Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9781587202490 | 1587202492
- Cover: Paperback
- Copyright: 3/2/2010
Preparing for the CCNP exam? Working as a network professional? Here are all the CCNP-level commands for the Implementing Cisco IP Routing (ROUTE) exam you need in one handy resource. The CCNP ROUTE Portable Command Guide is filled with valuable, easy-to-access information and is portable enough for use whether you're in the server room or the equipment closet.
Scott Empson is the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada. He teaches Cisco routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. Hans Roth is an instructor in the electrical/electronic engineering technology department at Red River College in Winnipeg, Canada.
Introduction | p. xv |
Network Design Requirements | p. 1 |
Cisco Hierarchical Model of Network Design | p. 1 |
Cisco Enterprise Composite Network Model | p. 2 |
Cisco Service-Oriented Network Architecture | p. 3 |
Routing Protocol Comparison | p. 4 |
Where to Implement Routing Protocols | p. 4 |
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Network Lifecycle | p. 5 |
Implementing an EIGRP-based Solution | p. 7 |
Configuring EIGRP | p. 8 |
EIGRP Auto-Summarization | p. 10 |
Passive EIGRP Interfaces | p. 10 |
"Pseudo" Passive EIGRP Interfaces | p. 11 |
Injecting a Default Route into EIGRP: Redistribution of a Static Route | p. 11 |
Injecting a Default Route into EIGRP: IP Default Network | p. 12 |
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 | p. 13 |
Accepting Exterior Routing Information: default-information | p. 14 |
Load Balancing: Maximum Paths | p. 14 |
Load Balancing: Variance | p. 15 |
Bandwidth Use | p. 15 |
Authentication | p. 16 |
Stub Networks | p. 17 |
EIGRP Unicast Neighbors | p. 19 |
EIGRP over Frame Relay: Dynamic Mappings | p. 19 |
EIGRP over Frame Relay: Static Mappings | p. 20 |
EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces | p. 22 |
EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces | p. 24 |
EIGRP over MPLS: Layer 2 VPN | p. 26 |
EIGRP over MPLS: Layer 3 VPN | p. 27 |
Verifying EIGRP | p. 29 |
Troubleshooting EIGRP | p. 30 |
Configuration Example: EIGRP | p. 30 |
Implementing a Scalable Multiarea Network OSPF-based Solution | p. 35 |
Configuring OSPF | p. 36 |
Using Wildcard Masks with OSPF Areas | p. 37 |
Configuring Multiarea OSPF | p. 38 |
Loopback Interfaces | p. 38 |
Router ID | p. 38 |
DR/BDR Elections | p. 39 |
Passive Interfaces | p. 39 |
Modifying Cost Metrics | p. 40 |
OSPF LSDB Overload Protection | p. 40 |
OSPF auto-cost reference-bandwidth | p. 41 |
Authentication: Simple | p. 41 |
Authentication: Using MD5 Encryption | p. 42 |
Timers | p. 43 |
Propagating a Default Route | p. 44 |
OSPF Special Area Types | p. 44 |
Stub Areas | p. 44 |
Totally Stubby Areas | p. 45 |
Not-So-Stubby Areas (NSSA) Stub Area | p. 46 |
NSSA Totally Stubby Areas | p. 46 |
Route Summarization | p. 47 |
Inter-Area Route Summarization | p. 47 |
External Route Summarization | p. 47 |
Configuration Example: Virtual Links | p. 48 |
OSPF and NBMA Networks | p. 49 |
Full-Mesh Frame Relay: NBMA on Physical Interfaces | p. 49 |
Full-Mesh Frame Relay: Broadcast on Physical Interfaces | p. 50 |
Full-Mesh Frame Relay: Point-to-Multipoint Networks | p. 52 |
Full-Mesh Frame Relay: Point-to-Point Networks with Subinterfaces | p. 53 |
OSPF over NBMA Topology Summary | p. 54 |
Verifying OSPF Configuration | p. 55 |
Troubleshooting OSPF | p. 55 |
Configuration Example: Single-Area OSPF | p. 56 |
Configuration Example: Multiarea OSPF | p. 59 |
Configuration Example: OSPF and NBMA Networks | p. 65 |
Configuration Example: OSPF and Broadcast Networks | p. 70 |
Configuration Example: OSPF and Point-to-Multipoint Networks | p. 74 |
Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces | p. 79 |
Implementing an IPv4-based Redistribution Solution | p. 85 |
Route Filtering Using the distribute-list Command | p. 86 |
Verifying Route Filters | p. 86 |
Configuration Example: Outbound Route Filters | p. 87 |
Configuration Example: Inbound Route Filters | p. 89 |
Using a Distribute List that References a Prefix List | p. 91 |
Using a Distribute List that References a Route Map | p. 92 |
Route Filtering Using Prefix Lists | p. 93 |
Policy Routing Using Route Maps | p. 96 |
Configuration Example: Route Maps | p. 97 |
Passive Interfaces | p. 100 |
Route Redistribution | p. 101 |
Assigning Metrics | p. 102 |
Redistributing Subnets | p. 102 |
Assigning E1 or E2 Routes in OSPF | p. 103 |
Defining Seed Metrics | p. 104 |
Redistributing Static Routes | p. 105 |
Redistributing OSPF Internal and External Routes | p. 105 |
Using Route Maps with Route Redistribution and Route Tags to Prevent Routing Loops | p. 105 |
Verifying Route Redistribution | p. 109 |
Administrative Distances | p. 109 |
Static Routes: permanent Keyword1 | p. 110 |
Floating Static Routes | p. 111 |
Static Routes and Recursive Lookups | p. 111 |
Implementing Path Control | p. 113 |
Offset Lists | p. 113 |
Cisco IOS IP Service Level Agreements | p. 114 |
Define One (or More) Probes | p. 115 |
Define One (or More) Tracking Objects | p. 116 |
Define the Action on the Tracking Object(s) | p. 116 |
Verify IP SLA Operations | p. 116 |
Policy Routing Using Route Maps | p. 117 |
Configuration Example: Route Maps | p. 120 |
Enterprise to ISP Connectivity | p. 125 |
Configuring BGP | p. 126 |
BGP and Loopback Addresses | p. 127 |
eBGP Multihop | p. 128 |
Verifying BGP Connections | p. 129 |
Troubleshooting BGP Connections | p. 129 |
Autonomous System Synchronization | p. 131 |
Default Routes | p. 132 |
Load Balancing | p. 132 |
Authentication | p. 133 |
Attributes | p. 133 |
Route Selection Decision Process | p. 133 |
Origin | p. 134 |
Next-Hop | p. 135 |
Autonomous System Path: Remove Private Autonomous System | p. 136 |
Autonomous System Path: Prepend | p. 137 |
Weight: The Weight Attribute | p. 139 |
Weight: Access Lists | p. 141 |
Weight: Route Maps | p. 142 |
Local Preference: bgp default local-preference Command | p. 143 |
Local Preference: Route Maps | p. 145 |
Multi-Exit Discriminator (MED) | p. 146 |
Atomic Aggregate | p. 149 |
Regular Expressions | p. 150 |
Regular Expressions: Example One | p. 151 |
Regular Expressions: Example Two | p. 152 |
BGP Route Filtering Using Access Lists | p. 152 |
BGP Route Filtering Using Prefix Lists | p. 154 |
Configuration Example: BGP | p. 156 |
Implementing IPv6 | p. 163 |
Assigning IPv6 Addresses to Interfaces | p. 164 |
IPv6 on NBMA Networks | p. 165 |
Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6 | p. 166 |
IPv6 and RIPng | p. 167 |
Configuration Example: IPv6 RIP | p. 168 |
IPv6 and OSPFv3 | p. 170 |
Enabling OSPF for IPv6 on an Interface | p. 171 |
OSPFv3 and Stub/NSSA Areas | p. 171 |
Enabling an OSPF for IPv6 Area Range | p. 172 |
Enabling an IPv4 Router ID for OSPFv3 | p. 172 |
Forcing an SPF Calculation | p. 173 |
Configuration Example: OSPFv3 | p. 173 |
IPv6 and EIGRP | p. 177 |
Enabling EIGRP for IPv6 on an Interface | p. 177 |
Configuring the Percentage of Link Bandwidth Used by EIGRP | p. 178 |
Configuring Summary Addresses | p. 178 |
Configuring EIGRP Route Authentication | p. 178 |
Configuring EIGRP Timers | p. 179 |
Configuring EIGRP Stub Routing | p. 179 |
Logging EIGRP Neighbor Adjacency Changes | p. 180 |
Adjusting the EIGRP for IPv6 Metric Weights | p. 180 |
Route Redistribution | p. 180 |
IPv6 Transition Techniques | p. 181 |
Configuring Manual IPv6 Tunnels | p. 181 |
Configuring Generic Routing Encapsulation IPv6 Tunnels | p. 184 |
Configuring Automatic 6to4 Tunnels | p. 185 |
Configuring IPv4-Compatible IPv6 Tunnels | p. 186 |
Configuring ISATAP Tunnels | p. 186 |
Verifying IPv6 Tunnel Configuration and Operation | p. 187 |
Implementing NAT-PT for IPv6 | p. 187 |
Configuring Basic IPv6 to IPv4 Connectivity for NAT-PT for IPv6 | p. 188 |
Configuring IPv4-Mapped NAT-PT Connectivity | p. 189 |
Configuring Mappings for IPv6 Hosts Accessing IPv4 Hosts | p. 189 |
Configuring IPv6 Access Control Lists | p. 190 |
Configuring Mappings for IPv4 Hosts Accessing IPv6 Hosts | p. 191 |
Configuring Port Address Translation for IPv6 to IPv4 Address Mappings | p. 192 |
Verifying NAT-PT Configuration and Operation | p. 192 |
Static Routes in IPv6 | p. 193 |
Floating Static Routes in IPv6 | p. 194 |
Verifying and Troubleshooting IPv6 | p. 194 |
IPv6 Ping | p. 197 |
Routing for Branch Offices and Mobile Workers | p. 199 |
Verifying Existing Services | p. 199 |
Network Address Translation | p. 200 |
Dynamic Host Control Protocol | p. 200 |
Access Control Lists and Firewalls | p. 200 |
Policy-Based Routing and Web Cache Communication Protocol | p. 201 |
Hot Standby Router Protocol | p. 201 |
Configuration Example: DSL Using PPPoE | p. 201 |
Configure PPPoE (External Modem) | p. 203 |
Virtual Private Dial-Up Network (VPDN) Programming | p. 203 |
Configure the Dialer Interface | p. 204 |
For Password Authentication Protocol (PAP) | p. 204 |
For Challenge Handshake Authentication Protocol (CHAP) | p. 205 |
Define Interesting Traffic and Specify Default Routing | p. 205 |
Configure NAT Using an ACL | p. 205 |
Configure NAT Using a Route Map | p. 206 |
Configure DHCP Service | p. 207 |
Apply NAT Programming | p. 208 |
Verify a PPPoE Connection | p. 208 |
Configuring PPPoA | p. 209 |
Configure PPPoA on the WAN Interface (Using Subinterfaces) | p. 209 |
Configure the Dialer Interface | p. 210 |
For Password Authentication Protocol (PAP) | p. 210 |
For Challenge Handshake Authentication Protocol (CHAP) | p. 210 |
Verify a PPPoA Connection | p. 211 |
Configuring a Teleworker to a Branch Office VPN Using CLI | p. 211 |
Configure the ISAKMP Policy (IKE Phase 1) | p. 213 |
Configure Policies for the Client Group(s) | p. 213 |
Configure the IPsec Transform Sets (1KB Phase 2, Tunnel Termination) | p. 214 |
Configure Router AAA and Add VPN Client Users | p. 214 |
Create VPN Client Policy for Security Association Negotiation | p. 215 |
Configure the Crypto Map (IKE Phase 2) | p. 215 |
Apply the Crypto Map to the Interface | p. 216 |
Verify the VPN Service | p. 216 |
Configuring IPsec Site-to-Site VPNs Using CLI | p. 217 |
Configure the ISAKMP Policy (IKE Phase 1) | p. 217 |
Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) | p. 218 |
Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) | p. 218 |
Configure the Crypto Map (IKE Phase 2) | p. 218 |
Apply the Crypto Map to the Interface (IKE Phase 2) | p. 219 |
Configure the Firewall Interface ACL | p. 219 |
Verify the VPN Service | p. 220 |
Configuring GRE Tunnels over IPsec | p. 221 |
Create the GRE Tunnel | p. 221 |
Specify the IPsec VPN Authentication Method | p. 222 |
Specify the IPsec VPN IKE Proposals | p. 222 |
Specify the IPsec VPN Transform Sets | p. 223 |
Specify Static Routing for the GRE over IPsec Tunnel | p. 224 |
Specify Routing with OSPF for the GRE over IPsec Tunnel | p. 224 |
Enable the Crypto Programming at the Interfaces | p. 225 |
Appendix Create Your Own Journal Here | p. 226 |
Table of Contents provided by Ingram. All Rights Reserved. |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.