10.7.3 |
Configure
Reflexive Access Lists |
| 10.7.4 |
Reflexive
Access Lists
Configuration Examples |
|
|
| 10.8 |
Context-Based Access
Control
| 10.8.1 |
Functions |
| 10.8.2 |
How
CBAC Works |
| 10.8.3 |
The
CBAC Process |
| 10.8.4 |
Configuration
Tasks |
| 10.8.5 |
Basic
Configuration |
| 10.8.6 |
Configuration
Global Timeouts and Thresholds |
| 10.8.7 |
Defining
an
Inspection Rule |
| 10.8.8 |
Configuring
Logging and Audit Trial |
| 10.8.9 |
Monitoring
and Maintaining CBAC |
| 10.8.10 |
Configuration
Examples |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|