Chapter 1-10 Outlines

Outline:

Chapter 1: Overview of Scalable Internetworks
Chapter Overview 
1.1 The Hierarchical Network Design Model
1.1.1 Core, Distribution and Access Layer
1.1.2 Defining the Router's Role in a Hierarchy
1.1.3 Defining the Router's Role in a Hierarchy (cont.)
1.2 Key Characteristics of Scalable Internetworks
1.2.1 Key Characteristics
1.2.2 Make the Network Reliable and Available
1.2.3 Make the Network Responsive
1.2.4 Make the Network Efficient
1.2.5 Make the Network Efficient (cont.)
1.2.6 Make the Network Adaptable
1.2.7 Make the Network Accessible but Secure
Chapter Summary
Chapter Quiz 
Chapter 2: Advanced IP Addressing Management
Chapter Review 
Chapter Overview 
2.1 Classful Addressing
2.1.1 Internet's Address Architecture
2.1.2 Advertising Network Addresses
2.1.3 IPv4 Address Formats
2.2 Classless Interdomain Routing
2.2.1 Why Classless Interdomain Routing?
2.2.2 Classless Addressing
2.2.3 How CIDR Works
2.3 IP Address Issues and Solutions
2.3.1 Addressing Issues
2.3.2 Using Addressing Hierarchies
2.3.3 Slowing IP Address Depletion
2.3.4  IP Version 6 (IPv6)
2.4 Variable-Length Subnet Masks
2.4.1 Variable-Length Subnet Mask Overview
2.4.2 Classless and Classful Updates
2.4.3 Calculating VLSMs
2.4.4  VLSM Examples
2.5 Route Summarization Overview
2.5.1 What is Route Summarization?
2.5.2 Summarizing Within an Octet
2.5.3 Summarizing Addresses in a VLSM-Designed Network
2.5.4  Route Sumarization Implementation Considerations
2.6 Private IP Addresses and NAT
2.6.1 Using Private Addressing
2.6.2 Translating Inside Local Addresses
2.6.3 NAT Implementation Considerations
2.7 Using IP Unnumbered
2.7.1 Understanding IP Unnumbered
2.7.2 Configuring IP Unnumbered on Serial Interfaces
2.7.3 RIP with IP Unnumbered Configured Properly
2.7.4  Host Routers
2.7.5 RIP with IP Unnumbered Configured Improperly
2.7.6 Examples of Routing Updates
2.7.7 Using a Different Subnet Mask and a Different Major Net
2.8 Easy IP/DHCP
2.8.1 What is Easy IP?
2.8.2 Cisco IOS DHCP Server
2.8.3 Configuration of the Cisco IOS DHCP Server
2.9 Using Helper Address
2.9.1 Overview
2.9.2 Server Location
2.9.3 IP Helper-Address Examples
Chapter Summary
Chapter Quiz 
Chapter 3: Routing Protocols Overview
Chapter Review 
Chapter Overview 
3.1 Routing
3.1.1 Types of Routing
3.1.2 Static Routing
3.1.3 Distance-Vector Routing
3.1.4 Link-State Routing
3.1.5 Hybridized Routing
3.2 Convergence
3.2.1 Change in a Network Topology
3.2.2 Accommodating Topological Changes
3.2.3 Convergence Time
3.3 Route Calculation
3.3.1 Communication among Routers
3.3.2 Initiating Updates
3.3.3 Routing Metrics
Chapter Summary
Chapter Quiz 
Chapter 4: OSPF in a Single Area
Chapter Review
Chapter Overview 
4.1 OSPF Overview
4.1.1 Issues Addressed by OSPF
4.1.2 OSPF Terminology
4.1.3 OSPF Packet Formats
4.2 Steps to OSPF Operation
4.2.1 List of Steps
4.2.2 Step 1: Establishing Router Adjacencies
4.2.3 Step 2: Electing the DR and BDR
4.2.4 Step 3: Discovering Routes
4.2.5 Step 4: Choosing Routes
4.2.6 Step 5: Maintaining Routing Information
4.3 Configuring OSPF on Routers within a Single Area
4.3.1 Basic Configuration Steps
4.3.2 Optional Configuration Commands
4.4 OSPF Over Non-Broadcast Networks
4.4.1 Non-Broadcast Multiple Access (NBMA) Overview
4.4.2 Configuring OSPF for Nonbroadcast Networks
4.4.3 Point-to-Point Subinterfaces
4.4.4 Point-to-MultiPoint Mode
4.4.5 Point-to-Multipoint Interfaces
4.4.6 Broadcast Interfaces
4.5 Verifying OSPF Operation
4.5.1 Show Commands
4.5.2 Clear and Debug Commands
Chapter Summary
Chapter Quiz 
Chapter 5: OSPF with Multiple Areas
Chapter Review
Chapter Overview 
5.1 Creating Multiple OSPF Areas
5.1.1 Issues with Large One-Area OSPF Networks
5.1.2 OSPF Hierarchical Routing
5.1.3 OSPF Multi-Area Components
5.1.4 OSPF Packet Formats
5.1.5 Types of LInk-States Advertisements (LSAs)
5.1.6 Types of Area
5.1.7 Calculating Costs for External Routes
5.2 Configuring OSPF Operation Across Multiple Areas
5.2.1 Forwarding Packets in a Multi-Area Network
5.2.2 Flooding LSUs to Multiple Areas
5.2.3 Updating the Routing Table
5.3 Using and Configuring OSPF Multi-Area Component
5.3.1 Configuring OSPF ABRs
5.3.2 Using Route Summarization
5.3.3 Configuring Route Summarization
5.4 Using Stub and Totally Stubby Areas
5.4.1 What Are Stub and Totally Stubby Areas
5.4.2 Stub and Totally Stub Area Restrictions
5.4.3 Configuring Stub and Totally Stubby Areas
5.4.4 OSPF Stub Area Configuration Example
5.4.5 OSPF Totally Stubby Configuration Example
5.5 Meeting the Backbone Area Requirements
5.5.1 Creating a Virtual Link
5.5.2 Configuring Virtual Links
5.5.3 OSPF Virtual Link Configuration Example
5.6 Using and Configuring NSSA
5.6.1 When to Use NSSA
5.6.2 How NSSA Operates
5.6.3 Configuring NSSA
5.7 Verifying OSPF Operation
5.7.1 Show Command
Chapter Summary
Chapter Quiz 
Chapter 6: Configuring EIGRP
Chapter Review
Chapter Overview 
6.1 EIGRP Concepts
6.1.1 Backward Compatibility with IGRP
6.1.2 EIGRP Design
6.1.3 EIGRP Support for Novell IPX RIP and SAP
6.1.4 EIGRP Terminology
6.2 EIGRP Technology
6.2.1 EIGRP Features
6.2.2 Neighbour Discovery and Recovery
6.2.3 Reliable Transport Protocol
6.2.4 The Diffused Update Algorithm
6.2.5 Protocol-Specific Modules
6.3 EIGRP Data Structure
6.3.1 EIGRP Tables
6.3.2 Route Tagging with EIGRP
6.3.3 EIGRP Packet Types
6.4 Convergence Using EIGRP
6.4.1 DUAL Algorithm and Feasible Secession
6.4.2 Alternative Paths
6.5 Enhanced IGPR Operation
6.5.1 Building the Neighbor Table
6.5.2 Discovering Routes
6.5.3 Choosing Routes
6.5.4 Maintaining Routes
6.6 Configuring EIGRP
6.6.1 Configuring EIGRP for IP
6.6.2 Configuring EIGRP Support for IPX
6.6.3 Configuring EIGRP for IPS SAP Updates
6.6.4 EIGRP for IPX SAP Configuration Example
6.7 Summarizing EIGRP Routes for IP
6.7.1 Classful Boundary
6.7.2 Manual Summarization Example
6.8 Verifying Enhanced IGRP Operation
6.8.1 Show Commands
Chapter Summary
Chapter Quiz 
Chapter 7: Route Optimization
Chapter Review 
Chapter Overview 
7.1 Controlling Routing Update Traffic
7.1.1 How to prevent routing update exchange and propagation
7.1.2 Using and Configuring the Passive-Interface Command
7.1.3 Using and Configuring Route Filters
7.1.4 Route Filtering Configuration Example
7.2 Default Routing
7.2.1 Gateway of Last Resort
7.2.2 Gateway of Last Resort for a Non-Local Domain
7.2.3 Gateway of Last Resort Fails for a Local Domain
7.2.4 The Solution
7.2.5 Gateway of Last Resort Still Works When Links Fails
7.2.6 Using IP Classless
7.3 Static Routes and Gateways of Last Resort
7.3.1 Improper use of static routes and gateways of last resort
7.3.2 Using Default and Static Routes in Complicated Networks
7.3.3 Dealing with Too Much Default Routing Information
7.3.4  Fixing a Default Gateway Loop
7.3.5 Policy Routing
7.4 The 0.0.0.0 Default Route
7.4.1 RIP and 0.0.0.0
7.4.2 Scenario
7.4.3 Using 0.0.0.0 with IGRP
7.4.4  What to Do Instead of Using 0.0.0.0 with IGRP
7.4.5 Using Floating Static Routes
7.4.6 The default-information originate command
7.5 Using Multiple Routing Protocols
7.5.1 What is Redistribution
7.5.2 Redistribution Implementation Considerations
7.5.3 Selecting the Best Path
7.5.4  Redistribution Guidelines
7.5.5 Redistribution and EIGRP
7.5.6 Modifying Administrative Distance (Optional)
7.5.7 IP Static Route Filtering Configurations Example
7.5.8 Redistribution Example Using ip default-network
7.5.9 Redistribution Example Using distance
7.5.10 Verifying Redistribution Operation
7.6 RIP and OSPF Redistribution
7.6.1 Case Study: Configuring a RIP Network
7.6.2 Adding OSPF to the Center of a RIP Network
7.6.3 Adding OSPF to the Center of a RIP Network
7.6.4  Configuration File Examples
7.6.5 Adding OSPF Areas
7.6.6 Configuration File Examples
7.6.7 Setting Up Mutual Redistribution
Chapter Summary
Chapter Quiz 
Chapter 8: Basic BGP
Chapter Review 
Chapter Overview 
8.1 Autonomous Systems
8.1.1 Segregation of the Internet into Autonomous Systems
8.1.2 Static Routing, Default Routing and Dynamic Routing
8.1.3 Characteristics of an Autonomous System
8.1.4 Stub Autonomous System
8.1.5 Multihomed Nontransit AS
8.1.6 Multihomed Transit AS
8.1.7 BGP and ISP Connectivity Basics
8.1.8 When Not to Use BGP to Connect to an ISP
8.2 BGP Basic Operations
8.2.1 BGPv4
8.2.2 How BGP Works
8.2.3 BGP Message Header Format
8.3 BGP Neighbor Negotiation
8.3.1 OPEN Message Format
8.3.2 Finite State Machine Perspective Example
8.3.3 NOTIFICATION Message
8.3.4  KEEPALIVE Message
8.3.5 UDATE Message and Routing Updates
8.3.6 Network Layer Reachability Information
8.3.7 Withdrawn Routes
8.3.8 Path Attributes
8.4 BGP Basic Configuration
8.4.1 EBGP and IBGP
8.4.2 Configuring EBGP for a Single Connection to an ISP
8.4.3 Simple BGP Configuration Example
8.4.4 Compare and Contrast EBGP and IBGP Configurations
8.5 Verifying BGP Operation
8.5.1 Show Commands
8.6 Peering
8.6.1 Configuration Example: Building Peering Sessions
8.6.2 How to Maintain BGP Continuity Inside an AS
8.6.3 How Synchronization within an AS Occurs
8.7 The Routing Process
8.7.1 Route Exchange
8.7.2 Routes Received from Peers
8.7.3 A Routing Environment Example
8.7.4 BGP Route Maps
8.7.5 CIDR and Aggregate Addresses
8.7.6 How to Control BGP Routes with BGP Attributes
8.7.7 The Next-Hop Attribute
8.7.8 Next-Hop Behavior on Multiaccess Media
8.7.9 Next-Hop Behavior over NBMA
8.7.10 Describe the AS_path Attribute
8.8 Issue with Using Private AS Numbers
8.8.1 Conserving AS Numbers
8.8.2 Configuration Example: Removing Private AS Numbers
8.8.3 Why and How to Manipulate AS_path Information
8.8.4 Configuration Example: AS_path Manipulation
8.8.5 The Local Preference Attribute
8.8.6 Configuration Example: Setting The Local Preference Attribute
8.8.7 The Multiexit Discriminator (MED) Attribute
8.8.8 Configuration Example: MED
8.8.9 ORIGIN Attribute
8.8.10 The BGP Decision Process
Chapter Summary
Chapter Quiz 
Chapter 9: Integrating BGP into ISP Networks
Chapter Review 
Chapter Overview 
9.1 Route Reflectors
9.1.1 Route Reflector Basics
9.1.2 Internal Peers without Route Reflectors
9.1.3 Internal Peers with Route Reflectors
9.1.4 Naming Conventions and Rules of Operation
9.2 Route Filtering and Manipulation Process (Policies)
9.2.1 Route Filtering and Attribute Manipulation
9.2.2 Route Filtering and Manipulation Process Actions
9.2.3 How to ID and Filter Routes Based on NLRI
9.2.4 Configuring BGP Filtering Using Prefix Lists
9.2.5 Route Filtering Configuration Example Using a Single Prefix List
9.2.6 The Community Attribute
9.2.7 Configuration Example: Communities
9.2.8 Peer Group
9.2.9 Configuration Example: Peer Groups
9.3 Issues of Redundancy, Symmetry and Load Balancing
9.3.1 Introduction to Redundancy, Symmetry, and Load Balancing
9.3.2 Why Redundancy is Desired
9.3.3 How to Use Dynamically Learned Default Routes
9.3.4  Configuration Example: Dynamically Learned Defaults
9.3.5 How to Use Statically Set Default Routes
9.3.6 Configuration Example: Statically Set Default Routes
9.3.7 Symmetry
9.3.8 Loading Balancing
9.3.9 Single-Homed Connections
9.4 Describe Various Multihomed Connections to a Single Provider and Multiple Providers
9.4.1 Describe Multihomed Connections with A Single Provider
9.4.2 Default Only, One Primary, and One Backup Link Scenario
9.4.3 Multihomed Scenarios with Multiple Providers
9.5 Configure BGP to Interact with IGPs
9.5.1 Injecting Information Dynamically into BGP
9.5.2 Injection of Unwanted or Faulty Information
9.5.3 Injecting Information Statically into BGP
9.5.4 Inject Information Dynamically  into BGP (Configuration)
9.5.5 Inject Routing Information Statically into BGP
9.6 Practical BGP Design Example
9.6.1 Example Problem
9.6.2 Problem 1
9.6.3 Problem 2
Chapter Summary
Chapter Quiz 
Chapter 10: Managing IP Traffice
Chapter Review 
Chapter Overview 
10.1 Traffic Management Techniques
10.1.1 Managing IP Traffic
10.1.2 IP Access Lists
10.2 Configuring IP Standard Access Lists
10.2.1 Filtering
10.2.2 Inbound Access List Processing
10.2.3 Outbound Access List Processing
10.2.4 Access Lists Use Wildcard Mask
10.2.5 Access List Configuration Tasks
10.2.6 Implicit Masks
10.2.7 Configuration Principles for Access Lists
10.2.8 Location of Standard Access Lists
10.3 Restricting Virtual Terminal Access
10.3.1 How to Control vty Access
10.3.2 Virtual Terminal Line Commands
10.4 Configuring Extended Access Lists
10.4.1 Higher Degree of Control
10.4.2 Extended Access List Processing
10.4.3 Extended IP Access List Command
10.4.4  Extended Access List Examples
10.4.5 Configuring Named Access Lists
10.4.6 Location of Extended Access Lists
10.4.7 Verifying Access-List Configuration
10.5 Using an Alternative to Access Lists
10.5.1 Configuring Null Interface
10.5.2 Null Interface Command
10.6 Configuration Lock-and-Key Security (Dynamic Access Lists)
10.6.1 What is Lock-and-Key
10.6.2 Lock-and-Key Configuration Tips
10.6.3 Verify Lock-and-Key Configuration
10.6.4  Lock-and-Key Configuration Examples
10.7 Configuration IP Session Filtering (Reflexive Access Lists)
10.7.1 About Reflexive Access Lists
10.7.2 How Reflexive Access Lists Implement Session Filtering
10.7.3 Configure Reflexive Access Lists
10.7.4  Reflexive Access Lists Configuration Examples
10.8 Context-Based Access Control
10.8.1 Functions
10.8.2 How CBAC Works
10.8.3 The CBAC Process
10.8.4  Configuration Tasks
10.8.5 Basic Configuration
10.8.6 Configuration Global Timeouts and Thresholds
10.8.7 Defining an Inspection Rule
10.8.8  Configuring Logging and Audit Trial
10.8.9 Monitoring and Maintaining CBAC
10.8.10 Configuration Examples
Chapter Summary
Chapter Quiz