HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
CCNP ROUTE Portable Command Guide
All the ROUTE 642-902 Commands in One Compact, Portable Resource
Scott Empson
Hans Roth
Preparing for the CCNP® exam? Working as a network professional? Here are all the CCNP-level commands for the Implementing Cisco IP Routing (ROUTE) exam you need in one handy resource. The CCNP ROUTE Portable Command Guide is filled with valuable, easy-to-access information and is portable enough for use whether you’re in the server room or the equipment closet.
This book helps you memorize commands and concepts as you work to pass the CCNP ROUTE exam (642-902). The guide summarizes all CCNP certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in simple network designs.
Use CCNP ROUTE Portable Command Guide as a quick, offline resource for research and solutions.
--Logical “how-to” topic groupings inside the front and back covers provide one-stop research
--Compact size makes it easy to carry with you, wherever you go
--Helps you review important commands before taking the CCNP ROUTE certification exam
--“Create Your Own Journal” appendix with blank, lined pages enables you to personalize the book for your own needs
This book is part of the Cisco Press® Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.
CCNP ROUTE Command Guide: Implementing Path Control
Download the sample pages (includes Chapter 5)
Introduction xv
Chapter 1 Network Design Requirements 1
Cisco Hierarchical Model of Network Design 1
Cisco Enterprise Composite Network Model 2
Cisco Service-Oriented Network Architecture 3
Routing Protocol Comparison 4
Where to Implement Routing Protocols 4
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Network Lifecycle 5
Chapter 2 Implementing an EIGRP-based Solution 7
Configuring EIGRP 8
EIGRP Auto-Summarization 10
Passive EIGRP Interfaces 10
“Pseudo” Passive EIGRP Interfaces 11
Injecting a Default Route into EIGRP: Redistribution of a Static Route 11
Injecting a Default Route into EIGRP: IP Default Network 12
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 13
Accepting Exterior Routing Information: defaultinformation 14
Load Balancing: Maximum Paths 14
Load Balancing: Variance 15
Bandwidth Use 15
Authentication 16
Stub Networks 17
EIGRP Unicast Neighbors 19
EIGRP over Frame Relay: Dynamic Mappings 19
EIGRP over Frame Relay: Static Mappings 20
EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces 22
EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces 24
EIGRP over MPLS: Layer 2 VPN 26
EIGRP over MPLS: Layer 3 VPN 27
Verifying EIGRP 29
Troubleshooting EIGRP 30
Configuration Example: EIGRP 30
Chapter 3 Implementing a Scalable Multiarea Network OSPF-based Solution 35
Configuring OSPF 36
Using Wildcard Masks with OSPF Areas 37
Configuring Multiarea OSPF 38
Loopback Interfaces 38
Router ID 38
DR/BDR Elections 39
Passive Interfaces 39
Modifying Cost Metrics 40
OSPF LSDB Overload Protection 40
OSPF auto-cost reference-bandwidth 41
Authentication: Simple 41
Authentication: Using MD5 Encryption 42
Timers 43
Propagating a Default Route 44
OSPF Special Area Types 44
Stub Areas 44
Totally Stubby Areas 45
Not-So-Stubby Areas (NSSA) Stub Area 46
NSSA Totally Stubby Areas 46
Route Summarization 47
Inter-Area Route Summarization 47
External Route Summarization 47
Configuration Example: Virtual Links 48
OSPF and NBMA Networks 49
Full-Mesh Frame Relay: NBMA on Physical Interfaces 49
Full-Mesh Frame Relay: Broadcast on Physical Interfaces 50
Full-Mesh Frame Relay: Point-to-Multipoint Networks 52
Full-Mesh Frame Relay: Point-to-Point Networks with Subinterfaces 53
OSPF over NBMA Topology Summary 54
Verifying OSPF Configuration 55
Troubleshooting OSPF 55
Configuration Example: Single-Area OSPF 56
Configuration Example: Multiarea OSPF 59
Configuration Example: OSPF and NBMA Networks 65
Configuration Example: OSPF and Broadcast Networks 70
Configuration Example: OSPF and Point-to-Multipoint Networks 74
Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces 79
Chapter 4 Implementing an IPv4-based Redistribution Solution 85
Route Filtering Using the distribute-list Command 86
Verifying Route Filters 86
Configuration Example: Outbound Route Filters 87
Configuration Example: Inbound Route Filters 89
Using a Distribute List that References a Prefix List 91
Using a Distribute List that References a Route Map 92
Route Filtering Using Prefix Lists 93
Policy Routing Using Route Maps 96
Configuration Example: Route Maps 97
Passive Interfaces 100
Route Redistribution 101
Assigning Metrics 102
Redistributing Subnets 102
Assigning E1 or E2 Routes in OSPF 103
Defining Seed Metrics 104
Redistributing Static Routes 105
Redistributing OSPF Internal and External Routes 105
Using Route Maps with Route Redistribution and Route Tags to Prevent Routing Loops 105
Verifying Route Redistribution 109
Administrative Distances 109
Static Routes: permanent Keyword 110
Floating Static Routes 111
Static Routes and Recursive Lookups 111
Chapter 5 Implementing Path Control 113
Offset Lists 113
Cisco IOS IP Service Level Agreements 114
Step 1: Define One (or More) Probes 115
Step 2: Define One (or More) Tracking Objects 116
Step 3: Define the Action on the Tracking Object(s) 116
Step 4: Verify IP SLA Operations 116
Policy Routing Using Route Maps 117
Configuration Example: Route Maps 120
Chapter 6 Enterprise to ISP Connectivity 125
Configuring BGP 126
BGP and Loopback Addresses 127
eBGP Multihop 128
Verifying BGP Connections 129
Troubleshooting BGP Connections 129
Autonomous System Synchronization 131
Default Routes 132
Load Balancing 132
Authentication 133
Attributes 133
Route Selection Decision Process 133
Origin 134
Next-Hop 135
Autonomous System Path: Remove Private Autonomous System 136
Autonomous System Path: Prepend 137
Weight: The Weight Attribute 139
Weight: Access Lists 141
Weight: Route Maps 142
Local Preference: bgp default local-preference Command 143
Local Preference: Route Maps 145
Multi-Exit Discriminator (MED) 146
Atomic Aggregate 149
Regular Expressions 150
Regular Expressions: Example One 151
Regular Expressions: Example Two 152
BGP Route Filtering Using Access Lists 152
BGP Route Filtering Using Prefix Lists 154
Configuration Example: BGP 156
Chapter 7 Implementing IPv6 163
Assigning IPv6 Addresses to Interfaces 164
IPv6 on NBMA Networks 165
Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6 166
IPv6 and RIPng 167
Configuration Example: IPv6 RIP 168
IPv6 and OSPFv3 170
Enabling OSPF for IPv6 on an Interface 171
OSPFv3 and Stub/NSSA Areas 171
Enabling an OSPF for IPv6 Area Range 172
Enabling an IPv4 Router ID for OSPFv3 172
Forcing an SPF Calculation 173
Configuration Example: OSPFv3 173
IPv6 and EIGRP 177
Enabling EIGRP for IPv6 on an Interface 177
Configuring the Percentage of Link Bandwidth Used by EIGRP 178
Configuring Summary Addresses 178
Configuring EIGRP Route Authentication 178
Configuring EIGRP Timers 179
Configuring EIGRP Stub Routing 179
Logging EIGRP Neighbor Adjacency Changes 180
Adjusting the EIGRP for IPv6 Metric Weights 180
Route Redistribution 180
IPv6 Transition Techniques 181
Configuring Manual IPv6 Tunnels 181
Configuring Generic Routing Encapsulation IPv6 Tunnels 184
Configuring Automatic 6to4 Tunnels 185
Configuring IPv4-Compatible IPv6 Tunnels 186
Configuring ISATAP Tunnels 186
Verifying IPv6 Tunnel Configuration and Operation 187
Implementing NAT-PT for IPv6 187
Configuring Basic IPv6 to IPv4 Connectivity for NAT-PT for IPv6 188
Configuring IPv4-Mapped NAT-PT Connectivity 189
Configuring Mappings for IPv6 Hosts Accessing IPv4 Hosts 189
Configuring IPv6 Access Control Lists 190
Configuring Mappings for IPv4 Hosts Accessing IPv6 Hosts 191
Configuring Port Address Translation for IPv6 to IPv4 Address Mappings 192
Verifying NAT-PT Configuration and Operation 192
Static Routes in IPv6 193
Floating Static Routes in IPv6 194
Verifying and Troubleshooting IPv6 194
IPv6 Ping 197
Chapter 8 Routing for Branch Offices and Mobile Workers 199
Verifying Existing Services 199
Network Address Translation 200
Dynamic Host Control Protocol 200
Access Control Lists and Firewalls 200
Policy-Based Routing and Web Cache Communication Protocol 201
Hot Standby Router Protocol 201
Configuration Example: DSL Using PPPoE 201
Step 1: Configure PPPoE (External Modem) 203
Virtual Private Dial-Up Network (VPDN) Programming 203
Step 2: Configure the Dialer Interface 204
For Password Authentication Protocol (PAP) 204
For Challenge Handshake Authentication Protocol (CHAP) 205
Step 3: Define Interesting Traffic and Specify Default Routing 205
Step 4a: Configure NAT Using an ACL 205
Step 4b: Configure NAT Using a Route Map 206
Step 5: Configure DHCP Service 207
Step 6: Apply NAT Programming 208
Step 7: Verify a PPPoE Connection 208
Configuring PPPoA 209
Step 1: Configure PPPoA on the WAN Interface (Using Subinterfaces) 209
Step 2: Configure the Dialer Interface 210
For Password Authentication Protocol (PAP) 210
For Challenge Handshake Authentication Protocol (CHAP) 210
Step 3: Verify a PPPoA Connection 211
Configuring a Teleworker to a Branch Office VPN Using CLI 211
Step 1: Configure the ISAKMP Policy (IKE Phase 1) 213
Step 2: Configure Policies for the Client Group(s) 213
Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) 214
Step 4: Configure Router AAA and Add VPN Client Users 214
Step 5: Create VPN Client Policy for Security Association Negotiation 215
Step 6: Configure the Crypto Map (IKE Phase 2) 215
Step 7: Apply the Crypto Map to the Interface 216
Step 8: Verify the VPN Service 216
Configuring IPsec Site-to-Site VPNs Using CLI 217
Step 1: Configure the ISAKMP Policy (IKE Phase 1) 217
Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) 218
Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) 218
Step 4: Configure the Crypto Map (IKE Phase 2) 218
Step 5: Apply the Crypto Map to the Interface (IKE Phase 2) 219
Step 6: Configure the Firewall Interface ACL 219
Step 7: Verify the VPN Service 220
Configuring GRE Tunnels over IPsec 221
Step 1: Create the GRE Tunnel 221
Step 2: Specify the IPsec VPN Authentication Method 222
Step 3: Specify the IPsec VPN IKE Proposals 222
Step 4: Specify the IPsec VPN Transform Sets 223
Step 5a: Specify Static Routing for the GRE over IPsec Tunnel 224
Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel 224
Step 6: Enable the Crypto Programming at the Interfaces 225
Appendix Create Your Own Journal Here 226