Routing Operations in Cisco IOS Routers
|
|
|
- Julie Gaines
- 9 years ago
- Views:
Transcription
1 Routing Operations in Cisco IOS Routers Rick Burts January 24, 2012 CMUG BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 1
2 Rick Burts Senior Consultant with Chesapeake NetCraftsmen CCIE 4615 more than 10 years as a CCIE CCSI Cisco Support Community Hall of Fame member Cisco Support Community VIP for 2010 and for 2011 [email protected]
3 Cisco Support Community This is an excellent forum with participation by Cisco users and by Cisco engineers. It is a good place to ask questions and get answers. It is an excellent place to share what you know with other members of the community.
4 Routing Operation in Cisco IOS Routers Topics Covered: The Routing Table (RIB) Overriding the Routing Table Load Sharing Routing Segmentation and Separation Routing and Router Resources
5 The Routing Table 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6 The Routing Table Basic Structure Route Selection Interface Down Events Backup Routes Static Routes Discard Routes
7 The Routing Table Basic Structure 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 7 7
8 The Routing Information Base or RIB Routing Protocols Install routes into the RIB Interfaces Install routes into the RIB Other Sources Install routes into the RIB -Performance Routing (PFR) -Reverse-Route Injection (RRI) -PPP IPCP -DHCP Routing Protocols Interfaces Other Sources RIB
9 Basic Structure Routing Protocols Routing Protocols Pull routes from the RIB for redistribution Cisco Express Forwarding (CEF) CEF maintains the FIB, Forwarding Information Base, and the Adjacency tables A copy of the RIB is sent down to the FIB A copy of the RIB is sent down to the hardware forwarding component Interfaces Other Sources RIB FIB Adj Hardware Forwarding Tables
10 Basic Structure router#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, + - replicated route C L C L D C L S /8 is variably subnetted, 2 subnets, 2 masks /25 is directly connected, Ethernet1/ /32 is directly connected, Ethernet1/ /8 is directly connected, Ethernet0/ /16 is variably subnetted, 2 subnets, 2 masks /32 is directly connected, Ethernet0/ /24 [90/307200] via , 00:23:36, Ethernet1/ /24 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Serial2/ /32 is directly connected, Serial2/ /16 is directly connected, Null0
11 Basic Structure router#show ip route Network C L C L D C L S /8 is variably subnetted, 2 subnets, 2 masks /25 is directly connected, Ethernet1/ /32 is directly connected, Ethernet1/ /8 is directly connected, Ethernet0/ /16 is variably subnetted, 2 subnets, 2 masks /32 is directly connected, Ethernet0/ /24 [90/307200] via , 00:23:36, Ethernet1/ /24 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Serial2/ /32 is directly connected, Serial2/ /16 is directly connected, Null0
12 Basic Structure router#show ip route Route C L C L D C L S /8 is variably subnetted, 2 subnets, 2 masks /25 is directly connected, Ethernet1/ /32 is directly connected, Ethernet1/ /8 is directly connected, Ethernet0/ /16 is variably subnetted, 2 subnets, 2 masks /32 is directly connected, Ethernet0/ /24 [90/307200] via , 00:23:36, Ethernet1/ /24 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Serial2/ /32 is directly connected, Serial2/ /16 is directly connected, Null0
13 Basic Structure router#show ip route Network + Route C L C L D C L S /8 is variably subnetted, 2 subnets, 2 masks /25 is directly connected, Ethernet1/ /32 is directly connected, Ethernet1/ /8 is directly connected, Ethernet0/ /16 is variably subnetted, 2 subnets, 2 masks /32 is directly connected, Ethernet0/ /24 [90/307200] via , 00:23:36, Ethernet1/ /24 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Serial2/ /32 is directly connected, Serial2/ /16 is directly connected, Null0
14 Basic Structure router#show ip route Major networks with subnets show up under a single network with multiple routes C L D C L S S /8 is directly connected, Ethernet0/ /16 is variably subnetted, 2 subnets, 2 masks /32 is directly connected, Ethernet0/ /24 [90/307200] via , 00:23:36, Ethernet1/ /24 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Serial2/ /32 is directly connected, Serial2/ /16 is directly connected, Null /24 is directly connected, Null0 Native mask routes and supernets show up as separate networks
15 Basic Structure Administrative distance Metric Last Modification Time D EX /24 [170/ ] via , 00:58:45, Serial3/0 The administrative distance is locally significant The metric is a protocol specific measure The time shown is the amount of time since the route was last touched EIGRP recalculation of any type, including losing an alternate path, resets this timer OSPF SPF run resets this timer IS-IS SPF run resets this timer
16 Admin Distance Route Source Default Distance Values Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown (infinity) 255
17 Routing Table: Route Selection 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
18 Route Selection How does the RIB decide which route is best among various sources? EIGRP 1 Actually, it doesn t. (a) EIGRP 1 installs a route into the RIB (c) The RIB sends the new route to EIGRP 1 (d) EIGRP decides if the new route should replace the existing one D EX /24... (b) OSPF 2 attempts to install the same route in the RIB (e) The RIB notifies OSPF 2 if the route was installed or not OSPF 2
19 Route Selection Each route is marked with the installing routing process When another process attempts to install an overlapping route in the RIB, the RIB allows the owner of the current route to decide if it should be installed or not Generally, this decision is made using the administrative distance of the two routing processes
20 Route Selection The RIB receives OSPF s new route, calls into EIGRP, and EIGRP determines if the OSPF route should be installed The RIB receives the EIGRP reply and flushes the EIGRP route RT: closer admin distance for , flushing 1 routes EIGRP-IPv4(1):Callback: lostroute /24 RT: add /24 via , ospf metric [110/65] EIGRP receives a callback stating the RIB has removed one of its routes The RIB installs OSPF s route The RIB notifies OSPF its route has been installed
21 Route Selection How is administrative distance used to determine which route should be installed? RIPv2 EIGRP EIGRP / / /25 These two routes are identical EIGRP internal AD = 90 RIP AD = 120 EIGRP internal route is installed The lowest administrative distance wins.
22 Route Selection Only identical routes are compared Identical prefixes with different prefix lengths are not the same route The route from the protocol with the lower administrative distance is installed
23 Route Selection What happens if the administrative distance of the two routes are equal? It depends on the routing protocol RIPv2 EIGRP EIGRP / / /25 These two routes are identical EIGRP internal = 90 RIPv2 = Configured to 90 It depends. Usually the route with the default AD is installed into the RIB
24 Route Selection OSPF and IS-IS OSPF 1 AD=110 OSPF 2 AD=110 IS-IS AD= / / /24 IS-IS default AD 115 OSPF default AD 110 OSPF wins Default AD is the same between the two OSPF processes The older route remains in the RIB
25 Route Selection EIGRP EIGRP 1 AD=90 Metric=1000 EIGRP 2 AD=90 Metric=500 OSPF AD= / / /24 EIGRP def. AD is 90 OSPF def. AD is 110 EIGRP wins EIGRP 2 route metric is lower than EIGRP 1 EIGRP 2 route is installed in the RIB Tie breaker is the lowest AS number
26 Route Selection What happens if the same routing process has multiple identical routes with the same metric? EIGRP 1 AD=90 Metric= /24 EIGRP 1 AD=90 Metric= /24 OSPF AD= /24 EIGRP def. AD is 90 OSPF def. AD is 110 EIGRP wins Both routes have the same metric and the same AS number BOTH routes are installed in the RIB When multiple paths exist within the same routing process with equal cost, both are presented to the RIB for equal cost load-sharing
27 The Routing Table: Interface Down Events 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 29
28 Interface Down Events How does the RIB interact with the routing protocol when an interface fails? interface Ethernet1/0 ip address router eigrp 1 network A E1/0 E1/0 interface Ethernet1/0 ip address router eigrp 1 network B
29 Interface Down Events A#show ip route /8 is variably subnetted, 2 subnets, 2 masks C /25 is directly connected, Ethernet1/0 L /32 is directly connected, Ethernet1/ /16 is variably subnetted, 2 subnets, 2 masks D /24 [90/307200] via , 00:00:05, Ethernet1/0... The RIB tells EIGRP the interface is down , connected, is removed from the RIB , learned through EIGRP, is removed from the RIB (before EIGRP takes the neighbor down) The EIGRP neighbor goes down The interface changes to down state 20:46:58.151: EIGRP-IPv4(1): Callback: route_adjust Ethernet1/0 20:46:58.151: RT: interface Ethernet1/0 removed from routing table 20:46:58.151: RT: del via , connected metric [0/0] 20:46:58.151: RT: delete subnet route to /25 20:46:58.151: RT: delete route to via , Ethernet1/0 20:46:58.151: RT: no routes to , flushing 20:46:58.151: RT: delete route to via , Ethernet1/0 20:46:58.151: RT: no routes to , flushing 20:46:58.151: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor (Ethernet1/0) is down: interface down 20:47:00.139: %LINK-5-CHANGED: Interface Ethernet1/0, changed state to administratively down 20:47:01.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/0, changed state to down
30 The Routing Table: Backup, Static, and Discard Routes 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 32
31 Backup Routes 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 33
32 Backup Routes RIPv2 EIGRP EIGRP / / /25 EIGRP RIP internal route installed These two routes are identical EIGRP internal AD = 90 RIP AD = 120 RIB calls backups
33 Backup Routes If a route with a low administrative distance fails The routing table calls each routing process asking for backup routes Each routing process attempts to install its matching routes The route with the lowest administrative distance wins
34 Backup Routes router-b#show ip route Codes: D - EIGRP, EX - EIGRP external, O OSPF O /24 [110/1064] via , Serial0/3 router-b#show ip eigrp topo IP-EIGRP Topology Table for AS(100)/ID( )... P /24, 0 successors, FD is Inaccessible The route is installed by OSPF EIGRP has the same route in its topology table, but it s not installed because it has a higher AD (170) router-b#debug ip routing router-b#debug ip eigrp notifications... RT: delete route to /24 IP-EIGRP: Callback: callbackup_routes /24 IP-EIGRP: Callback: reload_iptable RT: add /24 via , eigrp metric [170/ ] router-b#show ip route Codes: D - EIGRP, EX - EIGRP external, O OSPF D EX /24 [170/ ] via , Serial0/3... The OSPF route fails EIGRP gets a callback for /24, which is the OSPF route that failed EIGRP installs the existing /24 route from its topology table The route is now installed by EIGRP
35 Static Routes 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
36 Static Routes Static Routes Can Have a Next Hop of an IP Address ip route This causes the RIB and CEF to do a recursive lookup to find the correct Layer 2 header to rewrite onto the packet Recursive lookup: For each packet destined to /24: 1) Look up the destination ( /24) 2) Find the next hop is ) Look up how to get to ) Find is via connected interface 5) Look up the layer 2 header out connected interface to next-hop As long as the next hop is reachable, the router assumes the destination through that next hop is reachable
37 Static Routes Static Routes Can Have a Next Hop of a Point-to-Point Serial interface ip route serial0 The RIB and forwarding tables point the route directly out the point-to-point interface - No need to do a recursive lookup For each packet destined to /24, the Layer 2 rewrite header is set up to reach the other end of the point-to-point link Faster, less complicated lookup As long as the interface is up, the router assumes the destination is reachable through that interface
38 Static Routes Static Routes Can Have a Next Hop of a broadcast interface ip route fa0/0 The RIB and CEF will point this route directly to the broadcast interface router#show ip route /16 is subnetted, 1 subnets S is directly connected, FastEthernet0/0
39 Static Routes ip route FastEthernet 0/ /24 via internetwork Packet to A Best route is through broadcast interface FE0/0 ARP for B Route to through internetwork Proxy ARP must be enabled ARP reply via B Send packets to via B s MAC address This happens for each destination in which host A does not have a route Note: Proxy ARP disabled by default
40 Static Routes For a default route ( /0), this could result in 2 32 ARP entries in A s local tables This would overflow the ARP cache, and crash A Control static routes to broadcast interfaces Small range of reachable addresses Don t use with proxy ARP, just for reaching hosts actually connected to that segment Static routes to point-to-point Serial interfaces don t have this problem
41 Static Routes For a static route to an interface, the destination network is shown in the routing table as connected: router(config)#ip route fa 0/1 router#show ip route /16 is subnetted, 1 subnets S is directly connected, FastEthernet0/1 Static routes to interfaces will be included if you configure redistribute connected How do routing protocols handle this in relation to the network statement?
42 Static Routes OSPF: IS-IS: Static routes to interfaces are not advertised as a result of a network statement IS-IS doesn t use network statements, so static routes to interfaces are not advertised without redistribution EIGRP: BGP: Static routes to interfaces are considered connected routes They will be picked up and advertised if they are contained within a network statement Static routes to interfaces are installed in the routing table They will be picked up and advertised if they match a network statement
43 Static Routes Floating Static Routes ip route <B> 250 show ip route... D EX /24 via <C> No dynamic routing A EIGRP learned route C B D /24
44 Static Routes The concepts of administrative distance and backup routes are used to create floating static routes Configuring a static route with a very high administrative distance ensures it won t be installed as long as there is a dynamically learned route installed in the RIB using the default AD 255 = unreachable
45 Static Routes Floating Static Routes ip route <B> 250 show ip ip route route... S via via <C> <B> No dynamic routing A EIGRP learned route C B D /24
46 Static Routes When the dynamically learned route fails, the RIB calls the processes looking for a backup route Since no other processes have routes to install, the static route with an administrative distance of 250 wins This assumes that the primary route will be removed from the table in a failure event. If a failure event will not remove the primary route from the RIB then the floating static backup will not be installed.
47 Static Routing with Object Tracking How can we get dynamic failover with no dynamic routing? ip route <C> ip route <B> 10 show ip route via <C> A / /24 C.2 B /24.3 D /24
48 Static Routing with Object Tracking ip route track 1 ip route track 1 ip sla 1 reachability ip sla 1 icmp-echo source-interface Ethernet1/0 frequency 5 ip sla schedule 1 life forever start-time now Probes are being sent to The track object goes down when reachability fails The routing table is updated to remove the route to the destination through the tracked path The floating static route is installed into the routing table Probes are still sent to determine when this path is available again 02:34:12.106: ICMP: echo reply rcvd, src , dst , topology BASE, dscp 0 topoid 0 02:34:17.114: ICMP: dst ( ) host unreachable rcv from :34:17.306: Track: 1 Change #9 ip sla 1, reachability Up- >Down 02:34:17.306: %TRACKING-5-STATE: 1 ip sla 1 reachability Up->Down 02:34:17.306: RT: del via , static metric [1/0] 02:34:17.306: RT: delete subnet route to /24 02:34:17.306: RT: updating static /24 (0x0) via :34:17.306: RT: add /24 via , static metric [10/0] 02:34:17.310: RT: updating static /24 (0x0) via :34:22.114: ICMP: dst ( ) host unreachable rcv from
49 Object Tracking Tip - Use EEM event manager applet static_tracking event syslog pattern "%TRACKING-5-STATE: 1 ip sla 1 reachability Up->Down" action 1 wait 3 action 2 cli command "enable" action 3 cli command "term len 0" action 4 cli command "term exec prompt timestamp" action 5 cli command "show log append flash:log_output" action 6 mail server "<mail_server_ip>" to "< _address>" from "<sender>" subject Link C-D is down." end Connectivity is unstable. Any helpful tools? A C We can use Embedded Event Manager (EEM) to notify us of the issue B D /24
50 Static Routing with BFD BFD Bidirectional Forwarding Detection BFD builds its own neighbor relationship with adjacent routers to provide fast peer failure detection independent of media type, encapsulation, or routing protocols Static routing has no method of peer discovery Can use BFD to track the reachability of the peer Static route only installed in RIB if BFD session is up allowing us to consider the Gateway reachable Interface GigabitEthernet0 ip address bfd interval 500 min_rx 500 multiplier 5 ip route static bfd GigabitEthernet ip route GigabitEthernet
51 Discard Routes 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
52 Discard Routes Discard routes are created when a router aggregates routing information (EIGRP) ip summary-address eigrp (OSPF) area 1 range (IS-IS) summary-address level-2... Router_A#show ip route... D /16 is a summary, 00:04:03, Null0 A discard route has an administrative distance of five by default
53 Discard Routes Why is this discard route created? Suppose A is advertising a default route to B B is advertising the summary /16 to A B is not building a discard route for this summary interface eth 0/0 ip summary-address eigrp ip route <A> A / /0 B / /24
54 Discard Routes A receives a packet for A / via / /0 B / / via /0 We have a permanent routing loop. Routing Loop avoided if B had a discard route for /16
55 Discard Routes Be careful when using non default AD values for summary routes /24 AD = 90 B A ip summary-address eigrp D C / / /30 D#show ip route Routing entry for /24 Known via "eigrp 1", distance 250, type internal Redistributing via eigrp 1 Routing Descriptor Blocks: * directly connected, via Null0 D receives the route from C via EIGRP with an AD of 90. This is better than the installed route to Null with an AD of 250.
56 Overriding the Routing Table 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 60
57 Overriding the Routing Table What if I do not want to route my traffic based only on destination? Policy-Based Routing (PBR) Route-map Performance Routing (PfR) Source IP ToS Application Link Utilization
58 Overriding the Routing Table: Policy Based Routing 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 62
59 Route Maps Route maps allow you to: Combine more than one type of filter into a single phrase Use some rudimentary forms of logical AND and OR to filter routes Set some route attributes, rather than just permitting or denying routes Route maps can be used to: Set IP next-hop Filter BGP updates Filter EIGRP updates Filter routes being redistributed between two protocols Etc.
60 Route Maps One of the two results of a route map is whether the route is permitted or denied through the filter Phrase 1 Phrase 2 Phrase 3 Type of phrase (permit or deny) Phrase sequence route-map CMUG permit 10 match ip address 10 route-map CMUG permit 20 match ip address 20 set ip next-hop route-map CMUG permit 30 set ip next-hop If the route map makes it to this phrase, set next-hop is executed, and the route map exits with permit If this match succeeds, set next-hop is executed, and the route map exits with permit If not, the route map continues with the next phrase If this match succeeds, the route map exits with permit If not, the route map continues with the next phrase
61 Route Maps Phrase type Match result Route map result Permit Permit Set statements within the phrase are executed and the route map exits with permit Deny Permit Set statements within the phrase are not executed and the route map exits with deny Permit/ Deny Deny Set statements within the phrase are not executed and route map continues with the next phrase If there is no next phrase, route map exits with deny
62 Route Maps PBR proceeds through the route map until a match is found. If no match is found in the route map, the packet will be forwarded according to normal destination-based routing If the route-map statement is marked as a deny, the packets meeting the match criteria are forwarded according to normal destination-based routing If the statement is marked as permit and the packets do not meet the match criteria, the packets are forwarded according to normal destinationbased routing If the route-map statement is marked as permit and the packets meet the match criteria, the set clauses are applied and policy routing is performed
63 Route Maps Match metric route-type tag ip address ip address prefix-list ip next-hop length ip route-source Description Metric of the route In BGP s case, this is the MED Must match exactly! OSPF or EIGRP route type Internal, External OSPF external type 1 or 2 Route tag Standard or extended access list Applied against the prefix Numbered or named Prefix list Applied against the prefix and prefix length Standard or extended access list Applied against the next hop (via in the routing table) Numbered or named Packet length Standard or extended access list Applied against the neighbor this route was learned from (from in the routing table) Numbered or named
64 Route Maps Not all set statements work with all protocols or in all situations It is recommended to test what you want to do before you try to use it Set ip next-hop ip next-hop recursive ip next-hop verify interface metric metric-type tag Description Set the next hop in the routing table or transmitted route Set the next hop to a subnet which is not directly connected Set the next hop and verify availability using tracking Set the output interface Set the metric of the redistributed or transmitted route Set the type of external route External type 1 or type 2 for OSPF Sets the route tag
65 Route Map Logic (AND) route-map CMUG permit 10 match ip address 10 match tag 1000 set ip next-hop Must match BOTH match conditions to successfully match route-map phrase Logical AND Some types of matches cannot co-exist in the same route map phrase, such as an access list and a prefix list
66 Route Map Logic (OR) route-map CMUG permit 10 match ip address set ip next-hop Can match any ACL in the ACL list under the single match statement Logical OR
67 Route Map Logic (NOT) route-map CMUG permit 10 match ip address 10 route-map CMUG permit 20 match ip address 20 route-map CMUG permit 30 set ip next-hop If we match either ACL in phrase 10 or phrase 20 then we exit the route-map and don t fall to catch-all phrase 30. Therefore we must NOT match either ACL 10 nor 20 in order for the set to apply Logical NOT
68 Route Maps Route map Logic Notes route-map CMUG permit 10 match ip address 10 match tag 1000 set ip next-hop route-map CMUG permit 10 match ip address set ip next-hop route-map CMUG permit 10 match ip address 10 route-map CMUG permit 20 match ip address 20 route-map CMUG permit 30 set ip next-hop AND OR NOT Both matches must succeed for the set to be executed Some types of matches cannot co-exist in the same route map phrase, such as an access list and a prefix list If the route matches either access list 10 or 20, the set will be executed The route must not match access list 10 or 20 for the set to execute If the access lists deny routes, then the routes must not exist for a specific action to be taken (useful in conditional advertisement)
69 Route Maps In normal processing, if all matches fail, the route map falls through to the next phrase Route map continue allows you to continue to another phrase if the matches succeed Sets are executed before the continue is followed Use for: Gathering policy (matches and sets) into a single phrase More complex logical constructions
70 Route Maps Gathering Policy with Continue If this match succeeds route-map CMUG permit 10 match ip address 10 set ip next-hop continue 30 route-map CMUG permit 20 match ip address 20 set ip next-hop continue 30 route-map CMUG permit 30 set ip precedence critical set ip df 0 Execute this set Continue to 30 Execute this set If this match succeeds Execute this set Continue to 30 Execute this set
71 Policy Based Routing Router_B#show ip route... D /24 via <E> Router_B#show run / /24 A interface Ethernet1/0 ip policy route-map CMUG access-list 10 permit access-list 20 permit route-map CMUG permit 10 match ip address 10 route-map CMUG permit 20 match ip address 20 set ip next-hop route-map CMUG permit 30 set ip next-hop E1/0 B / /24 D.2 C E /24
72 Policy Based Routing PBR applied to an interface only affects traffic that comes in that interface Can configure a PBR policy local to the router Router#show run ip local policy route-map CMUG access-list 101 permit ip any route-map CMUG permit 10 match ip address 101 set ip next-hop Local PBR policy only affects traffic generated from the router itself
73 Policy Based Routing Can PBR be Dynamic? You can use Object Tracking with PBR to track the availability of the next-hop track 1 ip sla 1 reachability track 2 ip sla 2 reachability ip sla 1 icmp-echo source-interface Ethernet1/0 ip sla 2 icmp-echo source-interface Ethernet1/0 ip sla schedule 1 life forever start-time now ip sla schedule 2 life forever start-time now route-map CMUG permit 10 match ip address 101 set ip next-hop verify-availability track 1 set ip next-hop verify-availability track 2 Tracking object tied to IP SLA object Route-map ties next-hop to tracking object so next-hop is only valid if the tracking object is UP If both tracking objects are DOWN, normal routing is used Sequence number determines priority of next-hops
74 Policy Based Routing Load sharing Supplemental to dynamic load-sharing capabilities offered by Cisco IOS, PBR allows traffic to be administratively distributed among multiple paths based on the traffic characteristics Quality of Service (QoS) Using IP Precedence or type of service (ToS) values to prioritize differentiated traffic Source-sensitive routing Route traffic originating from different users through different paths Cost Route traffic across low-bandwidth, low-cost permanent paths or high-bandwidth, high-cost, switched paths Security Route certain types of traffic (like http) to firewall/ips/content filtering device and allow other traffic to follow normal routing
75 Overriding the Routing Table: Performance Routing 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
76 Performance Routing Traditional routing based on destination of packet Policy-based routing allows routing based on more information about the packet Source IP, Protocol, Ports Used, QoS markings, etc Performance Routing (PFR) allows for routed path decisions to be made on path characteristics (like reachability, delay, packet loss, jitter, Mean opinion Score) so application traffic can be given the optimum path given it s path requirements
77 Performance Routing Learn traffic and applications Discovers traffic going through network via Netflow Measure traffic and application performance Tracks characteristics like loss/delay/jitter about paths either passively (via netflow) or actively (via IP SLA probes) Apply policies to the traffic based on measurements Allows definitions of policies so certain applications or traffic classes given required network service Reroute traffic Dynamically alters path of application traffic if current service not in line with specified policy to sustain performance
78 Performance Routing Enterprise Information BR ISP1 Internet MC Command Voice Information BR ISP2 Apps Border Routers collect traffic information and pass the information to a central router (called a Master Controller) Master Controller receives information about flows and determine if they are within configured policy for traffic class If measurements of traffic class is out of policy or lessoptimum, Master controller can send commands to the borders to re-route traffic
79 Load Sharing 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85 BRKARC Cisco and/or its affiliates. All rights reserved. Cisco Public 85
80 Load Sharing Assume the same routing process attempts to install two routes for the same destination in the RIB The routing process may allow the second route to be installed based on its own rules Route cost Maximum Paths OSPF IS-IS EIGRP Must be equal to installed route Must be equal to installed route Must be less than or equal to the lowest cost route times the variance Must be less than or equal to the maximum-paths configured under the routing process
81 Load Sharing Load sharing performed in the CEF (Cisco Express Forwarding) path CEF has 2 forms of load sharing Per-session (Per-destination) Eth1 Eth2 Flow 1 - Flow 2 - Per-packet Eth1 Eth2
82 Load Sharing Per-Session Load Sharing Often referred to as per-destination load sharing, even within Cisco IOS This method is the default behavior and does not require any additional configuration A session is a flow that shares the same source and destination. Traffic with different source to destination pairs tend to take different paths This method ensures that traffic for a given session arrive in order Has the potential for traffic polarization and is more effective as the number of source to destination pairs increase
83 Load Sharing Per-Packet Load Sharing To utilize this method, configure ip cef load-sharing per-packet in interface configuration mode. Each outgoing interface must have this command configured Uses a round-robin method to determine which path each packet takes to the destination without consideration of source to destination sessions Ensures traffic is more evenly distributed over multiple paths Packets for a given source to destination session may take different paths, introducing a greater potential for packets to arrive out of sequence. Not advisable for all types of traffic Method used when process-switching
84 Load Sharing router#show ip route Routing entry for /24 Known via "eigrp 100", distance 170, metric , type external Redistributing via eigrp 100 Last update from on Serial3/1, 00:18:17 ago Routing Descriptor Blocks: * , from , 00:18:17 ago, via Serial3/0 Route metric is , traffic share count is , from , 00:18:17 ago, via Serial3/1 Route metric is , traffic share count is 1... The traffic share count is critical to understanding the actual load sharing of packets using these two routes How is this calculated?
85 Load Sharing router#show ip route Routing entry for /24 Known via "eigrp 100", distance 170, metric , type external Redistributing via eigrp 100 Last update from on Serial3/1, 00:18:17 ago Routing Descriptor Blocks: * , from , 00:18:17 ago, via Serial3/0 Route metric is , traffic share count is , from , 00:18:17 ago, via Serial3/1 Route metric is , traffic share count is 1... The metric of each route is divided into the highest metric among the available metrics / == 1 The resulting number is the traffic share count
86 Load Sharing router#show ip route Routing entry for /24 Known via "eigrp 100", distance 170, metric , type external Redistributing via eigrp 100 Last update from on Serial3/1, 00:18:17 ago Routing Descriptor Blocks: * , from , 00:18:17 ago, via Serial3/0 Route metric is , traffic share count is , from , 00:18:17 ago, via Serial3/1 Route metric is , traffic share count is 1... If one metric is less than another metric, the traffic share count will be something other than 1 (only for EIGRP and requires variance to be configured) / == / == 2 The resulting number is the traffic share count
87 Load Sharing router#show ip route Routing entry for /24 Known via "eigrp 100", distance 170, metric , type external Redistributing via eigrp 100 Last update from on Serial3/1, 00:18:17 ago Routing Descriptor Blocks: * , from , 00:18:17 ago, via Serial3/0 Route metric is , traffic share count is , from , 00:18:17 ago, via Serial3/1 Route metric is , traffic share count is 1... When process switching, traffic share count packets is sent down one path, and then the process moves to the next available path The route with the * beside it is the current in use path for process-switching
88 Load Sharing CEF uses 16 hash buckets and assigns hash buckets to each next-hop Router#sh ip route Routing entry for /32 Known via "ospf 10", distance 110, metric 20, type extern 2, forward metric 30 Last update from on Ethernet1/0, 00:01:04 ago Routing Descriptor Blocks: , from , 00:01:04 ago, via Ethernet1/0 Route metric is 20, traffic share count is 1 * , from , 00:01:24 ago, via Ethernet1/0 Route metric is 20, traffic share count is 1 Each packet that comes in gets measured against the HASH, and the HASH result determines which hash bucket the packet uses Router#sh ip cef internal [snip] /32, epoch 0, RIB[I], refcount 5, per-destination sharing Ethernet1/0(7): , nexthop Ethernet1/0, adjacency IP adj out of Ethernet1/0, addr nexthop Ethernet1/0, adjacency IP adj out of Ethernet1/0, addr flags: Per-session, for-rx-ipv4 16 hash buckets < 0 > IP adj out of Ethernet1/0, addr C4608 < 1 > IP adj out of Ethernet1/0, addr C44E8 < 2 > IP adj out of Ethernet1/0, addr C4608 < 3 > IP adj out of Ethernet1/0, addr C44E8 < 4 > IP adj out of Ethernet1/0, addr C4608 < 5 > IP adj out of Ethernet1/0, addr C44E8 < 6 > IP adj out of Ethernet1/0, addr C4608 < 7 > IP adj out of Ethernet1/0, addr C44E8 < 8 > IP adj out of Ethernet1/0, addr C4608 < 9 > IP adj out of Ethernet1/0, addr C44E8 <10 > IP adj out of Ethernet1/0, addr C4608 <11 > IP adj out of Ethernet1/0, addr C44E8 <12 > IP adj out of Ethernet1/0, addr C4608 <13 > IP adj out of Ethernet1/0, addr C44E8 <14 > IP adj out of Ethernet1/0, addr C4608 <15 > IP adj out of Ethernet1/0, addr C44E8 Each next-hop has 8 hash buckets The result is a 50/50 chance of getting each next-hop 1:1 load-sharing
89 Load Sharing Hash Inputs Hash Hash Result via Serial3/0 via Serial3/1 Per-destination Load-sharing takes a set of inputs, runs those inputs into the hash algorithm, and the result of the algorithm determines which load-sharing Hash bucket that packet will use Per-destination load-sharing algorithm used will determine which inputs are put into the hash
90 Load Sharing Source Destination Hash CEF hashes the source and destination addresses, and chooses a bucket from the load share table = 5 Hash Result via Serial3/0 via Serial3/1 The load share table points to an adjacency corresponding to one of the next hops in the routing table
91 Load Sharing How do I tell which next-hop a particular packet will take? router#show ip cef exact-route > : Serial3/0 (next hop ) exact-route command in CEF takes hash inputs (source/destination IP) and puts them through the hash to result the egress interface Useful in tracing path of packet during troubleshooting
92 Load Sharing Polarization If the same input into the hash algorithm produces the same result, then what if there are many routers using the same algorithm? Packet 1 = src dst Packet 2 = src dst If the hash for packet 1 always results in path 1 1 D And if the hash for packet 2 always results in path 2 A 1 2 B 2 1 C 2 E F G Then all routers will make the same path decision and as a result the links between B=>E and C=>F will never be used!
93 Load Sharing Polarization We can fix this if we change the inputs on each router by looking at something else besides just the src/dst IP -But this extra input would need to be unique per router, otherwise every router will pick the same path again 1 D Universal Algorithm A 1 2 B 2 1 C 2 E F G Each router adds a unique random number to the hash algorithm resulting in the possibility that the hash result on each hop may be different
94 Load Sharing Performance Routing Enterprise 20% Routing Updates GW1 ISP1 CORE Internet Routing Updates GW2 60% ISP2 Voice Apps In addition to load sharing traffic based on application policies, PfR can also load share or load balance traffic based on link utilization.
95 Load Sharing Performance Routing Enterprise Information BR 39% ISP1 MC Command Internet Information BR 41% ISP2 Voice Apps CE2 link was 60% utilized and CE1 only 20%. PfR can identify this and move traffic to better balance out the egress link utilizations. Done by configuring a policy to keep link utilization within a % of each other, so one link isn t utilized more than the other
96 Routing Segmentation and Separation 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
97 Routing Segmentation and Separation When would you want to separate routing operations? Prevent any potential exchange of data or routing information. Why not use ACLs or other security features? Helpful but limited A VRF can help prevent the exchange of routes as well as data and does not have to be constantly updated.
98 Routing Segmentation and Separation What is a VRF? A VPN Routing and Forwarding (VRF) is an IOS routing instance. All tables (routing/cef) maintained in routing instance (vrf) All protocols/features run independently in each VRF instance Allows for logical separation at Layer-3 Originally designed for MPLS VPN so multiple MPLS customers can use overlapping IP space and be logically separated from each other This presentation will be referring to VRF outside of an MPLS VPN context. Also known as VRF-Lite.
99 Routing Segmentation and Separation Router_A#show run vrf blue Router_A#show run vrf red ip vrf blue!! interface Ethernet0/1 ip vrf forwarding blue ip address ! interface Loopback1 ip vrf forwarding blue ip address ! router eigrp 1! address-family ipv4 vrf blue network no auto-summary autonomous-system 1 exit-address-family! Router_A! ip vrf red!! interface Ethernet0/2 ip vrf forwarding red ip address ! interface Loopback2 ip vrf forwarding red ip address ! router eigrp 1 address-family ipv4 vrf red network no auto-summary autonomous-system 1 exit-address-family!
100 Routing Segmentation and Separation How to configure and identify a VRF Router#show ip vrf Name Default RD Interfaces blue <not set> Et0/1 Lo1 red <not set> Et0/2 Lo2 Router#show ip vrf int Interface IP-Address VRF Protocol Et0/ blue up Lo blue up Et0/ red up Lo red up Router#show ip route vrf blue Routing Table: blue C C L /32 is subnetted, 1 subnets is directly connected, Loopback /16 is variably subnetted, 2 subnets, 2 masks /24 is directly connected, Ethernet0/ /32 is directly connected, Ethernet0/1
101 Routing Segmentation and Separation Routing principles are the same within a VRF as in the global routing table. All routes and prefixes are unique to a given VRF unless route leaking is configured. Features that affect forwarding (like Routing Protocols/static routes/nat/pbr) need to be configured on a per-vrf basis Interface-level features that affect traffic (like ACLs/QoS/uRPF) do not need to be configured to be VRF aware because they inherit the VRF of the interface on which they are configured
102 Routing and Router Resources: CPU 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109
103 CPU Central Processing Unit responsible for carrying out instructions. IOS uses a priority run-to-completion model for executing processes. The task scheduler is responsible for scheduling and executing kernel processes on the CPU Process Priorities: Critical High Medium Low There is no preemption but higher priority processes have more opportunity to access the CPU.
104 CPU What uses CPU resources? Router processes Packet switching IP Input Process switched packets Interrupts CEF switched packets CPU utilization for five seconds: 5%/2%; one minute: 3%; five minutes: 2% PID Runtime (ms) Invoked usecs 5Sec 1Min 5Min TTY Process [snip] % 1.00% 0% 0 IP Input % 1.00% 0% 0 BGP Router % 0% 0% 0 BGP Scanner
105 CPU How does routing information affect CPU resources? BGP router calculates the best BGP path and processes any route "churn". It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB). Does a large amount of work during initial convergence where large amount of prefixes are exchanged. The larger the tables that are being exchanged, the more time BGP router will have to use the CPU.
106 CPU Monitoring CPU usage Show commands: show process cpu sorted show process cpu history CPU threshold monitoring/logging process cpu threshold type {total process interrupt} rising percentage interval seconds [falling percentage interval seconds] 18:41:20.934: %SYS-1-CPURISINGTHRESHOLD: Threshold: Total CPU Utilization(Total/Intr): 72%/0%, Top 3 processes(pid/util): 79/64%, 140/6%, 75/1%
107 CPU Reporting CPU events via EEM event manager applet highcpu event snmp oid get-type exact entry-op ge entry-val 90 poll-interval 10 action 1.0 cli command "enable" action 2.0 cli command "show proc cpu sorted redirect flash:highcpu.txt action 3.0 syslog msg High CPU DETECTED "show process cpu sort" written to > flash:highcpu.txt action 4.0 mail server "<mail_server_ip>" to "< _address>" from "<sender>" subject CPU exceeded 90%." Event manager applet monitoring SNMP OID for CPU utilization percentage every 10 seconds Actual OID will depend on platform/code If CPU OID value exceeds value 90 (90%), script will trigger the specified actions
108 Routing and Router Resources: Memory 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116
109 Memory Managed in 2 pools: Processor and I/O The processor memory pool is the general memory pool common to all IOS systems including storage for routing information. The I/O pool or packet memory manages memory for interface packet buffers.
110 Memory How does routing information affect memory resources? Most common example of where we see this is the storing of BGP prefixes. BGP generally carries the largest number of prefixes as well as the potential to store multiple tables.
111 Memory How much memory do I need to store my routing information? Full BGP table Multiple feeds Route filtering Soft reconfiguration inbound Default route
112 Memory Usage Example BGP Profile 1 Baseline memory usage with no BGP peers BGP Profile 2 1 BGP peer sending 300,000 routes BGP Profile 3 2 BGP peers both sending the exact same 300,000 prefixes Unique AS path and next-hop IP information from each peer BGP Profile 4 2 BGP peers both sending 300,000 unique prefixes with zero overlap Unique AS path and next-hop IP information from each peer
113 Memory Usage Example BGP Routes vs. Memory Consumption Total Memory (Bytes) No Routes Routes Routes Routes BGP Profile Free Used #Peers #Routes Memory The amount of memory used to store prefixes also depends on the amount of overlap between peers. BGP Profile MB , MB , MB , MB
114 Memory Monitoring memory availability Show commands show process memory sorted show memory statistics history Memory Threshold Notifications memory free low-watermark {processor threshold io threshold} memory reserve critical kilobytes 22:31:19.559: %SYS-4-FREEMEMLOW: Free Memory has dropped below 2000k Pool: Processor Free: freemem_lwm:
115 Q & A 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123
Chapter 2 Lab 2-2, EIGRP Load Balancing
Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.
Troubleshooting Load Balancing Over Parallel Links Using Cisco Express Forwarding
Page 1 of 16 Troubleshooting Load Balancing Over Parallel Links Using Cisco Express Forwarding Document ID: 18285 Contents Introduction Prerequisites Requirements Components Used Conventions Background
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
ASA 9.x EIGRP Configuration Example
ASA 9.x EIGRP Configuration Example Document ID: 91264 Contributed by Dinkar Sharma, Magnus Mortensen, and Prashant Joshi, Cisco TAC Engineers. May 13, 2015 Contents Introduction Prerequisites Requirements
IP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved.
BGP DDoS Mitigation Gunter Van de Velde Sr Technical Leader NOSTG, Cisco Systems May 2013 2012 Cisco and/or its affiliates. All rights reserved. 1 A simple DDoS mitigation mechanism explained Bertrand
Frame Mode MPLS Implementation
CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the
CCIE R&S Lab Workbook Volume I Version 5.0
Copyright Information, Inc. All rights reserved. The following publication, CCIE R&S Lab Workbook Volume I Version 5.0, was developed by Internetwork Expert, Inc. All rights reserved. No part of this publication
Introduction to Dynamic Routing Protocols
CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Lab 4.2 Challenge Lab: Implementing MPLS VPNs
Lab 4.2 Challenge Lab: Implementing MPLS VPNs Learning Objectives Configure Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) on a router Enable MPLS on a router Verify
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
CertificationKits.com EIGRP Sample CCNA Lab. EIGRP Routing. The purpose of this lab is to explore the functionality of the EIGRP routing protocol.
EIGRP Routing The purpose of this lab is to explore the functionality of the EIGRP routing protocol. Hardware & Configuration Required for this Lab Two Cisco routers with two Fast Ethernet interfaces and
Configuring Enhanced Object Tracking
Configuring Enhanced Object Tracking First Published: May 2, 2005 Last Updated: July 1, 2009 Before the introduction of the Enhanced Object Tracking feature, the Hot Standby Router Protocol (HSRP) had
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Configuring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
Route Optimization. rek. 2005 Petr Grygarek, VSB-TU Ostrava, Routed and Switched Networks 1
Route Optimization (intra-as) Petr Grygárek rek 1 Goal of route optimization Static routing: More predictable and safer Dynamic routing: Automatically ally reacts on topology changes Lower administration
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Troubleshooting IP Routing
C H A P T E R 7 Troubleshooting IP Routing This troubleshooting chapter has several goals. First, it explains several tools and functions not covered in Chapters 4 through 6 specifically, tools that can
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
IP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
OSPF Configuring Multi-Area OSPF
OSPF Configuring Multi-Area OSPF Objective In this lab configure a multiarea OSPF operation, interarea summarization, external route summarization, and default routing. Scenario International Travel Agency
CCNA 2 v5.0 Routing Protocols Final Exam Answers
CCNA 2 v5.0 Routing Protocols Final Exam Answers 1 Refer to the exhibit. What can be concluded about network 192.168.1.0 in the R2 routing table? This network was learned through summary LSAs from an ABR.*
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Configuring a Basic MPLS VPN
Configuring a Basic MPLS VPN Help us help you. Please rate this document. Contents Introduction Conventions Hardware and Software Versions Network Diagram Configuration Procedures Enabling Configuring
Multiprotocol Label Switching Load Balancing
Multiprotocol Label Switching Load Balancing First Published: July 2013 The Cisco ME 3800 and ME 3600 switches support IPv4 and IPv6 load balancing at the LER and LSR. Effective with Cisco IOS Release
- Route Filtering and Route-Maps -
1 Prefix-Lists - Route Filtering and Route-Maps - Prefix-lists are used to match routes as opposed to traffic. Two things are matched: The prefix (the network itself) The prefix-length (the length of the
BGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
isco Troubleshooting Input Queue Drops and Output Queue D
isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco
DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim
Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements
IPv6 over MPLS VPN Document ID: 112085 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram VRF Configuration Multiprotocol BGP (MP BGP) Configuration
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
Configuring Route Maps and Policy-Based Routing
C H A P T E R 2 Configuring Route Maps and Policy-Based Routing Perhaps one of the most colorful descriptions for route maps is that route maps are like duct tape for the network not necessarily because
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
How to Configure Cisco 2600 Routers
Helsinki University of Technology Department of Communications and Networking How to Configure Cisco 2600 Routers Juha Järvinen 10.6.2004 [email protected] Modified by Zhong Yunqiu 7.8.2008 Table
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
GregSowell.com. Mikrotik Routing
Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
BGP4 Case Studies/Tutorial
BGP4 Case Studies/Tutorial Sam Halabi-cisco Systems The purpose of this paper is to introduce the reader to the latest in BGP4 terminology and design issues. It is targeted to the novice as well as the
IP Accounting C H A P T E R
C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
Configuring BGP. Cisco s BGP Implementation
Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Using OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
Advanced routing scenarios POLICY BASED ROUTING: CONCEPTS AND LINUX IMPLEMENTATION
Advanced routing scenarios POLICY BASED ROUTING: CONCEPTS AND LINUX IMPLEMENTATION What is wrong with standard IP forwarding? The IP forwarding algorithm selects the route according to the destination
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
CCNP CISCO CERTIFIED NETWORK PROFESSIONAL LAB MANUAL
CCNP CISCO CERTIFIED NETWORK PROFESSIONAL LAB MANUAL VER 2.0 Page 1 of 315 ACKNOWLEDGEMENT We can write a 1000 page book, but we can t find enough words to describe the credit Mr. Siddiq Ahmed deserves
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
BGP Support for Next-Hop Address Tracking
The feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established.
CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding
Http://elmaestrodelared.blogspot.com CCNA Exploration 4.0: (II) Routing Protocols and Concepts Chapter 1: Introduction to Routing and Packet Forwarding 1. If a router cannot find a valid configuration
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
How To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
Configuring a Gateway of Last Resort Using IP Commands
Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
BGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
ISIS for ISPs. ISP/IXP Workshops
ISIS for ISPs ISP/IXP Workshops 1 Configuring ISIS in IOS Starting ISIS in IOS router isis [name] Where the optional name can specify the name of the ISIS process ISIS name is unique to the router Gives
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1
1 Which two statements are true regarding the advantages of the use of static routes? (Choose increased security reduced effort in configuring routes the administrator maintains control over routing easier
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Introduction This document discusses Cisco tunnel default gateway implementations that are available as part
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2
61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
BGP: Frequently Asked Questions
BGP: Frequently Asked Questions Document ID: 5816 Contents Introduction How do I configure BGP? How do I configure BGP with the use of a loopback address? What is the order of preference of attributes
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
IOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
NetFlow Policy Routing
NetFlow Policy Routing Feature Summary NetFlow policy routing (NPR) integrates policy routing, which enables traffic engineering and traffic classification, with NetFlow services, which provide billing,
Configuring NetFlow-lite
CHAPTER 55 Note NetFlow-lite is only supported on Catalyst 4948E Ethernet Switch. This chapter describes how to configure NetFlow-lite on the Catalyst 4948E switch. NetFlow-lite provides traffic monitoring
Lab 5-5 Configuring the Cisco IOS DHCP Server
Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology
