Home > Store

CCNP Routing and Switching Portable Command Guide, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

CCNP Routing and Switching Portable Command Guide, 2nd Edition

eBook

  • Your Price: $30.39
  • List Price: $37.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2015
  • Dimensions: 6" x 9"
  • Edition: 2nd
  • eBook
  • ISBN-10: 0-13-399091-5
  • ISBN-13: 978-0-13-399091-1

CCNP Routing and Switching Portable Command Guide

All ROUTE (300-101) and SWITCH (300-115) Commands in One Compact, Portable Resource

Preparing for the CCNP® ROUTE or CCNP SWITCH exam? Working as a network professional? Here are all the CCNP-level commands you’ll need, in one handy resource. The CCNP Routing and Switching Portable Command Guide is filled with valuable, easy-to-access information, and it’s portable enough to use whether you’re in the server room or the equipment closet.

This guide helps you memorize commands and concepts as you prepare to pass the CCNP ROUTE (300-101) or CCNP SWITCH (300-115) exams. It summarizes all CCNP certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, offering tips and examples for applying them in real-world environments. Throughout, configuration examples deepen your understanding of how these commands are used in actual network designs.

Whenever you’re researching routing or switching solutions, you won’t find a quicker, more useful offline resource.

--Logical “how-to” topic groupings inside the front and back covers provide one-stop research

--Compact size makes it easy to carry with you, wherever you go

--Helps you review important commands before taking the CCNP ROUTE or CCNP SWITCH certification exam

--“Create Your Own Journal” appendix with blank, lined pages enables you to personalize the book for your own needs

--“What Do You Want to Do?” chart inside front and back covers helps you to quickly reference specific tasks

Sample Content

Table of Contents

Introduction xix

Part I: ROUTE

Chapter 1 Basic Network and Routing Concepts 1

Cisco Hierarchical Network Model 1

Cisco Enterprise Composite Network Model 2

Typically Used Routing Protocols 2

IGP Versus EGP Routing Protocols 3

Routing Protocol Comparison 3

Administrative Distance 3

Static Routes: permanent Keyword 4

Floating Static Routes 5

Static Routes and Recursive Lookups 5

Default Routes 6

Verifying Static Routes 6

Assigning IPv6 Addresses to Interfaces 7

Implementing RIP Next Generation (RIPng) 7

Verifying and Troubleshooting RIPng 8

Configuration Example: RIPng 9

IPv6 Ping 11

IPv6 Traceroute 12

Chapter 2 EIGRP Implementation 13

Configuring EIGRP 14

EIGRP Router ID 15

EIGRP Autosummarization 15

Passive EIGRP Interfaces 16

“Pseudo” Passive EIGRP Interfaces 17

EIGRP Timers 17

Injecting a Default Route into EIGRP: Redistribution of a Static Route 18

Injecting a Default Route into EIGRP: IP Default Network 18

Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 19

Accepting Exterior Routing Information: default-information 20

Load Balancing: Maximum Paths 20

Load Balancing: Variance 20

Bandwidth Use 21

Stub Networks 21

EIGRP Unicast Neighbors 22

EIGRP over Frame Relay: Dynamic Mappings 23

EIGRP over Frame Relay: Static Mappings 24

EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces 25

EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces 26

EIGRP over MPLS: Layer 2 VPN 28

EIGRP over MPLS: Layer 3 VPN 30

EIGRPv6 31

    Enabling EIGRPv6 on an Interface 31

    Configuring the Percentage of Link Bandwidth Used by EIGRPv6 32

    EIGRPv6 Summary Addresses 32

    EIGRPv6 Timers 32

    EIGRPv6 Stub Routing 32

    Logging EIGRPv6 Neighbor Adjacency Changes 33

    Adjusting the EIGRPv6 Metric Weights 33

EIGRP Address Families 33

Named EIGRP Configuration Modes 34

Verifying EIGRP and EIGRPv6 35

Troubleshooting EIGRP 37

Configuration Example: EIGRPv4 and EIGRPv6 using Named Address Configuration 37

Chapter 3 Implementing a Scalable Multiarea Network OSPF-Based Solution 41

OSPF Message Types 42

OSPF LSA Types 43

Configuring OSPF 44

Using Wildcard Masks with OSPF Areas 44

Configuring Multiarea OSPF 45

Loopback Interfaces 45

Router ID 46

DR/BDR Elections 46

Passive Interfaces 46

Modifying Cost Metrics 47

OSPF auto-cost reference-bandwidth 47

OSPF LSDB Overload Protection 48

Timers 48

IP MTU 49

Propagating a Default Route 49

OSPF Special Area Types 49

    Stub Areas 50

    Totally Stubby Areas 50

    Not-So-Stubby Areas 51

    Totally NSSA 51

Route Summarization 52

    Interarea Route Summarization 52

    External Route Summarization 52

Configuration Example: Virtual Links 52

    OSPF and NBMA Networks 53

    OSPF over NBMA Topology Summary 57

IPv6 and OSPFv3 57

    Enabling OSPF for IPv6 on an Interface 58

    OSPFv3 and Stub/NSSA Areas 58

    Interarea OSPFv3 Route Summarization 59

    Enabling an IPv4 Router ID for OSPFv3 59

    Forcing an SPF Calculation 59

    IPv6 on NBMA Networks 60

    OSPFv3 Address Families 60

Verifying OSPF Configuration 61

Troubleshooting OSPF 63

Configuration Example: Single-Area OSPF 64

Configuration Example: Multiarea OSPF 65

Configuration Example: OSPF and NBMA Networks 69

Configuration Example: OSPF and Broadcast Networks 72

Configuration Example: OSPF and Point-to-Multipoint Networks 76

Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces 80

Configuration Example: IPv6 and OSPFv3 83

Configuration Example: OSPFv3 with Address Families 86

Chapter 4 Configuration of Redistribution 91

Defining Seed and Default Metrics 91

Redistributing Connected Networks 93

Redistributing Static Routes 93

Redistributing Subnets into OSPF 93

Assigning E1 or E2 Routes in OSPF 94

Redistributing OSPF Internal and External Routes 95

Configuration Example: Route Redistribution for IPv4 95

Configuration Example: Route Redistribution for IPv6 97

Verifying Route Redistribution 98

Route Filtering Using the distribute-list Command 98

    Configuration Example: Inbound and Outbound Distribute List Route Filters 99

    Configuration Example: Controlling Redistribution with Outbound Distribute Lists 100

    Verifying Route Filters 100

Route Filtering Using Prefix Lists 101

    Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution 103

    Verifying Prefix Lists 104

Using Route Maps with Route Redistribution 104

    Configuration Example: Route Maps 105

Manipulating Redistribution Using Route Tagging 106

Changing Administrative Distance for Internal and External Routes 108

Passive Interfaces 108

Chapter 5 Path Control Implementation 111

Verifying Cisco Express Forwarding 111

Configuring Cisco Express Forwarding 111

Path Control with Policy-Based Routing 112

Verifying Policy-Based Routing 113

Configuration Example: PBR with Route Maps 114

Cisco IOS IP Service Level Agreements 115

    Step 1: Define One (or More) Probe(s) 116

    Step 2: Define One (or More) Tracking Object(s) 117

    Step 3a: Define the Action on the Tracking Object(s) 117

    Step 3b: Define Policy Routing Using the Tracking Object(s) 117

    Step 4: Verify IP SLA Operations 118

Chapter 6 Enterprise Internet Connectivity 119

Configuring a Provider Assigned Static or DHCP IPv4 Address 120

Configuring Static NAT 121

Configuring Dynamic NAT 121

Configuring NAT Overload (PAT) 122

Verifying NAT 124

NAT Virtual Interface 124

Configuration Example: NAT Virtual Interfaces and Static NAT 124

Configure Basic IPv6 Internet Connectivity 125

Configuring IPv6 ACLs 126

    Verifying IPv6 ACLs 127

Configuring Redistribution of Default Routes with Different Metrics in a Dual-Homed Internet Connectivity Scenario 127

Configuring BGP 128

BGP and Loopback Addresses 129

iBGP Next-Hop Behavior 129

eBGP Multihop 130

Verifying BGP Connections 132

Troubleshooting BGP Connections 132

Default Routes 133

Attributes 134

    Route Selection Decision Process 134

    Weight Attribute 134

    Using AS_PATH Access Lists to Manipulate the Weight Attribute 136

    Using Prefix Lists and Route Maps to Manipulate the Weight Attribute 136

    Local Preference Attribute 137

    Using AS_PATH Access Lists with Route Maps to Manipulate the Local Preference Attribute 138

    AS_PATH Attribute Prepending 139

    AS_PATH: Removing Private Autonomous Systems 141

    MED Attribute 142

Route Aggregation 144

Route Reflectors 145

Regular Expressions 146

Regular Expressions: Examples 146

BGP Route Filtering Using Access Lists and Distribute Lists 147

Configuration Example: Using Prefix Lists and AS_PATH Access Lists 149

BGP Peer Groups 150

MP-BGP 151

    Configure MP-BGP Using Address Families to Exchange IPv4 and IPv6 Routes 151

    Verifying MP-BGP 153

Chapter 7 Routers and Routing Protocol Hardening 155

Securing Cisco Routers According to Recommended Practices 156

    Securing Cisco IOS Routers Checklist 156

    Components of a Router Security Policy 157

    Configuring Passwords 157

    Password Encryption 158

    Configuring SSH 159

    Restricting Virtual Terminal Access 160

    Securing Access to the Infrastructure Using Router ACLs 161

    Configuring Secure SNMP 162

    Configuration Backups 165

    Implementing Logging 166

    Disabling Unneeded Services 169

Configuring Network Time Protocol 169

    NTP Configuration 170

    NTP Design 171

    Securing NTP 172

    Verifying NTP 173

    SNTP 174

    Setting the Clock on a Router 174

    Using Time Stamps 178

    Configuration Example: NTP 178

Authentication of Routing Protocols 182

    Authentication Options for Different Routing Protocols 182

    Authentication for EIGRP 183

    Authentication for OSPF 185

    Authentication for BGP and BGP for IPv6 189

Part II: SWITCH

Chapter 8 Basic Concepts and Network Design 191

Hierarchical Model (Cisco Enterprise Campus Architecture) 191

Verifying Switch Content-Addressable Memory 192

Switching Database Manager Templates 192

    Configuring SDM Templates 192

    Verifying SDM Templates 193

LLDP (802.1AB) 194

    Configuring LLDP 194

Verifying LLDP 195

Power over Ethernet 196

    Configuring PoE 196

    Verifying PoE 196

Chapter 9 Campus Network Architecture 197

Virtual LANs 198

Creating Static VLANs 198

    Normal-Range static VLAN Configuration 198

    Extended-Range static VLAN Configuration 199

Assigning Ports to Data and Voice VLANs 199

Using the range Command 200

Dynamic Trunking Protocol 200

Setting the Trunk Encapsulation and Allowed VLANs 201

Verifying VLAN Information 202

Saving VLAN Configurations 202

Erasing VLAN Configurations 203

Verifying VLAN Trunking 203

VLAN Trunking Protocol 204

    Using Global Configuration Mode 204

Verifying VTP 206

Configuration Example: VLANs 206

Layer 2 Link Aggregation 209

    Link Aggregation Interface Modes 210

    Guidelines for Configuring Link Aggregation 210

    Configuring L2 EtherChannel 211

    Configuring L3 EtherChannel 211

    Verifying EtherChannel 212

    Configuring EtherChannel Load Balancing 212

    Configuration Example: PAgP EtherChannel 213

DHCP for IPv4 216

    Configuring Basic DHCP Server for IPv4 216

    Configuring DHCP Manual IP Assignment for IPv4 217

Implementing DHCP Relay IPv4 217

Verifying DHCP for IPv4 218

Implementing DHCP for IPv6 218

Configuring DHCPv6 Server 219

Configuring DHCPv6 Client 219

Configuring DHCPv6 Relay Agent 220

Verifying DHCPv6 220

Chapter 10 Implementing Spanning Tree 221

Spanning-Tree Standards 222

    Enabling Spanning Tree Protocol 222

    Configuring the Root Switch 223

    Configuring a Secondary Root Switch 224

    Configuring Port Priority 224

    Configuring the Path Cost 224

    Configuring the Switch Priority of a VLAN 225

    Configuring STP Timers 225

    Verifying STP 226

    Cisco STP Toolkit 226

    Port Error Conditions 231

    FlexLinks 231

    Changing the Spanning-Tree Mode 231

    Extended System ID 232

    Enabling Rapid Spanning Tree 232

    Enabling Multiple Spanning Tree 233

    Verifying MST 235

    Troubleshooting Spanning Tree 235

    Configuration Example: PVST+ 235

    Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ 239

Chapter 11 Implementing Inter-VLAN Routing 241

Inter-VLAN Communication Using an External Router: Router-on-a-Stick 241

Inter-VLAN Routing Tips 242

Removing L2 Switch Port Capability of a Switch Port 242

Configuring SVI Autostate 243

Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface 243

Configuration Example: Inter-VLAN Communication 244

Configuration Example: IPv6 Inter-VLAN Communication 251

Chapter 12 Implementing High-Availability Networks 259

Configuring IP Service Level Agreements (Catalyst 3750) 260

    Configuring Authentication for IP SLA 262

    Monitoring IP SLA Operations 262

Implementing Port Mirroring 262

    Default SPAN and RSPAN Configuration 262

    Configuring Local SPAN 263

    Local SPAN Guidelines for Configuration 263

    Configuring Local SPAN Example 264

    Configuring Remote SPAN 267

    Remote SPAN Guidelines for Configuration 267

    Configuring Remote SPAN Example 268

    Verifying and Troubleshooting Local and Remote SPAN 269

Switch Virtualization 269

    StackWise 270

    Virtual Switching System 271

Chapter 13 First-Hop Redundancy Implementation 277

First-Hop Redundancy 278

Hot Standby Router Protocol 278

    Configuring Basic HSRP 278

    Default HSRP Configuration Settings 279

    Verifying HSRP 279

    HSRP Optimization Options 279

    Multiple HSRP Groups 281

    HSRP IP SLA Tracking 283

    HSRPv2 for IPv6 284

    Debugging HSRP 285

Virtual Router Redundancy Protocol 285

    Configuring VRRP 285

    Interface Tracking 287

    Verifying VRRP 287

    Debugging VRRP 287

Gateway Load Balancing Protocol 287

    Configuring GLBP 288

    Interface Tracking 290

    Verifying GLBP 290

    Debugging GLBP 291

IPv4 Configuration Example: HSRP on L3 Switch 291

IPv4 Configuration Example: GLBP 296

IPv4 Configuration Example: VRRP on Router and L3 Switch 300

IPv6 Configuration Example: HSRP on Router and L3 Switch 304

Chapter 14 Campus Network Security 311

Switch Security Recommended Practices 312

Configuring Switch Port Security 313

    Sticky MAC Addresses 313

    Verifying Switch Port Security 314

Recovering Automatically from Error-Disabled Ports 315

    Verifying Autorecovery of Error-Disabled Ports 315

Configuring Port Access Lists 315

    Creating and Applying Named Port Access List 316

Configuring Storm Control 316

Implementing Authentication Methods 317

    Local Database Authentication 317

    RADIUS Authentication 318

    TACACS+ Authentication 319

    Configuring Authorization and Accounting 321

    Configuring 802.1x Port-Based Authentication 322

Configuring DHCP Snooping 323

    Verifying DHCP Snooping 324

IP Source Guard 324

Dynamic ARP Inspection 325

    Verifying DAI 326

Mitigating VLAN Hopping: Best Practices 326

VLAN Access Lists 327

    Verifying VACLs 329

    Configuration Example: VACLs 329

Private VLANs 331

    Verifying PVLANs 332

    Configuration Example: PVLANs 333

Appendixes

Appendix A Private VLAN Catalyst Switch Support Matrix 337

Appendix B Create Your Own Journal Here 339

9781587144349   TOC   12/8/2014

Updates

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020