Home > Store

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide: Foundation learning for the ROUTE 642-902 Exam

Register your product to gain access to bonus material or receive a coupon.

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide: Foundation learning for the ROUTE 642-902 Exam

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Foundational, authorized learning for Cisco's brand-new CCNP Implementing Cisco IP Routing (ROUTE) exam - straight from Cisco!
  • The only Cisco authorized self-study book for the new CCNP ROUTE exam: developed with Learning@Cisco, designers of the exam and its companion course
  • Includes review questions, chapter objectives, summaries, definitions, case studies, job aids, and command summaries
  • Thoroughly introduces routed network construction, support, and scalability

Description

  • Copyright 2010
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-882-0
  • ISBN-13: 978-1-58705-882-0

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide is a Cisco® authorized learning tool for CCNP®/CCDP®/CCIP® preparation. As part of the Cisco Press Foundation Learning Series, this book teaches you how to plan, configure, maintain, and scale a routed network. It focuses on using Cisco routers connected in LANs and WANs typically found at medium-to-large network sites. After completing this book, you will be able to select and implement the appropriate Cisco IOS services required to build a scalable, routed network.

Each chapter opens with the list of topics covered to clearly identify the focus of that chapter. At the end of each chapter, a summary of key concepts for quick study and review questions provide you with an opportunity to assess and reinforce your understanding of the material. Throughout the book there are many configuration examples and sample verification outputs demonstrating troubleshooting techniques and illustrating critical issues surrounding network operation.

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide is ideal for certification candidates who are seeking a tool to learn all the topics covered in the ROUTE 642-902 exam.

  •      Serves as the official book for the Cisco Networking Academy CCNP ROUTE course
  •      Includes all the content from the e-Learning portion of the Learning@ Cisco ROUTE course
  •      Provides a thorough presentation of complex enterprise network frameworks, architectures, and models, and the process of creating, documenting, and executing an implementation plan
  •      Details Internet Protocol (IP) routing protocol principles
  •      Explores Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP)
  •      Examines how to manipulate routing updates and control the information passed between them
  •      Covers routing facilities for branch offices and mobile workers
  •      Investigates IP Version 6 (IPv6) in detail
  •      Presents self-assessment review questions, chapter objectives, and summaries to facilitate effective studying

This book is in the Foundation Learning Guide Series. These guides are developed together with Cisco® as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams.

Sample Content

Online Sample Chapter

CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control

Sample Pages

Download the sample pages (includes Chapter 5 and Index)

Table of Contents

    Introduction xxvii

Chapter 1 Routing Services 1

    Complex Enterprise Network Frameworks, Architectures, and Models 1

        Traffic Conditions in a Converged Network 1

        Cisco IIN and SONA Framework 3

        Cisco IIN 3

        Cisco SONA Framework 4

        Cisco Network Models 6

        Cisco Enterprise Architecture 6

        Cisco Hierarchical Network Model 8

        Cisco Enterprise Composite Network Model 9

    Creating, Documenting, and Executing an Implementation Plan 13

        Approaches to Creating an Implementation Plan 14

        Creating an Implementation Plan 15

        Implementation Plan Documentation 17

        Implementation Plan Example 18

        Example Network Scenario 18

        Example Network Requirements 18

        Example Network Implementation Plan 19

    Reviewing IP Routing Principles 21

        IP Routing Overview 22

        Principles of Static Routing 22

        Principles of Dynamic Routing 26

        Principles of On-Demand Routing 28

        Characteristics of Routing Protocols 30

        Distance Vector, Link-State, and Advanced Distance Vector

        Routing Protocols 30

        Classful Routing Protocol Concepts 31

        Classless Routing Protocol Concepts 35

        RIPv2 and EIGRP Automatic Network-Boundary Summarization 35

        RIP 38

        Characteristics of RIPv1 38

        Characteristics of RIPv2 38

        RIP Configuration Commands 39

        Populating the Routing Table 41

        Administrative Distance 41

        Routing Protocol Metrics 43

        Criteria for Inserting Routes into the IP Routing Table 45

        Floating Static Routes 45

        IP Routing Protocol Comparisons 46

        Routing and Routing Protocols Within the Enterprise Composite

        Network Model 48

    Summary 49

    Review Questions 51

Chapter 2 Configuring the Enhanced Interior Gateway Routing Protocol 57

    Understanding EIGRP Terminology and Operation 58

        EIGRP Capabilities and Attributes 58

        EIGRP Terminology 61

        EIGRP Operation 63

        Populating EIGRP Tables 63

        EIGRP Packets 65

        EIGRP Neighbors 67

        Initial Route Discovery 69

        DUAL 71

        Advertised Distance and Feasible Distance 71

        Successor and Feasible Successor 72

        DUAL Example 75

        EIGRP Metric Calculation 80

    Planning EIGRP Routing Implementations 83

    Configuring and Verifying EIGRP 84

        Planning and Configuring Basic EIGRP 85

        Planning for Basic EIGRP 85

        Basic EIGRP Configuration 86

        Basic Configuration Example 88

        Another Basic EIGRP Configuration Example 89

        Verifying EIGRP Operation 90

        Verifying EIGRP Neighbors 93

        Verifying EIGRP Routes 94

        Verifying EIGRP Operations 96

        Using the passive-interface Command with EIGRP 104

        Propagating an EIGRP Default Route 107

        EIGRP Route Summarization 109

        Configuring Manual Route Summarization 110

        Verifying Manual Route Summarization 112

    Configuring and Verifying EIGRP in an Enterprise WAN 113

        EIGRP over Frame Relay and on a Physical Interface 113

        Frame Relay Overview 113

        EIGRP on a Physical Frame Relay Interface with

        Dynamic Mapping 114

        EIGRP on a Frame Relay Physical Interface with Static Mapping 116

        EIGRP over Frame Relay Multipoint Subinterfaces 118

        Frame Relay Multipoint Subinterfaces 118

        EIGRP over Multipoint Subinterfaces 119

        EIGRP Unicast Neighbors 121

        EIGRP over Frame Relay Point-to-Point Subinterfaces 123

        Frame Relay Point-to-Point Subinterfaces 123

        EIGRP on Frame Relay Point-to-Point Subinterfaces 123

        EIGRP over MPLS 125

        MPLS 125

        MPLS Operation 126

        Service Provider Offerings 127

        Layer 2 and Layer 3 MPLS VPN Solutions 128

        Layer 3 MPLS VPNs 128

        Layer 2 MPLS VPNs 132

        EIGRP Load Balancing 134

        EIGRP Equal-Cost Load Balancing 134

        EIGRP Unequal-Cost Load Balancing 136

        EIGRP Bandwidth Use Across WAN Links 139

        EIGRP Link Utilization 139

        Examples of EIGRP on WANs 140

    Configuring and Verifying EIGRP Authentication 144

        Router Authentication 144

        Simple Authentication Versus MD5 Authentication 144

        MD5 Authentication for EIGRP 146

        Planning for EIGRP Authentication 147

        Configuring EIGRP MD5 Authentication 147

        MD5 Authentication Configuration Example 148

        Verifying MD5 Authentication for EIGRP 152

        EIGRP MD5 Authentication Verification 153

        Troubleshooting MD5 Authentication 154

    Optimizing EIGRP Implementations 156

        EIGRP Scalability in Large Networks 156

        EIGRP Queries and Stuck-in-Active 158

        Stuck-in-Active Connections in EIGRP 158

        Preventing SIA Connections 160

        EIGRP Query Range 161

        Limiting the EIGRP Query Range 164

        Graceful Shutdown 173

    Summary 174

    References 179

    Review Questions 179

Chapter 3 Configuring the Open Shortest Path First Protocol 185

    Understanding OSPF Terminology and Operation 186

        Link-State Routing Protocols 186

        OSPF Area Structure 188

        OSPF Areas 191

        Area Terminology 192

        OSPF Adjacencies 193

        OSPF Metric Calculation 195

        Link-State Data Structures 196

    OSPF Packets 197

        Establishing OSPF Neighbor Adjacencies: Hello 199

        Exchange Process and OSPF Neighbor Adjacency States 201

        OSPF Neighbor States 204

        Maintaining Routing Information 205

        OSPF Link-State Sequence Numbers 207

        Verifying Packet Flow 208

        Configuring and Verifying Basic OSPF Routing 209

        Planning and Configuring OSPF 209

        Planning OSPF Routing Implementations 209

    Configuring Basic OSPF 211

        Single-Area OSPF Configuration Example 212

        Multiarea OSPF Configuration Example 213

        OSPF Router ID 214

        Loopback Interfaces 215

        OSPF router-id Command 215

        Verifying the OSPF Router ID 216

        Verifying OSPF Operations 217

        The show ip ospf interface Command 218

        The show ip ospf neighbor Command 219

        The show ip route ospf Command 221

        The show ip protocols Command 221

        The debug ip ospf events Command 222

    Understanding OSPF Network Types 222

        Types of OSPF Networks 222

        Electing a DR and BDR and Setting Priority 223

        Adjacency Behavior for a Point-to-Point Link 224

        Adjacency Behavior for a Broadcast Network 224

        Adjacency Behavior over a Layer 2 MPLS VPN 225

        Adjacency Behavior over a Layer 3 MPLS VPN 226

        Adjacency Behavior for an NBMA Network 227

        DR Election in an NBMA Topology 228

        OSPF over Frame Relay Topology Options 228

        OSPF over NBMA Topology Modes of Operation 229

        Selecting the OSPF Network Type for NBMA Networks 229

        OSPF Configuration in Cisco Broadcast Mode 231

        OSPF Nonbroadcast Mode Configuration 231

        OSPF Configuration in Point-to-Multipoint Mode 233

        OSPF Configuration in Cisco Point-to-Multipoint

        Nonbroadcast Mode 236

        Using Subinterfaces in OSPF over Frame Relay Configuration 236

        OSPF Configuration in Cisco Point-to-Point Mode 239

        OSPF over NBMA Modes of Operation Summary 240

        Displaying OSPF Adjacency Activity 241

    Understanding OSPF LSAs 244

        LSA Type 1: Router LSA 246

        LSA Type 2: Network LSA 247

        LSA Type 3: Summary LSA 247

        LSA Type 4: Summary LSA 248

        LSA Type 5: External LSA 249

        Example OSPF LSAs in a Network 250

    Interpreting the OSPF LSDB and Routing Table 250

        OSPF LSDB 250

        OSPF Routing Table and Types of Routes 254

        Calculating the Costs of E1 and E2 Routes 255

        Configuring OSPF LSDB Overload Protection 256

    Configuring and Verifying Advanced OSPF Features 258

        Using the passive-interface Command with OSPF 258

        Propagating an OSPF Default Route 260

        Configuring OSPF Route Summarization 263

        Configuring Inter-area OSPF Route Summarization on an ABR 265

        Interarea Route Summarization Configuration Example

        on an ABR 266

        Configuring External OSPF Route Summarization on an ASBR 267

        External Route Summarization Configuration Example

        on an ASBR 268

        OSPF Virtual Links 269

        Configuring OSPF Virtual Links 270

        Verifying OSPF Virtual Link Operation 272

        OSPF LSDB for Virtual Links 275

        Changing the Cost Metric 278

        Configuring OSPF Special Area Types 279

        Configuring Stub Areas 281

        Configuring Totally Stubby Areas 284

        Interpreting Routing Tables in Different Types of OSPF Areas 286

        Configuring NSSAs 289

        Configuring Totally Stubby NSSAs 294

        Example OSPF Area Types in a Network 295

        Verifying All Area Types 296

    Configuring and Verifying OSPF Authentication 297

        Planning for OSPF Authentication 297

        Configuring, Verifying, and Troubleshooting OSPF Simple Password

        Authentication 297

        Configuring OSPF Simple Password Authentication 297

        Simple Password Authentication Example 299

        Verifying Simple Password Authentication 300

        Troubleshooting Simple Password Authentication 301

        Configuring OSPF Simple Password Authentication for Virtual Links 304

        Configuring, Verifying, and Troubleshooting MD5 Authentication 305

        Configuring OSPF MD5 Authentication 305

        MD5 Authentication Example 307

        Verifying MD5 Authentication 308

        Troubleshooting MD5 Authentication 309

    Summary 311

    References 314

    Review Questions 315

Chapter 4 Manipulating Routing Updates 325

    Assessing Network Routing Performance Issues 326

    Routing Protocol Performance Issues 326

        Routing Protocol Performance Solutions 327

    Using Multiple IP Routing Protocols on a Network 329

        Understanding a Network with Complex Routing 329

        Understanding Route Redistribution 330

        Redistribution Overview 330

        Redistributed Routes 332

        Redistribution Implementation Considerations 334

        Selecting the Best Route in a Redistribution Environment 335

        Redistribution Techniques 338

        One-Point Redistribution 339

        Multipoint Redistribution 340

        Preventing Routing Loops in a Redistribution Environment 342

    Implementing Route Redistribution 344

        Configuring Route Redistribution 344

        Redistributing into RIP 346

        Redistributing into OSPF 347

        Redistributing into EIGRP 350

        The default-metric Command 352

        The passive-interface Command 353

        Route Redistribution Example 355

        Using Administrative Distance to Influence

        the Route-Selection Process 358

        Selecting Routes with Administrative Distance 358

        Modifying Administrative Distance 361

        Redistribution Using Administrative Distance Example 363

        Verifying Redistribution Operation 369

    Controlling Routing Update Traffic 370

        Static and Default Routes 371

        Using Route Maps 373

        Route Map Applications 373

        Understanding Route Maps 374

        Configuring Route Maps to Control Routing Updates 376

        Configuring Route Maps for Policy Based Routing 377

        Configuring Route Redistribution Using Route Maps 379

        Using Route Maps with Redistribution 380

        Using Route Maps to Avoid Route Feedback 381

        Using Route Maps with Tags 382

        Using Route Maps with Redistribution and Tags 382

        Using Distribute Lists 384

        Configuring Distribute Lists to Control Routing Updates 386

        Controlling Redistribution with Distribute Lists 389

        Using Prefix Lists 390

        Prefix List Characteristics 390

        Filtering with Prefix Lists 391

        Configuring Prefix Lists 391

        Verifying Prefix Lists 397

        Using Multiple Methods to Control Routing Updates 398

        Comprehensive Example of Controlling Routing Updates 398

    Summary 412

    References 415

    Review Questions 416

Chapter 5 Implementing Path Control 419

    Understanding Path Control 419

        Assessing Path Control Network Performance 419

        Path Control Tools 421

    Implementing Path Control Using Offset Lists 424

        Using Offset Lists to Control Path Selection 424

        Configuring Path Control Using Offset Lists 424

        Verifying Path Control Using Offset Lists 426

    Implementing Path Control Using Cisco IOS IP SLAs 426

        Using Cisco IOS IP SLAs to Control Path Selection 427

        Cisco IOS IP SLAs Operation 429

        Cisco IOS IP SLAs Sources and Responders 429

        Cisco IOS IP SLAs Operations 430

        Cisco IOS IP SLAs Operation with Responders 430

        Cisco IOS IP SLAs with Responder Time Stamps 432

        Configuring Path Control Using IOS IP SLAs 432

        Configuring Cisco IOS IP SLAs Operations 433

        Configuring Cisco IOS IP SLAs Tracking Objects 436

        Configuring the Action Associated with the Tracking Object 436

        Verifying Path Control Using IOS IP SLAs 437

        Examples of Path Control Using Cisco IOS IP SLAs 438

        Tracking Reachability to Two ISPs 438

        Tracking DNS Server Reachability in the Two ISPs 440

    Implementing Path Control Using Policy-Based Routing 446

        Using PBR to Control Path Selection 447

        Configuring PBR 448

        PBR match Commands 448

        PBR set Commands 449

        Configuring PBR on an Interface 452

        Verifying PBR 454

        PBR Examples 454

        Using PBR When Connecting Two ISPs 454

        Using PBR Based on Source Address 457

        Alternative Solution IP SLAs Configuration Example Using PBR 459

    Advanced Path Control Tools 460

        Cisco IOS Optimized Edge Routing 460

        Virtualization 461

        Cisco Wide Area Application Services 462

    Summary 463

    References 467

    Review Questions 467

Chapter 6 Implementing a Border Gateway Protocol Solution for ISP Connectivity 471

    BGP Terminology, Concepts, and Operation 471

        Autonomous Systems 471

        BGP Use Between Autonomous Systems 474

        Comparison with Other Scalable Routing Protocols 475

        Connecting Enterprise Networks to an ISP 477

        Public IP Address Space 478

        Connection Link Type and Routing 478

        Connection Redundancy 482

        Using BGP in an Enterprise Network 485

        BGP Multihoming Options 486

        Multihoming with Default Routes from All Providers 487

        Multihoming with Default Routes and Partial Table from All Providers 488

        Multihoming with Full Routes from All Providers 491

        BGP Path Vector Characteristics 492

        When to Use BGP 494

        When Not to Use BGP 495

        BGP Characteristics 495

        BGP Neighbor Relationships 497

        External BGP Neighbors 497

        Internal BGP Neighbors 498

        IBGP on All Routers in a Transit Path 500

        IBGP in a Transit Autonomous System 500

        IBGP in a Nontransit Autonomous System 501

        BGP Partial-Mesh and Full-Mesh Examples 501

        TCP and Full Mesh 502

        Routing Issues If BGP Not on in All Routers in a Transit Path 503

        BGP Synchronization 504

        BGP Tables 506

        BGP Message Types 508

        Open and Keepalive Messages 508

        Update Messages 509

        Notification Messages 509

        BGP Attributes 510

        Well-Known Attributes 511

        Optional Attributes 511

        Defined BGP Attributes 512

        The AS-Path Attribute 513

        The Next-Hop Attribute 514

        The Origin Attribute 517

        The Local Preference Attribute 518

        The Community Attribute 519

        The MED Attribute 519

        The Weight Attribute (Cisco Only) 520

        The Route-Selection Decision Process 521

        BGP Route-Selection Process 522

        The Path-Selection Decision Process with a Multihomed

        Connection 525

    Configuring BGP 526

        Planning BGP Implementations 527

        Peer Groups 527

        Entering BGP Configuration Mode 529

        Defining BGP Neighbors and Activating BGP Sessions 529

        Shutting Down a BGP Neighbor 531

        Defining the Source IP Address 531

        EBGP Multihop 534

        Changing the Next-Hop Attribute 536

        Defining the Networks That BGP Advertises 538

        BGP Neighbor Authentication 540

        Configuring BGP Synchronization 542

        Resetting BGP Sessions 542

        Hard Reset of BGP Sessions 543

        Soft Reset of BGP Sessions Outbound 544

        Soft Reset of BGP Sessions Inbound 544

        BGP Configuration Examples 546

        Basic BGP Examples 546

        Peer Group Example 547

        IBGP and EBGP Examples 549

    Verifying and Troubleshooting BGP 552

        show ip bgp Command Output Example 552

        show ip bgp rib-failure Command Output Example 554

        show ip bgp summary Command Output Example 554

        debug ip bgp updates Command Output Example 556

        Understanding and Troubleshooting BGP Neighbor States 557

        Idle State Troubleshooting 558

        Active State Troubleshooting 558

        Established State 559

    Basic BGP Path Manipulation Using Route Maps 559

        BGP Path Manipulation 560

        Changing the Weight 562

        Changing the Weight for All Updates from a Neighbor 562

        Changing the Weight Using Route Maps 562

        Setting Local Preference 564

        Changing Local Preference for All Routes 564

        Local Preference Example 565

        Changing Local Preference Using Route Maps 567

        Setting the AS-Path 568

        Setting the MED 570

        Changing the MED for All Routes 571

        Changing the MED Using Route Maps 572

        Implementing BGP in an Enterprise Network 575

    Filtering BGP Routing Updates 576

        BGP Filtering Using Prefix Lists 578

        Planning BGP Filtering Using Prefix Lists 578

        BGP Filtering Using Prefix Lists Example 578

        BGP Filtering Using Route Maps 580

        Planning BGP Filtering Using Route Maps 580

        BGP Filtering with Route Maps Example 580

    Summary 582

    References 587

    Review Questions 587

Chapter 7 Implementing Routing Facilities for Branch Offices and Mobile Workers 591

    Planning the Branch Office Implementation 591

        Branch Office Design 591

        Upgrade Scenario 595

        Implementation Plan 596

        Deploying Broadband Connectivity 597

        Satellite Broadband Information 598

        Cable Background Information 601

        DSL Background Information 603

        PPPoA 606

        Configuring Static Routing 609

        Routing to the Internet 611

        Floating Static Route 615

        Verifying Branch Services 618

        Configuring NAT 619

        Verifying NAT 623

        Verifying Other Services 629

        Verifying and Tuning IPsec VPNs 631

        IPsec Technologies 632

        Encapsulation Process 633

        IPsec Site-to-Site VPN Configuration 635

        ISAKMP Policy 636

        IPsec Details 637

        VPN Tunnel Information 637

        VPN ACL 638

        Apply the Crypto Map 638

        Verifying an IPsec VPN 639

        Impact on Routing 647

        Configuring GRE Tunnels 647

        Generic Routing Encapsulation 649

        Configuring GRE 650

        Example of GRE Configuration 652

    Planning for Mobile Worker Implementations 661

        Connecting a Mobile Worker 661

        Components for Mobile Workers 662

        Business-Ready Mobile Worker and VPN Options 663

    Routing Traffic to the Mobile Worker 664

        VPN Headend Configuration 665

        Allowing IPsec Traffic 666

        Defining Address Pools 670

        Providing Routing Services for VPN Subnets 672

        Tuning NAT for VPN Traffic Flows 675

        Verifying IPsec VPN Configuration 677

        Reviewing Alternatives for Mobile Worker Connectivity 683

    Summary 685

    References 688

    Review Questions 688

Chapter 8 Implementing IPv6 in an Enterprise Network 691

    Introducing IPv6 691

        IPv4 Issues 692

        Features of IPv6 693

        IPv6 Packet Header 695

        Extension Headers 696

        MTU Discovery 698

    IPv6 Addressing 698

        IPv6 Addressing in an Enterprise Network 698

        IPv6 Address Representation 700

        Interface Identifiers in IPv6 Addresses 701

        IPv6 Address Types 704

        IPv6 Global Unicast Addresses 705

        IPv6 Link-Local Unicast Addresses 707

        IPv6 Site-Local Unicast Addresses: Deprecated 708

        IPv6 Multicast Addresses 708

        Solicited-Node Multicast Addresses 710

        IPv6 Anycast Addresses 711

        Comparing IPv6 Addresses with IPv4 Addresses 712

    Configuring and Verifying IPv6 Unicast Addresses 716

        IPv6 Unicast Address Configuration and Verification Commands 717

        Static IPv6 Address Assignment 719

        Static Global Aggregatable Address Assignment 719

        Assigning Multiple Global Aggregatable Addresses 721

        IPv6 Unnumbered Interfaces 723

        Static Link-Local Address Assignment 723

        Stateless Autoconfiguration of IPv6 Addresses 724

        Unicast Connectivity on Different Connection Types 733

        Unicast Connectivity on Broadcast Multiaccess Links 733

        Unicast Connectivity on Point-to-Point Links 738

        Unicast Connectivity on Point-to-Multipoint Links 742

    Routing IPv6 Traffic 746

        IPv6 Routing Protocols 747

        Static Routing 747

        Static Route Configuration and Verification Commands 747

        Static Route Configuration and Verification Example 750

        RIPng 751

        RIPng Configuration and Verification Commands 752

        RIPng Configuration and Verification Example 752

        OSPFv3 759

        Similarities Between OSPFv2 and OSPFv3 760

        Differences Between OSPFv2 and OSPFv3 761

        OSPFv3 Configuration and Verification Commands 763

        OSPFv3 Configuration and Verification Examples 767

        EIGRP for IPv6 773

        EIGRP for IPv6 Configuration and Verification Commands 773

        EIGRP for IPv6 Configuration and Verification Example 774

        MBGP 782

        MBGP Configuration and Verification Commands 783

        MBGP Configuration and Verification Example 784

        IPv6 Policy-Based Routing 785

        IPv6 PBR Configuration and Verification Commands 785

        IPv6 PBR Configuration and Verification Example 788

        IPv6 Redistribution 791

        RIPng Redistribution 791

        RIPng and OSPFv3 Redistribution 799

        RIPng, OSPFv3, and MBGP Redistribution 814

    Transitioning IPv4 to IPv6 824

        Dual Stack 826

        Tunneling 828

        Translation 829

    Tunneling IPv6 Traffic 830

        Manual IPv6 Tunnels 830

        Manual IPv6 Tunnel Configuration and Verification Commands 831

        Manual IPv6 Tunnel Configuration and Verification Example 832

        GRE IPv6 Tunnels 838

        GRE IPv6 Tunnel Configuration and Verification Commands 839

        GRE IPv6 Tunnel Configuration and Verification Examples 839

        6to4 Tunnels 846

        6to4 Tunnel Configuration and Verification Commands 848

        6to4 Tunnel Configuration and Verification Example 848

        IPv4-Compatible IPv6 Tunnels 854

        IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands 854

        IPv4-Compatible IPv6 Tunnel Configuration and Verification Example 854

        ISATAP Tunnels 857

        ISATAP Tunnel Configuration and Verification Commands 859

        ISATAP Tunnel Configuration and Verification Example 859

    Translation Using NAT-PT 864

        Static NAT-PT for IPv6 865

        Static NAT-PT Operation 865

        Static NAT-PT Configuration and Verification Commands 866

        Static NAT-PT Configuration and Verification Example 867

        Dynamic NAT-PT for IPv6 871

        Dynamic NAT-PT Configuration and Verification Commands 872

        Dynamic NAT-PT Configuration and Verification Examples 873

    Summary 885

    References 897

    Review Questions 897

Appendix A Answers to Review Questions 901

Online Supplemental Material:

    Appendix B IPv4 Supplement

    Appendix C BGP Supplement

    Acronyms and Abbreviations

TOC, 9781587058820, 5/25/10

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020