CCNP Practical Studies Routing-3
CCNP Practical Studies Routing-3
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Introduction
Goals of This Book
Audience
Chapter Organization
How Best to Use This Book
Getting Equipment
How to Use The Book if You Cannot Get Equipment
Command Syntax Conventions
Conclusion
i
CCNP Practical Studies: Routing
ii
CCNP Practical Studies: Routing
iii
CCNP Practical Studies: Routing
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Index
iv
CCNP Practical Studies: Routing
Henry Benjamin is a dual Cisco Certified Internet Expert (CCIE #4695), having been certified in Routing and Switching in May 1999 and
ISP Dial in June 2001. His other Cisco certifications include CCNA and CCDA.
He has more than 10 years experience in Cisco networks, including planning, designing, and implementing large IP networks running
IGRP, EIGRP, BGP, and OSPF. Recently, Henry worked for Cisco Systems, Inc. in the internal IT department as a key network designer,
designing and implementing networks all over Australia and Asia.
v
CCNP Practical Studies: Routing
In the past two years, Henry has been a key member of the CCIE global team based in Sydney, Australia. As a senior and core member of
the team, his tasks include writing new laboratory examinations and written questions for the coveted CCIE R/S certification,
recertification examinations, and ISP laboratory examinations.
Proctoring candidates from all parts of the world is a favorite pastime of his. Henry has authored another book, CCIE Routing and
Switching Exam Cram: Exam: 350-001, for the CCIE qualification examination and helped edit many other titles.
Henry holds a bachelor of aeronautical engineering degree from Sydney University in Australia.
vi
CCNP Practical Studies: Routing
Eddie Chami has three years of networking experience. Eddie entered Cisco Systems two years ago, where he joined the Technical
Assistance Center (TAC) at Cisco Systems in Australia. During this period, he attained his CCIE in Routing and Switching and has also
proctored CCIE R/S exams. With his extensive knowledge in the networking field, Eddie found great satisfaction in not only learning from
others but also teaching others. He is currently working with the WAN team, helping customer deployments and troubleshooting day-to-
day network connectivity. Eddie's other interests are in the areas of optical, DSL, wireless, and high-speed networks. Eddie has a diploma
in aviation studies and a commercial pilot license. His hobbies are sports, reading, and flying. Currently, Eddie is broadening his
knowledge in the optical space field; he also has great interests in GMPLS. He can be contacted at [email protected].
vii
CCNP Practical Studies: Routing
Acknowledgments
Cisco Press was wonderful to work with—no bones about it. The team at Cisco Press includes an amazing family of hard-working people.
It has been a true pleasure to be invited to write this book. Any aspiring author in this field should seriously consider working with Cisco
Press. In particular, at Cisco Press, I'd like to thank Michelle Stroup for introducing me to this project and Andrew Cupp for the tireless
work on this book and complete trust in me. Thank you Tammi Ross for being such a great help. I'd also like to thank San Dee Phillips,
Sydney Jones, Tim Wright, and Octal Publishing, Inc. for all of their expert work on this book. If I ever write another book, it will be only
with the fine folks at Cisco Press.
The technical editors, Eddie, Frank, and Davin, provided valuable technical expertise, and all three showed they have the technical
expertise and keen eye for detail to become accomplished authors themselves. Davin and Eddie are CCIEs that I had the pleasure of
passing, and I eagerly await Frank's attempt in the near future.
I would also like to thank my wife, Sharon, and my one and only son, Simon, who turned eight years old while I was completing this book.
I was always grateful to them both for their understanding and knowing when I needed time to complete this project. I treasure my time
with my family and my growing little boy who makes me proud to be his dad. Simon, I love you to the sun and keep going around forever
and ever.
This book would have never been written if my mum and dad had never told me to study. Thank you Dad. Thank you Mum.
ix
CCNP Practical Studies: Routing
Introduction
The Cisco Certified Network Professional (CCNP) certification on the Routing and Switching career track is becoming increasingly
popular. CCNP certification builds on your foundation established from the Cisco Certified Network Associate (CCNA) certification. The
Routing 2.0 exam is one of the exams that you must pass to become a CCNP. This book provides you with a practical way to prepare for
the Routing examination and enables you to obtain some practical skills required to fully appreciate the power of routing in any
environment. Professional-level certifications, such as CCNP, open the door to many career opportunities. CCNPs today are valuable
compared to even CCIEs, based on the fact that a company can hire many CCNPs who are technically very sound and can provide quality
technical skills without the burden of paying large amounts for a single individual who may have more expertise but whose vast expertise
isn't necessary for that company's needs. By demonstrating the determination to prepare for and pass the extensive CCNP exam process,
CCNPs also demonstrate a strong desire to succeed. CCNPs, through the examinations required, demonstrate a large knowledge base that
can be built upon with almost any company running any technology.
Passing the Routing 2.0 exam means that you have mastered the concepts and implementation skills necessary to build a complex IP
network of Cisco routers. This is a great skill and demonstrates to any employer that you are ready for any challenges that might be asked
of you. CCNP Practical Studies: Routing is intended to help you move concepts and theories into practical experience on Cisco routers.
NOTE
The Routing 2.0 exam is a computer-based exam with multiple-choice, fill-in-the-blank, and list-in-order style questions. The exam can be
taken at any Sylvan Prometric testing center (1-800-829-NETS, www.2test.com). The exam takes approximately 75 minutes and has
approximately 60 questions. You should check with Sylvan Prometric for the exact length of the exam. The exam is constantly under
review, so be sure to check the latest updates from Cisco at www.cisco.com/warp/public/10/wwtraining/.
The second goal of this book is to provide you with comprehensive coverage of Routing 2.0 exam-related topics, without too much
coverage of topics not on the exam. Ultimately, the goal of this book is to get you from where you are today to the point that you can
confidently pass the Routing 2.0 exam. Therefore, all this book's features, which are outlined in this introduction, are geared toward helping
you discover the IP routing challenges and configuration scenarios that are on the Routing exam, where you have a knowledge deficiency
in these topics, and what you need to know to master those topics. The best method to accomplish this is to demonstrate these topics and
provide a step-by-step practical studies guide.
Audience
CCNP Practical Studies: Routing is targeted to networking professionals, familiar with networking concepts and the principles of routing
theory, who desire a hands-on approach to applying their knowledge. This book is designed to allow a reader, in a structured manner, to
configure an entire network consisting of various topologies, technologies, and routing protocols from start to finish. You should have
CCNA-level knowledge to use this book to its full extent.
Each chapter starts by briefly describing the technology that is covered in the practical portion of the chapter. This technology background
is brief and assumes the reader has a strong technical background and now desires a practical environment to apply this knowledge.
The bulk of each chapter contains five scenarios, which provide you with an opportunity to apply the material at hand practically with the
aid of complete explanations. A Practical Exercise, at the end of each chapter, lets you test yourself by applying your knowledge without
the benefit of the inline explanations that are provided in the scenarios. You can assess your mastery of the subjects by looking over the
Practical Exercise solution. Finally, each chapter ends with a series of review questions designed to allow you to further assess your
knowledge of the technology covered. The final chapter in the book is a special chapter that reinforces all the concepts and technologies
covered in this guide into one complex scenario. Chapter 9, "CCNP Routing Self-Study Lab," is designed to assist you in your final
preparation for the Routing exam by providing you a lab scenario that incorporates many technologies and concepts. Detailed solutions and
tips are provided to guide you through the configurations.
By working through these various elements, you will not only gain more confidence navigating within the Cisco IOS but also an
understanding of how these various networking concepts relate. Various help tools and author experience are included to ensure that you
are fully aware of any problematic configurations and challenges that face network designers in today's large networks.
xi
-
CCNP Practical Studies: Routing
The end result is that you will become a more complete network engineer ready to tackle and design any IP routing solution. CCNP
Practical Studies: Routing is for individuals studying for the CCNP Routing 2.0 exam who would like to apply their knowledge while
preparing themselves for the exam. Again, this book was written assuming you have CCNA-level experience and knowledge concerning
Cisco routers and routing protocols.
Chapter Organization
This book has nine chapters. Each chapter (except Chapter 9) contains brief background information, five scenarios with detailed
explanations and full Cisco IOS configurations, a Practical Exercise with solutions, and review questions. This book also contains four
appendixes.
In each chapter, following the scenarios, one practical lab requires you to configure the network on your own. The solution contains the full
configuration, so readers without network equipment can still follow the configuration requirements. A Review Questions section follows
each Practical Exercise to ensure that you digest the fundamental terms and concepts presented in each chapter.
The following subsections briefly describe the subject of each chapter and appendix.
Chapter 1 covers basic IP addressing, variable-length subnet masks, and subnetting topics.
IP concepts are reviewed and explained, followed by an explanation of the IP routing table on Cisco routers and instructions about how to
minimize the IP routing table using summarization.
Chapter 2 covers the basic information required on Cisco routers to route IP data across an IP network. Topics include what a distance-
vector protocol is and how to configure one on Cisco routers. Link-state routing protocols are described and configured. Finally, IP routing
tables are covered in more detail using common IP routing algorithms, such as RIP and IGRP. This is followed by some common
techniques used to ensure IP data is routing as correctly and efficiently as possible.
Chapter 3 covers basic OSPF routing principles and how OSPF routing is fundamental for any small or large network. Basic OSPF
terminology is described and configured. The chapter briefly explains why OSPF is considered an improved routing protocol over RIP by
explaining how OSPF discovers, chooses, and maintains routing tables. Nonbroadcast multiaccess (NBMA) is demonstrated using a
common network topology. The issues and challenges facing network designers when configuring OSPF in larger networks are
demonstrated with the practical scenarios.
Chapter 4 covers the more advanced topics in OSPF and another link-state routing protocol, IS-IS.
OSPF is explained in more detail, and the chapter explains how OSPF is used in large IP routing environments and how OSPF can be
configured to reduce IP routing tables and CPU usage, and lower the memory requirements of access or edge routers. OSPF is a popular IP
routing protocol, so most Cisco certifications, including CCNP and CCIE, heavily test on OSPF.
Chapter 5 focuses on a protocol developed by Cisco Systems and used on Cisco IOS routers only, namely Enhanced Interior Gateway
Routing Protocol (EIGRP). EIGRP is explained and configured on Cisco routers. You discover how EIGRP learns about new neighbors
and how EIGRP operates in NMBA networks.
Chapter 6 covers the most important routing protocol in use today, Border Gateway Protocol (BGP).
xii
-
CCNP Practical Studies: Routing
The basics terms and configuration options are described to help you appreciate the powerful nature of BGP. There are five practical
scenarios to complete your understanding of BGP to help you appreciate its complexity.
Chapter 7 describes BGP in greater detail; in particular, the chapter covers how BGP deals with large networks. Scalability issues are
presented, and ways to overcome large BGP networks are covered and configured on Cisco routers.
Chapter 8 covers the issues and challenges facing networks when information from one routing algorithm is redistributed into another. This
chapter also covers how information can be controlled to ensure that the network is routing IP as correctly and efficiently as possible.
Chapter 9 is designed to assist you in your final preparation for the Routing 2.0 exam by providing you a lab scenario that incorporates
many of the technologies and concepts covered in this book. The exercises presented are a combination of all the most critical topics found
in this book into one scenario. Full working configurations and sample displays are presented.
Appendix A describes some useful study tips for CCNP candidates. Common exam techniques and the best study practices are provided to
ensure that you are fully prepared on the day of the examination.
Appendix B describes what a CCNP can achieve after becoming CCNP certified.
Appendix D is a bonus aid designed to assist you in your final preparation for the most widely sought after certification in the world today,
namely CCIE (Routing and Switching).
Getting Equipment
You can obtain reasonably priced equipment from various places. If your place of employment has spare equipment that you can use, this
may be your first option. If you want to purchase equipment, numerous places exist on the Internet; contact Cisco Systems for second-hand
or used routers at very competitive prices. Alternatively, search Cisco partners or auction sites for cheap devices to help you. There are also
simulators that offer a cheap solution to purchasing equipment. Cisco, for example, offers a product called Cisco Interactive Mentor (CIM)
that enables candidates to simulate real-life networks. For more details on CIM, visit www.ciscopress.com.
NOTE
xiii
-
CCNP Practical Studies: Routing
Visit the following web site for a number of quality tools and Internet links:
www.iponeverything.net
Because some experience and knowledge level has been assumed of the reader, you might run into concepts about which you want
additional information. As a future CCNP, you should always strive to build upon your knowledge beyond a studying perspective so that
you can proceed to a technical level far beyond the minimum required for Cisco-based certifications.
I recommend using the following resources as reference material while reading the book:
•
•
Routing TCP/IP, Volumes I and II by Jeff Doyle and Jennifer DeHaven Carroll (Volume II only) (Cisco Press).
•
OSPF Network Design Solutions by Thomas M. Thomas II (Cisco Press).
•
Routing in the Internet by Christian Huitema (Prentice Hall PTR).
•
CCIE Routing and Switching Exam Cram: Exam: 350-001 by Henry Benjamin and Thomas M. Thomas II (The Coriolis Group).
•
Internet Routing Architectures, Second Edition, by Sam Halabi (Cisco Press).
•
Building Cisco Multilayer Switched Networks by Karen Webb (Cisco Press).
Building Scalable Cisco Networks by Catherine Paquet and Diane Teare (Cisco Press).
In particular, I recommend the companion book to this guide from Cisco Press, CCNP Routing Exam Certification Guide by Clare Gough.
As always, you will also find Cisco Connection Online (www.cisco.com) to be invaluable.
For more quality resources visit www.ciscopress.com and follow the links guiding you to certification materials. Cisco Press has plans to
expand its line of Practical Studies books, so be on the lookout for Practical Studies books that will help you prepare for the other exams
besides the Routing exam that you must pass to achieve CCNP status.
• Boldface indicates commands and keywords that are entered literally as shown. In examples (not syntax), boldface indicates user
•
input (for example, a show command).
•
Italics indicates arguments for which you supply values.
•
Square brackets [ and ] indicate optional elements.
•
Braces { and } contain a choice of required keywords.
Vertical bars (|) separate alternative, mutually exclusive elements.
Conclusion
The CCNP certification has great value in the networking environment. It proves your competence and dedication. It is required for several
other certifications, and it is a huge step in distinguishing yourself as someone who has proven knowledge of Cisco products and
technology. CCNP Practical Studies: Routing is designed to help you attain CCNP certification. It is a CCNP certification book from the
only Cisco-authorized publisher. The author and editors at Cisco Press believe that this book will help you achieve CCNP certification. The
dedication required to achieve any success is up to you.
Having many Cisco certifications myself, the joy and success I have achieved has significantly changed my life and that of my family.
There are always challenges facing network engineers; and no doubt, after you are a qualified Cisco professional, meeting those challenges
will drive you to acquire skills you never thought you could master.
xiv
-
CCNP Practical Studies: Routing
I sincerely hope you enjoy your time spent with this book; it took months and long nights to complete to ensure that you, as the reader,
have the perfect companion through your journey to becoming a CCNP. And when you succeed in attaining your certification, please feel
free to e-mail me at [email protected], so I too can enjoy your success and joy as well.
xv
-
CCNP Practical Studies: Routing
This chapter starts by covering basic IP concepts. It then briefly explains how to efficiently configure IP to ensure full use of address space.
Next, this chapter covers when and how IP routing tables can be minimized using summarization techniques with various routing protocols.
Five practical scenarios complete your understanding of these topics and ensure you have all the basic IP networking knowledge to
complement your knowledge of today's most widely used networking protocol, IP.
An IP address is configured on end systems to allow communication between hosts that are geographically dispersed. An IP address is 32
bits in length with the network mask or subnet mask (also 32 bits in length) defining the host and subnet portion. A subnet is a network that
you, as network administrator, segment to allow a hierarchical routing topology. Routing allows communication between these subnets.
The host address is a logical unique address that resides on a subnet.
The Internet Engineering Task Force (IETF) standards body, which is a task force consisting of over 80 working groups responsible for
developing Internet standards, defined five classes of addresses and the appropriate address ranges. Table 1-1 displays the five ranges.
[*]
127.0.0.0 is reserved for loopbacks purposes. Other reserved addresses for private use as defined by RFC 1918 are
10.0.0.0-10.255.255.255
172.16.0.0-172.16.255.255
192.168.0.0-192.168.255.255
Soon after these ranges were defined and the Internet's popularity extended beyond the Department of Defense in the United States, it
became clear that to ensure that a larger community could connect to the World Wide Web there had to be a way to extend IP address space
by using subnetting. Subnetting allows an administrator to extend the boundary for any given subnet.
To best illustrate an IP address and subnet portion, determine how many hosts are available on a particular subnet, or even how to best
utilize an IP address space, consider the following example.
You are given the IP address 131.108.1.56 and the subnet mask is 255.255.255.0. This example helps you determine what the subnet is,
how many hosts can reside on this subnet, and what the broadcast address is.
You can deduce the subnet for any IP address by performing a logical AND operation along with the subnet mask.
-1-
CCNP Practical Studies: Routing
NOTE
A logical AND operation follows two basic rules. One is that positive and positive equal positive, and the second is that negative and
positive or negative is negative. So, in binary (positive is 1 and negative is 0), 0 AND 0 is 0, 0 AND 1 is 0, 1 AND 1 is 1, 1 AND 0 is 0,
and so forth.
Figure 1-1 displays the logical AND operation used to determine the subnet address.
The result of the logical AND operation reveals the subnet address is 131.108.1.0. The subnet address is reserved and cannot be assigned to
end devices.
To determine the number of hosts available in any given subnet, you simply apply the formula 2n - 2 where n is the number of borrowed
bits. This is best explained with examples. To determine the number of borrowed bits, you must examine the subnet mask in binary. For a
default Class C network mask of 255.255.255.0, the last eight bits represent the borrowed bits. So, for a Class C network, the number of
hosts that can reside are 28 - 2 = 256 - 2 = 254 hosts. (You subtract two host addresses for the subnet address and the broadcast address,
which are not permitted to be used by host devices.) In IP, a broadcast address consists of all binary 1s, so for this example, the broadcast
address for the subnet 131.108.1.0 is 131.108.1.255. (255 in binary is 11111111.)
Now consider another example. Given the host address 171.224.10.67 and the subnet mask of 255.255.255.224, this example shows you
how to determine the subnet and the number of hosts that can reside on this network.
To determine the subnet, perform a logical AND. Figure 1-2 displays the operation.
The subnet is 171.224.10.64. The number of hosts that can reside on this network with a subnet mask of 255.255.255.224 (or 11100000, 5
borrow bits) is 25 - 2 = 32 - 2 = 30 hosts. You can apply the technique used in this simple example to any Class A, B, or C address, and
applying a subnet mask that is not the default or classful kind enables you to extend IP address space and allow a larger number of devices
to connect to the IP network.
-2-
CCNP Practical Studies: Routing
Table 1-2 displays some common subnets used in today's network and the number of hosts available on those subnets.
[*]
Used commonly for WAN circuits when no more than 2 hosts reside.
NOTE
The following routing algorithms support VLSM: RIP Version 2, OSPF, IS-IS, EIGRP, and BGP4.
To demonstrate the use of VLSM, consider the example of connecting two Cisco routers through a wide-area link. Only two devices host
systems are needed.
To use any IP address space effectively, it would be wise to use the lowest possible number of subnet bits and lowest possible number of
host bits. You could use a Class C mask or a mask that allows for 254 hosts. For a link that never uses more than two hosts, this wastes a
vast amount of space, 252 addresses in fact.
Apply the formula to determine the best subnet to use to cater to two hosts on any given subnet and class of address. Remember that you
must subtract two host addresses for the subnet address and broadcast address.
Applying the formula, you get 2n - 2 = 2, or 2n = 4, or n = 2 borrowed bits. You need to borrow only two bits from the subnet mask to allow
for two host addresses. The subnet mask is 30 bits in length or 255.255.255.252 in binary, which is represented as
11111111.11111111.11111111.111111100. The last two bits (00) are available for host addresses; the subnet is 00; the first host address is
01, the second is 10, and the broadcast address is 11.
NOTE
Loopback interfaces configured on Cisco routers are typically configured with a host address using a 32-bit subnet mask, which allows, for
example, a Class C network with 255 hosts among 255 different routers and conserves valuable IP address space.
To give network designers the ability to manage large networks, summarization is important for limiting or reducing IP routing tables. The
most important consideration to make when summarizing any IP address space is to ensure a hierarchical design.
-3-
CCNP Practical Studies: Routing
In a hierarchical design, IP address space is configured across any given router so that it can be easily summarized. To illustrate the
capabilities of summarization consider the following IP address ranges in Table 1-3.
A router would normally advertise each of the seven IP address ranges, from 131.108.1–7, as seven different IP route entries.
The binary examination of the subnets 1 to 7 in Table 1-3 displays that the first five bits (shaded) are unchanged. The most important fact is
that these seven networks are contiguous or in a range that you can easily summarize. Because the high-order bits are common in Table 1-3
(0000 0) and all seven routes are contiguous (binary 001 to 111), you can perform summarization. Because the first five bits are the same,
you can apply the mask 248 (11111 000) on the third octet and send an advertisement encompassing all seven routes. Before looking at
how to complete this summarization using RIP, EIGRP, or OSPF, the following is a list of benefits when using summarization:
•
•
Reduces routing table sizes
•
Allows for network growth
•
Simplifies routing algorithm recalculation when changes occur
Reduces requirements for memory and CPU usage on routers significantly
The alternatives to network summarization are not easy to accomplish, and this includes renumbering an IP network or using secondary
addressing on Cisco routers, which is not an ideal solution for management purposes and also provides extra overhead on a router. Also, it
is important to understand that if a range of addresses is not contiguous (that is, they do not start from a range that can be easily
summarized, such as the range of addresses 131.108.1.0/24 and 131.108.10.0/24), summarization is impossible. You could still summarize
the first seven networks, for example, but they might reside in other parts of your network and cause IP routing problems. The best practice
is to assign a group of addresses to a geographic area so that the distribution layer of any network enables summarization to be relatively
easy to complete.
Depending on the routing protocols in use, summarization may be enabled by default. Automatic summarization simply announces a Class
A network with an 8-bit mask, 255.0.0.0, Class B with 16-bit mask, and a Class C mask with a 24-bit mask, 255.255.255.0. With RIPv2,
automatic summarization occurs. In other words, you must disable automatic summarization to allow the more specific routes to be
advertised; otherwise a default mask is assumed.
router rip
version 2
no auto-summary
The command no auto-summary disables automatic summaries and allows subnets to be advertised.
EIGRP also applies automatic summaries but it also enables the manual configuration of summary addresses. The following example
shows you how to summarize the networks in Table 1-3 using EIGRP.
To configure summarization with EIGRP, you must first disable automatic summarization with the following command:
router eigrp 1
no auto-summary
Then, you apply the manual summarization on the interface to which you want to send the advertised summary. Example 1-1 displays the
command you use to summarize the seven networks in Table 1-3.
-4-
CCNP Practical Studies: Routing
Example 1-1 applies a summary on the serial interface. Also note that the EIGRP autonomous system number is 1, matching the
configuration on the router because you can have more than one EIGRP process running. The actual summary is 131.108.1.0
255.255.248.0, which replaces the seven individual routers numbered 131.108.1-7.0/24 with one simple route.
OSPF allows summarization manually under the OSPF process ID. Now look at how to configure the seven networks in Table 1-3 with an
OSPF summary. You use the following command in OSPF to summarize internal OSPF routes:
Example 1-2 displays the configuration required to summarize the seven networks in Table 1-3. Assume the area-id for now is 1.
NOTE
With OSPF, you can correctly configure summarization only on area border routers (ABRs). An ABR resides in more than one OSPF area.
For this example, assume the Cisco router is an ABR.
NOTE
OSPF also enables you to summarize external OSPF routes redistributed from such protocols as IGRP or RIP.
BGP and IS-IS, covered in Chapters 4, "Advanced OSPF and Integrated Intermediate System-to-Intermediate System," 6, "Basic Border
Gateway Protocol" and 7, "Advanced BGP," also provide complex summarization techniques.
IP Helper Address
As in any network, broadcasts are used to find and discover end systems. In a Layer 2 environment, you use broadcasts to find an end
system's MAC address. Layer 3 of the TCP/IP model, IP also uses broadcasts for such services as sending IP datagrams to all hosts on a
particular network. Broadcasts on any network consume CPU and bandwidth to reduce this even more. In an IP network, you use the IP
helper address to change a broadcast into a more specific destination address so not all devices must view the IP data, which conserves
bandwidth.
To save on bandwidth, all Cisco routers installed with Cisco Internet Operating System (IOS) software by default have an algorithm that
dictates that not all broadcast packets be forwarded. So to allow the ability to forward packets wisely, you can use the IP helper address
command to convert a broadcast into a more specific destination address. The command to enable an IP help address is as follows:
ip helper-address address
You can configure more than one helper address per interface on a Cisco router. The IP helper address forwards packets that are normally
discarded by default to the following services:
•
•
Trivial File Transfer Protocol (TFTP)
•
Domain Name System (DNS)
•
BOOTP server
•
BOOTP client
•
NetBIOS Name Server
Dynamic Host Configuration Protocol (DHCP)
-5-
CCNP Practical Studies: Routing
NOTE
The most common use for the helper address is for clients running DHCP, which remote servers assign IP addresses and subnet masks
usually performed locally through a broadcast to be served remotely with a unicast (one) packet.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and using good practice and
defining your end goal are important in any real-life design or solution. The five scenarios presented in this chapter are based on simple IP
technologies to introduce you to the configuration of IP on Cisco routers and give you the basic foundation required to complete the more
advanced topics and scenarios found later in this book. Readers who are familiar with these basics may want to skip this chapter and move
on to Chapter 2, "Routing Principles."
Figure 1-3 displays the one router, named R1, with one Ethernet interface.
NOTE
When you enable the Ethernet interface with the command [no] shutdown, the IOS message tells you the Ethernet interface and the line
protocol are up. To see these messages remotely, enable terminal monitor on any VTY lines. Also, by default, all Cisco routers are
enabled for IP routing with the command ip routing. You can disable IP routing with the command [no] ip routing.
-6-
CCNP Practical Studies: Routing
Example 1-4 displays the active Ethernet interface up and the current IP address configuration.
Next, you see how to configure a secondary address on R1 using the IP address 131.108.1.1/24. Example 1-5 displays the secondary IP
address assignment.
R1 now has two IP address assignments: 161.108.1.1/24 and 131.108.1.1/24. Confirm the IP address assignment by displaying the interface
statistics with the command show interfaces Ethernet 0/0. Example 1-6 displays the Ethernet statistics on R1 and is truncated for clarity.
Example 1-6 does not show the secondary addressing on R1. Unfortunately, the Cisco IOS does not display IP secondary addressing, and
the only way to view any secondary addressing is to view the configuration. Example 1-7 displays the full working configuration on R1
along with the secondary IP address, 131.108.1.1.
-7-
CCNP Practical Studies: Routing
!
interface Serial0/1
shutdown
!
line con 0
line aux 0
line vty 0 4
!
end
Start by breaking up the subnet 131.108.1.0/24 into four equal subnets. To do this, examine the subnet in binary. The last eight bits are used
for host addresses, so by default you have 254 IP address available. To allow at most 62 hosts, you use the formula 2n - 2 = 62, which
becomes 2n = 64. n, which is the borrowed amount of bits, becomes six bits. So to allow at most 62 hosts, you must use the subnet mask of
255.255.255.192, where 192 in binary is 11000000. The host devices use the last six bits. This is only half the job; you must also configure
the four different subnets on R1 in Figure 1-4. To determine the four subnets you must count in binary.
The first subnet starts from 131.108.1.0. You know the broadcast address ends in all 1s, so count from binary 0 to all 1s. Count only from
the last octet. Table 1-4 displays the binary calculation.
-8-
CCNP Practical Studies: Routing
Table 1-4 counts in binary from 0 to 3 and so forth until 63, which in binary is 001111111. Notice that the last six bits are all 1s, which
indicates the broadcast address, so the first subnet ranges from 131.108.1.0 to 131.108.1.63. The subnet is 131.108.1.0, and the broadcast
address is 131.108.1.63.
Table 1-5 performs the same calculation in binary without the intermediate steps to demonstrate the broadcast address for the second
subnet.
Table 1-5 displays the second subnet with all zeros as 131.108.1.64 and the broadcast of 131.108.1.127.
Table 1-6 displays the third subnet calculation starting from the next available decimal number of 128.
Table 1-6 displays the subnet as 131.108.1.128, and the broadcast address as 131.108.1.191.
-9-
CCNP Practical Studies: Routing
Finally, you can deduce the last subnet available in exactly the same way. Table 1-7 displays the final binary addition.
NOTE
If you are confused about how to convert binary from decimal, simply use a Windows-based calculator to perform the calculation to assist
in your first few calculations. It is vital that you can perform these steps without much thought, so you can quickly break up any type of
subnet in various design situations or examination scenarios.
Table 1-7 displays the subnet as 131.108.1.192 and the broadcast address for the final subnet as 131.108.1.255.
Now that you have the four broken subnets, configure the Router R1 in Figure 1-4 for IP routing. Example 1-8 displays the IP
configuration on the four interfaces on R1.
The mask is 255.255.255.192 in Example 1-8. The mask or subnet mask is derived from the six bits you borrowed to extend the Class B
address 131.108.1.0. Binary 1100000 is 192.
To complete this scenario, you have to break up the network 131.108.2.0/24 into 30-bit sized subnets so that they can be used on WAN
circuits that contain no more than two hosts.
Once more, use the simple formula 2n - 2 = 2, or 2n = 4, where n = 2. So, you need two bits per subnet, and you have already discovered
that the mask is 255.255.255.252.
- 10 -
CCNP Practical Studies: Routing
Table 1-8 displays the first four subnets available along with the subnet, broadcast address, and binary equivalent.
As an exercise, you can try to complete the table on your own. Simply count in binary and the next available subnet is clearly evident to
you. Notice that the subnets in decimal count in fours, so the first subnet is 131.108.2.0/30, then 131.108.2.4/30, 131.108.2.8/30,
131.108.2.12/30, and so forth.
- 11 -
CCNP Practical Studies: Routing
The Class B address 141.108.0.0 has been assigned to you for this task. You should ensure this address space is designed so that company
growth allows you to use IP address space wisely to conserve it. Ensure summarization is possible with the three distribution routers.
It is important that the IP addressing scheme is correctly laid out in a hierarchical fashion so that you can use summarization IP routing
tables to keep them to a minimum. Start with the core of the network with a possible 20 routers. The core network of any large organization
typically grows at a slower pace than access routers, so assume that allowing for over 1500 hosts should suffice. Assign seven Class C
networks for the core, and reserve another eight for future use. Using 15 subnets allows for easy summarization as well. Assign the range
141.108.1.0–141.108.15.255 to the core network. In binary, this is the range 00000001 to 00001111, so the first four bits are common.
The distribution routers generally perform all the summarization, so you can assign another seven subnets and reserve another eight Class
C networks for future use. So now the distribution routers use the range 141.108.16.0–141.108.31.255.
The access-level routers, where the users generally reside, typically grow at a fast rate, and in this scenario, each site has over 100 users; it
is also possible that over 30 (90 in total) remote sites will be added in the future. It is vital that the subnets used here are contiguous so that
summarization can take place on the distribution Routers R1, R2, and R3. The following describes a sample solution:
• For access Routers R4 and R5 and possible new routers, use the range 141.108.32.0 to 141.100.63.255; in binary that ranges from
•
100000 (32) to 63(11111).
For access Routers R6 and R7 and possible new routers, use the range 141.108.64.0 to 141.100.95.255; in binary that ranges from
•
1000000(64) to 1011111(95).
For access Routers R8 and R9 and possible new routers, use the range 141.108.96.0 to 141.108.127.255; in binary that ranges
•
from 1100000(96) to 1111111(127).
You can reserve the remaining 128 subnets for future use.
This is by no means the only way you can accomplish the tasks in this scenario, but you need to apply these principles in any IP subnet
addressing design.
NOTE
Cisco IOS gives you even more IP address space by allowing the use of subnet zero with the IOS command ip subnet-zero. Of course non-
Cisco devices may not understand subnet zero. A good use for subnet zero would be for WAN links or loopback interfaces and conserving
IP address space for real hosts, such as UNIX devices and user PCs. Subnet zero, for example, when using the Class B address 141.108.0.0
is 141.108.0.0, so a host address on a Cisco router could be 141.108.0.1/24.
When designing any IP network, you must answer the following core questions:
•
•
How many subnets are available?
•
What IP ranges will be used; will private address space be applied to conserve public addresses?
•
How many hosts reside on the edge of the network?
•
What are the expansion possibilities for the network?
•
What are the geographic locations of remote sites?
•
Is there a connection to the Internet or WWW?
•
Is an IP address space currently being used?
•
What are the current sizes of exiting IP routing tables?
•
Are any non-IP protocols already in use? If so, can you tunnel these non-IP protocols?
•
What routing protocols enable the use of VLSM?
These are just some of the major questions that you need to look at carefully. Cisco Systems provides a comprehensive guide to
subnets at the following URL:
www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2003.htm
NOTE
Great resources for information on IP addressing and subnet calculators are also available on the Internet.
- 12 -
CCNP Practical Studies: Routing
Table 1-9 displays the IP address ranges to be summarized, as well as the binary representation of the third octet or the subnet port of the IP
address space.
Before configuring EIGRP or OSPF summarization, you first need to decide whether summarization is possible at all. Table 1-9 displays
16 subnets, numbered from 1-16. The first 15 subnets all have one thing in common when viewed in binary: The first four bits or high-
order bits are always 0. Therefore, you can summarize the first 15 networks using the subnet mask 255.255.255.240. (240 in binary is
1111000 where the first four bits are common.) The last four bits contains the networks 1 to 15 or in binary encompass all networks from
0000 to 1111.
The last remaining subnet 151.100.16.0 is the odd network out. Although it is contiguous, you cannot summarize it along with the first 15
network, because any summary address range encompasses networks beyond 151.100.16.0, which may reside in other parts of the network.
Configure EIGRP to summarize these routes out of a serial port (serial 0/0 in this example). Example 1-9 displays the configuration
required to disable automatic summarization and the two required summary address commands on the serial 0/0 on a router named R1.
In Example 1-9, the router R1 sends only two updates: one for the networks ranging from 151.100.1.0 to 151.100.15.0 and another for
151.100.16.0. These two are instead of 16 separate IP route entries. Even in a small scenario like this, you saved 14 IP route entries.
Reducing IP routing tables means when a router performs a routing table search, the time it takes to determine the outbound interface is
reduced allowing end-user data to be sent faster over a given medium.
With OSPF, you do not need to disable automatic summarization, because OSPF does not automatically summarize IP subnets. Hence, to
summarize the same block of addresses of a router (OSPF ABR), you apply two commands under the OSPF process. Example 1-10
displays the summary commands required.
- 13 -
CCNP Practical Studies: Routing
In this scenario, you have a group of users on one segment requiring IP address assignment. No local servers reside on the segment with
this group of users.
Now, when the users on the local-area network (LAN) segment attached to R1 send out a request for an IP address, this IP packet is sent to
the broadcast address, which is dropped by default. Unless a local Dynamic Host Configuration Protocol (DHCP) server exists on this
segment, the users' requests for an IP address aren't responded to. To alleviate this problem, you configure a helper address on R1 pointing
to the remote file server(s)' address. In this case, two servers are available for redundancy, so you can configure two helper addresses on
R1's Ethernet port.
NOTE
Remember, a helper address can forward many UDP-based protocols such as DNS and BOOTP requests. You can further restrict which
protocols are sent by using the IOS command ip forward-protocol {udp [port]} or you can forward a packet based on a particular port
number used by a certain application.
- 14 -
CCNP Practical Studies: Routing
The five basic scenarios in this first chapter are aimed at addressing your basic knowledge or re-enforcing what you already know. The
Practical Exercise that follows gives you an opportunity to test yourself on these concepts.
Practical Exercise: IP
NOTE
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Given the IP address ranges in Table 1-10 and using EIGRP as your routing algorithm, ensure that the least number of IP routing entries are
sent out the Ethernet 0/0 port on a Cisco IOS-based router. Table 1-10 displays the IP subnet ranges.
You should notice that the first five bits are the same and the last three encompass the range 1-7, so you can apply the following summary
command:
Example 1-12 displays the configuration required to summarize the networks from Table 1-10 on an Ethernet 0/0 port using the ? tool to
demonstrate the available options required by Cisco IOS.
NOTE
- 15 -
CCNP Practical Studies: Routing
Example 1-12 displays the Cisco IOS prompts that appear when the user enters the question mark (?) to display the options or parameters
the Cisco IOS requires next. They are illustrated here for your reference.
Review Questions
You can find the answers to these questions in Appendix C, "Answers to Review Questions."
1: Given the following host address and subnet mask combinations, determine the subnet address and broadcast addresses:
•
•
131.108.1.24 255.255.255.0
•
151.108.100.67 255.255.255.128
•
171.199.100.10 255.255.255.224
161.88.40.54 255.255.255.192
2: Given the network 141.56.80.0 and a subnet mask of 255.255.254.0, how many hosts are available on this subnet?
5: Given the subnet in binary notation 1111111.11111111.00000000.00000000, what is the decimal equivalent?
Summary
You have successfully worked through five scenarios using common techniques in today's large IP networks. You can now begin to apply
this knowledge to the chapters ahead and work through more complex scenarios. The basic information described in this chapter can be
applied to any networking scenario you come across when designing and implementing a Cisco-powered network or any network for that
matter.
- 16 -
CCNP Practical Studies: Routing
•
•
Internet Protocol (IP) routing tables
•
Dynamic routing protocols
•
Classful and classless routing
Using show, debug, ping, and trace commands
This chapter focuses on a number of objectives relating to the CCNP routing principles. Understanding basic routing principles not only
applies to the CCNP certification but to all Cisco-based certification. A concrete understanding of how to route traffic across the network is
fundamental for the more advanced topics covered later in this book.
This chapter starts by covering the basic information a Cisco router requires to route traffic and then describes classful and classless routing
protocols. The chapter then briefly covers distance vector and link-state protocols and examines IP routing tables and common testing
techniques used to troubleshoot IP networks.
Five practical scenarios complete your understanding and ensure you have all the basic IP routing skills to complement your understanding
of IP routing on Cisco IOS routers.
NOTE
The method by which a routing algorithm, such as RIP/OSPF, determines that one route is better than another is based upon a metric. The
metric value is stored in routing tables. Metrics can include bandwidth, communication cost, delay, hop count, load, MTU, path cost, and
reliability.
For routing IP across a network, Cisco routers require IP address allocation to interfaces and then statically or dynamically advertise these
networks to local or remote routers. After these networks are advertised, IP data can flow across the network. Routing occurs at Layer 3, or
the network layer, of the Open System Interconnection (OSI) model.
By default, IP routing is enabled on Cisco routers. The command you use to start or disable it is [no] ip routing. However, because IP
routing is enabled, you do not see this command by viewing the running configuration as displayed with the IOS command, show running-
config. Consider a one-router network with two directly connected Ethernet interfaces as an introductory example, shown in Figure 2-1.
- 17 -
CCNP Practical Studies: Routing
In Figure 2-1 router R1 has two interfaces: E0 (IP address 172.108.1.1/24) and E1 (172.108.2.1/24). Assume there are users on E0 and E1
with PCs labeled PC 1 and PC 2. By default, an IP packet from PC 1 to PC 2 is routed by R1 because both IP networks connect directly to
R1. No routing algorithm is required on a single Cisco router (not attached to any other routers) when all interfaces are directly connected
as described in this example. Example 2-1 displays R1's routing table.
In Example 2-1, the C on the left side of the IP routing table denotes the two directly connected networks. Cisco IOS routers support many
dynamic routing protocols as well as static (denoted by S) routes. Later chapters in this book cover the main dynamic routing protocols,
such as the Open shortest Path First (OSPF) Protocol, RIP, Interior Gateway Routing Protocol (IGRP), and EIGRP. Scenario 2-1 covers all
the fields used in an IP routing table.
NOTE
The IP address source and destination in an IP datagram does not change, but the Layer 2 Media Access Control (MAC) source and
destination do. For example, when PC 1 sends a packet to PC 2, and because PC 2 resides on a different subnet, PC 1 automatically sends
the IP packet to the default router using the destination MAC address of Router R1 (or E0 burnt in address) or the default gateway address
of 172.108.1.1/24 (assuming a default gateway has been configured on PC 1 and PC 2). The router then strips the Layer 2 header and
installs its own Layer 2 header when the packet enters the network where PC 2 resides. The Layer 2 header contains the source address of
R1 E1 and the destination address of the PC 2 MAC address. The Layer 3 IP source and destination address do not change. Some
exceptions exist, of course, and many new emerging technologies, because of IP address depletion, change the Layer 3 addressing to allow
more hosts to connect to the Internet. Example technologies include Network Address Translation (NAT) or the implementation of Web
proxies.
Cisco routers require only IP addressing and routing to allow hosts on different segments to communicate.
This chapter covers dynamic and static routing in the section "Classful and Classless Routing Protocols."
- 18 -
CCNP Practical Studies: Routing
All Cisco routers support IP routing. Example 2-2 shows a full list of the protocols that Cisco IOS-based routers support.
Border Gateway Protocol (BGP), EIGRP, IGRP, Intermediate System-to-Intermediate System (IS-IS) Protocol, OSPF, and RIP are
dynamic routing protocols and are all covered in this book. You can use static routing to minimize large routing tables and can manually
configure it to override dynamic information.
When you configure multiple routing algorithms on a Cisco router, deciding which path to take is vital. To overcome this problem, you
assign each routing method, whether dynamic or static, an administrative distance (AD).
AD is important because routers cannot compare, for example, RIP's metric to OSPF's metric because hop count means nothing in OSPF
and cost means nothing in a RIP domain. Using AD ensures that the Cisco routers can compare the remote destinations they learn through
various routing algorithms.
AD is defined as the trustworthiness of a routing information source. The higher the value (between 0–255), the less trusted the source.
Table 2-1 displays the default AD values on a Cisco router.
For example, if a router has two paths to a destination and one is listed as OSPF (AD is 110) and another as IGRP (AD is 100), the router
selects the IGRP path because of the lower AD. Cisco IOS enables the network designer to change the AD with the distance command.
- 19 -
CCNP Practical Studies: Routing
Distance vector protocols (a vector contains both distance and direction), such as RIP, determine the path to remote networks using hop
count as the metric. A hop count is defined as the number of times a packet needs to pass through a router to reach a remote destination.
For IP RIP, the maximum hop is 15. A hop count of 16 indicates an unreachable network. Two versions of RIP exist: version 1 and version
2. IGRP is another example of a distance vector protocol with a higher hop count of 255 hops. A higher hop counts allows your network to
scale larger. One of the drawbacks of protocols, such as RIP and IGRP, is convergence time, which is the time it takes for routing
information changes to propagate through all your topology. Table 2-2 describes the characteristics of distance vector protocols.
Link-state routing protocols, such as OSPF and IS-IS, create a topology of the network and place themselves at the root of the tree. Link-
state protocols implement an algorithm called the shortest path first (SPF, also known as Dijkstra's Algorithm) to determine the path to a
remote destination. There is no hop count limit. (For an IP datagram, the maximum time to live ensures that loops are avoided.)
NOTE
Hello packets are used to discover neighboring routers, so when changes occur updates can be sent immediately. Hello packets are used to
establish and maintain neighbors. OSPF uses the Class D multicast addresses in the range 224.0.0.0 through 239.255.255.255. The two
most important reserved addresses are 224.0.0.5 for all OSPF routers and 224.0.0.6 for all DRs and BDRs. Any new OSPF-enabled routers
immediately transmit a multicast Hello packet by using the OSPF routers multicast address of 224.0.0.5. DRs use the multicast address
224.0.0.6 to send updates to all other OSPF routers. Therefore, two reserved multicast addresses are vital for maintaining OSPF adjacencies
across any broadcast media, such as Ethernet or Token Ring.
The OSPF database is populated with link-state advertisements (LSAs) from neighboring routers. The LSA packets contain information,
such as cost and the advertising router or the router ID, which is the highest IP address configured on the local router. Typically, OSPF
administrators configure loopback interfaces to ensure that the OSPF process is not prone to failures. (Loopback interfaces never fail unless
you shut them down or manually delete them.) In the event that more than one loopback interface is configured on a Cisco router, the
loopback interface with (numerically) the highest IP address is the router ID. Table 2-3 displays the characteristics of link-state protocols.
- 20 -
CCNP Practical Studies: Routing
NOTE
EIGRP is considered an advanced distance vector protocol because EIGRP sends out only incremental updates. BGP is considered a path
vector protocol because autonomous system numbers are carried in all updates, and the vector indicates the direction and path to a remote
network. Also note distance vector protocols are simpler to implement, and link-state protocols are more complex. BGP is considered the
most complex routing protocol to configure, whereas RIP is considered the easiest.
Routing protocols can also be described as classful and classless. Classful addressing is the use of Class A, Class B, and Class C addresses.
(Class D is reserved for multicasts, and Class E is reserved for future use.) Class A, B, and C addresses define a set number of binary bits
for the subnet portion. For example, a Class A network ranges from 1–127 and uses a subnet mask of 255.0.0.0. A Class B network uses
the mask 255.255.0.0, and Class C uses 255.255.255.0. Classful routing protocols apply the same rules. If a router is configured with a
Class A address 10.1.1.0, the default mask of 255.0.0.0 is applied and so forth. This method of routing does not scale well, and when
designing networks, classless routing better utilizes address space. For example, you can use a Class B network, such as 131.108.0.0, and
apply a Class C mask (255.255.255.0, or /24, mask).
NOTE
The following three blocks of IP address space for private networks have been reserved according to RFC 1597:
•
•
10.0.0.0–10.255.255.255
•
172.16.0.0–172.31.255.255
192.168.0.0–192.168.255.255
Examples of classful routing protocols are RIPv1 and IGRP. Examples of classless routing protocols are OSPF, IS-IS, EIGRP, and BGP.
With classless routing, the ability to apply summarization techniques enables you to reduce the size of a routing table. At last count
(October 2001), there are over 80,000 IP routing table entries on the Internet. Reducing the IP routing table size allows for faster delivery
of IP packets and lower memory requirements.
- 21 -
CCNP Practical Studies: Routing
Scenarios
The following scenarios and questions are designed to draw together some of the content described in this chapter and some of the content
you have seen in your own networks or practice labs. There is not always one right way to accomplish the tasks presented here, and using
good practice and defining your end goal are important in any real-life design or solution.
NOTE
A loopback interface is a software interface. You can ping it and communicate with it. Most importantly, it never goes down, and you can
use it as a tool to populate routing tables.
First, configure router R1 for IP routing. You need to start by configuring the loopbacks, Ethernet, and the serial interface.
A loopback interface is a software interface that can be numbered from 0-2147483647. Loopbacks are handy when you don't have access to
a large number of routers and are vital tools when you are configuring IOS on Cisco routers.
Refer to Figure 2-2 for IP address assignments. R1 is directly connected to R2 with back-to-back serial cables. As with any wide-area
network (WAN) connection, clocking is required to enable the two routers to communicate.
NOTE
To determine which router requires a clock to enable communication at Layer 2 of the OSI model, use the show controller command to
determine which end of the network is the data circuit-terminating equipment (DCE). Typically, this is a modem.
- 22 -
CCNP Practical Studies: Routing
Notice that R1 has the DCE connection so you need to configure a clock rate with the clock rate speed command.
NOTE
The output in Example 2-4 is different from that of Example 2-3 because this scenario uses different model routers for R1 (2600) and R2
(3600), and the cable types used on the routers are V.35. Router R2 has the data terminal equipment (DTE), so R2 requires a clocking
source. In this case, R1, the DCE, supplies the clock.
To configure the loopbacks with an IP address, simply use the following command syntax:
The Cisco IOS automatically enables the loopback interface if you have not previously created it. To configure the three loopbacks for this
scenario, type the commands on R1 as displayed in Example 2-5.
R1(config-if)#interface loopback 1
2w1d: %LINK-3-UPDOWN: Interface Loopback1, changed state to up
2w1d: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback1, changed state
to up
- 23 -
CCNP Practical Studies: Routing
In Example 2-5 when the first interface Loopback 0 is created, you get a message that indicates Loopback 0 is active. Similarly, this
happens for loopbacks 1 and 2. You now simply configure the IP addresses for the Ethernet and serial link to R2, as demonstrated in
Example 2-6.
This time you did not get any messages to indicate the link is active. The lack of such a message is because that all physical interfaces are
shut down by default when you first configure a router from the default state. You need to enable the interfaces. You can assume that the
Ethernet on R1 is connected to a Catalyst switch. Example 2-7 displays the Ethernet interface and serial interface on R1 being enabled.
NOTE
If you do not have access to any form of switch or hub, you can enable the Ethernet interface with the command keepalive 0, in which case
hardware is unnecessary. Of course, no users can attach to your network, but for training purposes it is a great command to use. The Cisco
IOS considers the interface active and includes the network in the IP routing table.
The Ethernet interfaces is running, but you still have no active connection on R1 serial link because R1 S0/1 connects to R2, and you have
yet to enable R2 serial interface to R1. Example 2-8 displays IP address configuration and the enabling of the hardware interfaces on R2.
On this occasion, notice both the Ethernet and serial connections are immediately active because R2 is connected to an Ethernet switch, and
the link to R1 is active because R1 is enabled and supplying a clock source.
- 24 -
CCNP Practical Studies: Routing
Now view the routing tables on R1 and R2 in Scenario 2-1 to see what exactly is described in an IP routing table. Example 2-9 displays
R1's routing table.
Both of these cases show routing entries for only directly connected interfaces, which are denoted by the C on the left side of each routing
table. Now, you take the R1 routing table and look at it in depth. In particular, look at the shaded portions in Example 2-9.
The first half of the display summarizes the abbreviations the Cisco IOS uses to denote how it learns or discovers routing entries. For
example, entries that display C are directly connected networks; entries denoted by D are discovered by EIGRP, and so forth.
That the gateway of last resort is not set in this case means that if the router receives an IP packet, by default if the router doesn't know the
destination, it drops the IP packet. If the router knows the gateway of last resort, which is typically represented by a next hop address, the
router forwards the IP packets to that destination or next hop address.
The following entry describes the fact that R1 has the Class B network 131.108.0.0 subnetted with five individual networks, namely the
three loopbacks, the Ethernet, and the serial link to R2:
- 25 -
CCNP Practical Studies: Routing
To make the routing table a little more interesting, configure R1/R2 with RIP and then OSPF. At this stage, R1 is not aware of any IP
networks on R2 and vice versa.
To start, configure RIP on both R1 and R2. IP RIP is one of the easiest routing protocols to configure. To enable IP RIP, you need to
perform the following steps:
Step 1. Enable the routing protocol with the command router rip.
Step 2. Specify the networks on which RIP will run. With RIP, you need to specify only the major network because RIP is a
classful protocol. In this example, the Class B network is 131.108.0.0.
Example 2-11 and Example 2-12 display the configurations required on R1 and R2, respectively, to enable IP RIP.
Now enable debugging on R1 to view the routing updates on R1. Example 2-13 displays the debug commands enabled on R1.
- 26 -
CCNP Practical Studies: Routing
Example 2-13 displays routing updates sent (by default version 1 of RIP is sent and both versions 1 and 2 are accepted) and received by R1.
Then R1 sends updates to loopbacks 0, 1, and 2, Ethernet 0/0, and most importantly to R2 through the serial link S0/1. R1 sends
information about the local interfaces so that R2 can dynamically insert these entries into its own routing table. R2 performs the same
routing function; that is, it sends updates to R1. Example 2-14 displays the IP routing table on R1.
Example 2-15 shows just IP RIP routes using the command show ip route rip.
As you can see in Example 2-15, R2 is advertising the Class B subnetted networks 131.108.2.0/24, 131.108.7.0/24, 131.108.8.0/24, and
131.108.108.9.0/24 through the next hop address 131.108.3.2. The outgoing interface is serial 0/1. RIP works in this environment because
all the networks are Class C. Another important field described in the IP routing table is the administrative distance and the metric. In the
case of IP RIP, the administrative distance is 120 and the metric is hop count. The hop count to all the remote networks in Example 2-15 is
1.
Now change the IP address on the serial link to the most commonly used subnet. To ensure the efficient use of IP address space when
designing networks, you typically use a subnet that allows only two hosts. To allow two hosts, you must use the subnet mask
255.255.255.252. Example 2-16 displays the IP address change on R1 and R2 using the new subnet mask of 255.255.255.252.
- 27 -
CCNP Practical Studies: Routing
Look at the IP routing table on R1. Remember that RIP is classful so it applies the default subnet mask, or whatever mask is applied, to a
directly attached interface. In the first RIP example, a /24 network was used on all interfaces. Example 2-17 now displays the new IP
routing table on R1.
Notice what happens to the IP RIP routes. Also notice that the serial link to R2 through Serial 0/1 is a /30 subnet, whereas all the other
directly connected interfaces are /24.
Because you use a variable-length subnet mask (VLSM) across this network means you need a routing protocol that understands VLSM. IP
RIP version 1 does not. Enable version 2 of IP RIP. To enable version 2, you type the command version 2. You can also use static routes to
accomplish connectivity. Example 2-18 displays the enabling of RIP version 2.
IP RIPv2 understands VLSM. Example 2-19 displays the new IP routing table on R1.
The remote networks are now back in the routing table because RIPv2 understands VLSM. Another routing protocol that understands
VLSM is OSPF. Before you learn how to configure OSPF, Example 2-20 and Example 2-21 display the full configurations for R1 and R2
using VLSM and RIPv2.
- 28 -
CCNP Practical Studies: Routing
!
enable password cisco
!
no ip domain-lookup
!
interface Loopback0
ip address 131.108.4.1 255.255.255.0
no ip directed-broadcast
!
interface Loopback1
ip address 131.108.5.1 255.255.255.0
no ip directed-broadcast
!
interface Loopback2
ip address 131.108.6.1 255.255.255.0
no ip directed-broadcast
!
interface Ethernet0/0
ip address 131.108.1.1 255.255.255.0
no ip directed-broadcast
!
interface Serial0/0
shutdown
!
interface Serial0/1
ip address 131.108.3.1 255.255.255.252
no ip directed-broadcast
clockrate 128000
!
router rip
version 2
network 131.108.0.0
!
line con 0
transport input none
line aux 0
line vty 0 4
end
- 29 -
CCNP Practical Studies: Routing
NOTE
In both cases, the command no ip domain-lookup is configured. This IOS command is a handy command to disable when you are
studying on Cisco IOS routers. Every time you type an unknown command on a router in exec or priv mode, the router automatically
queries the DNS server, which is time consuming and annoying. On R2, the extra serial interfaces are not configured and are in a shutdown
state or are not enabled by default.
- 30 -
CCNP Practical Studies: Routing
In this basic scenario, you configure three areas: 0, 1, and 2. Area 0 (or area 0.0.0.0) is the backbone; areas 1 and 2 cover the Ethernets on
R1 and R2 and their respective loopbacks. As on all good OSPF networks, a backbone OSPF area 0 is configured. To enable OSPF, you
need to perform the following steps:
Step 1. Enable the routing protocol with the command router ospf process number. The process number is significant to only the
local router. You can run more than one process.
Step 2. Specify the networks on which OSPF will run and the area assignments. The IOS command to enable OSPF per interface
is
Before you configure OSPF, renumber all interfaces and remove IP RIP with the command no router rip. Example 2-22 displays IP
address changes and the removal of IP RIP.
Example 2-23 displays the IP address changes and the removal of IP RIP on R2.
Now that RIP is removed and the IP addressing is redone, configure R1 for OSPF by using the process number 1 and for R2 using process
number 2. Example 2-24 and Example 2-25 display the new OSPF configurations on R1 and R2.
- 31 -
CCNP Practical Studies: Routing
The wildcard mask 0.0.0.0 indicates an exact match. The wildcard mask 0.0.0.255 means the first three octets must match and the last octet
does not matter. For example, the command network 131.108.1.0 0.0.0.255 means 131.108.1.1 to 131.108.1.254 all match. In this case,
you can configure any IP address in the range 131.108.1.1 to 131.108.1.254 to be in area 1 on R1 E0/0. Example 2-26 displays the IP
routing table on R1.
You can see from Example 2-26 that R1 discovers four remote networks (R2's Ethernet and three loopback interfaces) through OSPF. In
addition, there are also the directly attached links.
R1 dynamically learns the remote networks on R2 through the next hop address of 131.108.3.2 and the outbound interface Serial 0/1.
Notice once again the administrative distance and metric pairing. In the case of OSPF, the administrative distance is 110 (more trusted than
RIP at 120) and the metric used by OSPF is cost. The left side indicates the routing type as O for OSPF. The IA (inter-area) indicates the
remote network is part of another area, in this case area 2.
Example 2-27 uses the command show ip route ospf on Router R2 to display only the OSPF routes.
Example 2-28 and Example 2-29 display the complete configurations for R1 and R2 for your reference.
- 32 -
CCNP Practical Studies: Routing
!
interface Ethernet0/0
ip address 131.108.1.1 255.255.255.0
no ip directed-broadcast
!
interface Serial0/0
shutdown
!
interface Serial0/1
ip address 131.108.3.1 255.255.255.252
clockrate 128000
!
router ospf 1
network 131.108.1.0 0.0.0.255 area 1
network 131.108.3.1 0.0.0.0 area 0
network 131.108.4.1 0.0.0.0 area 1
network 131.108.4.2 0.0.0.0 area 1
network 131.108.4.3 0.0.0.0 area 1
!
router rip
version 2
network 131.108.0.0
!
ip classless
!
line con 0
line aux 0
line vty 0 4
end
- 33 -
CCNP Practical Studies: Routing
!
router ospf 2
network 131.108.2.0 0.0.0.255 area 2
network 131.108.3.2 0.0.0.0 area 0
network 131.108.4.4 0.0.0.0 area 2
network 131.108.4.5 0.0.0.0 area 2
network 131.108.4.6 0.0.0.0 area 2
!
router rip
version 2
network 131.108.0.0
!
ip classless
!
line con 0
exec-timeout 0 0
transport input none
line aux 0
line vty 0 4
no login
!
end
Once more, revisit the two-router scenario. IGRP is a classful routing protocol, so you have to change the IP addressing back to a non-
VLSM network. In this scenario, you use a different class address as well. Figure 2-4 displays the network topology and IP addressing
scheme.
This scenario starts with IGRP and then changes the routing protocol to EIGRP.
In this basic scenario, you configure the two routers R1 and R2 for IGRP using the same administrative domain. To share information
between routers in IGRP, you need to configure the same administrative domain. To enable IGRP, you need to perform the following steps:
Step 1. Use the command router igrp administrative domain to enable the routing protocol. The administrative domain must be
the same for routers that are under a common administrative control or the same network.
Step 2. You then specify the networks on which IGRP runs. As with IP RIP, you need to specify only the major class network.
- 34 -
CCNP Practical Studies: Routing
Use the Class C network 199.100.1.0/24 through to 199.100.9.0/24. Example 2-30 displays the IP address changes made to Router R1.
NOTE
When using a class C network with the default class C mask, you must specify each network in IGRP.
- 35 -
CCNP Practical Studies: Routing
On R1, you can see four remote IGRP networks learned through the next hop address 199.100.3.2 (R1's link to R2) and through the
outbound interface Serial 0/1.
R1 dynamically learns the remote networks on R2 through the next hop address of 131.108.3.2 and the outbound interface Serial 0/1.
Notice the administrative distance and metric pairing. In the case of IGRP, the administrative distance is 100 (more trusted than RIP at 120
and OSPF at 110) and the metric IGRP uses is called a composite metric. The left side indicates the routing type as I for IGRP.
NOTE
The values K1 through K5 are constants. If the defaults are used, K1 = K3 = 1 and K2 = K4 = K5 = 0.
Values K1 through K5 can be configured with nondefaults with the IOS command metric weights tos k1 k2 k3 k4 k5, where type of service
must be zero.
Example 2-35 and Example 2-36 display the full configurations for R1 and R2, respectively.
- 36 -
CCNP Practical Studies: Routing
no ip directed-broadcast
!
interface Loopback2
ip address 199.100.6.1 255.255.255.0
no ip directed-broadcast
!
interface Ethernet0/0
ip address 199.100.1.1 255.255.255.0
no ip directed-broadcast
!
interface Serial0/0
shutdown
!
interface Serial0/1
ip address 199.100.3.1 255.255.255.0
clockrate 128000
!
router igrp 1
network 199.100.1.0
network 199.100.3.0
network 199.100.4.0
network 199.100.5.0
network 199.100.6.0
!
ip classless
!
line con 0
transport input none
line aux 0
line vty 0 4
no login
!
end
- 37 -
CCNP Practical Studies: Routing
no ip directed-broadcast
!
interface Ethernet0/0
ip address 199.100.2.1 255.255.255.0
no ip directed-broadcast
no cdp enable
!
interface TokenRing0/0
no ip address
no ip directed-broadcast
shutdown
ring-speed 16
no cdp enable
!
interface Serial1/0
shutdown
!
interface Serial1/1
ip address 199.100.3.2 255.255.255.0
ip directed-broadcast
!
interface Serial1/2
shutdown
!
interface Serial1/3
shutdown
!
router igrp 1
network 199.100.2.0
network 199.100.3.0
network 199.100.7.0
network 199.100.8.0
network 199.100.9.0
!
no ip classless
!
line con 0
exec-timeout 0 0
transport input none
line aux 0
line vty 0 4
end
Now remove IGRP and use EIGRP instead. To configure EIGRP, you simply enable the routing protocol and define the networks. EIGRP
enables network summarization by default. That is, the default mask is assumed, or a classful network is assumed. Also, the metric EIGRP
uses is the same as the metric IGRP uses, but it is multiplied by 256. You can use the command no auto-summary to disable automatic
summarization. EIGRP also supports VLSM. Figure 2-5 shows the sample network for this EIGRP example.
- 38 -
CCNP Practical Studies: Routing
Modify the Ethernet segments on R1 and R2 to use a different class address of 131.108.1.0/25 and 131.108.1.128/25, respectively.
Example 2-37 displays the removal of IGRP and the enabling of EIGRP in AS 1 on Router R1.
Example 2-38 displays the removal of IGRP and the enabling of EIGRP in AS 1 on Router R2.
Notice IGRP is removed first and the AS number is the same in R1 and R2 so that both routers can share information. You have not
disabled automatic summarization yet. Now view R1's EIGRP routing table, as displayed in Example 2-39.
- 39 -
CCNP Practical Studies: Routing
On R1, you can see four remote EIGRP networks learned through the next hop address 199.100.3.2 (R1's link to R2) and through the
outbound interface Serial 0/1. One of these routes is to null0. R1 dynamically learns the remote networks on R2 through the next hop
address of 199.100.3.2 and the outbound interface Serial 0/1. Notice the administrative distance and metric pairing. In the case of EIGRP,
the administrative distance is 90 (more trusted than RIP at 120, OSPF at 110, and IGRP at 100), and the metric EIGRP uses is 256 times
that of IGRP. The left side indicates the routing type as D for EIGRP. You'll also see D EX, which means redistributed into an EIGRP
domain.
The remote network 131.108.1.128/25 has no entry because R1 has a locally connected subnet 131.108.1.0/25. You can also see that all
routes for 131.108.0.0/16 are sent to null0, short for the bit bucket, or discarded. Now, ping the remote network 131.108.1.129/25 from R1.
Example 2-40 displays a sample ping from Router R1.
The response from the router in Example 2-40 is no reply (….) or, in this case, the packets are sent to null0. Packets sent to null0 are
discarded.
To solve the problem of packets being discarded, you need to disable automatic summarization. Configure R1 and R2 to disable automatic
summarization as in Example 2-41.
R2(config)#router eigrp 1
R2(config-router)#no auto-summary
Example 2-42 now displays R1's EIGRP routing table and a sample ping request to the remote network 131.108.1.129.
- 40 -
CCNP Practical Studies: Routing
Notice that the 131.108.1.128/25 is inserted and there is a successful ping from R1 to R2 Ethernet interface. It is vital you understand these
simple topics, such as classful and classless, fixed-length variable subnet masks (FLSMs) and VLSM.
Example 2-43 and Example 2-44 display the full configurations for R1 and R2, respectively, using EIGRP.
- 41 -
CCNP Practical Studies: Routing
- 42 -
CCNP Practical Studies: Routing
Figure 2-6 displays the OSPF/IGRP topology and the IP addressing scheme in place between R1 and R2.
Example 2-45 and Example 2-46 display the IP addressing changes to R1 and R2, respectively.
On R1, configure IGRP; again IGRP is classful, so you need to enable IGRP only in AS 1. R2 runs both IGRP and OSPF; hence
redistribution is required. Example 2-47 enables IGRP in AS 1 on R1.
- 43 -
CCNP Practical Studies: Routing
On R2, configure IGRP and OSPF. Example 2-48 enables IGRP in AS 1 and OSPF with a process ID of 1.
You also need to configure redistribution on R2 so that R1 discovers the OSPF interfaces through IGRP. (R1 is running only IGRP.)
On R2, configure IGRP to redistribute the OSPF interfaces into IGRP. As with any form of redistribution, you must use the metric that the
routing protocol you are redistributing into uses. IGRP does not use OSPF cost but uses a composite metric. Therefore, you need to define
values so that IGRP has a valid metric. Follow the prompts, as in Example 2-49, using the ? character to discover which metric IGRP
requires. You need to advise R1 of the bandwidth (128 kbps), delay (20000 ms), reliability (1 is low, 255 is 100 percent loaded), loading (1
out of 255, 255 being 100 percent loaded), and finally the MTU (1500 bytes). Example 2-49 displays the redistribution and also displays
the various options the Cisco IOS Software requires.
Look on R1 and R2 to find which IP networks have been discovered. Example 2-50 displays R1's IP routing table.
- 44 -
CCNP Practical Studies: Routing
On R1 in Example 2-50, you only see the directly connected routes, but on R2, you see the remote routes from R1. Why is this so? This
scenario is a typical routing problem caused by the lack of understanding between VLSM and FLSM. IGRP on R1 is configured using a /24
bit subnet in all interfaces. On R2, you have applied a number of non-/24 subnets. You need to trick R1 into believing that all these
networks are indeed /24 bit subnets by using summarization techniques on R2.
For example, to summarize the loopbacks and Ethernet on R2 as /24 bits to R1, perform the commands in Example 2-52 under the OSPF
process. Example 2-52 displays the IOS configuration to enable the summary of the three networks on R2.
Look at R1's routing table now. Example 2-53 displays the IP routing table on R1.
Still there are no routing entries. Can you think why IGRP on R1 is still not aware of the remote networks on R2? The problem is that
OSPF assumes that only a nonsubnetted network will be sent. For example, in this case, you are using the Class B network 131.108.0.0.
You also need to use the command redistributed connected subnets to advise OSPF to send subnetted networks.
NOTE
Example 2-54 displays the configuration required so that OSPF redistributes the Class B subnetted networks.
- 45 -
CCNP Practical Studies: Routing
Example 2-56 and Example 2-57 display the full configurations on Routers R1 and R2.
- 46 -
CCNP Practical Studies: Routing
!
router igrp 1
network 131.108.0.0
!
ip classless
!
line con 0
transport input none
line aux 0
line vty 0 4
end
- 47 -
CCNP Practical Studies: Routing
The R2 routing table is more complicated. Example 2-58 shows R2's routing table.
Notice the two entries for the same network sent to null0, or the bit bucket. The longest match rule applies on all routers; so for example,
when an IP packet arrives for the network 131.108.8.129, the IP routing entry sends that to the directly connected interface E0/0. Similarly,
if a pack arrives for network 131.108.8.0/25, the packet is sent to the directly connected loopback 1 interface. This is commonly known as
the longest match rule.
Scenario 2-5: Using the show, ping, trace, and debug Commands
The previous four scenarios covered four relatively easy networks. This scenario shows you how to use common show and debug
techniques and ping and trace commands to determine why routing entries are missing, for example, or why some networks are
unreachable. To see a real-life scenario using two routers, refer to Scenario 2-3 and view some of the output from the show and debug
commands. This scenario also displays some simple ping and trace tests. All show, ping, trace, and debug commands are taken from
Figure 2-6 in the previous scenario.
You are familiar with the command show ip route from the previous scenarios, so start with that command on R1 from Figure 2-6. Here,
you are only interested in IGRP learned routes. Example 2-59 displays only IGRP routes.
- 48 -
CCNP Practical Studies: Routing
Almost all troubleshooting techniques involve the ping command. Ping is a simple tool that sends an ICMP-request packet to the remote
network and back. A successful ping receives an ICMP-reply. Example 2-60 displays a sample ping from R1 to R2 and the three remote
networks: 131.108.7.1, 131.108.8.1, and 131.108.9.1.
This is an example of the standard ping command. At times, an extended ping is required. The extended ping enables you to provide the
Cisco IOS with more parameters, such as the source address, the number of packets to send, the size of the datagram, and the timeout. The
extended ping is a useful tool when users are complaining, for example, that when they FTP large files, the data is not transferred or a
particular network of users cannot reach a remote destination.
Example 2-61 is an example of an extended ping using the source address 131.108.1.1/24 (the Ethernet address of R1), a modified repeat
count of 10, a default datagram size of 100 bytes, and a timeout of 2 seconds. To use the extended ping command, simply type ping, press
Return, and the options appear. Example 2-61 also displays the options in an extended ping.
- 49 -
CCNP Practical Studies: Routing
NOTE
To terminate a large ping test, within a few seconds, type the escape sequence, which is Ctrl+Shift-^ followed by x.
Look at a simulated network failure to determine what's wrong with a remote network. View R1 IGRP routing table when the remote
network 131.108.10.0/24 is down. Example 2-62 displays R1's IP routing table.
- 50 -
CCNP Practical Studies: Routing
You can see from Example 2-62 that the remote network 131.108.10.0/24 is possibly down. Use the command debug ip routing to see
whether you can see the problem. This debug displays routing entries added or deleted into the IP routing table. Use the command on R1.
Example 2-63 displays a command used to debug the IP routing table and displays how to force the IP routing algorithm, in this case IGRP,
to add and delete remote routes by using the command clear ip route *.
Example 2-64 displays another clear ip route * after the network 131.108.10.0/24 is restored.
This time, you see the route added, but it enters the holddown state, which means the remote network 131.108.10.0 is not accepted and
inserted into the IP routing table during the holddown interval. This prevents routing loops. Now view the IP route table on R1. Example 2-
65 displays the IP routing table (IGRP) on R1.
When the IP network 131.108.10.0 goes into holddown mode, the entry in the IP routing table is displayed as possibly down during
holddown. After a set interval, known as the flush timer, the entry is completely removed. Example 2-66 displays the IP routing table on
R1 after this happens.
- 51 -
CCNP Practical Studies: Routing
If the remote entry is re-advertised as a valid route after the holddown interval, the network 131.108.1.0/24 is re-inserted into the IP routing
table.
The command show ip protocol is a useful command that displays the characteristic of the protocols in use on a Cisco router. Perform this
command on R1. Example 2-67 displays a sample output of the show ip protocol command on R1.
R1#
After 270 seconds, the route is marked as invalid, and after 630 seconds, the route is deleted. The holddown interval for IGRP is 280
seconds. Also notice that the default hop count is 100; you can set this to 255. The default constants are always displayed as their default
values K1 = K3 = 1 and K2 = K4 = K5 = 0.
Finally, the other most widely used command in today's networks is the trace command. The trace command makes use of the Time to
Live (TTL). The TTL field is used to stop routing loops. Perform a trace route command over the World Wide Web. Example 2-68
describes the route hops from the source to destination for the site www.cnn.com.
- 52 -
CCNP Practical Studies: Routing
The trace command displays the route taken from the source to destination. From Example 2-68, you can determine the next hop, the time
taken, and whether multiple hops exist.
NOTE
The trace command works by first sending three packets with a TTL of 1. The first router sees these packets and returns an error message.
Now the source of the first hop is known. The next three packets are sent with a TTL of 2 and this process is repeated until the final
destination is reached.
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Configure the network in Figure 2-7 for IP routing using the IP addressing scheme provided. Ensure that both Routers R1 and R2 have full
connectivity to each other. Use the ping command to ensure all networks are reachable. You must use IP RIP as your dynamic routing
protocol.
- 53 -
CCNP Practical Studies: Routing
You will notice that the entire IP addressing scheme is /24 except for the serial link between R1 and R2. The serial link contains a mask
that is 255.255.255.252, or /30. Because you have /24 and /30, the only way RIP can understand variable-length subnet mask is with RIPv2
or with the use of static routes. The configurations in Example 2-69 and Example 2-70 answer these issues using RIPv2. Static routes are
fine to configure, but you must be aware that static routes have an AD of 1, which means if you use any dynamic routing protocols, static
information is more trusted, even though you may have a dynamic routing protocol such as RIPv2 advertising the network's reachability
and next hop details dynamically. In a changing network, static routes can be cumbersome to document and administrate. If you do have
access to two routers, experiment with RIPv1 and static routes. Another major disadvantage of static routes is that they do not scale well in
large networks and can lead to routing loops or black holes (discarded packets) if configured incorrectly. In that case, you should change
the protocols to RIPv2, OSPF, IGRP, or EIGRP and apply the skills you learned in this chapter to test connectivity. Configure loopbacks
with VLSM and experiment with debug commands to discover why IP entries are added or not advertised. Examples 2-69 and 2-70 display
the full working configuration on R1 and R2.
- 54 -
CCNP Practical Studies: Routing
interface Serial0/1
ip address 131.108.3.1 255.255.255.252
clockrate 128000
!
router rip
version 2
network 131.108.0.0
!
line con 0
transport input none
line aux 0
line vty 0 4
!
end
- 55 -
CCNP Practical Studies: Routing
!
line con 0
exec-timeout 0 0
transport input none
line aux 0
line vty 0 4
!
end
Review Questions
These review questions are based on the Practical Exercise. Use the router displays taken from R1 from the preceding Practical Exercise to
answer the following questions. View Example 2-71 for sample output taken from R1; this output includes the IP routing table and sample
pings to the router R2.
You can find the answers to these questions in Appendix C, "Answers to Review Questions."
R1#ping 131.108.7.1
- 56 -
CCNP Practical Studies: Routing
4: How many subnets are known by R1 using the Class B network 131.108.0.0/16?
5: From R1, a ping test is sent to three remote networks. Is the ping test successful or not? Explain why or why not?
7: Each remote routing entry is labeled with the following information: [120/1]. What does the 120 represent and what does the 1
represent?
8: Besides a ping test, what other methods could you use to ensure connectivity to the remote networks?
Summary
You have now successfully worked through five routing principles scenarios using different routing protocols and have configured IP
addressing across a sample two-router network. You should have a strong knowledge base of routing principles to apply to the remainder of
this book. Table 2-7 summarizes the commands used in this chapter.
- 57 -
CCNP Practical Studies: Routing
The chapter starts by covering the basic OSPF concepts. It then briefly explains why OSPF is considered an improved routing protocol over
Routing Information Protocol (RIP) by covering how OSPF discovers, chooses, and maintains routing tables.
Nonbroadcast multiaccess (NBMA) is a particular challenge in any network environment. This chapter covers how OSPF overcomes any
limitations imposed by NBMA networks.
Five practical scenarios, included in the chapter, help you complete your understanding and ensure you have all the basic OSPF routing
skills to complement your understanding of how to configure and maintain OSPF on Cisco Internet Operating System (IOS) routers.
Basic OSPF
OSPF is a link-state routing protocol. Link-state protocols use the shortest path first (SPF) algorithm to populate the routing table. OSPF
shares information with every router in the network.
OSPF is considered a difficult protocol to configure and requires a thorough understanding of terms that are commonly used. Table 3-1
explains briefly the common OSPF terminology used throughout this chapter.
1. Init state— When Hello packets have been sent and are awaiting a reply to establish two-way
communication.
2. Establish bi-directional (two-way) communication— Accomplished by the discovery of the Hello
protocol routers and the election of a DR.
3. Exstart— Two neighbor routers form a master/slave relationship and agree upon a starting sequence to
be incremented to ensure LSAs are acknowledged.
4. Exchange state— Database Description (DD) packets continue to flow as the slave router acknowledges
the master's packets. OSPF is operational because the routers can send and receive LSAs between each
other. DD packets contain information, such as the router ID, area ID, checksum, if authentication is
used, link-state type, and the advertising router. LSA packets contain information, such as router ID also
but in addition include MTU sizes, DD sequence numbering, and any options.
5. Loading state— Link-state requests are sent to neighbors asking for recent advertisements that have not
yet been discovered.
6. Full state— Neighbor routers are fully adjacent because their link-state databases are fully synchronized.
Routing tables begin to be populated.
Topology table Also called the link-state table. This table contains every link in the whole network.
Designated router This router is responsible for ensuring adjacencies between all neighbors on a multiaccess network (such as
- 59 -
CCNP Practical Studies: Routing
The DR is selected based on the router priority. In a tie, the router with the highest router ID is selected.
Backup DR A backup router designed to perform the same functions in case the DR fails.
Link-state A packet that contains all relevant information regarding a router's links and the state of those links.
advertisement (LSA)
Priority Sets the router's priority so a DR or BDR can be correctly elected.
Router links Describe the state and cost of the router's interfaces to the area. Router links use LSA type 1.
Summary links Originated by area border routers (ABRs) and describe networks in the AS. Summary links use LSA
types 3 and 4.
Network links Originated by DRs. Network links use LSA type 2.
External links Originated by autonomous system boundary routers (ASBRs) and describe external or default routes to
the outside (that is, non- OSPF) devices for use with redistribution. External Links use the LSA type 5.
Area border router Router located on the border of one or more OSPF areas that connects those areas to the backbone
(ABR) network.
Autonomous system ABR located between an OSPF autonomous system and a non-OSPF network.
boundary router
(ASBR)
OSPF has so many features that the most efficient way to appreciate them is to enable OSPF on routers and observe how the routers
dynamically discover IP networks.
Before covering various OSPF scenarios, this chapter covers how OSPF is configured in single and multiple OSPF areas.
To enable OSPF on a Cisco router and advertise interfaces, the following tasks are required:
Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with an IP address in area 0. The network command
network 0.0.0.0 255.255.255.255 area 0 dictates that you do not care (255.255.255.255) what the IP address is, but if an IP address is
enabled on any interface, place it in area 0.
- 60 -
CCNP Practical Studies: Routing
The following is a list of reasons OSPF is considered a better routing protocol than RIP:
•
•
OSPF has no hop count limitations. (RIP has 15 hops only.)
•
OSPF understands variable-length subnet masks (VLSMs) and allows for summarization.
•
OSPF uses multicasts (not broadcasts) to send updates.
•
OSPF converges much faster than RIP, because OSPF propagates changes immediately.
•
OSPF allows for load balancing with up to six equal-cost paths.
•
OSPF has authentication available. (RIPv2 does also, but RIPv1 does not.)
•
OSPF allows for tagging of external routes injected by other autonomous systems.
OSPF configuration, monitoring, and troubleshooting have a far greater IOS tool base than RIP.
NOTE
OSPF does have some disadvantages, including the level of difficulty and understanding required to configure, monitor, and troubleshoot
it. The other two factors are the memory and Central Processing Unit (CPU) requirements that can affect even high-end router
performance. You can configure more than one OSPF process, but you must be mindful that the SPF calculations associated with multiple
OSPF processes can consume a considerable amount of CPU and memory.
To overcome these problems, OSPF, and in particular Cisco IOS, allows you to define the networks types and also allows static OSPF
neighbor configurations.
Cisco IOS enables you to configure five main network types as displayed in Table 3-2. These five possible solutions available with Cisco
IOS are listed for your reference.
Scenarios
The following scenarios are designed to draw together and further explore the content described earlier in this chapter and some of the
content you have seen in your own networks or practice labs. There is not always one right way to accomplish the tasks presented, and
using good practice and defining your end goal are important in any real-life design or solution.
You must also configure a number of loopback interfaces to populate the IP routing table. Figure 3-1 displays two routers named R1 and
R2 connected through Ethernet. Configure the routers of OSPF area 1 and place the loopbacks in area 1 also.
- 61 -
CCNP Practical Studies: Routing
Figure 3-1 displays the IP addressing and area assignments for Routers R1 and R2.
Configure R1 for OSPF first. Assign all interfaces with the area assignment 1. Also note that this scenario uses VLSM. Use the network
command and match the IP subnet exactly. Example 3-2 displays the OSPF configuration performed on R1.
NOTE
Routers R1 and R2 reside in one area; so, in fact, you could apply the one IOS command to enable all interfaces configured with an IP
address in the range 131.108.0.0 through 131.108.255.255 with the command network 131.108.0.0 0.0.255.255 area 1.
NOTE
R1 has a process ID of 1 and R2 has a process ID of 2. The process ID is locally significant only and doesn't need to match between
routers. The process ID can be any number between 1–65535. Also, because R2 has host (or /32 subnets) masks on loopbacks 2 and 3, the
inverse mask is 0.0.0.0, or an exact match.
Example 3-4 displays the three remote networks reachable through OSPF with a cost metric of 11 for all three. The next hop address is
131.108.1.2 through Ethernet 0/0. You might ask yourself why some of the remote networks are displayed as a /32 route when you used a
/27 mask.
To discover why loopbacks appear as /32 host routers, examine Example 3-4, which displays the IP routing table on R1.
- 62 -
CCNP Practical Studies: Routing
The remote network is displayed as a /32 route when a /27 mask is used because, by default, OSPF advertises loopbacks as host addresses,
or as /32 routes. Change this default configuration and make the routes appear as /27 with the configuration on R2, as displayed in Example
3-5. To make things a little more interesting, modify the cost as well to 1000.
Example 3-5 Advertising Loopbacks as /27 on R2 and Changing the Default Cost to 1000
R2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#int loopback0
R2(config-if)#ip ospf cost 1000
R2(config-if)#ip ospf network point-to-point
The command ip ospf cost 1000 changes the cost to 1000. The command ip ospf network point-to-point changes the route advertisement
to /27. Example 3-6 displays R1's routing table after these changes.
In Example 3-6, the subnet 131.108.5.32 displayed is 27 bits. The remaining loopbacks are still /32, so you need to modify them also.
The associated cost of the remote network 131.108.5.32/27 is 1010. To figure out why, remember that OSPF calculates the total cost from
source to destination. The 1000 is the cost R2 assigns and advertises to R1. When R1 receives the update, it makes a calculation on total
cost. The path taken to the remote network 131.108.5.32 is through Ethernet 0/0. Find out the cost associated with R1 Ethernet 0/0 by using
the show ip ospf interface ethernet 0/0 command as displayed in Example 3-7.
- 63 -
CCNP Practical Studies: Routing
R1#
The cost associated with the path on the Ethernet segment is 10. Therefore, the total cost is 1000 (as advertised by R2) plus 10, which
equals 1010. Another method you can use to determine the cost with an Ethernet segment is to use the cost calculation, cost = 108 /
Bandwidth = 108 / 107 = 10. Example 3-8 displays the full routing configuration on R1.
interface Serial0/0
shutdown
!
interface Serial0/1
shutdown
router ospf 1
network 131.108.1.0 0.0.0.255 area 1
network 131.108.4.0 0.0.0.127 area 1
network 131.108.4.128 0.0.0.127 area 1
network 131.108.5.0 0.0.0.31 area 1
!
line con 0
line aux 0
line vty 0 4
!
end
- 64 -
CCNP Practical Studies: Routing
!
interface Loopback1
ip address 131.108.6.1 255.255.255.255
!
interface Loopback2
ip address 131.108.6.2 255.255.255.255
!
interface Ethernet0/0
ip address 131.108.1.2 255.255.255.0
!
interface Serial1/0
shutdown
!
interface Serial1/1
shutdown
!
interface Serial1/2
shutdown
!
interface Serial1/3
shutdown
!
router ospf 2
network 131.108.1.0 0.0.0.255 area 1
network 131.108.5.32 0.0.0.31 area 1
network 131.108.6.1 0.0.0.0 area 1
network 131.108.6.2 0.0.0.0 area 1
!
line con 0
line aux 0
line vty 0 4
end
Now, apply the OSPF principles to a larger, more complex network in Scenario 3-2.
This scenario uses four routers: R1 and R2 from scenario 3-1 and two new routers named R6 and R3. Figure 3-2 displays the routers in this
scenario.
- 65 -
CCNP Practical Studies: Routing
In this scenario, you add two new routers, R3 and R6, and create an additional two new areas: Area 0 and Area 2. That makes a total of
three areas: the backbone Area 0 between R3 and R6, Area 2 covering the link between R6 and R2, and Area 1 covering the Ethernets
between R1 and R2.
Routers R2 and R6 in this case are referred to area border routers (ABRs) because more than one area is configured on each router. OSPF
includes a number of different router types. Table 3-3 displays all the possible routers types.
In Figure 3-2, R1 is an internal router; R2 is an ABR; R6 is a backbone router and ABR, and R3 is a backbone router.
Router R1 requires no configuration change, but you need to modify R2 and enable OSPF on R3 and R6. Example 3-10 displays the
modifications required on R2. Remember that you have a link to R6, so you need to set IP addressing and clocking as you did in the
Chapter 2, "Routing Principles." Example 3-5 uses Cisco serial back-to-back V.35 cables.
Now, enable OSPF on R3 and R6. Notice the IP addressing in Figure 3-2 has a mixture of the Class B networks 131.108.0.0 and
141.108.0.0 with different subnets. Hence, this scenario uses VLSM extensively to illustrate the capability of OSPF to handle VLSM.
- 66 -
CCNP Practical Studies: Routing
To enable OSPF on R6, start the OSPF process with the process ID 6 and enable the interfaces to advertise the networks as displayed by
Example 3-11.
Now that OSPF is configured on all four routers, examine the routing table on the backbone network to ensure that all networks are
routable. Example 3-13 displays the IP routing table on R6.
Example 3-13 displays the remote networks on Router R3, but not the networks from R1 or R2. For example, the Ethernet network
131.108.1.0/24 in area 1 is not routable from R6. Examine R3's routing table. Example 3-14 displays R3's IP routing table.
Once more, Example 3-14 doesn't display the networks in area 1 on Routers R1 and R2. Example 3-15 displays R2's IP routing table.
- 67 -
CCNP Practical Studies: Routing
Notice, however, that R2 has access to the remote networks in area 0 or on the backbone, but not vice versa, because Router R2 is
connected to area 2.
Area 2 is not partitioned from the backbone. In fact, area 2 is directly connected to the backbone through Router R6.
Area 1 is not directly connected to the backbone. Therefore, Router R1 is missing IP networks.
The golden rule in any OSPF network is that all areas must be contiguous or all areas must be connected to the backbone. Scenario 3-2
includes three areas. If an area cannot be assigned to the backbone or is partitioned from the backbone, a virtual link is required. When
designing a network, you use a virtual link to attach areas that do not have a physical connection to the backbone or in cases in which the
backbone is partitioned, as in the example shown in Figure 3-2.
Figure 3-3 displays the areas and the requirement for a virtual link.
- 68 -
CCNP Practical Studies: Routing
The virtual link in this scenario is required from R2 to R6. The virtual link allows information about area 1 to be sent to the backbone.
Another solution to this problem is to change the area 1 assignment to area 2 or to connect a physical link from area 1 to the backbone. In
this scenario, configure a virtual link between R2 and R6.
As you can see, this command has many options. The following is a simplification:
The area-id is the transit network between the two partitioned areas, in this case area 2. You can find the router-id by using the show ip
ospf database command, which displays the complete OSPF database. Example 3-16 shows you how to discover the router IDs on R2 and
R6. Note that the extensive amount of information typically supplied by the show ip ospf database command is not all displayed in
Example 3-16.
You now have the information required to configure a virtual link between R3 and R6. Examples 3-17 and 3-18 display the configuration
performed on Routers R2 and R6.
Use the show ip ospf virtual-links command on R2, demonstrated in Example 3-19, to ensure that the virtual link is active.
Example 3-19 displays an active link to the remote OSPF router with the ID 141.108.12.1. Now, view the routing tables on R3 to determine
whether the area 1 networks have been inserted into the IP routing table, as demonstrated in Example 3-20.
- 69 -
CCNP Practical Studies: Routing
Router R3 discovers the remote networks from the partitioned area 1 through the virtual link between the routers R2 and R6 as
demonstrated by the IP routing table in Example 3-20.
Examples 3-21,3-22, and 3-23 show the three configurations of routers R2, R3, and R6, respectively. R1's configuration is unchanged from
scenario 3-1.
- 70 -
CCNP Practical Studies: Routing
!
interface Serial1/0
ip address 141.108.10.1 255.255.255.252
!
interface Serial1/1
shutdown
!
interface Serial1/2
shutdown
!
interface Serial1/3
shutdown
!
router ospf 2
area 2 virtual-link 141.108.12.1
network 131.108.1.0 0.0.0.255 area 1
network 131.108.5.32 0.0.0.31 area 1
network 131.108.6.1 0.0.0.0 area 1
network 131.108.6.2 0.0.0.0 area 1
network 141.108.10.0 0.0.0.3 area 2
!
line con 0
line aux 0
line vty 0 4
login
!
end
- 71 -
CCNP Practical Studies: Routing
- 72 -
CCNP Practical Studies: Routing
!
interface TokenRing1
shutdown
!
router ospf 6
area 2 virtual-link 131.108.6.2
network 141.108.9.0 0.0.0.127 area 0
network 141.108.9.128 0.0.0.127 area 0
network 141.108.10.0 0.0.0.3 area 2
network 141.108.10.4 0.0.0.3 area 0
network 131.108.26.0 0.0.0.255 area 0
!
line con 0
line aux 0
line vty 0 4
end
Now, you move on to learn about some common OSPF commands you can use to ensure that remote networks are reachable.
Table 3-4. OSPF Commands for Monitoring, Managing, and Maintaining IP Routing Tables
Command Description
show ip ospf Displays the OSPF process and details such as OSPF process ID and router ID.
show ip ospf database Displays routers topological database.
show ip ospf neighbor Displays OSPF neighbors.
show ip ospf neighbor Displays OSPF neighbors in detail, providing parameters, such as neighbor address, hello interval,
detail and dead interval.
show ip ospf interface Displays information on how OSPF has been configured for a given interface.
ip ospf priority Interface command used to change the DR/BDR election process.
ip ospf cost Interface command used to change the cost of an OSPF interface.
Example 3-24 shows the output of the command show ip ospf taken from the backbone Router R3 in Figure 3-2. Table 3-5 explains how to
read the most important information contained within the output.
NOTE
Scenario 3-2, and thus this scenario, have four routers with the following router IDs:
•
•
R1— 131.108.5.1
•
R2— 131.108.6.2
•
R3— 141.108.12.1
R6— 141.108.2.1
- 73 -
CCNP Practical Studies: Routing
Table 3-5. Explanation of the show ip ospf Command Output Taken from R3
Field Explanation
Routing process ID Displays the process ID. In this case 141.108.2.1.
Minimum LSA interval 5 secs The amount of time that the IOS waits before the SPF calculation is completed after
Minimum LSA arrival 1 sec receiving an update. The minimum LSA interval is five seconds and the minimum LSA arrival
is one second on R3.
Number of areas in this router is Displays the number of areas configured on the local router. In this example, R3 has all
1 interfaces in the backbone, or area 0. So only one area is displayed by this command.
Area BACKBONE(0) Displays the area the router is configured for. R3 is a backbone router, so this output advises
the area in backbone 0.
Number of interfaces in this area Displays the number of interfaces in area 0. R3 has four interfaces in area 0.
is 4
Area has no authentication Displays the fact that no authentication is used on R3.
Example 3-25 shows the output of the command show ip ospf database taken from the backbone R3 in Figure 3-2. Table 3-6 explains how
to read the most important information contained within the output.
- 74 -
CCNP Practical Studies: Routing
To show you some different output, look at two more examples from Scenario 3-2: one from R2 and one from R6. Example 3-26 displays
the show ip ospf neighbor command from R2.
Router R2 has two neighbors: one across the Ethernet segment and another through the serial connection to R6. The show ip ospf
neighbor command displays the neighbor router ID and the priority of the neighbor (both 1 in this example) as well as the DR. Notice that
the DR is R1 as seen by R2. The state of the adjacency (Full) and the dead time are displayed. The dead time is the amount of time before
the adjacency is declared dead or inactive if a Hello packet is not received. The dead time must be the same of the adjacent router. The dead
time is four times the hello interval. The address field displays the remote router's IP address. In this case, the IP address assigned to R1 is
131.108.1. The interface field describes the outbound interface from which the neighbor was discovered. Example 3-27 displays the
neighbors on R6 in more detail by adding the detail parameter to the show ip ospf neighbor command.
Router R6 has no adjacency across any broadcast media, such as Ethernet. Therefore, the neighbors are all in a Full state but no DR or
BDR is elected across the wide-area network (WAN) link, because the WAN link is considered a point-to-point link. To determine what
type of OSPF network the given interface is, use the show ip ospf interface command. Example 3-28 displays this command in its most
basic form taken from R6. You can provide more parameters, such as interface serial number.
- 75 -
CCNP Practical Studies: Routing
Router R6 has six interfaces configured with OSPF, so you should expect details about those interfaces. Example 3-28 displays all interface
network types as point-to-point (loopbacks by default are configured as loopback, but the IOS command ip ospf network point-to-point
configures the loopback as point-to-point networks) except the Ethernet segment, because Ethernet is a broadcast medium. Also notice that
because R6 has no neighbors over the Ethernet network, no DR/BDR is elected, because there is no need. The dead interval is four times
the hello interval on all interfaces.
Now use some interface commands on the Figure 3-2 network to modify the behavior of the DR/BDR election process. Start by changing
the designated router in area 1 and ensure that Router R2 becomes the DR. Example 3-29 displays the current DR and the configuration
change on R2 to make the priority higher than R1 by setting the priority to 255.
- 76 -
CCNP Practical Studies: Routing
Example 3-29 stills displays the DR as R1 and not R2 even after the configuration setting changes the priority to 255, because the election
process has already taken place and R1 is still the DR. Example 3-30 simulates a network outage by shutting down R1 E0/0. Now look at
the OSPF neighbor on R1, as displayed by Example 3-30.
Example 3-30 Shutting Down R1 E0/0 and show ip ospf neighbor Commands
R1(config)#interface e 0/0
R1(config-if)#shutdown
1w6d: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0, changed state
to down
1w6d: %LINK-3-UPDOWN: Interface Ethernet0/0, changed state to up
1w6d: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0, changed state
to up
R1(config-if)#no shutdown
1w6d: %LINK-3-UPDOWN: Interface Ethernet0/0, changed state to up
1w6d: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0, changed state
to up
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
131.108.6.2 255 INIT/- 00:00:39 131.108.1.2 Ethernet0/0
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
131.108.6.2 255 EXCHANGE/- 0:39 131.108.1.2 Ethernet0/0
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
131.108.6.2 255 EXSTART/DR 00:00:39 131.108.1.2 Ethernet0/0
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
131.108.6.2 255 LOADING/DR 0:00:39 131.108.1.2 Ethernet0/0
R1#show ip ospf nei
Neighbor ID Pri State Dead Time Address Interface
131.108.6.2 255 FULL/DR 00:00:39 131.108.1.2 Ethernet0/0
Example 3-30 displays some interesting facts. The first is that when you shut down the interface and enable the Ethernet port E0/0 on R1,
IOS displays messages to advise you of the changed state. Second, the first neighbor state is INIT, which means R1 sent Hello packets,
which are awaiting R2's reply. The state of EXSTART/DR means the two routers have formed a master relationship. The LOADING state
indicates that link-state requests have been sent. The FULL state indicates the two routers are fully adjacent or share the same OSPF
database.
The DR indicates that the designated router is the neighbor with the IP address 131.108.1.2, which is Router R2. Example 3-31 displays the
neighbor state as seen by R2, which is now the backup designated router (BDR).
- 77 -
CCNP Practical Studies: Routing
The final command in this scenario is the ip ospf cost command. You use this command to change the cost Cisco routers assign by default
by using the formula OSPF cost = 108 / bandwidth. This command is not the only method you can use to change the cost. You can also use
the bandwidth command on a particular interface and let the Cisco IOS use the bandwidth portion of the cost formula to calculate the new
cost.
NOTE
You can also use the command auto-cost reference-bandwidth reference-bandwidth during the OSPF process to change the bandwidth
portion of the cost calculation. You should set this command equally across all your routers if you choose to use it. The reference-
bandwidth is set to 108 by default.
Assume you have a request from the network administrator that all loopbacks on R1 being advertised to R2 have a total cost of 100.
Example 3-32 displays the current cost on R2.
The three loopbacks display a cost of 11. To increase this to 100, you can increase the cost per interface. Example 3-33 displays the cost
change on R1 loopback interfaces from the default of 1 to 90. Remember that by default, the cost of a 10MB Ethernet interface is 10.
Changing the default cost from 1 to 90 means that the total cost R2 sees is 10, which is the default cost on an Ethernet interface plus the 90
you configured. Example 3-34 now displays the new OSPF routing table with the loopbacks from R1 with a new cost of 100.
- 78 -
CCNP Practical Studies: Routing
Example 3-34 R2's OSPF Routing Table After the Cost Change
R2#show ip route ospf
141.108.0.0/16 is variably subnetted, 7 subnets, 3 masks
O 141.108.1.128/25 [110/846] via 141.108.10.2, 3d03h, Serial1/0
O 141.108.9.128/25 [110/782] via 141.108.10.2, 3d03h, Serial1/0
O 141.108.1.0/25 [110/846] via 141.108.10.2, 3d03h, Serial1/0
O 141.108.9.0/25 [110/782] via 141.108.10.2, 3d03h, Serial1/0
O 141.108.12.0/24 [110/782] via 141.108.10.2, 3d03h, Serial1/0
O 141.108.10.4/30 [110/845] via 141.108.10.2, 3d03h, Serial1/0
131.108.0.0/16 is variably subnetted, 9 subnets, 3 masks
O 131.108.4.129/32 [110/100] via 131.108.1.1, 00:00:35, Ethernet0/0
O 131.108.33.0/24 [110/855] via 141.108.10.2, 3d03h, Serial1/0
O 131.108.4.1/32 [110/100] via 131.108.1.1, 00:00:35, Ethernet0/0
O 131.108.5.1/32 [110/100] via 131.108.1.1, 00:00:35, Ethernet0/0
O 131.108.26.0/24 [110/791] via 141.108.10.2, 3d03h, Serial1/0
The next scenario shows you how to configure an advanced OSPF network using a three-router network over Frame Relay.
Figure 3-4 displays the three-router network over Frame Relay used in this scenario. Included in Figure 3-4 are the IP addressing scheme,
Frame Relay DLCI numbering, and OSPF area assignments.
- 79 -
CCNP Practical Studies: Routing
This scenario involves three routers running OSPF over Frame Relay. Start by configuring the Frame Relay parameters. Figure 3-4 displays
the Frame Relay DLCIs and Local Management Interface (LMI) types. Example 3-35 displays R3's Frame Relay configuration. You do not
use subinterfaces in this scenario to demonstrate an NBMA environment.
Example 3-35 shows you how to configure the IP address and how to enable Frame Relay encapsulation. R3 also requires the DLCI
information, as displayed in Figure 3-4. The specific DLCIs are 103, which is the path to R4, and 108, which is the path to R5.
Example 3-36 and Example 3-37 show the configurations of R4 and R5, respectively.
NOTE
In Examples 3-36 and 3-37, R4 and R5 map IP over Frame Relay, but this is not the case on R3 in Example 3-35. Frame Relay, like any
protocol, needs to map Layer 2 of the Open System Interconnection (OSI) model to Layer 3. R3 is not configured for static mapping,
because Frame Relay dynamically discovers the maps because R3 is a hub router using Frame Relay inverse Address resolution Protocol
(ARP) protocol. Frame Relay inverse ARP automatically discovers the DLCI and next hop IP address.
Now that you have enabled Frame Relay, you can start the OSPF configuration. Example 3-38 displays the OSPF configuration on R3
along with the IP address assignment to E0.
You must also enable OSPF on Routers R4 and R5. Example 3-39 displays the OSPF configuration on R4 along with the IP address
assignment to E0.
- 80 -
CCNP Practical Studies: Routing
Example 3-40 displays the OSPF configuration on R5 along with the IP address assignment to E0.
NOTE
Example 3-40 places the two Ethernet networks with the one OSPF statement.
Ensure that OSPF adjacencies are up and in a FULL state on R3. Example 3-41 displays the OSPF neighbor state on router R3.
As you can see from the lack of output in Example 3-41, Router R3 has no adjacencies. The IOS on R3 in Example 3-41 tells you there are
no OSPF relationships to R4 and R5. That lack of relationships is because OSPF Hello packets (using multicast address, of course) are not
sent over a nonbroadcast OSPF network type.
Figure 3-4 shows a classic example of OSPF over NBMA. In an NBMA environment, broadcasts or multicasts do not propagate over the
Frame Relay. Example 3-42 displays the OSPF network type on R3 link to R4 and R5.
Example 3-42 displays no neighbor and the main fact that the link is considered a nonbroadcast link. OSPF can be configured a variety of
ways to accomplish this. To demonstrate OSPF over NBMA in this scenario, you do not modify the network type, but rather you statically
configure a neighbor relationship from R3 to R4 and R5. To enable a static OSPF neighbor relationship, enter the following command:
- 81 -
CCNP Practical Studies: Routing
The command neighbor 141.108.1.2 configures the neighbor to R4. The command neighbor 141.108.1.3 configures the neighbor to R5.
Example 3-43 overcomes the need to change the network environment from nonbroadcast and allows a static configuration of remote
OSPF routers. One more important task is required. Router R4 and R5 are spoke, or edge, routers. The hub router, R3, must become the
DR, because R3 has links to both R4 and R5 and information will be sent from R4 to R5, for example, through R3. The easiest way to
make R3 the DR is to disable R4 and R5 from ever becoming the DR by applying a 0 priority on R4 and R5. Example 3-44 demonstrates
how to set the priority to 0, in effect disabling any chance for R4 or R5 to become the DR.
The state shown in Example 3-45 displays a FULL adjacency and a state known as DROTHER, which indicates that the neighbor was not
chosen as the DR or BDR and cannot be because the priority has been set to zero. Example 3-46 displays the full working configuration of
R3.
- 82 -
CCNP Practical Studies: Routing
- 83 -
CCNP Practical Studies: Routing
!
interface Serial0
ip address 141.108.1.3 255.255.255.248
encapsulation frame-relay
ip ospf priority 0
frame-relay map ip 141.108.1.1 106 broadcast
frame-relay interface-dlci 106
!
interface Serial1
shutdown
!
router ospf 5
network 141.108.1.0 0.0.0.7 area 0
network 141.108.4.0 0.0.3.255 area 5
!
line con 0
line aux 0
line vty 0 4
!
end
The final scenario covers common show and debug commands used to verify correct OSPF implementation.
Figure 3-5 displays a simple two-router topology. The two routers are named SanFran and Chicago. Figure 3-5 displays the correct IP
address assignment and OSPF area assignment.
The network administrator of R1 has told you that a number of remote networks on R2 are not reachable by R1.
NOTE
Figure 3-5 displays two routers with the names SanFran and Chicago. To change the name of a router, you use the hostname name
command. Also, notice that the backbone segment is displayed as 0.0.0.0. The backbone can be configured on Cisco routers as 0 or 0.0.0.0.
- 84 -
CCNP Practical Studies: Routing
Example 3-49 displays no remote entries on R1. Start by ensuring that OSPF is correctly configured on R1 by using the show ip ospf
interface command. Example 3-50 displays a sample output taken from the router SanFran.
Example 3-50 displays a number of important details, such as the Ethernet interface on R1 resides in area 0.0.0.0, or the backbone; the
network type over the Ethernet interface is broadcast; and the router SanFran is the elected DR. The loopbacks on Chicago and SanFran are
active (software interfaces, like loopbacks, are active as long as they are not administratively shutdown), so OSPF looks like it is correctly
configured on R1. Take the same steps on Chicago. Example 3-51 displays a sample output from the show ip ospf interface command.
Example 3-51 displays the loopbacks in OSPF process 2, but the Ethernet interface is not enabled. Example 3-52 displays the OSPF
configuration on Chicago.
- 85 -
CCNP Practical Studies: Routing
Example 3-52 displays the fault with the router Chicago. The command network 131.108.1.0 0.0.0.0 causes the router to enable OSPF for
the interface configured with the IP address 131.108.1.0. This address is a reserved address for the subnet 131.108.1.0/24; hence OSPF
cannot run. Remove this command and install the correct network and mask command. Example 3-53 displays the removal of the incorrect
command and insertion of the correct network statement.
Make sure that OSPF is enabled on Chicago's Ethernet interface. Example 3-54 displays a sample output with the show ip ospf interface
command.
Example 3-54 displays that the Ethernet interface is now, in fact, enabled in OSPF area 0.0.0.0. The fact that no adjacent neighbor is
present still represents a problem.
Move back to the router named SanFran, and check for OSPF adjacency. Example 3-55 displays the OSPF characteristic of the Router
SanFran.
- 86 -
CCNP Practical Studies: Routing
No neighbor exists on this segment. Now introduce a new command using the debug command set:
This command enables IOS output of all events relating to adjacencies. Example 3-56 displays the command being enabled and a sample
output taken from the router SanFran.
The error message displayed by the IOS in Example 3-56 clearly states you have a mismatch in the hello interval. In other words, the hello
interval the Router SanFran uses (local router where the display is taken from) is different from the router sending out a Hello packet with
the router ID 131.108.7.1, through the IP address 131.108.1.2.
Remember that hello and dead intervals must match before neighboring routers can become fully adjacent.
Example 3-56 displays Dead R 40 C 120, Hello R 10 C 30. The first information tells you that the dead interval (displayed as Dead in the
debug output) received from the router Chicago (Dead R 40) is set to 40 seconds, whereas the configured (displayed as C from the debug
output) dead interval (Dead C 120) on SanFran is 120 seconds. Therefore, there is a mismatch error. Similarly, the hello interval Chicago
receives is set to 10 seconds; whereas the configured hello interval on SanFran is 30, another mismatch. The sample debug output, as
displayed in Example 3-56, advises you that the hello and dead interval should be correctly set on both routers: SanFran and Chicago.
OSPF routers never become adjacent (in other words, never exchange OSPF databases) unless all OSPF parameters, such as the hello
interval or dead interval, are the same.
Example 3-56 advises you that the Chicago dead interval is 40 seconds, whereas the configured interval on SanFran is 120 seconds.
Example 3-56 advises you that Chicago's hello interval is 10 seconds, whereas the configured hello interval on SanFran is 30 seconds.
These two clearly do not match.
Example 3-57 displays the configuration change on SanFran to ensure hello and dead intervals are configured the same way. The hello
interval is set to 10 seconds.
NOTE
The dead interval, by default, is four times the hello interval. Hence, Router SanFran is configured with a hello interval of 10 seconds,
which automatically configures the dead interval to 40 seconds thereby matching the hello and dead intervals set on the router named
Chicago.
- 87 -
CCNP Practical Studies: Routing
As soon as you correct the problem, you see the hello process completed, and an OSPF database exchange occurs. In other words, Routers
Chicago and SanFran are now OSPF neighbors. Example 3-57 highlights the OSPF neighbor state from the initial INIT state to the FULL
state. Example 3-58 now displays SanFran's IP routing table.
The Router SanFran now discovers the remote networks 131.108.7.1/32 and 131.108.6.0/32 through OSPF.
- 88 -
CCNP Practical Studies: Routing
This scenario has introduced you to some powerful OSPF commands that you can use to discover why OSPF is not functioning correctly.
Cisco IOS is updated almost daily, so you need to reference the IOS documentation for new and ever-expanding commands. Example 3-59
displays the debug and show commands possible on a Cisco router running IOS release 12.0.10.
NOTE
Using the ? character on the command-line interface displays a list of commands available to the user. Example 3-59 takes advantage of
this tool to display commands available to the network administrator.
- 89 -
CCNP Practical Studies: Routing
!
router ospf 1
network 0.0.0.0 255.255.255.255 area 0.0.0.0
!
ip classless
line con 0
line aux 0
line vty 0 4
!
end
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Configure the network in Figure 3-6 for OSPF routing using the IP addressing scheme provided. Ensure that both routers R1 and R2 have
full connectivity to Routers R3 and R6 in the backbone. Use the ping command to ensure all networks are reachable. You must use OSPF
as your only dynamic routing protocol.
- 90 -
CCNP Practical Studies: Routing
You will notice that the IP addressing scheme uses VLSM and the serial links use the subnet 141.108.10.0.
The following example configurations provide a solution using OSPF. This practical example is similar to Scenario 2-2 with the extra link
between area 1 and area 0. This means that you need to configure two virtual links: one from router R2 to R6 and another between R1 and
R3. This second virtual link is required in case of link failure or hardware failure from the Routers R1 and R2.
Configure the loopbacks with VLSM and experiment with debug commands to discover why IP entries are added or not advertised.
Remove the second virtual link from R1 to R3, and see how OSPF behaves when the link between R2 and R6 fails.
You will find that because the areas are partitioned, you actually do need two virtual links to ensure full connectivity in any network failure
situation. Example 3-62 displays R1's full working configuration.
- 91 -
CCNP Practical Studies: Routing
- 92 -
CCNP Practical Studies: Routing
- 93 -
CCNP Practical Studies: Routing
- 94 -
CCNP Practical Studies: Routing
line con 0
line aux 0
line vty 0 4
end
Review Questions
Use router output taken from R1 from the previous Practical Exercise to answer the following questions. Example 3-66 shows this sample
output taken from R1 and includes the IP routing table and sample pings to area 1.
- 95 -
CCNP Practical Studies: Routing
The answers to these question can be found in Appendix C, "Answers to Review Questions."
3: How many subnets are known by R1 using the Class B networks 131.108.0.0/16 and 141.108.0.0/16?
5: Why is the remote network 141.108.6.0/32 displayed as learned through the denotation: O IA?
6: What is the cost associated with the remote network 131.108.33.0/24 [110/74]?
- 96 -
CCNP Practical Studies: Routing
Summary
You have now completed some basic and challenging OSPF scenarios and discovered how powerful OSPF is when enabled on Cisco IOS
routers.
OSPF can be configured in single or multiple areas. You saw that all OSPF areas must be connected to the backbone for proper and correct
operation. Standard techniques using Cisco IOS show commands were demonstrated to ensure that you have all the required knowledge to
monitor and maintain small or large OSPF networks.
- 97 -
CCNP Practical Studies: Routing
Chapter 3, "Basic Open Shortest Path First," started by covering some of the basic Open Shortest Path First (OSPF) concepts. This chapter
covers some of the ways OSPF deals with large Internet Protocol (IP) routing environments and how you can configure OSPF to reduce IP
routing tables and the CPU and memory requirements of access or edge routers. OSPF is a popular IP routing protocol; therefore, most
Cisco certification exams test heavily on OSPF.
This chapter contains five practical scenarios to complete your understanding and ensure you have all the OSPF routing skills to
complement your understanding of how to configure and maintain OSPF in large IP networks. Integrated Intermediate System-to-
Intermediate System (IS-IS) is another link-state protocol common in today's networks used to route IP. Integrated IS-IS is covered in
detail in Scenarios 4-3 and 4-4.
Advanced OSPF
OSPF is an industry-standard routing protocol developed by the Internet Engineering Taskforce (IETF) as a replacement for legacy routing
protocols that did not scale well in large environments. OSPF supports the following features:
•
•
Variable-length subnet masks (VLSM).
•
The use of areas to minimize Central Processing Unit (CPU) and memory requirements.
A simple cost metric that you can manipulate to support up to six equal cost paths. The number of paths is limited only by the
•
Internet Operating System (IOS).
•
The use of authentication to ensure OSPF updates are secure and the use of multicast updates to conserve bandwidth.
•
Faster convergence times ensuring updates and changes are propagated across the network.
•
No limitation of network diameter or hop count. Limiting factors include only CPU and memory resources.
The ability to tag OSPF information injected from any autonomous systems.
•
•
Connecting multiple OSPF areas
•
VLSM and summarization with OSPF
OSPF over multiarea NBMA
An OSPF area is defined as a logical grouping of routers by a network administrator. OSPF routers in any area share the same topological
view (also known as the OSPF database) of the network. The core reason that OSPF is configured in multiple areas is to reduce routing
table sizes, which in turn reduces the topological database and CPU/memory requirements on a router.
OSPF is not just configured in one large area, so all routers share the same topological database. The use of multiple areas ensures that the
flooding and database management required in large OSPF networks is reduced within each area so that the process of flooding the full
database and maintaining full network connectivity does not consume a large portion of the CPU processing power. Every time a network
change occurs, the CPU on a router is interrupted and a new OSPF tree is calculated. Running the shortest path first (SPF) algorithm itself
is not CPU intensive, but sending and flooding the network with new topological information is extremely CPU intensive.
Routing tables become very large even with only 50 routers. The OSPF database is exchanged every 30 minutes in full, and if this database
is too large, every time the exchange occurs, the amount of bandwidth used over the network increases, which can cause severe delays in
sending user-based traffic because convergence times increase.
Considering the demands on CPU and memory along with reduced IP routing tables, you should now have a good understanding of why
OSPF requires more than one area. In Scenario 3-2 in Chapter 3, you saw how to configure an OSPF network that is partitioned from the
backbone. All OSPF areas must be connected to the backbone in case of network failure. When an area cannot reside physically or
logically on the backbone, a virtual link is required. For partitioned areas, OSPF treats the area as a separate area, and no routing
information flows to the backbone; therefore, you do not have IP connectivity.
- 99 -
CCNP Practical Studies: Routing
Virtual links add a layer of complexity and might cause additional problems when applied to large IP networks. It is best to avoid virtual
links in the real world.
When configuring a virtual link, you must be aware of the following design restrictions:
•
•
Virtual links must be configured between two area border routers (ABRs).
•
The transit area cannot be a stub area.
The transit area must have full routing knowledge of both partitioned areas.
NOTE
Stub areas are covered later in this chapter. Remember that all routers must be connected to the backbone logically or you must use a
virtual link. To understand why logical links are required in today's networks, consider the case were Company XYZ buys Company
ACME. Both companies use OSPF and have their own individual backbones. Rather than re-address the networks, a virtual link can
provide immediate IP connectivity.
Table 4-1 summarizes the four OSPF area types and their functions.
Figure 4-1 displays a typical OSPF area assignment and the function of these routers.
- 100 -
CCNP Practical Studies: Routing
In Figure 4-1, the routers residing in the backbone (area 0) are called backbone routers. A backbone router connecting to another area can
also be an ABR. Routers that connect to, for example, the Internet and redistribute external IP routing tables from such protocols as Border
Gateway Protocol (BGP) are termed autonomous system boundary routers (ASBRs). So, you can have a backbone router perform ASBR
functions as well as ABR functions.
Each router, depending on its function, sends out a link-state advertisement (LSA). An LSA is a packet used by such routing protocols as
OSPF (that is, link-state routing protocols) to send information to neighboring routers describing networks and path costs.
TIP
Before flooding any neighboring routers with LSAs, Cisco IOS routers must first undergo the following:
Step 2. The interface cannot be a stub area (LSA type 5. Stub areas are discussed later in this chapter.)
Step 3. The interface cannot be connected to a totally stubby area. (LSA type 3, 4, or 5 will not be sent. Totally stubby areas are
discussed later in this chapter.)
For a detailed summary of OSPF and the packet types, the Cisco Press titles Routing TCP/IP, Volumes I and II, by Jeff Doyle and Jennifer
DeHaven Carroll (Volume II only) explain all the advanced concepts you could ever need.
OSPF supports a number of LSA types as well as three other area types: a stub area, a totally stubby area, and a not-so-stubby area (NSSA).
These additional areas provide even more functionality in OSPF. Before covering these new areas in detail, this section first goes over the
link-state advertisement types and when to use them in an OSPF environment.
The OSPF standard defines a number of LSAs types. Unlike distance vector protocols (for example, RIP), OSPF does not actually send its
routing table to other routers. Instead, OSPF sends the LSA database and derives the IP routing table from LSAs. Table 4-2 describes the
six most common LSAs and their functions.
Table 4-2. Six Common Supported LSA Types on Cisco IOS Routers
LSA Packet
Type Name Function
1 Router link advertisements Describes the state and cost of the router's own interfaces.
2 Network link advertisements Used on multiaccess networks. These are originated by the designated router
(DR).
3 Summary link advertisements Originated by ABRs only. This LSA type sends out information into the
(ABRs) autonomous system (AS) but outside of the area (interarea routes).
4 Summary link advertisements Originated by ASBRs describing IP networks external to the AS.
(ASBRs)
5 Autonomous system (AS) external An LSA sent to a router that connects to the Internet, for example. An
link advertisements advertisement sent from ABR to the ASBR.
6 Not-so-stubby areas (NSSA) An advertisement bound to an NSSA area.
A stub area is defined as an area that contains a single exit point from the area. A stub in the English dictionary means a dead end, and that
is exactly what it means in OSPF. Areas that reside on the edge of the network with no exit point except one path can be termed a stub area.
Stubs come in three types.
- 101 -
CCNP Practical Studies: Routing
Table 4-3 summarizes the functions of these new areas, called stubby areas, total stubby areas, and not-so-stubby areas. Take important
note of the LSA type allowed or not allowed to fully appreciate the value of a stub area.
The only way to appreciate these new areas is to configure them and view the OSPF database. The scenarios that follow cover stub, totally
stubby, and not-so-stubby areas in more detail.
NOTE
A stub area cannot be a transit for a virtual link. This is a design limitation by the protocol itself. When a router is defined as a stub area, a
bit, called the E bit, in the Hello packet is set to 0. All routers that form any OSPF neighbor relationship must have the E bit set to 0 as
well; otherwise, no adjacency is formed.
Also a stub (does not permit LSA types 4 and 5) area or totally stubby (does not permit LSA types 3, 4, and 5) area does not allow external
routes. Nor is redistribution allowed. Those functions must be performed by ABRs or ASBRs.
Table 4-4 summarizes the LSA types by area and indicates which LSAs are permitted or disallowed in certain areas.
TIP
All OSPF packets are sent using IP protocol port number 89. OSPF runs over the IP layer (also called the Network layer) of the Open
System Interconnection (OSI) model.
- 102 -
CCNP Practical Studies: Routing
OSPF supports a number of features. The two main features that interest most network designers are that it supports VLSM and provides
the ability to summarize networks.
When an LSA packet or routing update is received or sent, the packet includes the following information:
•
•
LSA type
•
Router ID (unique IP address, no other router can share the same router ID)
•
Subnet mask
•
Attached router
Metric
Because the subnet mask is carried along with the update, OSPF can support VLSM. Without a mechanism that sends the subnet mask,
there can be no support for VLSM. Routing Information Protocol (RIPv1) and Interior Gateway Routing Protocol (IGRP), for example, do
not carry the subnet mask when they send out updates.
You configure OSPF in two ways to summarize networks using Cisco IOS routers:
•
•
Interarea summarization creating type 3 or 4 LSAs
External summarization with type 5 LSAs
Consider an OSPF network containing two routers across an Ethernet segment. Figure 4-2 displays this two-router topology with the
routers named R1 and R2.
R2 is sending R1 15 OSPF routes ranging from 131.109.1.0 to 131.109.15.0. Instead of populating R1's routing table with 15 IP route
entries, you can use summarization. Example 4-1 displays R1's routing table.
- 103 -
CCNP Practical Studies: Routing
The remote networks are indicated by O IA, which indicates interarea routes. Intra-area routes are indicated by O.
NOTE
Two more types of OSPF routes exist: external type 1 routes, indicated by Cisco IOS as O E1, and external type 2 routes, indicated by
Cisco IOS as O E2. External OSPF routes are routing entries in OSPF route tables injected by an external routing protocol, such as BGP or
IGRP.
When calculating the cost to a remote network, E1 routes add the total cost to destination; whereas E2 routes include only the cost to the
external network.
Example 4-1 displays an IP routing table telling you that R2 is in area 0 and another area (ABR); hence, R2 can perform interarea
summarization. Because the networks 1 to 15 are contiguous, you can configure R2 to mask the networks by masking the first 15 networks
with the IOS area area ID range address mask command. Example 4-2 displays the summary applied to R2 under the OSPF router
process ID of 1.
Example 4-3 displays R1's routing table now. Remember that previously there were 15 IP routing entries.
By using OSPF summarization techniques, you can summarize a simple network with 15 IP networks by using 1 IP routing entry.
In OSPF, you can also externally summarize IP routes by using the summary ip-address mask command.
OSPF summarization examples are included among the five scenarios in this chapter.
- 104 -
CCNP Practical Studies: Routing
OSPF over a multiple-area NBMA network presents some challenges to a network designer as you discovered in Chapter 3.
Typically, in a large NBMA environment, the backbone (area 0) assignment encompasses the NBMA connections themselves, because all
remote or edge sites need to transit the NBMA network. The same commands that applied in Chapter 3 are used in large NBMA
environments.
To summarize the command set used in large NBMA environments, the following commands and steps are required to configure OSPF in a
multiarea OSPF Network:
Summarization enables networks to reduce IP routing table sizes by using area range on ABRs and the summary address
subnet mask command for an ASBR.
Any command that manipulates the OSPF cost metrics for equal costs path load balancing.
Next, this chapter describes another common link-state routing protocol used in large IP routing environments, namely Intermediate
System-to-Intermediate System (IS-IS).
As with any new protocol, you need to be familiar with some new terms and definitions to fully understand IS-IS. Instead of using areas as
OSPF does, IS-IS has routers perform Level 1 (L1) and Level 2 (L2) functions.
Routers that have no direct connectivity to any other area are called L1 routers. Routers that connect areas are called L2 routers.
In Figure 4-3, Routers R1 and R2 are Level 1/Level 2 (L1/L2) routers, and the edge routers R3 and R4, which are each in only one area, are
L2 routers. An L1 router performs the functions similar to those an OSPF internal router performs. A L1/L2 router performs similar
functions to an ABR in OSPF. Both L1 and L2 routers maintain link-state databases.
- 105 -
CCNP Practical Studies: Routing
NOTE
IS-ES is the protocol—Connectionless Network Protocol (CLNP)—between an end system, such as a PC, and an IS-IS enabled router.
•
•
IS-IS maintains a link-state database.
•
IS-IS uses hello packets to form neighbor relations with other IS-IS enabled routers.
•
IS-IS uses areas to form a hierarchy.
•
IS-IS supports VLSM.
•
IS-IS support routing authentication mechanisms.
IS-IS on broadcast networks elects a designated router (DR).
To configure IS-IS on a Cisco IOS router, you must perform the following configurations and tasks:
•
•
Enable IS-IS with the command router isis.
•
Configure any IS-IS interface parameters, such as hello interfaces, and enable IS-IS to send out updates from an interface.
Configure area parameters.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and using good practice and
defining your end goal are important in any real-life design or solution. You start by building an OSPF network and then use the methods
described in this chapter to help reduce the size of IP routing tables.
- 106 -
CCNP Practical Studies: Routing
This scenario represents a typical OSPF network with semi-redundancy and a hierarchical address assignment. To simulate a large network
environment, you configure several loopback address assignments on R1 and R2. Typically in an environment like this, the hosts (devices,
such as mainframes, large computer hosts, or printers) reside in the backbone and the end users are connected to the remote sites. Assume
all IP traffic is between the edge, or access, routers and the backbone network in area 0.
To start OSPF on the eight routers, you must first enable the OSPF process by using the command router ospf process ID. In this scenario,
use the same process ID of 1 on all routers, and remember that the process ID is locally significant only. To send and receive LSAs per
interface, use the network command.
- 107 -
CCNP Practical Studies: Routing
From Figure 4-4, the remote network on Router R8, with the IP subnet 131.108.131.0/24, resides in area 11. Area 11 is partitioned from the
backbone and hence requires a virtual link so that all OSPF routers have a routing entry for the subnet 131.108.131.0/24. Example 4-4
displays the IP routing table on R1 after OSPF has been configured on all the routers in this network.
Example 4-4 displays the remote routers learned through Ethernet interface and the next hop address of 131.108.1.2, which is R2. There is,
of course, another path on R1 through the serial link to R2. Because the cost is lower through the Ethernet LAN segment, R1 chooses the
path to R2 as the preferred path.
The three remote networks on the access Routers R5, R6, and R7 are listed in Example 4-4, but the network on R8 is not. Configure a
virtual link between R4 and R8. Before you can configure a virtual link, you must know the router ID on R4 and R8. The show ip ospf
database command displays the local router ID, which is typically a loopback address or the highest IP address assignment. Loopbacks are
- 108 -
CCNP Practical Studies: Routing
always preferred because a loopback interface is logically never going to become unavailable unless the network administrator removes it.
A router ID that is a physical interface is prone to network failure and OSPF recalculations, which lead to network downtimes.
To configure a virtual link, use the IOS command area transit area router-id. The transit area in this example is area 10, and the router ID
is the IP address of the remote router. Example 4-5 displays the router ID on Routers R4 and R8.
Example 4-7 displays the virtual link configuration on R8 along with the IOS ? command to display the available options.
Example 4-8 displays the IP routing table on the core router, R1, along with the remote network 131.108.131.0 because of the virtual link
configuration.
- 109 -
CCNP Practical Studies: Routing
To view the status of the virtual link, use the show ip ospf virtual-links command. Example 4-9 displays sample output from this
command used on R4.
You have successfully configured a complex network with eight Cisco routers in multiple areas. The routing table, even with only eight
routers, has over 20 IP route entries.
Before using summarization on this network to reduce the IP routing table size, look at the full working configurations on all routers. Pay
particular attention to the shaded sections and the router functions within the OSPF network. Also note how the clockrate command is used
to enable back-to-back serial high-level data link control (HDLC) connections among Cisco routers. Example 4-10 displays R1's full
working configuration. R1 is a backbone router.
- 110 -
CCNP Practical Studies: Routing
- 111 -
CCNP Practical Studies: Routing
- 112 -
CCNP Practical Studies: Routing
interface Loopback14
ip address 131.108.29.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback15
ip address 131.108.30.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback16
ip address 131.108.31.1 255.255.255.0
ip ospf network point-to-point
!
interface Ethernet0/0
ip address 131.108.1.2 255.255.255.0
!
interface Serial1/0
ip address 131.108.255.5 255.255.255.252
clockrate 128000
!
interface Serial1/1
shutdown
!
interface Serial1/2
shutdown
!
interface Serial1/3
shutdown
!
router ospf 1
network 131.108.0.0 0.0.255.255 area 0
!
ip classless
!
line con 0
line aux 0
line vty 0 4
!
end
- 113 -
CCNP Practical Studies: Routing
Example 4-14 displays R5's full working configuration. R5 is an internal OSPF area.
- 114 -
CCNP Practical Studies: Routing
Example 4-15 displays R6's full working configuration. R6 is an internal OSPF router.
Example 4-16 displays R7's full working configuration. R7 is an internal OSPF area.
- 115 -
CCNP Practical Studies: Routing
interface Ethernet0
ip address 131.108.130.1 255.255.255.0
interface Serial0
ip address 131.108.255.14 255.255.255.252
!
interface Serial1
shutdown
!
router ospf 1
network 131.108.130.0 0.0.0.255 area 10
network 131.108.255.12 0.0.0.3 area 10
!
line con 0
line aux 0
line vty 0 4
!
end
Example 4-17 displays R8's full working configuration. R8 is an internal OSPF area, requiring a virtual link because area 11 is not
connected to area 0.
For the core routers in area 0, namely R1, R2, R3, and R4, which pass on routing information to other core or remote routers, you need to
have a more detailed view of the network. This detail is required so you do not perform any summarization on the core network and
maintain a full IP routing topology in the core (or backbone) network.
The access-level routers, R5, R6, R7, and R8, do not typically require an IP routing entry for every network in the core because they
require access to only the core network in area 0, the backbone. Therefore, these routers are perfect examples of how you can use
- 116 -
CCNP Practical Studies: Routing
summarization to reduce the size of routing tables. Only a single exit point to the core of the network exists, so you can configure stubby
networks. First, use some summary commands. Example 4-18 displays R5's IP routing table.
Use OSPF summarization for the core IP networks ranging from 131.108.1.0 to 131.108.31.255 on Routers R3 and R4. Example 4-19
displays the use of the IOS area area ID range mask command on R3.
- 117 -
CCNP Practical Studies: Routing
The IOS tells you only ABRs can perform OSPF summarization. Routers R3 and R4 are ABRs; hence, you can perform network
summarization on R3 and R4.
View the IP routing table on R5. Example 4-21 displays R5's routing table after network summarization is configured on R3 and R4. Also
displayed in Example 4-21 are a few ping requests to IP networks covered in the summary range 131.108.0.0/19, which are networks
covering the range 131.108.1.0 to 131.108.31.255.
- 118 -
CCNP Practical Studies: Routing
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/32 ms
R5#ping 131.108.31.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 131.108.31.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms
By using a simple command on the ABRs, you have significantly reduced the IP routing table size on R5 to nine remote OSPF entries. The
same occurs on Routers R6, R7, and R8.
Also because R5 and R7 have single exit points to the core, you can configure a stub network. You cannot configure a stub network on R8
because you have a virtual link. To create a stub network, use the area area id stub command. Create a stub network between Routers R3
(the ABR) and R5. Example 4-22 displays the stub configuration on R3.
If you attempt to configure a stub network on R4, Cisco's IOS displays the message in Example 4-23.
You cannot create a stub between R4 and R8 because of the virtual link. So, change the area assignments on R8 to area 10 so you can
create a stub.
Figure 4-5 displays the change of area assignments to remove the necessity of a virtual link between R8 and R4. To change the area
assignment on R8 from 11 to 10, configure the following commands on R8:
- 119 -
CCNP Practical Studies: Routing
Because a change has been made to OSPF area assignment, you must ensure that OSPF is still active on R5. Example 4-24 displays R5's
OSPF neighbor state after you configure the ABR R3 as a stub network in area 10.
The OSPF relationship between R3 and R5 is down because if one router is configured as a stub, the neighboring router must also be
configured as a stub, and in this case, R5 has not yet been configured as a stub. Example 4-25 displays the configuration of a stub network
on R5 and the OSPF relationship change to full adjacency.
Now, view the IP routing table on R5. Example 4-26 displays the new IP routing table after the stub configuration is completed on both
Routers R3 and R5.
- 120 -
CCNP Practical Studies: Routing
You now have on R5 a default route labeled 0.0.0.0 through the next hop address 131.108.255.9 (R3). You have a gateway of last resort,
which effectively means any packets to unknown destinations are sent to the next hop address 131.108.255.9 (R3). Configuring a stub
network performs exactly this function; it provides a default route.
Now, you can assume that all IP traffic from the edge routers is destined for the core network, so there is no reason for R5 or R6 to have
network entries for every individual IP route in the core. All IP traffic is destined for the core anyway. To further reduce the IP routing
table, you can configure OSPF to stop the entries labeled as O IA (interarea routes) from populating the edge routers by configuring a
stubby network with the no-summary option by applying the IOS area area id stub no-summary command.
This option prevents the ABR from sending summary link advertisements from other areas except the area that connects R5, area 10 in this
case. To ensure OSPF full adjacency is achieved between R3, R4, R5, R6, R7, and R8, you must configure both the core and edge routers.
Example 4-27 displays the configuration of the core router, R3, with the no-summary option.
You also complete the area 10 stub no-summary on the remaining routers. Example 4-28 displays the no-summary option configured on
R5.
R5's routing table should now contain even fewer entries. Example 4-29 displays R5 IP routing table. View the IP routing table on R5 in
Example 4-29 and compare it to Example 4-26.
- 121 -
CCNP Practical Studies: Routing
The only networks displayed now are the default network and networks residing in the same area as Router R5, which is area 10. You now
have only 8 remote entries instead of over 30, as shown in Example 4-18. The use of the stub configuration is effective in this type of
network topology.
List the full OSPF working configurations of the ABR Routers R3 and R4 and the edge routers that are configured as stubby networks.
Example 4-30 displays R3's OSPF configuration. The shaded portion highlights the configuration required for the stub network.
NOTE
The configuration in Example 4-30 contains only the message in Example 4-23; the OSPF routing process changes because the remaining
configuration is identical to that in Examples 4-10 to 4-17.
Example 4-31 displays R4's full OSPF working configuration. The shaded portion highlights the configuration required for the stub
network.
Example 4-32 displays R5's OSPF working configuration. The shaded portion highlights the configuration required for the stub network.
- 122 -
CCNP Practical Studies: Routing
Example 4-33 displays R6's OSPF working configuration. The shaded portion highlights the configuration required for the stub network.
Example 4-34 displays R7's OSPF working configuration. The shaded portion highlights the configuration required for the stub network.
Example 4-35 displays R8's OSPF working configuration. The shaded portion highlights the configuration required for the stub network.
TIP
To best appreciate OSPF and the features covered here, you can configure a simple two-router network with loopback address and follow
the steps completed here on a smaller scale and continually view the IP routing table to see the benefits of summarization and stubby
networks.
- 123 -
CCNP Practical Studies: Routing
Where this scenario covers redistribution, you use these routers to connect to an OSPF router.
The IP addressing scheme is displayed in Figure 4-6. Note that VLSM is in use. IS-IS supports VLSM, and you configure the three routers
to be in domain 1 using the network entity known as the simple format, which describes the area and system ID.
NOTE
Three methods (referred to as network entities) can define the area: simple format, OSI format, and Government OSI Profile (GOSIP)
format as described in the following list:
Simple format:
OSI format:
GOSIP format:
- 124 -
CCNP Practical Studies: Routing
•
•
AFI— Authority and format identifier (47 for Cisco routers)
•
ICD— International code designator
•
DFI— Domain specific part
•
AAI— Administrative authority identifier
•
RDI— Routing domain identifier (autonomous system number)
•
SEL— Network Service Access Port (NSAP)
•
Area— Used by L2 routers
System ID— Used by L1 routers; typically an interface Media Access Control (MAC) address
• Enable IS-IS with the command router isis optional area tag. The tag groups routers in one domain. You must also enter the
•
global command clns routing.
•
Configure the network interfaces with the command net network-entity-title.
Enable IS-IS per interface with the command ip router isis.
Figure 4-6 shows a small three-router network. All routers reside in one area. The areas are encoded as 00.0001, and the system IDs are the
MAC addresses from the local Ethernet interface.
•
•
R4— 0050.5460.98e8, net ID is 00.0001.0050.5460.98e8.00
•
R8— 00b0.64fc.d7bd, net ID is 00.0001.00b0.64fc.d7bd.00
R9— 00e0.b055.28ca, net ID is 00.0001.00e0.b055.28ca.00
Now, configure the first router, R4, for IS-IS. Example 4-36 displays the configuration required to enable IS-IS on Router R4.
The first configuration completed on R4 enables the IP routing and then enables Connectionless Network Service (CLNS) and interface
configuration on all participating IS-IS interfaces. Example 4-37 displays the configuration of IS-IS on R8.
- 125 -
CCNP Practical Studies: Routing
Now that IS-IS is configured on all three routers, examine the IP routing tables for IP connectivity. Example 4-39 displays R4's IP routing
table.
R4's routing table has four remote entries, all of which are labeled L1 (level 1 route) because all three routers reside in area 1 as configured
by the net command. The administrative distance for IS-IS is 115 and is followed by the metric. The IS-IS metric is between 0 and 63. The
default metric is set to 10, and the total metric is calculated from source to destination. Notice the path to the remote network
141.108.255.8/30 is calculated with two paths: one path through Serial 2 and the other through Serial 3. In other words, IS-IS supports
equal cost path load balancing, as does OSPF.
As with OSPF, the command set for monitoring IS-IS is large. Now look at a few examples of the most commonly used show commands.
Example 4-40 displays the IS-IS neighbor states with the show clns isis-neighbor command.
R4 has two CLNS neighbors, namely Routers R8 and R9. This means all routers share the same IS-IS link-state database. To view the link-
state database on an IS-IS router, use the command show isis database, which is displayed in Example 4-41.
- 126 -
CCNP Practical Studies: Routing
IS-IS, as OSPF, is an advanced link-state routing protocol that you can use in large environments to route IP. Before you look at
redistributing IS-IS with OSPF, here are the full working configurations of the three routers in this IS-IS topology. Example 4-42 displays
R4's full working configuration.
- 127 -
CCNP Practical Studies: Routing
- 128 -
CCNP Practical Studies: Routing
!
interface Serial1
ip address 141.108.255.9 255.255.255.252
ip router isis
clockrate 128000
!
router isis
net 00.0001.00e0.b055.28ca.00
!
line con 0
line 1 8
line aux 0
line vty 0 4
!
end
Example 4-45 displays some sample ping requests and replies to the remote network to demonstrate IP connectivity among all three
routers.
The IS-IS IOS command set is comprehensive. Table 4-7 summarizes the most common IS-IS configuration and show commands.
- 129 -
CCNP Practical Studies: Routing
Because R4 is within both the OSPF and IS-IS domain, you can configure redistribution between OSPF and IS-IS.
To configure redistribution between any IP routing protocols, you must configure a metric that is used within the IP dynamic routing
protocol. For OSPF, you must define a cost metric, for example.
Example 4-46 displays the configuration of OSPF redistribution from OSPF to IS-IS on R4 and the step-by-step process required to ensure
that all the OSPF routes are advertised as IS-IS routes in the IS-IS domain. The ? tool is used to bring up the available options.
- 130 -
CCNP Practical Studies: Routing
When redistributing from OSPF to IS-IS, you need to define the OSPF process ID from which the OSPF routes will be injected. The OSPF
process ID is 1.
Because OSPF uses cost as the metric for making routing decisions and IS-IS uses L1 or L2, you must define the IS-IS router type. (The
router type along with IS-IS metric is between 0–63.)
Three options are available when you are redistributing from OSPF to IS-IS: L1, L2, and L1/2.
In this scenario, you configure L2 routes. Finally, you need to define an IS-IS metric; the chosen value of 10 is used. Any value between 0
and 63 is a valid metric.
View the IP routing table inside in IS-IS network. Example 4-47 displays the IP routing table on R8.
- 131 -
CCNP Practical Studies: Routing
Example 4-47 displays the remote OSPF routes redistributed from the OSPF backbone on R1 into IS-IS as L2 routes, and a metric of 30,
which comes from the addition of the 10 used in redistribution and the two hop counts between R4 to R9 and R9 to R8. Try to ping the
remote address. Example 4-48 displays a sample ping request from R8 to the L2 IS-IS route 131.108.2.1 (R2's loopback address).
The ping request receives no replies. R8 has a routing entry for this network. The reason the ping request receives no replies is because R8
sends the request to the next hop address of 141.108.255.9 (R9) and R9 sends the request to R4. Example 4-49 displays R9's IP routing
table confirming the next hop address.
- 132 -
CCNP Practical Studies: Routing
Example 4-49 displays the next hop address of 141.108.255.1 (R4). Now, R4 can ping the remote address as confirmed by Example 4-50.
The last hop you need to look at is R1. Example 4-51 displays R1's OSPF routing table. Remember that R1 is configured for OSPF only.
NOTE
R4's routing table contains all the OSPF network entries advertised by R1, and because R1 and R4 are maintaining a full OSPF adjacency
and the next hop address is a directly connected LAN, ping requests are replied to when R4 pings the address 131.108.2.1.
- 133 -
CCNP Practical Studies: Routing
The reason that R1 has no remote OSPF entries and hence has no return path to the remote routers R8 or R9 in the IS-IS domain is that you
have not redistributed from IS-IS to OSPF. So far you have only configured one-way redistribution; you must also advise the OSPF domain
of the IS-IS routes. Once more, configure redistribution on R4, but this time, configure IS-IS to OSPF redistribution. Example 4-52
displays the configuration options when redistributing from IS-IS to OSPF.
NOTE
The keyword subnets is required here because 141.108.0.0 is subnetted using a Class C address, which is required whenever redistribution
is configured to a classless domain and a 30-bit mask on serial connections.
Now, view R1's IP routing table. Example 4-53 displays R1's OSPF routing table.
- 134 -
CCNP Practical Studies: Routing
Three remote networks are present, but none of the directly connected links on R4 are present. You also need to redistribute any locally
connected routers on R4. Configure this and use type 1 OSPF routes this time. Example 4-54 displays the configuration of locally
connected routes to be injected into IS-IS on R4.
Example 4-55 now displays the full IP network present in the IS-IS domain.
You have seen the power of the command redistribute. By simply using keywords, you can redistribute routes with the appropriate metric
and route type (1 or 2 in OSPF or L1/L2 in IS-IS). You can now provide connectivity between the two different routing domains. Confirm
connectivity by pinging from R8 to R1 loopback addresses 131.108.2.1/24 through 131.108.10.1/24, as displayed in Example 4-56.
- 135 -
CCNP Practical Studies: Routing
A sample trace from R9 to R1 displays the route path taken to the network 131.108.2.1/24, as displayed in Example 4-57.
Assume the link between R9 and R4 fails, so the only path to the OSPF backbone is through R8. Example 4-58 displays a sample trace
when the primary path fails.
The new IP routing table on R9 contains a path to all OSPF routes through the Serial connection to R8. Example 4-59 displays R9's IS-IS
routing table when the link failure to R4 occurs.
- 136 -
CCNP Practical Studies: Routing
By no means are these rules standard, and they are provided here for reference so you can easily refer to a sample network design and the
common rules experts adhere to in large OSPF networks.
When architecting a network, you should try to accomplish five basic goals with dynamic routing protocols:
•
•
Functionality— The network works; that is, no matter what failure or scenario, the network must always be functioning.
Scalability— As the network grows in size, your initial topology or design must be able to cope with growth and new challenges,
•
such as new acquisitions.
Adaptability— With ever-increasing new technologies, such as Voice over IP, your network should cope with and embrace new
•
features.
Manageability— This point refers to proactive management. Any large network should be able to foresee new challenges before
•
the network grinds to a halt.
Cost effectiveness— In reality, cost drives most network designers. The bigger your budget, the better able you are to provide
users the ability to work around network failures.
You can manage and configure OSPF so that the preceding five criteria are fully supported.
Implementing a hierarchical IP addressing scheme and performing summarization wherever possible are two key points in any large OSPF
network.
The following are some general guidelines when designing a large OSPF network.
Determine the number of routers in each area. Anything between 40–50 is an acceptable number. The number of calculations any given
router must perform given m LSAs is mlogm. For example, 100 routers require 100log 100 or 100 x 2 = 200. Keeping these calculations to
a minimum means the CPU/memory requirements are also kept low. The IETF standards committee provides the following sample design
guidelines:
•
•
The minimum number of routers per domain is 20; the maximum is 1000.
•
The minimum routers per single area is 20; the maximum is 350.
The number of areas per domain is 1; the maximum is 60.
TIP
OSPF is such a large topic that many books have been written about it. For a concise guide to OSPF and a more detailed guide, you cannot
invest in anything better than the following two quality Cisco Press titles: Routing TCP/IP by Jeff Doyle and OSPF Network Design
Solutions by Tom Thomas.
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Configure the network in Figure 4-8 for OSPF between the three routers named SanFran, Mel, and Simon. Configure the edge router
named Sydney for RIP and ensure IP connectivity among all four routers. You must use only RIPv1 and OSPF as your IP routing
- 137 -
CCNP Practical Studies: Routing
protocols. Ensure that a default route appears on all routers so users can connect to the Internet. Configure summarization wherever
possible to minimize IP routing tables.
The router named Simon is configured in the OSPF area 0 (backbone) and the RIP domain and needs to run redistribution between OSPF
and OSPF. Also, because you are using RIPv1, you must also provide summary addresses for all networks, but not /24 because RIPv1 does
not carry subnet mask information in routing updates. (RIPv2 does).
Router SanFran is connected to the Internet, so you need to configure SanFran to provide a default route to the rest of the internal network
by using the OSPF command default-information originate always. This IOS command injects a default route into the OSPF domain and
Router Simon because redistribution also injects a default route into the RIP domain.
The following are the full working configurations of all four routers with the shaded portions highlighting critical configuration commands.
Example 4-60 displays the full working configuration of Router Sydney. Sydney is running RIP only.
- 138 -
CCNP Practical Studies: Routing
!
interface Serial0/0
shutdown
!
interface Serial0/1
shutdown
!
router rip
network 141.108.0.0
!
line con 0
line aux 0
line vty 0 4
!
end
Example 4-61 displays the full working configuration of Router Simon. Simon is running OSPF and RIP. You must always be careful
when redistributing information from one routing domain into another. Simon advertises the non /24 subnets as Class C networks so the
RIP domain (Sydney router) can inject them into the routing table. Because RIPv1 is classless and the subnet 141.108.1.0/24 is configured
locally, all interfaces in this Class B network (141.108.0.0) are assumed to be Class C.
Current configuration:
!
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Simon
!
enable password cisco
!
ip subnet-zero
no ip domain-lookup
!
cns event-service server
!
interface Ethernet0
ip address 141.108.2.1 255.255.255.128
!
interface Ethernet1
ip address 141.108.1.4 255.255.255.0
!
interface Serial0
shutdown
!
interface Serial1
shutdown
!
interface Serial2
ip address 141.108.255.5 255.255.255.252
clockrate 128000
!
interface Serial3
ip address 141.108.255.1 255.255.255.252
clockrate 128000
!
- 139 -
CCNP Practical Studies: Routing
router ospf 1
summary-address 141.108.2.0 255.255.255.0
summary-address 141.108.255.0 255.255.255.0
summary-address 141.108.3.0 255.255.255.0
summary-address 141.108.4.0 255.255.255.0
redistribute connected subnets
redistribute rip metric 10 subnets
network 141.108.2.0 0.0.0.127 area 0
network 141.108.255.0 0.0.0.255 area 0
!
router rip
redistribute ospf 1 metric 2
passive-interface Ethernet0 -> Stops RIP updates on OSPF interfaces
passive-interface Serial2
passive-interface Serial3
network 141.108.0.0
!
=
ip route 141.108.3.0 255.255.255.0 Null0
ip route 141.108.4.0 255.255.255.0 Null0
!
line con 0
line aux 0
line vty 0 4
!
end
Example 4-62 displays the full working configuration of Router Mel. Mel is running OSPF only.
- 140 -
CCNP Practical Studies: Routing
Example 4-63 displays the full working configuration of Router SanFran. SanFran has a default static route pointing to Serial 1, which is
the Internet connection. Under the routing OSPF process, this default route is injected by using the default-information originate always
command.
Review Questions
Based on the following IP routing table, answer the following questions relating to the preceding Practical Exercise on OSPF/RIP routing.
Example 4-64 displays the IP routing table of Router Sydney.
The answers to these question can be found in Appendix C, "Answers to Review Questions."
2: In Example 4-64, what is the hop count or metric to the remote network 141.108.2.0/24?
3: What path does the packet sent to the IP subnet 171.108.255.0/24 take?
- 141 -
CCNP Practical Studies: Routing
4: What type of OSPF routers are the Routers Simon, Mel, and SanFran.
5: Why are static routes injected into the router named Simon?
6: How many OSPF neighbor adjacencies do you expect to see on the router named Simon?
7: Two methods are used in OSPF to summarize IP networks. What are they and what IOS command is used to provide summarization?
8: Why does creating areas reduce the size of the OSPF database?
Summary
OSPF and integrated IS-IS have the advantage of being an industry-wide standard and have a long-term success rate of routing IP in large
IP networks. The capabilities of link-state routing protocols are demonstrated in this chapter along with some challenging scenarios.
Although only one solution per scenario is presented, there are many alternative ways to enable OSPF and Integrated IS-IS to meet the
needs of any network in today's large networking environments.
- 142 -
CCNP Practical Studies: Routing
The chapter starts by covering the basic Enhanced Interior Gateway Routing Protocol (EIGRP) concepts. It then explains of how EIGRP
can be configured and monitored.
You discover how EIGRP learns about new neighbors and how EIGRP operates in NBMA networks. The five scenarios in this chapter help
to complete your understanding of EIGRP and ensure that you have all the basic IP networking knowledge to complement your
understanding of today's most widely used networking protocol, IP.
EIGRP uses distance-vector properties to determine the best path to a network, but it uses link-state properties when changes occur or when
detecting new neighbors. Like OSPF, EIGRP sends hello packets to find new neighbors and maintain neighbor adjacencies.
Some of the main features of EIGRP when used to route IP data are as follows:
• The metric is based on a composite that considers delay, bandwidth, and MTU sizes to ensure the best possible path to any
•
destinations containing dual paths.
•
Periodic updates are not sent; only network changes are sent.
•
EIGRP can load share up to six paths. (The default is four paths, as with OSPF.)
•
By default, EIGRP uses up to 50 percent of the bandwidth of an interface and can be configured to go lower or higher.
•
EIGRP includes support for VLSM.
EIGRP supports authentication of routing updates.
EIGRP was developed by Cisco to provide enhancements to IGRP and, in particular, to provide support for large IP networks and reduce
the convergence time for IP routing updates.
To achieve this goal, EIGRP has been designed with the following features:
•
•
Diffusing Update Algorithm (DUAL)— Like any routing protocol, EIGRP uses DUAL to maintain a loop-free topology.
Incremental updates— Instead of sending the complete IP routing table, EIGRP sends incremental updates when network
•
changes occur.
Hello protocol— EIGRP uses hello packets to discover neighboring routers.
Table 5-1 defines some of the common terminology used when discussing EIGRP networks.
- 143 -
CCNP Practical Studies: Routing
You have already configured IGRP and EIGRP in Chapter 2, "Routing Principles." This chapter covers EIGRP in greater detail using a
simple two-router topology.
Figure 5-1 displays a simple two-router EIGRP network in Autonomous System 1. This section shows you how to enable EIGRP on both
routers in Figure 5-1.
To start EIGRP on a Cisco router, you must first enable EIGRP with the command router eigrp autonomous system while in global
configuration mode.
For routers sharing the same IP domain, the AS needs to be the same. Example 5-1 displays the configuration of EIGRP on R1.
Notice that 131.108.1.0 is, by default, a Class B network. Next, view the configuration after you enter the network 131.108.1.0 command.
- 144 -
CCNP Practical Studies: Routing
Example 5-2 displays the running configuration of R1, truncated for clarity.
NOTE
IOS version 12.0.4(T) supports the use of the wildcard mask, which works as the OSPF wildcard mask does. For example, the network
131.108.1.1 0.0.0.0 command places the Ethernet interface of R1 in EIGRP 1. Consult the latest command reference on the Cisco Web site
at www.cisco.com/univercd/home/home.htm for more information. This URL can be accessed for free and contains every command
available on Cisco routers and switches.
EIGRP needs only the major network boundary when using the network command. For example, you can configure the Class B network,
131.108.0.0, instead of entering the address 131.108.1.0.
EIGRP supports summarization and VLSM, which are covered in this chapter.
Example 5-3 displays the same EIGRP configuration on R2. The AS is set to 1 on both routers to enable both routers to share IP routing
information.
R2 has a number of loopbacks to populate the IP routing tables ranging from 131.108.2.0 to 131.108.15.0/24. To view EIGRP neighbor
relations between two Cisco routers, use the show ip eigrp neighbors command.
Example 5-4 displays the neighbor R2 with the IP address 131.108.1.2, and the outbound interface the EIGRP neighbor (in this case R2)
was discovered. R1 discovered a remote EIGRP neighbor through the Ethernet interface (displayed as Et0/0). The holdtime indicates the
length of time, in seconds, that the Cisco IOS Software waits to hear from the peer before declaring it down. Smooth Round Trip Time
(SRTT) is the number of milliseconds it takes for an EIGRP packet to be sent to this neighbor and for the local router to receive an
acknowledgment of that packet. Retransmission timeout (RTO) indicates the amount of time the IOS software waits before resending a
packet from the local retransmission queue. Q Cnt indicates the number of update, query, or reply packets that the IOS software is waiting
to send to the neighbor. Sequence number (SEQ NUM) is the last sequenced number used in an update, query, or reply packet that was
received from this neighbor.
To maintain EIGRP between R1 and R2, you use hello packets to ensure that both routers are active and running. Any updates or changes
are sent immediately and both routers maintain topology tables. A topology table is created from updates received from all EIGRP
neighbors. The EIGRP topology table is used to maintain IP routing entries in the IP routing table.
Example 5-5 displays the EIGRP topology table on R1 using the IOS show ip eigrp topology command.
- 145 -
CCNP Practical Studies: Routing
Example 5-5 displays a wealth of information about all the remote entries EIGRP discovers. Also, notice the number of different IOS show
commands possible. Entries in this topology table can be updated by changes in the network or interface failures. For example, if a network
failure does occur, the topology table receives an update to recalculate the path to the remote entry using the algorithm called Diffusing
Update Algorithm (DUAL). DUAL is an algorithm developed by Cisco that performs the calculations on the topology table. DUAL is
based on detecting a network change within a finite amount of time. Any changes sent among neighboring routers are sent reliably (using
sequence packets and ensuring packet delivery). Because the algorithm is calculated almost instantaneously, in order, and with a finite
time, updates are sent and received quickly, which increases convergence time.
Table 5-2 summarizes the contents of the topology table in Example 5-5.
- 146 -
CCNP Practical Studies: Routing
Now that R1 has established a relationship with R2, by maintaining a topology table, with all entries in a passive state, you can expect to
see remote IP routing entries. (Active means the remote entry is being recalculated.) Example 5-6 displays R1's IP routing table.
If you simulate a network failure by shutting down the network 131.108.15.0 on R2, Example 5-7 displays R1's new topology table.
- 147 -
CCNP Practical Studies: Routing
Example 5-7 does not display the remote entry 131.108.15.0/24, and, therefore, it is not present in the IP routing table. EIGRP maintains IP
routes by using DUAL and maintaining an EIGRP topology table. For remote entries with multiple routes, EIGRP uses the feasible
condition (FC) to determine the best path.
The EIGRP routing algorithm always chooses the path to a remote destination with the lowest metric. The topology table maintains all
paths to remote networks, so by simply viewing the topology table, you can discover the number of paths available and why EIGRP
chooses a certain path.
EIGRP supports the use of VLSM; all updates contain an entry for the subnet mask. To demonstrate this, modify the IP networks on R2,
and look at R1's topology table after you alter all the networks from Class C networks to a range of variable-length subnet masks (VLSM).
Example 5-8 displays R1's topology table after the networks on R2 have been changed.
- 148 -
CCNP Practical Studies: Routing
Example 5-8 displays a range of non-Class C networks, demonstrating the powerful use of VLSM with EIGRP. Example 5-9 displays the
new IP routing table for completeness.
- 149 -
CCNP Practical Studies: Routing
•
•
EIGRP traffic should not exceed the committed information rate (CIR).
•
EIGRP aggregated traffic over all virtual circuits should not exceed the access line speed.
The allocated bandwidth for EIGRP must be the same on each virtual circuit between two remote routers.
The use of the bandwidth command should reflect the true speed of any interface. The bandwidth command is used in EIGRP metric
calculation and defines the amount of bandwidth. (By default, up to 50 percent of any link can be consumed by EIGRP; this is also
configurable using the ip bandwidth-percent eigrp AS percent command.) EIGRP does not have any way of statically defined
neighboring, so you must ensure that EIGRP packets or updates are sent over a nonbroadcast network. The bandwidth command does not
always have to reflect the actual bandwidth of the interface. In fact, you can use the bandwidth command to adjust the composite EIGRP
metric so that you can perform equal-cost load balancing on unequal speed links. The IOS variance command provides another method for
achieving unequal load balancing.
Setting a variance value lets the Cisco IOS Software determine the feasibility of a potential route, even though the path might be over a
slower wide-area network (WAN) link.
The following two conditions are required before load balancing over unequal paths can take place:
•
•
The local best metric must be greater than the metric learned from the next router.
The multiplier times the local best metric for the destination must be greater than or equal to the metric through the next router.
To manually summarize networks, you must advertise the supernet, for example, on an interface level with the ip summary address eigrp
autonomous system mask command.
Re-examine Figure 5-1 and summarize the networks 131.108.8.0 to 131.108.15.255. First, you must disable automatic summarization on
R2. Example 5-10 displays the disabling of automatic summarization on R2.
Because the networks 131.108.8.0–131.108.15.0 are contiguous, you can apply the mask 255.255.248.0 to incorporate the range of
networks from 131.108.8.255–131.108.15.255.
Example 5-11 displays the summary command completed on R2's link to R1.
R1 should now have only one remote routing entry for the networks 131.108.8.255–131.108.15.255 as displayed in Example 5-12.
- 150 -
CCNP Practical Studies: Routing
To support large IP networks, you can use several Cisco IOS enhancements, such as network summarization, load balancing, and reducing
the load on WAN links with the bandwidth command, to fine-tune EIGRP. Several factors can contribute to a poorly designed network,
such as the amount of routing information exchanged between routers, the number of routers in your network, the network diameter of your
network (hop count in EIGRP is still 255), and the number of alternative paths between routers.
EIGRP can scale in a well-designed IP network, and with proper configuration, it can be well-maintained.
As with any legacy protocol, the used-by date of EIGRP is fast approaching, especially in today's large IP-based network. Open Shortest
Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS), and Border Gateway Protocol (BGP) are far more common routing
protocols.
In the following five scenarios, you configure and monitor some sample EIGRP networks and apply the knowledge you have gained.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and the abilities to use good
practice and define your end goal are important in any real-life design or solution.
Assume the core backbone network resides on the Ethernet between R1 and R2.
Figure 5-2 displays a network with seven routers in AS1 and one remote router in AS2.
- 151 -
CCNP Practical Studies: Routing
The IP address assignment for the WAN links is described in Table 5-3. Note the use of VLSM across the WAN Links.
Start by enabling EIGRP on all the routers in AS 1. Example 5-13 displays enabling EIGRP on R1. The same configuration commands are
applied to all routers in AS 1 because the same Class B network, 131.108.0.0, is in use.
Example 5-13 configures R1 with EIGRP in AS 1 and enables EIGRP updates to be sent and received on all interfaces configured with an
address in the range 131.108.0.0–131.108.255.255. To display the interface running EIGRP, issue the show ip eigrp interfaces command.
- 152 -
CCNP Practical Studies: Routing
Example 5-14 displays a number of physical (E0/0 and Se0/0) interfaces running EIGRP and a number of loopbacks numbered from 0 to
13. Also, note that you have EIGRP neighbors through E0/0 and S0/0. In other words, R1 has established a neighbor relationship to R2
through Ethernet 0/0 and R3 through S0/0.
Next, display the neighbors on R1 by using the show ip eigrp neighbors command on R1.
Two neighbors are formed with R1, namely R2 (131.108.1.2) and R3 (131.108.1.2).
- 153 -
CCNP Practical Studies: Routing
R1 has a dual path to three remote networks because the composite metric is the same. R1 has no path to the remote network on R8 in
EIGRP AS 2.
Next, configure EIGRP on R4 and R8 in AS 2. R4 resides in two autonomous systems: 1 and 2. The serial link between R4 and R8 contains
the network 168.131.2.0/30.
You should expect to see a neighbor between R4 and R8. Example 5-19 displays the EIGRP neighbors on R4.
- 154 -
CCNP Practical Studies: Routing
Router R4 resides in two different autonomous systems: 1 and 2. Hence, R4 has established EIGRP neighbors with routers in AS 1 and AS
2. Display the IP routing table on R8, and ensure connectivity to the rest of the network. Example 5-20 displays the IP routing table on R8.
R8 has no remote EIGRP entries because R4 is not redistributing IP networks from EIGRP AS 1 into 2. R4 must be configured for
redistribution because EIGRP does not automatically redistribute among different autonomous systems. (EIGRP and IGRP automatic
redistribution occurs only if the AS is the same.) If the routers in AS 1 want to send data to AS 2, R4 must provide two-way redistribution.
Example 5-21 displays the configuration of two-way redistribution between AS 1 and 2. The ? tool is used here to highlight the parameters
the Cisco IOS requires.
TIP
You must be careful when performing any redistribution to ensure that networks residing in one domain do not contain routes or subnets in
the redistributed domain. Route maps or distributed lists should always be applied to ensure routing loops do not occur.
- 155 -
CCNP Practical Studies: Routing
After you configure redistribution on R4, you can expect to see R8 with IP routing information from AS 1.
- 156 -
CCNP Practical Studies: Routing
R8 has an expanded IP routing table. Notice that all the networks from AS 1 are tagged as D EX, or external EIGRP, and the AD distance
is 170 (or less trusted than Internal EIGRP set at 90). Before you configure EIGRP to summarize wherever possible in Figure 5-2, here are
the full working configurations of all eight Cisco routers running EIGRP.
Take particular note of the shaded sections, such as the bandwidth statement used to match the wire speed between routers. The
bandwidth statement ensures proper calculation of the EIGRP composite metric and also ensures that EIGRP does not consume more than
50 percent of the bandwidth. By default, Cisco IOS routers set the bandwidth to 1544 kbps.
- 157 -
CCNP Practical Studies: Routing
- 158 -
CCNP Practical Studies: Routing
interface Loopback10
ip address 131.108.26.1 255.255.255.0
!
interface Loopback11
ip address 131.108.27.1 255.255.255.0
!
interface Loopback13
ip address 131.108.28.1 255.255.255.0
!
interface Loopback14
ip address 131.108.29.1 255.255.255.0
!
interface Loopback15
ip address 131.108.30.1 255.255.255.0
!
interface Loopback16
ip address 131.108.31.1 255.255.255.0
!
interface Ethernet0/0
ip address 131.108.1.2 255.255.255.0
!
interface Serial1/0
bandwidth 128
ip address 131.108.255.5 255.255.255.252
clockrate 128000
!
interface Serial1/1
shutdown
router eigrp 1
network 131.108.0.0
!
ip classless
!
line con 0
line aux 0
line vty 0 4
end
- 159 -
CCNP Practical Studies: Routing
interface Serial1
ip address 131.108.255.9 255.255.255.252
bandwidth 125
clockrate 125000
!
interface Serial2
ip address 131.108.255.13 255.255.255.252
bandwidth 125
clockrate 125000
!
interface Serial3
no ip address
shutdown
!
router eigrp 1
network 131.108.0.0
!
line con 0
line aux 0
line vty 0 4
end
Example 5-26 displays R4's full working configuration. R4 is redistributing between the two EIGRP autonomous systems, 1 and 2.
- 160 -
CCNP Practical Studies: Routing
line con 0
line aux 0
line vty 0 4
end
- 161 -
CCNP Practical Studies: Routing
Example 5-30 displays R8's full working configuration. R8 is running EIGRP in AS 2 only.
- 162 -
CCNP Practical Studies: Routing
Figure 5-3 displays the connected routes being advertised by R1 and R2.
The networks ranging from 131.108.1.0 to 131.108.31.255 reside on two routers; in other words, 31 subnets or IP routing entries populate
the routing tables in AS 1 and AS 2.
- 163 -
CCNP Practical Studies: Routing
R3 has 31 separate network entries for the ranges 131.108.1.0–131.108.31.255. You can clearly summarize the networks on R1 and R2 to
reduce the IP routing table. To summarize the EIGRP network, you apply the ip summary-address eigrp AS IP address mask command.
Example 5-32 displays the interface configuration required for summarizing the networks ranging 131.108.1.0–131.108.15.255. The subnet
mask covering this range is 255.255.240.0.
- 164 -
CCNP Practical Studies: Routing
R1(config-if)#ip summary-address ?
eigrp Enhanced Interior Gateway Routing Protocol (EIGRP)
R1(config-if)#ip summary-address eigrp ?
<1-65535> Autonomous system number
R1(config-if)#ip summary-address eigrp 1 ?
A.B.C.D IP address
R1(config-if)#ip summary-address eigrp 1 131.108.1.0 255.255.240.0
Next, display the IP routing table on R3. Example 5-33 displays the IP routing table on R3 after summarization is configured on R1.
- 165 -
CCNP Practical Studies: Routing
R3 still has the 15 network entries advertised through the next hop address 131.108.36.4, or R4, as well as the summary address
131.108.0.0/20. (This encompasses the range 131.108.1.0–131.108.15.255.) R3 has two paths to the remote router R1. Cisco EIGRP-
enabled routers always accept an incoming route with a more specific destination.
When you performed summarization, you configured only R1 to summarize to R3; you must also provide the same summary address to R2.
Example 5-34 configures summarization on R1 pointing to R2. The interface that R1 and R2 are adjacent to, namely Ethernet 0/0, is where
you need to apply the same summary command used in Example 5-32.
Before you look at R3's IP routing table, you must perform the same summary configuration on R2 because R2 has 15 directly contiguous
networks ranging from 131.108.16.0 to 131.108.31.255.
Example 5-35 displays the summary configuration on R2. Two summary commands are required: one to R1 through Ethernet 0/0 and
another to R4 through Serial 1/0.
R3's IP routing table has been significantly reduced from 31 network entries for the subnets ranging from 1 to 31 to two network entries.
Prior to summarization, there were 41 subnets; now only 12 subnets are present in the Class B network 131.108.0.0 in R3's routing table.
- 166 -
CCNP Practical Studies: Routing
Also, note that load balancing is in place to R2's directly connected loopbacks because the EIGRP metrics are the same through serial 0 and
Ethernet 0. Also, in turn, summarization reduces the EIGRP topology table. The added benefit of summarization is that a network failure
on any one network is not propagated to remote networks to which a summary route is sent.
Because R4 is directly connected to R2, there is only one path (lower metric) taken to R2's directly connected interfaces, while load
balancing is taking place for R1's directly connected networks.
Figure 5-4 displays the four-router topology along with the IP addressing scheme.
- 167 -
CCNP Practical Studies: Routing
Four routers in Figure 5-4 reside in the same AS, so you do not need to configure any redistribution. Also, the Class A addresses,
10.1.1.0/25 and 10.1.1.128/25, are configured on the Ethernet interfaces on R3 and R4, respectively. VLSM is used on all four routers.
The Class A address, 10.0.0.0/8, is reserved for private use and not routable in the Internet.
Enable EIGRP in AS 1 on all four routers. Example 5-40 displays the EIGRP configuration on routers R1 and R2. Both routers reside in
AS 1 and are connected to only the network 131.108.1.0, so the EIGRP configuration is the same on R1 and R2.
R3 and R4 require both 131.108.0.0 and 10.0.0.0 network statements, as displayed by Example 5-41.
View the IP routing table on R1 to ensure that all subnets are routable through R1. Example 5-42 displays R1's routing table.
R1's IP routing tables display a total of two dynamically learned EIGRP routers: one route to the network 131.108.1.20/30 (the serial link
between R2 and R4) and one to network remote network 10.0.0.0 through R3. Take a closer look at the remote IP network on R3. R3 is
- 168 -
CCNP Practical Studies: Routing
configured with the network 10.1.1.0/25, yet R1 assumes that the entire Class A network is available through Serial 0/0, or R3. Example 5-
43 displays R2's IP routing table.
R2 also has two remote EIGRP routes: one pointing to the remote network 131.108.1.20/30 (the serial link between R1 and R3) and the
entire Class A network 10.0.0.0 through R4. Therefore, Routers R1 and R2 do not contain more specific routing entries for the 10.0.0.0
network.
EIGRP, by default, automatically summarizes at the network boundary for any IP networks not locally configured. Because R1 and R2 do
not have any interfaces configured in the Class A address 10.0.0.0, both routers assume the default Class A mask of 255.0.0.0.
You can turn this feature off with the no auto-summary command under the EIGRP routing process. Disable automatic summarization on
R1 and R2. Example 5-44 displays the disabling of automatic summarization on R1 and R2.
R2(config)#router eigrp 1
R2(config-router)#no auto-summary
R1 still assumes the entire Class A network is through R3 because even after you disable automatic summarization, you must still
summarize on the edge routers: R3 and R4.
- 169 -
CCNP Practical Studies: Routing
EIGRP supports VLSM, and you have just seen how careful you must be when using EIGRP as your IP routing protocol. EIGRP supports
VLSM as all IP routing updates do, when configured appropriately, and sends the subnet mask along with the network information.
- 170 -
CCNP Practical Studies: Routing
- 171 -
CCNP Practical Studies: Routing
network 10.0.0.0
!
line con 0
line aux 0
line vty 0 4
!
end
- 172 -
CCNP Practical Studies: Routing
NOTE
The IGRP domain is configured with a Class C mask everywhere because IGRP does not support VLSM.
The Class B network, 131.108.0.0, is present on all routers. The Class A network resides in OSPF area 0. Finally, the Class B address,
141.108.0.0, is located in IGRP AS 10. R3 and R4 need to have redistribution configured among the different routing domains.
Router R3 needs to run EIGRP in AS 1 and IGRP 10. R3 must ensure that EIGRP updates are sent to interfaces E0 and Serial 0 only, and
because you are using the same Class B address, you must make the interfaces not in IGRP AS 10 passive. The same condition applies to
the IGRP process; you should also make interfaces not in IGRP 10 passive. There is no reason to send EIGRP updates, for example, to R7
and waste CPU and WAN bandwidth because R7 is configured for IGRP only. The classful behavior of IGRP and EIGRP means you must
be careful when using the same class network among different routing domains.
- 173 -
CCNP Practical Studies: Routing
R3(config)#router igrp 10
R3(config-router)#network 131.108.0.0
R3(config-router)#passive-interface ethernet 0
R3(config-router)#passive-interface serial 0
As yet, you have not configured any redistribution on R3. Configure redistribution between EIGRP and IGRP (both ways) on R3.
Example 5-55 displays how to configure redistribution from IGRP to EIGRP. Even though the metric used by IGRP and EIGRP is the
same, you must still advise EIGRP of the metric values because the AS numbers are different.
Next, examine R7's IP routing table to see whether the EIGRP networks are installed.
- 174 -
CCNP Practical Studies: Routing
R7 IGRP entries are only those networks that are classful or Class C because the directly connected serial interface to R3 is a Class C mask.
Those networks in the EIGRP domain that are not Class C networks, such as the Serial link between R1 and R2 (/30) or the Ethernet
segment between R3 and R4 (/25), are not present in R7's routing table.
You can use static routes on R7 to correctly identify the networks in the EIGRP domain. (You have yet to learn how to configure static
routes; static routes are covered in Chapters 6, "Basic Border Gateway Protocol.") Example 5-58 displays the static IP routing configuration
on R7 pointing to the remote networks 131.108.2.128/25 and 131.108.255.0/30 networks. The variably subnetted network,
131.108.2.128/25, is not present on R7's IP (IGRP) routing table because IGRP does not support VLSM. You can use static routes to
overcome this limitation because static router have a more trusted administrative distance of 1.
Example 5-59 displays R7's routing table along with some successful pings to the non-Class C networks.
Configure R4 for redistribution because R4 is attached to the EIGRP 1 domain and OSPF. Once more, you need to make any interfaces not
required in the EIGRP domain passive. Example 5-60 displays the redistribution from OSPF into EIGRP 1.
- 175 -
CCNP Practical Studies: Routing
Example 5-61 displays the redistribution from EIGRP into OSPF. Remember, EIGRP domains have subnetted networks, so you must apply
the keyword subnets when redistributing from EIGRP to OSPF.
View the IP routing table on R1 in EIGRP 1 to ensure that R1 has a path to every network in this topology.
R1 has an IP routing entry for all EIGRP networks in AS 1, as well as the external EIGRP network routing from OSPF and IGRP.
- 176 -
CCNP Practical Studies: Routing
Example 5-63 displays a ping request and reply from R1 to all the remote networks in Figure 5-5.
You have just configured a complex network with three different IP routing protocols and have successfully enabled network IP
connectivity among all routers.
- 177 -
CCNP Practical Studies: Routing
line aux 0
line vty 0 4
!
end
- 178 -
CCNP Practical Studies: Routing
router eigrp 1
redistribute igrp 10 metric 128 20000 255 1 255
passive-interface Serial2
network 131.108.0.0
!
router igrp 10
redistribute eigrp 1 metric 128 20000 255 1 1500
passive-interface Ethernet0
passive-interface Serial0
network 131.108.0.0
!
line con 0
line aux 0
line vty 0 4
end
- 179 -
CCNP Practical Studies: Routing
- 180 -
CCNP Practical Studies: Routing
This scenario uses the network in Figure 5-5 to demonstrate some common show commands that verify that EIGRP is operating correctly.
Properly using show and debug commands can be valuable, not only in the real-life networks you will come across but also on your
certification exams—particularly when you take the next step in your career and try for CCIE certification.
•
•
show ip eigrp neighbors— Displays EIGRP neighbors
•
show ip eigrp topology— Displays the topology table
•
show ip eigrp interfaces— Displays interfaces in which EIGRP is sent and received
show ip eigrp traffic— Displays the number of EIGRP packets sent and received
Example 5-70 displays the use of the show ip eigrp neighbor taken from R1.
NOTE
This scenario uses the network in Figure 5-5 (the one you configured in Scenario 5-4) to demonstrate these commands.
Example 5-70 shows that R1 has two remote EIGRP neighbors: one through Serial 0/0 and another through Ethernet 0/0. The EIGRP
process is also identified as 1.
Example 5-71 displays the topology table with the show ip eigrp topology command.
- 181 -
CCNP Practical Studies: Routing
The table in Example 5-71 contains a wealth of information. The P on the left side indicates that remote networks are passive and routable.
Any active entry (displayed as A) should concern you if any entries remain active or stuck in active (SIA). A remote entry in an active state
(SIA) results in a loss of network connectivity because EIGRP is querying the remote EIGRP neighbors about the path to the remote
network in question. Because a reply has not been received, the EIGRP topology table installs the remote network in an active state.
Example 5-72 displays sample output from R1 with the show ip eigrp interfaces command.
This command is extremely useful when you are trying to explain why neighbors are not adjacent. The output in Example 5-72 displays
two interfaces running EIGRP in AS 1 and one peer per interface, namely to R2 through Ethernet 0/0 and R3 through Serial 0/0.
Example 5-73 displays the output from the show ip eigrp traffic command.
The traffic commands summarize the number of hello packets R1 receives and sends. Traffic commands show how many updates, queries,
replies, and acknowledges R1 uses to ensure that EIGRP is running correctly and with adjacent EIGRP routers. With every version of IOS,
there are always new commands and changes in IOS displays. Use the ? tool to view all your options. Example 5-74 displays the debug
commands possible with EIGRP on Cisco IOS running version 12-0.10-enterprise code. You must be in privilege mode to view the debug
command set.
- 182 -
CCNP Practical Studies: Routing
For a comprehensive list of EIGRP commands, visit the Cisco web site for free information at www.cisco.com/univercd/home/home.htm.
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Configure the network in Figure 5-6 for EIGRP in autonomous system 1. Ensure that SanFran has all the remote entries being advertised by
Router Sydney and the router in the RIP domain. Summarize wherever possible to reduce the IP routing table on the Router SanFran.
All routers in this practical exercise use the same Class B network, namely 131.108.0.0/24.
The RIP network attached to Brussels shares the identical subnet in the EIGRP 1 domain. Therefore, to avoid a routing loop, any
redistribution you configure on the Router Sydney has to ensure that these networks are not propagated. To stop EIGRP updates from being
sent to the RIP domain, you must also use passive interfaces on Router Sydney. Likewise for RIP, you should make sure passive interfaces
are not running RIP. You use route maps to ensure that networks are not advertised incorrectly. You can also use distribute lists.
- 183 -
CCNP Practical Studies: Routing
For summarization, you can provide a summary in EIGRP AS 1 covering the networks 171.109.1.0–171.108.3.0 with the following
command:
Example 5-76 displays the configuration required on Router Sydney. To make the configuration a little more interesting, route maps have
been applied to redistribution on Router Sydney. Route maps are covered in more detail in Chapters 6 and 7, "Advanced BGP."
- 184 -
CCNP Practical Studies: Routing
Example 5-78 displays SanFran's IP routing table, which shows the remote RIP link and the summary address advertised by Router
Sydney.
- 185 -
CCNP Practical Studies: Routing
Review Questions
The following questions are based on material covered in this chapter. Examples 5-79 and 5-80 are from the previous Practical Exercise.
Refer to the examples to answer the first question.
The answers to these questions can be found in Appendix C, "Answers to Review Questions."
Example 5-79 displays the detailed paths to the three remote networks, 171.109.1.0, 171.109.2.0 and 171.109.3.0/24, as seen by Router
SanFran along with a successful ping to the remote networks.
- 186 -
CCNP Practical Studies: Routing
If you perform a show ip route to the network 171.109.4.0/24 on SanFran, you see the output displayed in Example 5-80.
The reason that subnet 4 is not included in the IP routing table is that the summary address configured on Router Sydney includes only the
subnets 1, 2, and 3.
1: Example 5-79 displays the IP routing table of the Router SanFran. Which networks does the entry 171.109.0.0/22 embrace?
4: Why does EIGRP need to be manually configured to redistribute into another autonomous system?
- 187 -
CCNP Practical Studies: Routing
Summary
Although EIGRP is not an industry standard across routing vendors, it is a potentially useful protocol for routing IP.
EIGRP terminology and the fundamental operation of EIGRP is covered in this chapter, along with some detailed configurations, showing
how EIGRP interacts with other classful and classless routing algorithms. Summarization is described to demonstrate the powerful nature
of EIGRP and its capability to take advantage of VLSM to optimize IP address space usage across small or large IP networks.
Table 5-4 summarizes the most useful commands from this chapter.
- 188 -
CCNP Practical Studies: Routing
This chapter covers the basics of Border Gateway Protocol (BGP). Chapter 7, "Advanced BGP," covers more advanced BGP topics and
scenarios. This chapter contains five practical scenarios to complete your understanding of basic BGP and to help you appreciate the
complexity of BGP.
BGP4 is defined in industry standard RFC 1771. BGP enables you to create an IP network free of routing loops among different
autonomous systems. An AS is a set of routers under the same administrative control.
BGP is called a path-vector protocol because BGP carries a sequence of AS numbers that indicate the path taken to a remote network. This
information is stored so that routing loops can be avoided.
BGP uses Transmission Control Protocol (TCP) as its Layer 4 protocol (TCP port number 179). No other routing protocol in use today
relies on TCP. This allows TCP to ensure that updates are sent reliably, leaving the routing protocol to concentrate on gathering
information about remote networks and ensuring a loop-free topology.
Routers configured for BGP are typically called BGP speakers, and any two BGP routers that form a BGP TCP sessions are called BGP
peers or BGP neighbors.
BGP peers exchange full BGP routing tables initially. After that, only BGP updates are sent between peers, ensuring that only useful data is
sent, unless a change occurs.
BGP4 uses the following four message types to ensure that peers are active and updates are sent:
•
•
Open messages— These messages are used when establishing BGP peers.
•
Keepalives— These messages are sent periodically to ensure that connections are still active or established.
•
Update messages— Any change that occurs, such as a loss of network availability, results in an update message.
Notification— These messages are used only to notify BGP peers of receiving errors.
•
•
BGP is termed a path vector protocol.
•
BGP uses TCP as the transport layer protocol.
•
Full routing tables are exchanged only during the initial BGP session.
•
Updates are sent over TCP port 179.
•
BGP sessions are maintained by keepalive messages.
•
Any network changes result in update messages.
•
BGP has its own BGP table. Any network entry must reside in the BGP table first.
•
BGP has a complex array of metrics, called attributes, which include the next hop address and origin.
BGP supports variable-length subnet masking (VLSM) and summarization (sometimes called classless interdomain routing
[CIDR]).
The capability of BGP4 to guarantee routing delivery and the complexity of the routing decision process ensure that BGP will be widely
used in any large IP routing environment, such as the Internet. The Internet consists of over 80,000 BGP network entries, and there is no
doubt that only BGP can handle such a complex routing table.
Before you look at some simple examples, the following section describes the BGP attributes.
- 189 -
CCNP Practical Studies: Routing
BGP Attributes
BGP has a number of complex attributes used to determine a path to a remote network. These attributes allow greater flexibility and enable
a complex routing decision to ensure that the path to a remote network is the best possible path.
The network designer can also manipulate these attributes. BGP, when supplied with multiple paths to a remote network, always chooses a
single path to a specific destination. (Load balancing is possible with static routes.) BGP always propagates the best path to any peers.
Table 6-1 describes the well-known and optional attributes used in BGP4.
• IGP indicates the remote path originated from within the AS. Typically, when the network command or
•
redistribution is configured, BGP installs the network with an origin set to IGP.
•
EBG means learned through an External Gateway Protocol.
Incomplete means the BGP route was discovered using redistribution or static routers.
AS_Path This attribute describes the sequence of autonomous systems that the packet has traversed.
Next Hop This attribute describes the next hop address taken to a remote path, typically the BGP peer.
Local This attribute indicates to the AS the preferred path to exit the AS. A higher local preference is always
Preference preferred.
MED Multiexit Discriminator informs BGP peers in other autonomous systems which path to take to a remote
network. A lower MED is always preferred.
Weight This Cisco-only attribute is used in local router selection. Weight is not sent to other BGP peers, and a higher
weight value is always preferred. The weight value is between 0–294967295.
Atomic This attribute advises BGP routers that aggregation has taken place and is not used in the router-selection
process.
Aggregator This is the router ID responsible for aggregation and is not used in the router-selection process.
Community Communities allow routes to be tagged for use with a group of routers sharing the same characteristics.
Originator ID This attribute is used to prevent routing loops. This information is not used for router selection.
Cluster-List This attribute is used in route-reflector environments. This information is not used for router selection.
Internal BGP (IBGP) and External BGP (EBGP) are the two types of BGP sessions. IBGP is a connection between two BGP speakers in
the same AS. EBGP is a connection between two BGP speakers in different autonomous systems.
Figure 6-1 displays a simple three-router BGP topology and the different BGP connection types: IBGP and EBGP.
- 190 -
CCNP Practical Studies: Routing
IBGP peers also make certain that routing loops cannot occur by ensuring that any routes sent to another AS are known through an interior
routing protocol, such as Open Shortest Path First (OSPF), before sending the route information. In other words, the routers must be
synchronized. The benefit of this additional rule in IBGP TCP sessions is that information is not sent unless the remote path is reachable,
which reduces any unnecessary traffic, and, therefore, saves bandwidth. You can disable this feature with the no synchronization
command, which is covered later in this chapter.
The BGP routing decision is quite complex and takes into account the attributes listed in Table 6-1.
Step 2. Prefer the route with the highest weight (Cisco IOS routers only).
Step 3. If the weight is the same, prefer the largest local preference attribute.
Step 4. If the local preference is the same, prefer the route this local router originated.
Step 6. If this is equal, prefer the route with the origin set to originated (through BGP); IGP is preferred to EGP followed by
incomplete.
Step 7. If the origin codes are the same, prefer the route with the lowest MED.
Step 10. Finally, if all paths are equal, prefer the path with lowest BGP router ID.
- 191 -
CCNP Practical Studies: Routing
Configuring BGP
To start BGP on a Cisco router, the following command is required:
You must be aware that the network command is not used in the same way you use it when you apply networks in OSPF or EIGRP. With
BGP, you use the network command to advertise networks that originate from the router and need to be advertised through BGP.
Next, you see how to configure IBGP and EBGP among the three routers in Figure 6-1. Example 6-1 displays the IBGP configuration on
R1 to R2.
Example 6-2 displays the IBGP configuration to R1 and EBGP configuration to R3.
At this stage, because no network statements have been applied, no BGP entries are on any routers. Use some loopback interfaces on R1
and advertise them through BGP to R2 and R3.
Example 6-4 displays the three new loopback addresses on R1, ranging from 131.108.2.0 to 131.108.4.0.
You must next advertise these loopbacks with the network command. Because these networks are local to R1 and present in R1's IP
routing table as connected routes, you can apply the network command as displayed in Example 6-5.
- 192 -
CCNP Practical Studies: Routing
Example 6-6 displays the BGP table on R1, using the command show ip bgp.
The BGP table on R1 displays three local networks (next hop is 0.0.0.0 or local interfaces). Example 6-6 also displays the path as i, or
advertised through BGP. The local router ID is 131.108.1.1.
R2's local router is 131.108.1.2, and it learns the remote loopbacks on R1 through the next hop address 131.108.1.1, or R1's Ethernet
interface. Notice that R2 has set the local preference to 100 (default value); the origin attribute is set to i or IGP.
Because R1 and R2 are running only IBGP and no other interior gateway protocol, R2's IP routing table does not have the BGP entries
inserted because of synchronization. Example 6-8 confirms this with only the locally connected routes visible on R2.
To enable BGP to insert the routes, you must disable synchronization or configure an IGP routing protocol. R2, in turn, does not propagate
the loopbacks to R3; therefore, R3 does not have any entries at all, either in the BGP table or IP routing table.
Disable synchronization on R1 and R2. Example 6-9 displays the no synchronization command on R1 and R2.
- 193 -
CCNP Practical Studies: Routing
R2(config)#router bgp 1
R2(config-router)#no synchronization
The three remote networks are inserted into the IP routing tables as BGP-learned networks.
Notice that the next hop address on R3 is R2. The AS path on R3 indicates that the remote networks, 131.108.2.0 to 131.108.4.0/24,
transverse autonomous system number 1, as displayed in the BGP table in Example 6-11.
The following five scenarios examine how BGP is configured and monitored and how BGP can use policy-based routing to change the
routing decision of any IP network using powerful tools, such as route maps and the changing the BGP attributes.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and the abilities to use good
practice and define your end goal are important in any real-life design or solution. Again, use loopback interfaces to help populate BGP
tables, and use back-to-back serial connections among Cisco routers.
- 194 -
CCNP Practical Studies: Routing
In this scenario, you configure BGP on four routers and ensure that all BGP peers have remote IP routing entries. R1 and R2 are running
OSPF across the Ethernet subnet 131.108.1.0/24. Also, notice that this network contains a potential routing loop, so you discover how BGP
helps you avoid loops.
Example 6-12 displays the OSPF configuration on R1; the loopbacks are placed in area 0.
- 195 -
CCNP Practical Studies: Routing
Next, enable IBGP between R1 and R2 and EBGP connections between R1/R3 and R2/R4.
Example 6-15 displays the IBGP configuration to R2 and the EBGP configuration to R3, both on R1.
Now that you have configured BGP4 (by default, BGP Version 4 is enabled on Cisco IOS routers), Example 6-16 displays R1's BGP table.
R1's BGP table has no information about the locally connected loopbacks 131.108.2.0, 131.108.3.0, or 131.108.4.0, and the only network
in the BGP table is the remote network 131.108.0.0 through R2.
You need to use the network command to configure the local interfaces. Example 6-17 displays the network configuration on R1.
The same network configuration is required on R2. Example 6-18 displays the network configuration on R2.
NOTE
Whenever you make BGP configuration changes on Cisco IOS routers, you must use the clear ip bgp * command to clear the TCP
sessions (* for all BGP TCP peers). You use the clear ip bgp ip–address-of-peer command to clear a specific BGP peer.
Example 6-19 displays the BGP table on R1 after the loopbacks on R1 and R2 are advertised through BGP.
- 196 -
CCNP Practical Studies: Routing
R1 has three local interfaces in BGP and three remote networks advertised by R2 (next hop address is 131.108.1.2). Also, notice that the
default weight on R1 is set to 32768 (for local networks), and the local preference is 100 for the remote networks. These settings are set by
default. You can change any BGP attribute, as you discover shortly.
The first entry in Example 6-19 displays the remote network 131.108.0.0 reachable through R2 (131.108.1.2). By default, BGP
automatically summarizes at the network boundary. To turn off this behavior, you apply the no auto-summary command. Example 6-20
displays this configuration completed on R1 and R2.
After clearing the BGP session to R2 with the clear ip bgp 131.108.1.2 command, you can expect the BGP table on R1 to contain only
specific network entries. Example 6-21 displays R1's BGP table.
One of the most important commands used in BGP networks is the IOS show ip bgp neighbor command, which displays the remote BGP
peers and their states. Example 6-22 displays the remote BGP peers on R1. Note that the information relates to the BGP peer to R2 and R3.
- 197 -
CCNP Practical Studies: Routing
The BGP neighbors on R1 are established to R2, but not to R3. You have yet to configure BGP on R3. Anything other than the keyword
established between two BGP indicates a problem. The possible BGP states are as follows:
- 198 -
CCNP Practical Studies: Routing
•
•
Idle— BGP is waiting for a starting event, which is initiated by an operator of BGP, such as clearing the BGP peers.
•
Connect— BGP is waiting for the TCP connection to be completed.
•
Active— BGP is trying to acquire a remote peer by initiating a new TCP connection.
•
OpenSent— BGP is waiting for an open message from the remote peer.
•
OpenConfirm— BGP is waiting for a keepalive message.
Established— After a keepalive message is sent, this is the final stage of BGP peer negotiation during which both peers
exchange their BGP tables.
Next, you enable EBGP between R1 and R3. Example 6-23 displays the BGP configuration on R3, along with the network statement, so
that R3 advertises the network 141.108.1.0/24 as originating from AS 3. Also, note the EBGP connection between R3 (AS 3) and R4 (AS
2).
The BGP peers on R1 are displayed in Example 6-24 (truncated for clarity).
R1 has two established peers: one IBGP peer to R2, and an EBGP peer to R3.
- 199 -
CCNP Practical Studies: Routing
The show ip bgp summary command is a useful command that summarizes all BGP peers. Example 6-26 displays the BGP peers on R4 in
a summarized format.
Table 6-2 summarizes the descriptions and field definition, as displayed by the IOS show ip bgp summary command.
- 200 -
CCNP Practical Studies: Routing
Next, view some IP routing tables to ensure that you are routing IP. Example 6-27 displays R3's IP routing table.
R3 has a full set of BGP routes for all BGP AS networks. To view more information about how the BGP entries were learned, view the
BGP table with the show ip bgp command. Example 6-28 displays R3's BGP table.
- 201 -
CCNP Practical Studies: Routing
A lot of information is stored here. Start by analyzing why the remote network 131.108.1.0 has a dual path and why the next hop address
13.108.255.5, or the link to R1, is preferred as the path through R4. BGP does not load balance and always chooses one path. (Static routes
can be used to change this behavior.) R3 chooses the path through the serial link to R1 because the BGP algorithm decision is based on 10
parameters and because the first four are the same (next hop reachable, weight equal, local preference the same, not originated by local
router). The next decision is based on the path with the shortest AS path. The path to R1 is through one AS path only as opposed by two AS
paths to R4. Because weight has a higher preference than AS path, change the weight on R3 to prefer the path through R4.
Example 6-29 displays how to use the neighbor command to set all entries advertised through R4 to a weight value of 1 so that the
network advertised by R4 has a higher weight value for the network 131.108.1.0/24 only. (There are many ways to accomplish this task.)
Example 6-30 displays the BGP table on R3 after the configuration change.
The change is not implemented because you must first clear the BGP peer session. Clear the BGP TCP peer session on R3 to R4 with the
clear ip bgp 131.108.255.10 command. Example 6-31 displays the BGP table on R3 after the BGP TCP peer is established again.
- 202 -
CCNP Practical Studies: Routing
Even though the path to the remote network 131.108.1.0/24 through R1 has a shorter AS path (through AS 1 only) because weight has a
higher preference than AS path in the BGP routing decision, the path to 131.108.1.0/24 is now preferred through R4 (weight is 1) as
opposed to the link through R1. All entries advertised through the next hop address 131.108.255.10, or R4, have the weight value set to 1.
You have successfully configured a four-router topology with BGP4. Provided here for your reference are the four configurations on the
Routers R1 through R4.
- 203 -
CCNP Practical Studies: Routing
- 204 -
CCNP Practical Studies: Routing
- 205 -
CCNP Practical Studies: Routing
line aux 0
line vty 0 4
end
BGP chooses only one path to a remote network. To achieve any form of load balancing of two or more network paths, you can use static
routes to the remote peer address.
Enable BGP on R1 and configure the network command to advertise the Ethernet IP network 131.108.1.0/24. Because you are running
EBGP, synchronization is not an issue in this network. Also, to achieve load balancing, you need to peer the BGP neighbors using the
Ethernet IP addresses. In the case of R1, the next hop peer address is 161.108.1.1/24, and in the case of R2, the peer address is
131.108.1.1/24.
With BGP, if the next hop address in EBGP is not used, such as in this scenario in which you want to achieve load balancing, you must
enable EBGP multihop so that the EBGP peer is established. The IOS command to enable EBGP multihop is neighbor peer address ebgp-
multihop. Also, because the next hop address is not a directly connected address, BGP needs to advertise the update source IP address to
EBGP. In the case of R1, it is 131.108.1.1 (Ethernet 0/0), and in the case of R2, it is 161.108.1.0/24 (Ethernet 0/0).
- 206 -
CCNP Practical Studies: Routing
Now that R1 and R2 are configured with EBGP, ensure that BGP peer sessions are up with the show ip bgp neighbor command. Example
6-38 displays the peers on R1.
R1 has no peer relationship to R2. To discover why, display the IP routing table on R1. Example 6-39 displays R1's IP routing table.
R1 does not have any entries for the remote network 161.108.1.0/24 and thereby cannot establish a TCP session to R2. Configure two static
routes on R1 pointing to the remote network through Serial 0/0 and Serial 0/1.
To ensure that R2 can route to the remote network 131.108.1.0, install two static routes pointing to R1 over Serial 1/0 and Serial 1/1.
Example 6-41 displays the IP static route configuration on R2.
The BGP peers on R1 display the established peer to R1. Example 6-42 shows a truncated display of the peer with R2.
- 207 -
CCNP Practical Studies: Routing
Ensure that load balancing is taking place by pinging the remote network 161.108.1.1/24 from R1. Turn on debug ip packet, so you can
see on which outbound interface the ping request is sent. Example 6-43 shows the ping request after the debug ip packet command is
enabled. This command enables you to view where IP packets are sent to and received from.
You can see from Example 6-43 that the first ping request is sent through Serial 0/0 and the reply is received through Serial 0/0. The
second ping request is sent through Serial 0/1, and the reply is received through Serial 0/1; therefore, load balancing is occurring. It is
important to note that BGP still only sends packets through one path, but because IP at Layer 3 is load balancing, in effect you are load
balancing BGP by using static routes.
Example 6-44 displays the full working configuration of R1. Take note of the shaded sections, which contain the critical commands used to
achieve load balancing between R1 and R2.
- 208 -
CCNP Practical Studies: Routing
- 209 -
CCNP Practical Studies: Routing
•
•
To control traffic flow direction either by source or destination address
•
To change the next hop address
To change the way traffic is sent to a neighboring router
The advantages of using policy routing is the ability to load share to provide high-quality service and cost saving, based on data traffic, for
expensive links.
Figure 6-4 displays the same two-router network used in Scenario 6-3, except this time you configure two EBGP sessions between R1 and
R2 and use BGP to route dynamically without static routing.
- 210 -
CCNP Practical Studies: Routing
Configure two EBGP TCP sessions between R1 and R2. Example 6-46 displays the EBGP configuration on R1. (Notice, you don't need
EBGP multihop because you are using a directly connected peer.)
Example 6-48 displays the IP BGP table on R1 after the two BGP sessions are established.
Example 6-48 displays R1 choosing the path through the next hop address. 131.108.255.2. to reach the remote network 161.108.1.0/24
because BGP does not load balance as you discovered in Scenario 6-2. The path is chosen through 131.108.255.2 because of its lower IP
addresses; all other parameters that BGP bases decisions on are equal in this case. Assume that all traffic from the Ethernet segment on R1
- 211 -
CCNP Practical Studies: Routing
bound for 161.108.1.0 must be sent through the next hop address 131.108.255.6, or Serial 1/1, and all traffic destined for the Internet is sent
through Serial 1/0.
You can force BGP to complete this task by using policy-based routing or changing BGP attributes. But, suppose you want to send internal
traffic through one path and all Internet traffic through the second link. Next, you learn to configure policy-based routing to illustrate how
you can use route maps to achieve this.
To illustrate policy-based routing, configure R1 to choose a different next hop address for IP ICMP packets destined for the remote
network 161.108.1.0 (Serial 1/1) than for all other destinations (for example, Internet-based traffic), which will be through the second link
(Serial 1/0).
Policy routing is based on incoming packets only, so you need to apply the policy command on the Ethernet interface on R1.
Example 6-49 displays the configuration on R2 so that it sends a default BGP route to R1. Two default statements are configured for
redundancy purposes.
Example 6-50 displays the BGP default route in R1's BGP table.
Example 6-50 tells you that R1 is choosing all traffic through the next hop address 131.108.255.2. Example 6-51 confirms this when you
view the IP routing table on R1.
Policy routing needs to be configured on R1 to ensure that IP ICMP packets destined for the remote network 161.108.1.0/24 are sent
through the next hop address 131.108.255.6 and all other traffic is sent through 131.108.1.1 (Serial 1/0 to R2).
To configure policy routing, you apply the policy statement on the outbound interface and reference a route map. The IOS command is ip
policy route-map route-map-name.
- 212 -
CCNP Practical Studies: Routing
Example 6-52 displays the policy routing interface configuration on R1. The route map name is an arbitrary name you can assign. This
example assigns a route map called nondefault.
Next, you must set the conditions on R1 so that policy routing can occur. Example 6-53 sets all IP ICMP traffic from the Ethernet segment
on R1 destined for 161.108.1.0/24 through Serial 1/1 (next hop address 131.108.255.6) and all default traffic through Serial 1/0 (next hop
address 131.108.255.1). Remember that BGP, as displayed in Example 6-50, is sending all traffic through Serial 1/0 on R1. Example 6-52
uses the ? tool to illustrate the options available to you.
The route map on R1 policy routes any IP ICMP packets with a source address in the range 131.108.1.1–131.108.1.255 through the next
hop address 131.108.255.6.
Unfortunately, you cannot verify policy routing with the IP routing table. Example 6-54 displays R1's IP routing table.
Example 6-54 stills displays that all remote networks are routed through 131.108.255.2, or Serial 1/0.
An extended ping request along with a debug ip policy on R1 displays any policy routing.
Example 6-55 displays an extended ping using the source address 131.108.1.1 (R1's Ethernet interface) to the remote network
161.108.1.0/4.
- 213 -
CCNP Practical Studies: Routing
Example 6-55 displays the five ping requests successfully policy routed through Serial 1/1, or the next hop address 131.108.255.6.
Example 6-56 displays a ping request to the unknown network 141.108.1.1 on R1 and the subsequent policy debug output.
- 214 -
CCNP Practical Studies: Routing
R1 sends all packets to an unknown destination through normal forwarding through Serial 1/0. The debug output in Example 6-56 displays
a nonmatching policy; hence, the IP datagram is forwarded through the normal outbound interface.
This simple scenario demonstrates the powerful use of policy-based routing on source and destination addresses. With the use of extended
access lists, you can also base routing on port numbers. For example, you can do this if you want Telnet sessions to go through one
interface or another.
Configure R1 to send all Telnet traffic originated from the network 131.108.1.0/24 through the next hop interface 131.108.255.6.
Example 6-57 displays the access-list configuration to allow Telnet sessions through Serial 1/1.
- 215 -
CCNP Practical Studies: Routing
Example 6-58 displays a sample debug output when you telnet to 161.108.1.1 from R1 using the source address of 131.108.1.1. R2 has no
login on vty 0 4 lines; therefore, when you telnet from R1 to R2, you are immediately placed at the R2 prompt.
Because a policy is matched on access list 100, R1 sends all Telnet traffic through Serial 1/1.
- 216 -
CCNP Practical Studies: Routing
In this scenario, you configure a well-known BGP community and discover the advantages of peer groups.
NOTE
The community attribute is a number defined in the range 1 to 4,294,967,200. The IOS set community community-number [additive]
command is used to define a value. Some well-known community attributes, such as no-export (do not advertise to EBGP peers) and no-
advertise (do not advertise this route to any peer), can substitute for community-number.
The no export community attribute advises a BGP router carrying this attribute that the route advertised should not be advertised to any
peers outside the AS.
The no advertise community attribute advises a BGP router carrying this attribute that the route advertised should not be advertised to any
peers.
To apply the community attribute to a remote BGP neighbor, use the neighbor command:
Figure 6-5 displays a simple four-router topology, including an Internet connection on R1 and R2. R1 peers to an EBGP peer with the IP
address 141.199.1.1 (Remote AS 1001), and R2 peers to an EBGP peer with the IP address 151.100.1.1 (Remote AS 1002). Typically,
- 217 -
CCNP Practical Studies: Routing
large companies have more than one Internet connection, so to ensure that R1 and R2 are not the transit paths for any ISP-based traffic, you
set the community attribute (well-known) no-export on R1 and R2.
R1 is configured for EBGP and IBGP. The EBGP connection to the remote peer address, 141.199.1.1, is the Internet gateway. Therefore,
you must send the 6community to the remote peer and apply an outbound route map, so the Internet routers do not use R1 as a transit path.
You have yet to apply the route map named setcommunity (arbitrary name). Example 6-62 displays the route map configuration on R1.
Apply the well-known community no-export, which informs the neighboring router not to use R1 for any traffic not destined for the
network 131.108.0.0/16.
- 218 -
CCNP Practical Studies: Routing
Notice that the ? tool displays all the community variations, including a community number and the two other well-known community
values: local-AS and no-advertise.
You must ensure that the ISP connected to R2 does not use R2 as a transit path. Example 6-63 configures R2 to ensure that the ISP is not
using the network of Routers R1–R4 as a transit path.
The route map name is the same as the name used on R1 because route map names are locally significant on Cisco routers.
Next, configure the four routers, R1–R4, for IBGP, and set the same policies on all four routers. Assume the network designer has asked
you to ensure that R1 does not receive any default routes from R2, R3, or R4. Also set the next-hop-self attribute on all IBGP peer
sessions. Ensure that R1 sets the community to the value 2000.
For a small network such as this, the configuration on R1 can grow quite large. Take advantage of peer groups and configure one policy,
and apply that policy on R1 to all three remote routers (R2, R3, and R4).
Example 6-64 configures R1 for IBGP to R2 only, sets the next-hop-self attribute (no defaults routes permitted), sends the community
value of 2000, and sets the weight to 1000.
To configure R1 to set the same attributes and conditions to R3 and R4, you need to complete the same set of IOS commands (seven IOS
commands in total) and have different route maps and access lists. Clearly with a large network, this is not scalable.
To create a BGP peer group, use the neighbor peer-group command, beginning in router configuration mode. Example 6-65 creates a peer
group on R1 named internal; again, the name is an arbitrary name.
You must then assign the options, such as the weight and community value, to the peer groups. Example 6-66 displays all the available
options you can assign to a peer group.
- 219 -
CCNP Practical Studies: Routing
The shaded sections in Example 6-66 contain the options you set. Example 6-67 displays the setting of a distribution list to stop a default
route from being accepted on R1, advertising the next-hop-self attribute, setting the remote AS number to 1 (same on all IBGP peers), and
ensuring that community 2000 is sent to R2, R3, and R4.
Finally, apply these settings to all the remote peers. Example 6-68 shows how to make R2, R3, and R4 members of the peer group called
internal.
Example 6-68 Making R2, R3, and R4 Members of the Peer Group Internal
router bgp 1
neighbor 131.108.1.2 peer-group internal
neighbor 131.108.255.6 peer-group internal
neighbor 131.108.255.14 peer-group internal
R1 has defined three remote IBGP peers with one statement that sets all the parameters defined by the peer group internal. You can
configure BGP peers to override configuration options if required. The beauty of using peer groups is that you can add more BGP peers by
using only one command. This scales much better than configuring a multitude of IOS commands on several routers. Chapter 7 describes
two other main methods used in BGP networks to scale in large networks, namely route reflectors (you might notice this network is fully
meshed, that is, every BGP routers has a peer to each other) and confederations.
Example 6-69 displays the full working configuration on R1. Take note of the shaded sections that configure R1 to set local-based policies
to all three IBGP peers. Peer groups can also be applied to EBGP peers and are commonly used in large ISP networks in which many
thousands of customers might have Internet connections.
- 220 -
CCNP Practical Studies: Routing
Example 6-70 displays the full working configuration on R2. Notice R2 is not configured for peer groups.
- 221 -
CCNP Practical Studies: Routing
Example 6-71 displays the full working configuration on R3. Notice R3 is not configured for peer groups.
- 222 -
CCNP Practical Studies: Routing
set weight 1
!
route-map setweight permit 20
match ip address 2
!
line con 0
line aux 0
line vty 0 4
end
Example 6-72 displays the full working configuration on R4. Notice R4 is not configured for peer groups.
Refer to Figure 6-4 and the BGP topology to see how to use some common show commands to verify that BGP is operating correctly.
Show and debug commands can be valuable, not only in the real-life networks you come across, but also during your certification exams.
- 223 -
CCNP Practical Studies: Routing
•
•
show ip bgp summary— Displays BGP neighbors in summary mode
•
show ip bgp— Displays the BGP topology table
•
clear ip bgp *— Clears all BGP TCP sessions
•
show tcp brief— Displays all TCP sessions (BGP uses TCP)
debug ip bgp events— Displays any BGP events, such as neighbor state changes
Example 6-73 displays a sample output taken from R1 in Figure 6-4 using the IOS show ip bgp summary command.
Example 6-73 displays a lot of useful information, including the local router identifier 131.108.255.13, the local AS of 1, and the BGP table
version of 11. (An increasing version number indicates a network change is occurring; if no changes occur, this number remains the same.)
It also shows six network paths on R1, using 854 bytes of memory.
Memory is important in BGP because in a large network, such as the Internet, memory can be a limiting factor. As more BGP entries
populate the IP routing table, more memory is required. Example 6-73 displays four configured remote peers: the first three are IBGP
(because the AS is 1 and the same as the local AS) and one remote peer that has never been active. (The output indicates an idle session,
and the up/down time displays this connection was never established.)
The BGP table is one that confuses most people. Most engineers are familiar with a standard Cisco IOS IP routing table and mistakenly
apply the same principles to the BGP table. The BGP table is not an IP routing table. The BGP table displays information, such as remote
and local network entries, BGP attributes, and selected paths. Entries are then inserted into the IP routing table.
Example 6-74 displays the BGP table on R1 in Figure 6-4. Notice the show ip bgp command can be performed in executive mode.
Again, the BGP table version is displayed as 11 and the local router ID is 131.108.255.13. The various networks are listed along with the
next hop address, metric (MED), local preference (Locpref), weight, and the path. The i on the left side (part of the status codes) indicates
an internal BGP route and the i on the right side of Example 6-74 indicates the origin. (i is for IGP, part of the origin codes.)
- 224 -
CCNP Practical Studies: Routing
If a BGP configuration change is completed on Cisco IOS routers, the BGP peer session must be cleared. The command to clear all
sessions is clear ip bgp *. To clear a single peer router, use the clear ip bgp peer-ip-address command.
Example 6-75 clears all BGP sessions on R1 after a configuration change to set all IBGP peer localpref attributes to 1000, instead of the
default value of 100.
Example 6-75 displays the BGP table after the change is configured and you clear all BGP peers sessions on R1.
The ? tool displays a number of options, including clearing BGP sessions based on AS numbers or remote peer address. On Cisco IOS
routers, you must clear the BGP sessions if you want a change to take place because BGP does not update changes after a BGP session is
established. You can, however, configure soft configurations with the neighbor peer address soft-reconfiguration inbound command,
which enables you to make changes and not have to clear the TCP peer, resulting in no downtime.
Example 6-76 displays the output from the show tcp brief command on R1.
Router R1, as displayed in Example 6-76, has three TCP sessions in an established state. The TCP port numbers are also listed. This
command is useful because you need to be certain that TCP is active at Layer 4 of the OSI model when troubleshooting to discover why
two BGP peers are not sending updates, for example. The foreign addresses list the TCP port as 179, and the local address is a number TCP
generates. This tells you that R1 has three TCP sessions active, and you can expect BGP to send updates and keepalives across each TCP
session.
Debugging BGP is useful. The most widely used tool when establishing why BGP is or is not peering is the debug ip bgp events
command. Next, clear all BGP sessions on R1 with this debug command turned on to discover the session you activated.
Example 6-77 displays the sample output taken from R1 when the BGP sessions are cleared for demonstration purposes. You would never
use this command during normal working hours, because BGP loses peering to any remote peers. Also, notice that the clear and debug
commands are performed in privileged mode.
- 225 -
CCNP Practical Studies: Routing
The sample output from Example 6-77 displays the BGP session's teardown state (reset by user) and the re-establishing of TCP sessions to
the three peers: 131.108.255.14, 131.108.255.14, and 131.108.1.2. After the sessions are active, only changes are sent across the TCP
peers. You can view keepalives with the debug ip bgp keepalives command. Example 6-78 displays a sample output taken from R1 after
the TCP peers are established.
R1 is sending and receiving keepalives to the three remote peers to ensure that the remote routers are still active. Assume that R1 is
reloaded.
- 226 -
CCNP Practical Studies: Routing
If you display the TCP sessions now, you will discover three TCP sessions using a new local TCP port number because the sessions have
been re-established and a new random local TCP port number has been chosen by TCP.
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Using the IP addressing scheme provided and BGP4 as your routing protocol, configure the network in Figure 6-6 for IP routing. Ensure
that both Routers R1 and R2 have full connectivity to each other. Use the ping command to ensure that all networks are reachable. You
must use BGP4 as your dynamic routing protocol. Ensure that all routes received by R2 are tagged as follows:
•
•
All even routes have weight set to 100.
•
All odd routes have weight set to 200.
•
All even routes have MED set to 100.
All odd routes have MED set to 200.
- 227 -
CCNP Practical Studies: Routing
You will notice that all the IP addressing schemes are /24, except for the serial link between R1 and R2. The serial link contains a mask,
255.255.255.252 or /30. BGP has no issues with VLSM. The 16 loopbacks on R1 are advertised to R2 using the redistribute connected
command. The no-auto summary command ensures that R2 sees all 16 individual routes. The access list on R2 must be set with a mask of
0.0.254.255, or all even networks match these criteria. The dual-path connections between R1 and R2 allow redundancy. There are two
EBGP sessions between R1 and R2; therefore, the route map on R2 is applied to both EBGP peers in case of link failure.
Examples 6-80 and 6-81 display the full working configuration on R1 and R2, respectively. Take note of the shaded sections, as they
contain critical IOS commands that ensure the desired solution is achieved.
- 228 -
CCNP Practical Studies: Routing
- 229 -
CCNP Practical Studies: Routing
router bgp 2
network 161.108.1.0 mask 255.255.255.0
neighbor 131.108.255.1 remote-as 1
neighbor 131.108.255.1 route-map setweight in
neighbor 131.108.255.5 remote-as 1
neighbor 131.108.255.5 route-map setweight in
no auto-summary
!
access-list 1 permit 131.108.0.0 0.0.254.0
!
route-map setweight permit 10
match ip address 1
set local-preference 100
set weight 100
!
route-map setweight permit 20
set local-preference 200
set weight 200
!
line con 0
line aux 0
line vty 0 4
!
end
Review Questions
The following questions are based on material covered in this chapter. The answers to these question can be found in Appendix C,
"Answers to Review Questions."
3: Example 6-82 displays the output from the show tcp brief command. How many BGP sessions are in use?
Use Example 6-83 to answer questions 4-6. Example 6-83 displays the BGP table on a Cisco BGP router.
- 230 -
CCNP Practical Studies: Routing
6: What is the metric and local preference for the remote network 131.108.101.0/24?
7: Example 6-84 displays the output from the show ip bgp summary command for a Cisco BGP-enabled router. What is the BGP
autonomous system that R2 resides in? How many BGP sessions are active, and what version of BGP is configured on the router
named R2?
8: On a Cisco router, what value is preferred, higher or lower weight, and what is the range of values for weight?
Summary
You can now begin to apply this knowledge to the more complex scenarios found in the next chapter. You learned how to successfully
configure IBGP and EBGP, along with techniques used to load balance BGP using static routes. The BGP principles presented in this
chapter's Practical Exercise will benefit you in the next chapter's advanced BGP scenarios.
- 231 -
CCNP Practical Studies: Routing
BGP is a routing protocol designed for use in large IP networks. The five practical scenarios in this chapter complete your understanding
and ensure that you have advanced BGP networking knowledge to complement your understanding of today's most widely used
networking protocol, IP.
Consider a network consisting of 100 routers. Having this many routers leads to a large number of TCP BGP peers. In fact, you can easily
calculate the number of peers by using the formula n(n-1)/2, where n is the number of BGP routers.
NOTE
To avoid routing loops, BGP only propagates updates learned from IBGP connections to other IBGP sessions that are fully meshed. Fully
meshed networks contain a BGP peer to every BGP speaker in the network.
For a 100-router network, there are 100(100-1)/2 = 100(99)/2 = 4950 TCP peers.
IBGP works well in small networks, and as the network grows even to just 100 routers, the scalability and administration of BGP becomes
a task you must carefully consider.
•
•
Route reflectors
Confederations (advanced form of route reflectors; confederations are beyond the scope of this chapter.)
Route reflectors are used to address the scalability issues in large IBGP networks. A route reflector is a BGP router configured to forward
routing updates to BGP peers within the same autonomous system (AS). Route reflectors are not used in External BGP (EBGP) sessions.
- 233 -
CCNP Practical Studies: Routing
The number of IBGP sessions required to maintain full connectivity in the network in Figure 7-1 is 4(3)/2 = 6 IBGP sessions.
By using route reflectors, you can reduce the number of IBGP sessions from six to three (a 50 percent reduction). Figure 7-2 displays R1
reflecting (route reflector) BGP routing information to R2, R3, and R4.
Similarly, for a network consisting of 100 routers, instead of 4950 IBGP TCP sessions (fully meshed), using route reflectors can reduce this
number to 99 IBGP sessions (a 98 percent reduction).
In reality, what happens is that a router or routers running BGP become the focal point for disseminating routing information, and these
routers are called route reflectors. The routers on the edge are termed the router reflector clients (or just clients).
- 234 -
CCNP Practical Studies: Routing
The level of complexity, manageability, and scalability concerns in a large BGP network can be overcome by specifying a core router(s),
also known as a route reflector, to perform core routing functions, such as routing updates to all edge routers. Route reflectors reduce the
need to configure IBGP (full-mesh) large networks.
TIP
Cluster is a term used to describe a route reflector and the clients. For example, the four routers in Figure 7-2 form a BGP cluster.
Confederations are another way of dealing with the explosion of an IBGP network and are typically used in networks that contain
thousands of IBGP peers. The concept of confederations is based on multiple subautonomous systems.
•
•
Route reflector configuration is enabled only on the route reflector; clients are configured normally as IBGP peers.
•
The usual BGP routing algorithm is applied to all BGP routes to ensure a loop-free topology.
•
Route reflectors preserve all BGP attributes.
•
Updates are sent from the route reflector to all clients.
•
Clients receive all updates from the route reflector only.
•
In any cluster, there must be at least one route reflector.
•
Nonclients (not part of a cluster) must still be fully meshed to maintain full connectivity.
All updates contain the originator-ID attribute, which ensures a loop-free topology, in which the route reflector ignores any
update it receives with its own originator-ID.
Next, configure the four routers in Figure 7-2 for route reflectors with R1 configured as the route reflector.
Example 7-1 displays the configuration on R1, which is configured as the route reflector, to R2 (peer address 131.108.2.2), R3 (peer
address (131.108.3.2), and R4 (peer address 131.108.4.2).
Example 7-1 displays the route reflector IOS command pointing to R2, R3, and R4. Also, whenever you configure route reflectors, you
must still configure the IBGP session indicating the IBGP peer to R2, R3, and R4. Hence, R1 is configured as an IBGP peer to all clients,
as you would normally configure an IBGP network.
- 235 -
CCNP Practical Studies: Routing
•
•
Addressing of scalability issues
•
Enables a hierarchical design
•
Reduces the number of TCP peers and, therefore, the amount of traffic across WAN circuits
•
Fast convergence in propagation of information
Provides easier troubleshooting as the information is typically sent from one source
Filtering is vital to any large BGP network, and to allow the network designer flexibility, BGP can be filtered using the following methods:
•
•
Access lists— Used when configuring route maps and filtering networks based on IP networks using filter-based lists
•
Distribute lists— Filter incoming or outgoing IP networks
Prefix lists— Filter information based on the prefix of any address, for example, all networks starting with 131.108.0.0
Prefix lists are a new and a more efficient way of identifying routes for matching and filtering BGP information. Prefix lists are efficient
because BGP routers perform lookups on only the prefix (beginning) address and can make faster routing decisions. For example, you
might want to accept all networks in the range 4.0.0.0 to 4.255.255.255 and reject all other networks. In this case, a prefix list accomplishes
this task efficiently and easily.
To apply a prefix list to a BGP peer, the following IOS command syntax is required:
To verify prefix list configuration, use the show ip prefix-list command in exec mode.
Table 7-1 displays some common prefix list examples used in today's large BGP networks.
Table 7-1. Prefix List Examples Using the Prefix Name CCNP
Filtering required Example IOS command
Deny default routes ip prefix-list ccnp deny 0.0.0.0/0
Permit a default route ip prefix-list ccnp permit 0.0.0.0/0
Permit exact prefix 30.0.0.0/8 ip prefix-list ccnp permit 30.0.0.0/8
Deny mask lengths greater than 25 bits in routes with a prefix of 131/8 ip prefix-list ccnp deny 131.0.0.0/8 ge 25
Permit mask lengths from 8 to 24 bits in all address spaces ip prefix-list ccnp permit 0.0.0.0/0 ge 8 le 24
This presents a problem because, in practice, two or more connections provide the same BGP routing information, and the BGP network
designer must ensure that the ISPs do not use the company's network as a transit, specific routing information is not received through their
Internet connection, and only a default route is accepted. Remember, routing involves knowing only the next hop and not the full path to a
remote destination; as long as a next hop router exists, traffic transverses the Internet.
It is not uncommon to accept a full BGP routing table, but in practice, this has little or no value because all traffic to a default route is sent
through the ISP connection.
- 236 -
CCNP Practical Studies: Routing
Another primary concern of a multihomed connection is redistributing interior routing protocols into BGP. You can use three basic
methods to accomplish this task:
•
•
network command— As you saw in Chapter 6, the network command enables you to advertise networks to other BGP routers.
redistribution command— To avoid routing loops, you must be careful when you configure redistribution from one interior
protocol to and from BGP . Route maps are typically used to ensure that only the correct networks are sent to the ISP and vice
•
versa.
Static routes— Typically, static routes are used to send all traffic to unknown destinations through the ISP connection. The ISP,
on the other hand, has the network in the BGP table, so traffic from the Internet can be directed to the correct outgoing interface.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and the ability to use good
practice and define your end goal are important in any real-life design or solution.
The five scenarios presented in this chapter are based on complex BGP technologies so that you become fully aware of the powerful nature
of BGP in large IP networks.
Figure 7-3 displays a simple four-router topology in AS 333. Also, notice that the Class B address 131.1.08.0.0 is used throughout this
network. Typically, in a well-designed IP network, the designer applies a hierarchical IP address design to ensure that all IP address space
is used efficiently. The WAN links between R1 and R2, for example, use a 30-bit subnet mask, allowing for only two hosts. R1 is
configured as the route reflector, and R2, R3, and R4 are the clients.
First, you must configure IBGP on Router R1. Example 7-2 displays the IBGP configuration on R1.
- 237 -
CCNP Practical Studies: Routing
R1 is the route reflector, so you must configure R1 to reflect BGP information to R2, R3, and R4. Example 7-3 displays the configuration
with R1 as a route reflector.
Example 7-4 shows that three remote peers, to R2 (131.108.1.2), R3 (131.108.255.6), and R4 (131.108.255.2), are established.
R1 dynamically learns the remote networks 131.108.3.0/24 and 131.108.4.0/24. The IP table on R1, however, displays something quite
different. Example 7-6 displays the IP routing table on R1.
- 238 -
CCNP Practical Studies: Routing
The R1 routing table contains no BGP entries because, with route reflectors, IBGP does not insert any network into the IP routing table due
to synchronization. In this simple case, you have no other IGP configured, so you must disable synchronization. Disable synchronization on
R1, R2, R3, and R4. Example 7-7 displays disabling synchronization on Router R1; the same command should be completed on all four
routers in Figure 7-3.
R1 can now reach the two remote networks: 131.108.3.0/24 (R3) and 131.108.4.0/24 (R4). Verify that R2 can also reach these networks
because R2 is a route reflector client. Example 7-9 displays the IP routing table on R2.
R2, even though synchronization is disabled, has no remote BGP entries. To discover why, view the BGP table on R2. Example 7-10
displays the BGP table on R2.
- 239 -
CCNP Practical Studies: Routing
Example 7-10 displays the remote entries present in R2's BGP table with a next hop address that is not routable. In other words, BGP does
not insert any remote network when the next hop address is not routable. To fix this, configure R1 to advertise the WAN links to R2 and
R3.
After you clear all the BGP sessions on R1 with the clear ip bgp * command, the BGP table on R2 displays the remote BGP entries in its
IP routing table.
Example 7-12 displays the IP routing table on R2 and some successful ping requests to R3 E0 (131.108.3.1/24) and R4 E0
(131.108.4.1/24).
Example 7-12 displays the remote BGP entries on R2, a successful ping request, and a reply to the remote networks attached to R3 and R4.
Before you consider a more complex route reflector scenario, here are the full working configurations on all four routers. Take particular
note of the shaded sections, which contain critical commands, especially on R1, the route reflector.
- 240 -
CCNP Practical Studies: Routing
- 241 -
CCNP Practical Studies: Routing
no synchronization
network 131.108.3.0 mask 255.255.255.0
network 131.108.255.4 mask 255.255.255.252
neighbor 131.108.255.5 remote-as 333
!
line con 0
line aux 0
line vty 0 4
end
- 242 -
CCNP Practical Studies: Routing
Ensure that as long as there is IP connectivity, the IBGP sessions are established to R1 and R2.
The two routers, R1 and R2, have one connection to the Internet through Serial 1/0. Figure 7-4 displays the physical topology.
Assume the Routers R1–R5 are part of a large company and route reflectors are configured on R1 and R2 for redundancy purposes.
The primary path for the edge routers R3, R4, and R5 is through R1; if R1 fails, the primary path is through R2. Hence, R1 and R2 are both
configured as router reflectors to provide redundancy.
Enable OSPF on the IGP routers by enabling all interfaces in area 0, so you can take advantage of loopbacks for the source and destination
address for all IBGP peer sessions.
- 243 -
CCNP Practical Studies: Routing
Configure the same two commands on R2–R5 to enable OSPF as the IGP.
Next, configure IBGP on R1 and use the loopback addresses as the next hop addresses because as long as you have IP connectivity, BGP
should remain active. In fact, good IBGP design always uses loopbacks so that one routing failure does not result in loss (TCP fails) of
IBGP connectivity.
Example 7-18 configures IBGP on R1 to act as a route reflector to R3, R4, and R5 using the loopback interfaces as the source and peer
addresses. OSPF is used as the IGP to ensure IP connectivity among all loopback interfaces.
Example 7-18 displays the local advertisement of the network 131.108.1.0 on R1 and displays the enabling of R1 to reflect BGP
information to R3, R4, and R5. For redundancy purposes, R1 is configured to peer to R2 but not as a route reflector. R1 is configured to
peer to the loopback interfaces to ensure that as long as there is IP connectivity, BGP is established.
Example 7-19 displays the configuration of R2 as a backup route reflector to R3, R4, and R5.
Example 7-19 displays the local advertisement of the network 131.108.1.0 on R2 and the enabling of R2 to reflect BGP information to R3,
R4, and R5. R2 is configured to peer to the loopback interfaces to ensure that as long as there is IP connectivity, IBGP is established.
- 244 -
CCNP Practical Studies: Routing
Example 7-20 displays the IBGP configuration on R3 pointing to R1 and R2. Because R3 is locally connected to 131.108.3.0, use the
network command to advertise this network to R1 and R2.
R3 is configured normally for IBGP to R1 and R2. After the BGP peer sessions are established on routers R4 and R5, you can take a look
at the BGP tables.
Example 7-21 and Example 7-22 display the IBGP configuration on R4 and R5, respectively.
All the routers in Figure 7-5 have IBGP peers configured. Example 7-23 displays the BGP table on the client router R3.
R3's BGP table has the local network 131.108.3.0/24 (indicated with the next of 0.0.0.0). Also present in the BGP table is the remote
network, 131.108.1.0/24, advertised by R1 and R2. R4 advertises 131.108.4.0/24, and R5 advertises 131.108.5.0. To confirm IP
connectivity, view the IP routing table on R3. Example 7-24 displays the IP routing table on R3; remember that you have OSPF configured
as the IGP.
- 245 -
CCNP Practical Studies: Routing
R3's IP routing table displays the remote networks 131.108.4.0/24 and 131.108.5.0/24 discovered by OSPF (indicated by the O on the left
side of the IP routing table).
Even though BGP (view the BGP table in Example 7-23) has inserted the remote networks, 131.108.1.0/24, 131.108.4.0/24, and
131.108.5.0/24, as OSPF discovered routes, you need to disable synchronization on all the IBGP routers so that BGP entries are inserted
into the IP routing table to see whether this solves the problem.
After you clear all IBGP sessions on R1 and R2 with the clear ip bgp * command, you can expect to see BGP routing entries in the IP
routing table on R3. Example 7-26 displays the IP routing table on R3.
The reason that OSPF is chosen for the preferred path is that OSPF has a lower administrative distance of 110, compared to 200 for IBGP.
Change the default administrative distance on all five routers so that internal BGP is the preferred path in this five-router network.
- 246 -
CCNP Practical Studies: Routing
NOTE
The same scenario can be duplicated using EBGP, in which case, you use the concept of a backdoor to ensure that your IGP is the preferred
routing method. For example, if EBGP is configured between two routers and OSPF is the interior routing protocol, EBGP administrative
distance is 20, far lower than OSPF (AD is 110). By default, a lower AD is always preferred; therefore, the next hop address is the EBGP
connection. To change this default behavior without the changing AD values, use the network <network subnet-mask> backdoor
command. Specifying the network allows the router to choose OSPF as the preferred path rather than the EBGP discovered path.
Changing the administrative distance is not always the most desirable method because all routers typically need modification, as in this
scenario.
The external distance is for EBGP routes (default is 20); the internal distance is for IBGP routes (default is 200), and the local distance
defines the AD for locally connected routes (default is 200).
Example 7-27 displays the distance configuration on R1 and is configured on all five routers. You use the ? tool to display the options as
you enter the values.
The internal distance is set to 109 (less than OSPF 110); the external distance is unchanged at 20, and the local distance is also changed to
109. Example 7-28 displays the IP routing table on R3 after the TCP peers are cleared.
R1 now uses BGP with an AD of 109 as the preferred path to the remote networks connected to R1/R2, R4, and R5.
- 247 -
CCNP Practical Studies: Routing
This scenario built a redundant IBGP network. Next, simulate a routing BGP failure to R1 and ensure that R2 becomes the preferred path
on all route reflector clients.
The preferred path on R3 to 131.108.1.0/24 is through R1; the peer address is 131.108.254.1 (R1's loopback address). When the TCP peer
to R1 fails on R3, the preferred path is through R2 (a route reflector).
Example 7-30 displays the BGP table on R3 after the BGP failure.
Before you build upon this scenario and add the EBGP connections to the two different ISP routers, view the full working configurations of
R1–R5.
- 248 -
CCNP Practical Studies: Routing
- 249 -
CCNP Practical Studies: Routing
- 250 -
CCNP Practical Studies: Routing
- 251 -
CCNP Practical Studies: Routing
router ospf 1
network 0.0.0.0 255.255.255.255 area 0
!
router bgp 333
no synchronization
network 131.108.5.0 mask 255.255.255.0
neighbor 131.108.254.1 remote-as 333
neighbor 131.108.254.1 update-source Loopback0
neighbor 131.108.254.2 remote-as 333
neighbor 131.108.254.2 update-source Loopback0
distance bgp 20 109 109
line con 0
line aux 0
line vty 0 4
!
end
Because most CCNP candidates do not have two ISP connections to configure in a lab environment, you configure two routers and inject
default routes along with a large IP routing table to simulate an ISP router.
Figure 7-6 displays the EBGP connections on R1 and R2 and the IP addressing.
Configure the routers ISP1 and ISP2 for EBGP and advertise a default route to the internal BGP network along with some routes that
simulate an Internet environment.
Example 7-36 configures ISP1 for EBGP and allows a default route to be advertised to the EBGP peer to R1.
- 252 -
CCNP Practical Studies: Routing
Example 7-37 displays the EBGP configuration on ISP2. Remember that both Internet routers, ISP1 and ISP2, are providing default routes
to R1 and R2, respectively.
View the BGP tables on R1 and R2 and ensure that the BGP table contains a default route.
R1, because it has a direct connection to the EBGP peer to ISP1, selects ISP1 for default-based traffic.
- 253 -
CCNP Practical Studies: Routing
Similarly, because R2 has a direct connection to the EBGP peer to ISP2, R2 selects ISP2 for all default-based traffic. This means that
traffic is sent to different ISP routers for any traffic to the Internet. This traffic pattern is undesirable because IP packets might take
different paths and not reach the destination in a timely manner, resulting in loss or slow user-data transfer, such as HTTP traffic.
Ideally, a dual-home connection is for redundancy purposes only. Configure R2 to send all default traffic through the connection on R1 to
ISP1, unless R1 loses the connection to ISP1.
To accomplish this task, you modify the MED value on R2 to ensure that all default traffic is sent through R1. Lower MED values are
preferred, and MED influences only EBGP connections.
Example 7-40 displays the MED configuration on R2. To demonstrate another method, an example using AS_Path manipulation follows.
After you clear the BGP sessions to R1 and ISP2 on R2, the BGP table on R2 is displayed, as shown in Example 7-41.
As displayed in Example 7-41, the preferred path to the next hop 160.100.1.1, even though the MED is lower, is through ISP2. The MED
attribute is compared only for paths from neighbors in the same AS.
R1 (in AS 333) and ISP2 (in AS 4000) are in different autonomous systems, so to enable BGP to compare MED in different autonomous
systems, you must enable the bgp always-compare-med command. The bgp always-compare-med command allows the MED values to
be compared, and BGP decisions are even though the two routers, R1 and R2, are in different autonomous systems.
Example 7-42 displays the configuration on R2 to allow MED to be compared between R1 and ISP2.
After you clear the BGP sessions on R2, the BGP table on R2 displays the preferred default route 0.0.0.0/0 through R1.
- 254 -
CCNP Practical Studies: Routing
Example 7-43 shows that the new preferred path is through R1 because the MED is lower.
Before removing the configuration comparing MED on R2 and demonstrating how the AS_Path attribute can also be used to accomplish
the task, Example 7-44 displays R2's full working configuration.
- 255 -
CCNP Practical Studies: Routing
In Chapter 6, you learned the BGP routing decisions and one of the decisions are based on shortest AS_Path. Configure R2 to prepend
AS_Paths (add AS_Paths) from ISP2 so that R1's connection to ISP1 is the preferred path for default routing.
The? tool in Example 7-45 displays the options for prepending AS_Paths on R2. Next, configure the AS_Path to 4000 3999 3998 on R2 for
all incoming routes from ISP2. Example 7-46 displays the BGP table on R2.
- 256 -
CCNP Practical Studies: Routing
R2 now prefers the path through the next hop address 171.108.1.1 (R1's link to ISP1) because the AS_Path is only 50001 (one hop), or a
lower hop count away compared to 4000 3999 3998 (three hops).
You have seen two methods used on R2 and discovered how powerful BGP can be in allowing the network administrator to manipulate
BGP and achieve any routing path desired.
Some other common configurations completed on routers connected to the Internet include the following:
•
•
Ensuring that only a default route is accepted
Ensuring that you are not a transit path for any Internet traffic
Next, configure R1 and R2 to accept only a default route and ensure that the service providers, ISP1 and ISP2, do not use the network
between R1 and R2 as a transit path.
Example 7-47 displays the configuration on R1 to allow only default routes and displays setting the no-export community to ISP1. You
can use a filter list along with a route map to permit a default route.
Example 7-47 R1 Allowing Only Default Routes (Filter List) and Setting Community
R1(config)#router bgp 333
R1(config-router)#neighbor 171.108.1.1 filter
R1(config-router)#neighbor 171.108.1.1 filter-list 1
R1(config-router)#neighbor 171.108.1.1 filter-list 1 in
R1(config-router)#neighbor 171.108.1.1 send-community
R1(config-router)#neighbor 171.108.1.1 route-map noexport ?
R1(config-router)#neighbor 171.108.1.1 route-map noexport out
R1(config)#route-map no-export
R1(config-route-map)#set community no-export
R1(config)#access-list 1 permit 0.0.0.0
Example 7-47 displays the configuration on R2 to allow only default routes and setting the no export community to ISP1.
Example 7-48 also shows the use of a well-known community value: no-export. The no-export community attribute advises a BGP router
carrying this attribute that the route advertised should not be advertised to any peers outside the AS.
Example 7-48 configures R2 (because R2 is also connected to an ISP router) using a route map to set the community and allowing only a
default route using a filter list on inbound updates. In the next scenario, you use prefix lists to accomplish the same task.
- 257 -
CCNP Practical Studies: Routing
Example 7-48 R2 Allowing Only Default Routes (Filter List) and Setting Community
R2(config)#router bgp 333
R2(config-router)#neighbor 160.100.1.1 route-map setcommuntiy out
R2(config-router)#neighbor 160.100.1.1 send-community
R2(config-router)#neighbor 160.100.1.1 filter-list 1 in
R2(config)#access 1 permit 0.0.0.0
R2(config)#route-map setcommuntiy
R2(config-route-map)#set community no-export
Before looking at how to use prefix lists to achieve complex routing filters, view the full working configurations of the four main routers in
this scenario.
- 258 -
CCNP Practical Studies: Routing
end
- 259 -
CCNP Practical Studies: Routing
- 260 -
CCNP Practical Studies: Routing
- 261 -
CCNP Practical Studies: Routing
First, configure some routes on ISP1 pointing to Null0 (a bit bucket, commonly used in BGP to advertise routes statically for entries in the
IP routing table). You use the redistribute static command to inject networks into R1. To make things simpler, you remove all the IBGP
sessions on R1 and advertise these static routes to R1.
NOTE
All filtering, route maps, and IBGP peers configured in the previous scenario have been removed from Router R1 for clarity.
Example 7-53 displays the static route configuration of 25 networks on ISP1 and the advertisement of these static routes to R1.
- 262 -
CCNP Practical Studies: Routing
Example 7-53 displays the static route configuration of Class A networks ranging from 1.0.0.0–11.0.0.0; the Class A networks 100.0.0.0,
101.0.0.0, and 102.0.0.0; and finally the Class B networks ranging from 141.100.0.0–150.100.0.0/16.
The last entry, 0.0.0.0/0, is a default route advertisement. In a real-world BGP environment, the router ISP1 would have more specific
entries to all these networks, and a static route would be configured so that information can be sent over the EBGP peers without the need
for dynamic routing advertisements. Null routes and loopbacks are great learning tools. To simulate a real environment, configure ISP1 to
prepend some of the static routes with varying autonomous systems. Example 7-54 configures all networks in the range 1.0.0.0–11.0.0.0.
The origin AS is 1000, with the path through 998 999. All other networks are prepended with the autonomous systems 400, 300, and 200.
The route map name is set to prepend.
- 263 -
CCNP Practical Studies: Routing
The route map also configures the BGP origin attribute to IGP (as advertised by the network command). All subnets allowed by access list
1 prepend all networks to 998 999 and set the origin to IGP.
Similarly, line 20 in the route map (route-map prepend permit 20) statement configures all networks in access list 2 with an IGP origin
attribute. The networks defined in access list 2 are prepended with an AS of 400, 300, and 200 or {400 300 200}.
Example 7-55 confirms that the attributes are set correctly, by viewing the BGP table on R1.
The first eleven networks in Example 7-55 match access list 1 configured on ISP1.
Example 7-56 displays the IP (BGP routes only) routing table on R1.
- 264 -
CCNP Practical Studies: Routing
Example 7-56 displays all the networks advertised through ISP1. (Next hop address is 171.108.1.1, the EBGP peer address of ISP1.)
NOTE
If you try to ping any of these networks from R1, the ping request reaches ISP1, but because you have configured a null0 route, the packets
are dropped on ISP1. For the purposes of this exercise, all you need to be interested in is generating routes. There are other methods to
generate BGP routes, such as BGP generators. Cisco IOS (internal only) allows a router to generate as many routes as you could ever need
to simulate the Internet. Alternatively, you could peer to your corporate Internet gateway and receive the full BGP table, although this is
not a recommended exercise.
Manually generating routes to null0 using static routes is a great learning tool to deploy in any practice lab.
As you can determine, Example 7-56 shows many BGP entries. There is no need for R1, or the IBGP network, to be fully aware of all the
entries advertised from ISP1 because you already have a default route. This is especially true because ISP1 is advertising the nonroutable
10.0.0.0 network, which might be in use on Router R1, or an internal network running an IGP, such as OSPF. Configure a prefix list on R1
to stop unnecessary routing traffic.
Next, you configure a prefix list on R1 to stop any BGP routes, matching the following criteria:
•
•
Permit the default route 0.0.0.0.
•
Allow any routes in the range 1.0.0.0–11.0.0.0, but not 10.0.0.0/24.
Allow all routes 141.1.0.0/16 only. (This might be a network, for example, where a virtual private network might be configured
•
for extranets, so you might want specific routing information such as this.)
Deny all other routes.
NOTE
Prefix lists follow sequence numbers just as route maps do. You do not need to specify the sequence; the initial number is 5 and is
incremented by 5 each time. When you view the final configuration, you will discover the IOS has inserted the sequence numbers for you.
- 265 -
CCNP Practical Studies: Routing
Configure a prefix list on R1 to obtain the preceding objectives. Example 7-57 uses the ? to guide you through the various options. First,
configure a prefix list on inbound traffic from ISP1 on R1. Example 7-57 displays the filter list configuration in BGP configuration mode.
R1 is configured to apply a prefix list to all inbound traffic from the router ISP1. As yet, you have not defined the prefix list. As with an
access list, you need to configure the options for the prefix list to perform any filtering.
Example 7-58 displays the prefix list configuration in global configuration mode.
Prefix lists, by default, implicitly deny all other networks. You do not need to deny any other networks because the Cisco IOS
automatically denies all networks not specifically permitted in the prefix list, named ccnp in Example 7-58.
Example 7-59 displays the configuration on R1 when the show running-config command is entered in privilege mode on R1 (truncated).
- 266 -
CCNP Practical Studies: Routing
The Cisco IOS automatically configures sequence numbering starting from 5–60.
NOTE
The examples of prefix lists are practically endless. For more great examples, visit
www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fipr_c/ipcprt2/1cfbgp.htm#xtocid798074.
Cisco recommends that prefix lists be used in preference to route maps because prefix lists are hard coded in software (complied in code
terms) and take less time to process.
Example 7-60 displays the BGP table on R1 after the BGP peer is cleared and re-established on R1.
- 267 -
CCNP Practical Studies: Routing
Typically, prefix lists are used by large ISPs networks and are used to ensure that only routes permitted into an ISP are routed into the
Internet. Some ISPs, for example, use the Class A 10.0.0.0 private address for network-layer addressing on all network devices and,
therefore, block this network from all BGP sessions using prefix lists.
The best method you can apply to fully appreciate prefix lists is to set up a simple two-router topology and configure prefix lists to see the
effect on the BGP table.
- 268 -
CCNP Practical Studies: Routing
- 269 -
CCNP Practical Studies: Routing
The full list of available show commands used in BGP is displayed in Example 7-63.
NOTE
The following sample IOS displays are taken from the two-router topology in Figure 7-7. For more examples of the full IOS command set,
visit www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fiprrp_r/bgp_r/1rfbgp2.htm.
Suppose you want Router R1 to detail information about the remote network 1.0.0.0/8. Example 7-64 displays the output of the IOS show
ip bgp 1.0.0.0/8 command.
Example 7-64 shows that the remote entry is reachable through the next hop address 171.108.1.1 (ISP1). The network 1.0.0.0/8 is not
advertised to any peer because R1 has only one EBGP peer to ISP1. The path traversed to reach 1.0.0.0/8 is through the AS paths 50001
(ISP1), then 998, and finally originates from 999; the origin attribute is set to IGP (meaning that BGP advertised this network through the
network command). This IOS command is typically used to determine which AS path is taken to reach a remote network and the
advertised peer.
- 270 -
CCNP Practical Studies: Routing
s—Entry suppressed.
*—Entry is valid.
i—Entry originated from Interior Gateway Protocol (IGP) and was advertised with a network router configuration
command.
?—Origin of the path is not clear. Usually, this is a router that is redistributed into BGP from an IGP.
Network IP address of a network entity, 1.0.0.0/8, for example.
Next Hop IP address of the next system that is used when forwarding a packet to the destination network.
Metric MED.
LocPrf Local preference value as set with the set local-preference route-map configuration command. The default
value is 100.
Weight Weight of the route, Cisco-specific only.
Path Autonomous system paths to the destination network. In Example 7-66, the AS path is 50001 998 999.
To display routes with unnatural network masks (that is, classless interdomain routing [CIDR]), use the show ip bgp cidr-only command.
Example 7-65 displays the output from the show ip bgp cidr-only command on R1. You should expect the network 131.108.1.0 (Class B
subnetted or /24 network mask).
Table 7-3 displays the field descriptions for the show ip bgp cidr-only command.
- 271 -
CCNP Practical Studies: Routing
171.108.1.2
Status codes Status of the table entry. The status is displayed at the beginning of each line in the table. It
can be one of the following values:
>—The table entry is the best entry to use for that network.
i—The table entry was learned through an internal BGP (IBGP) session.
Origin codes Origin of the entry. The origin code is placed at the end of each line in the table. It can be
one of the following values:
(131.108.1.0 is advertised using the network
command. Hence, I is displayed.) i—Entry originated from Interior Gateway Protocol (IGP) and was advertised with a
network router configuration command.
?—Origin of the path is not clear. Usually, this is a router that is redistributed into BGP
from an IGP.
Network (131.108.1.0/24) Internet address of the network the entry describes.
Next Hop (171.108.1.1) IP address of the next system to use when forwarding a packet to the destination
network.
Metric MED.
LocPrf Local preference value, as set with the set local-preference route-map
configuration command.
Weight Weight of the route, as set through autonomous system filters.
Path Autonomous system paths to the destination network. There can be one entry in this field for
each autonomous system in the path. At the end of the path is the origin code for the path:
i—The entry was originated with the IGP and advertised with a network router
configuration command.
?—The origin of the path is not clear. Usually this is a path that is redistributed into BGP
from an IGP
The final command most network designers use is the show ip bgp regexp command. This IOS command is used to match networks
meeting certain path descriptions. For example, if you want to discover all the paths originating locally, you would use the show ip bgp
regexp ^$ command. This command is used to discover which networks match certain paths. Example 7-66 displays the output taken from
R1 matching all networks originating locally.
NOTE
Regular expressions (REGEXP) are not defined as part of the CCNP certification exam but are so useful they are covered here for readers
developing expert-level skills. Regular expressions are patterns that match input strings. For example, the . character matches any single
character, the ^ matches the beginning of an input string, and $ matches the end of an input string.
- 272 -
CCNP Practical Studies: Routing
Because R1 is advertising the network 131.108.1.0 (connected to E0), the output from the show ip bgp regexp ^$ command displays all
locally connected originating routes.
Example 7-67 displays all networks coming through AS 998, as seen on R1.
After you ascertain which networks are encompassed in path AS 998, you might want to implement a route map. For example, you could
implement a route map that sets the MED to 100 and weight to 1000 for only those paths passing through 998. REGEXPs are used prior to
making changes to BGP neighbors to ensure that the correct networks are tagged for further processing. You can easily discover the power
of BGP—even by using only the most basic show commands described in this book.
- 273 -
CCNP Practical Studies: Routing
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Configure the five-router topology in Figure 7-8 for IP routing. R3 runs only OSPF. R1 and R2 run BGP and OSPF.
Ensure that the 15 loopbacks on R1 (131.108.2.0–131.108.16.0/24) are advertised to R5 and that R5 modifies all even networks with a
local weight to 1000 and metric (MED) to 100. For all odd networks, set the weight to 2000 and the metric (MED) to 200.
Ensure that R1 advertises a default route to R5 and that R2 advertises a default route to R4. Use a prefix list to accomplish this task.
Ensure that R4 does not accept any networks in the range 131.108.0.0 but does accept a default route only. All other networks must be
denied on R4.
Ensure that R3 can reach all BGP-advertised networks using OSPF as the only routing protocol. (That is, redistribution is required on
R1/R2).
You have a lot to accomplish and you should begin by ensuring Layer 1, or the physical layer between all routers, is running. Ensure that IP
addressing is accurate.
- 274 -
CCNP Practical Studies: Routing
Then, perform some simple pings, for example, from R1 to R5 and R2 to R4. After Layer 1 is up, start by configuring OSPF between
R1/R2 and R3. Then configure IBGP between R1 and R2, followed by EBGP between R1/R5 and R2/R4. Redistribution is required on
R1/R2 so that R3 can dynamically learn the remote BGP networks on R4/R5 through OSPF (external routes Type 2).
Example 7-68 displays the full working configuration on R1. The shaded portions call your attention to critical commands required for full
IP connectivity. R1 has OSPF and BGP enabled. Synchronization is disabled, and the next hop self-attribute is set to R5 so that R5 is able
to reach R4's Ethernet network, 141.108.1.0/24.
- 275 -
CCNP Practical Studies: Routing
!
interface Ethernet0/0
ip address 131.108.1.1 255.255.255.0
!
interface Serial1/0
ip address 171.108.1.1 255.255.255.252
!
clockrate 128000
!
router ospf 1
redistribute connected metric 100 subnets
redistribute bgp 100 metric 100 subnets
network 0.0.0.0 255.255.255.255 area 0
!
router bgp 100
no synchronization
network 131.108.1.0 mask 255.255.255.0
network 131.108.2.0 mask 255.255.255.0
network 131.108.3.0 mask 255.255.255.0
network 131.108.4.0 mask 255.255.255.0
network 131.108.5.0 mask 255.255.255.0
network 131.108.6.0 mask 255.255.255.0
network 131.108.7.0 mask 255.255.255.0
network 131.108.8.0 mask 255.255.255.0
network 131.108.9.0 mask 255.255.255.0
network 131.108.10.0 mask 255.255.255.0
network 131.108.11.0 mask 255.255.255.0
network 131.108.12.0 mask 255.255.255.0
network 131.108.13.0 mask 255.255.255.0
network 131.108.14.0 mask 255.255.255.0
network 131.108.15.0 mask 255.255.255.0
network 131.108.16.0 mask 255.255.255.0
neighbor 131.108.1.2 remote-as 100
neighbor 171.108.1.2 remote-as 200
neighbor 171.108.1.2 next-hop-self
neighbor 171.108.1.2 default-originate
!
ip classless
ip route 0.0.0.0 0.0.0.0 Null0
!
line con 0
line aux 0
line vty 0 4
end
Example 7-69 displays the full working configuration on R2. The shaded portions call your attention to critical commands required for full
IP connectivity. R2 has OSPF and BGP enabled. Synchronization is disabled, and the next-hop-self attribute is set to R4 so that R4 can
reach R5's Ethernet network, 151.108.1.0/24.
- 276 -
CCNP Practical Studies: Routing
Example 7-70 displays the full working configuration on R3. The shaded portions call your attention to critical commands required for full
IP connectivity. R3 is running only OSPF.
- 277 -
CCNP Practical Studies: Routing
Example 7-71 displays the full working configuration on R4. The shaded portions call your attention to critical commands required for full
IP connectivity.
Example 7-72 displays the full working configuration on R5. The shaded portions call your attention to critical commands required for full
IP connectivity.
- 278 -
CCNP Practical Studies: Routing
Review Questions
The answers to these question can be found in Appendix C, "Answers to Review Questions."
6: Provide the IOS command syntax to enable a default route to be sent to a remote peer.
7: To display route reflector clients, which show command(s) can you use, if any?
8: View the following BGP table. What is the originating AS for the remote preferred path to the remote network 141.108.1.0/24?
R5#show ip bgp
BGP table version is 22, local router ID is 171.108.1.2
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
9: Using a route map, which IOS command sets the weight and local preference attribute to 100.
10: Can you set the BGP attribute next-hop-self to both EBGP and IBGP peers?
- 279 -
CCNP Practical Studies: Routing
Summary
After configuring many of the advanced features deployed in today's large IP environments and the Internet community, you can now
understand and appreciate the level of complexity of BGP.
You discovered how BGP is enabled efficiently in large IBGP networks, how BGP can be modified using BGP attributes, and the resulting
routing decisions that are made based on the configuration. The alternative methods used to change the routing decision made by BGP were
also configured, and you saw how to monitor BGP.
- 280 -
CCNP Practical Studies: Routing
The CCNP Routing exam devotes approximately 25 percent of its test questions to route optimization. A thorough knowledge of how
routing information can be shared across different routing domains not only aids you on the CCNP Routing exam but also in the more
difficult scenarios you might experience in real-life networks.
This chapter contains five practical scenarios to complete your understanding of route redistribution and optimization and ensure that you
have all the practical knowledge you need for understanding routing optimization.
A routing loop is a path to a remote network that alternates between two routers, each of which assumes the path is reachable through the
other. Hence, the time to live present in every IP packet expires, and the packet or user data is dropped, resulting in the loss of network
connectivity.
Routing using a single routing algorithm is usually more desirable than running multiple IP and non-IP routing protocols, especially from a
configuration and troubleshooting perspective. However, with today's changing networks, mergers, department politics, and acquisitions,
more than one IP routing protocol is often in use.
You can use several methods to control information sent from one protocol to another to ensure that you avoid a routing loop.
Cisco IOS Software allows the following methods to control route filtering:
• Passive interfaces— A passive interface is a Cisco interface configured for routing, but it does not send any routing information
•
on the outbound interface. Routing information (if any exists) is still received and processed normally.
Distribution lists— Distribution lists define which networks are permitted or denied when receiving or sending routing updates.
•
Distribution lists require that you configure access lists to define which networks are permitted or denied.
Route maps— Route maps can also be used to define which networks are permitted or denied. Route maps can also be used
along with access lists to define which networks are permitted or denied when applying match statements under any route map
configuration options.
Along with passive interfaces and filtering, you can also use static routes, policy routing, default routes, or routes to null0 (routing black
hole or bit bucket) to ensure that network paths to nonexisting destinations are dropped.
Redistribution Defined
Redistribution is defined as the exchange of routing updates from one routing protocol to another. Every routing protocol in use today can
support redistribution. Because protocols, such as OSPF or RIP, have defined metrics, when you perform any redistribution you must
convert the metric. For example, when redistributing from RIP to OSPF, you must convert the metric from hop count (RIP) to OSPF cost.
NOTE
The Cisco IOS Software automatically redistributes between IGRP and Extended Internet Gateway Routing Protocol (EIGRP) when the
same autonomous system (AS) is defined. This is the only form of automatic redistribution that the Cisco IOS Software performs. All other
methods must be manually configured, as you discover in this chapter.
- 281 -
CCNP Practical Studies: Routing
The reasons that multiple IP routing protocols might be configured in any one network are numerous. Here are some reasons why a
network administrator might configure more than one routing algorithm:
• An organization might have purchased another company that runs another routing protocol. Instead of reconfiguring potentially
•
thousands of routers, it is easier to configure redistribution on one router and allow immediate communication.
•
An organization might be transitioning from one protocol to another, for example, from legacy RIP to OSPF.
Some business units within an organization might have host-based routing and require RIP, for example, to be configured on the
•
edge of the network. RIP is fine for a LAN-based network.
Political reasons within an organization or department can impact routing algorithm decisions. For example, payroll might have
specific needs or an engineer might prefer a different routing algorithm to ensure that only certain networks are propagated
between each other.
The number of reasons is countless. What is definite is that you need to understand redistribution and how it is configured and controlled
on Cisco IOS-based routers.
There are two primary concerns when redistributing from one protocol to another:
•
•
Metric conversion
Administrative distances
You have seen already in this guide the various metrics used by OSPF or RIP. Cisco IOS routers always choose administrative distance
over any metric; hence, you must be careful when changing administrative distances.
Table 8-1 displays the administrative distances Cisco routers use by default.
Table 8-1 shows that a Cisco router always prefers an EIGRP route (AD is 100) over an OSPF (AD is 110) or RIP (AD is 120), for
example.
TIP
Classful protocols do not understand variable-length subnet masks (VLSM), nor do they send updates with the subnet mask. Examples of
classful protocols are IGRP and RIP.
Classless protocols understand VLSM and examples include IS-IS, OSPF, and BGP.
- 282 -
CCNP Practical Studies: Routing
For every router configured in a classful network, the following rules apply:
• The router configured as a classless router has one or more interfaces attached to a major network, such as a Class A, B, or C
network. For example, the local router might have the Class A network 9.1.1.1/8 configured locally and assumes the same Class
•
A mask on any networks received on any given interface.
The router does not have any interfaces attached to the major network being advertised, and hence, assumes the subnet mask is at
the bit boundary: 8 bits for Class A (255.0.0.0), 16 bits for Class B (255.255.0.0), and 24 bits for Class C (255.255.255.0).
Figure 8-1 displays R1 configured for redistribution to R2. R1 has a number of local interfaces subnetted using the Class B network
131.108.0.0. R2, on the other hand, is running RIP and has two local interfaces configured in the Class B network with Class C routers:
131.108.1.0/24 and 131.108.2.0/24.
The RIP process on R2 assumes all networks in the Class B network 131.108.0.0 have a 24-bit subnet mask because of the local attached
interfaces. Hence, the subnetted routes on R1 are not passed to R2. The 141.108.0.0 network on R1 is advertised to R2 as a Class B
network. In other words, R2 assumes the entire Class B network, 141.108.0.0, is reachable through R1 for networks not locally connected.
To solve this problem and others you encounter, this chapter covers the Cisco IOS command required for enabling redistribution.
- 283 -
CCNP Practical Studies: Routing
The static [ip] keyword is used to redistribute IP static routes. The optional ip keyword is used when redistributing into
the Intermediate System-to-Intermediate System (IS-IS) protocol.
The connected keyword refers to routes that are established automatically by virtue of having enabled IP on an
interface. For routing protocols, such as OSPF and IS-IS, these routes are redistributed as external to the autonomous
system (AS).
process-id (Optional) For the bgp, egp, or igrp keyword, this is an autonomous system number, which is a 16-bit decimal number.
For the ospf keyword, this is an appropriate OSPF process ID from which routes are to be redistributed.
level-1 Specifies that for IS-IS, level 1 routes are redistributed into other IP routing protocols independently.
level-1-2 Specifies that for IS-IS, both level 1 and level 2 routes are redistributed into other IP routing
protocols.
level-2 Specifies that for IS-IS, level 2 routes are redistributed into other IP routing protocols independently.
as-number AS number for the redistributed route.
metric metric- (Optional) Metric used for the redistributed route. If a value is not specified for this option, and no value is
value specified using the default-metric command, the default metric value is 0. Use a value consistent with the
destination protocol.
metric-type (Optional) For OSPF, the external link type associated with the default route advertised into the OSPF routing domain.
type-value It can be one of two values:
If a metric-type is not specified, the Cisco IOS software adopts a Type 2 external route.
external 1— Routes that are external to the autonomous system, but are imported into OSPF as Type 1 external routes.
external 2— Routes that are external to the autonomous system, but are imported into OSPF as Type 2 external routes.
tag tag-value (Optional) 32-bit decimal value attached to each external route. This is not used by OSPF itself. It can be
used to communicate information between autonomous system boundary routers (ASBRs). If none is
specified, the remote AS number is used for routes from Border Gateway Protocol (BGP) and Exterior
Gateway Protocol (EGP); for other protocols, zero (0) is used.
route-map (Optional) Allows you to indicate a route map that should be interrogated to filter the importation of
routes from this source routing protocol to the current routing protocol. If not specified, all routes
are redistributed. If this keyword is specified, but no route map tags are listed, no routes are
imported.
map-tag (Optional) Identifier of a configured route map.
weight number- (Optional) Network weight when redistributing into BGP. An integer from 0 to 65,535.
- 284 -
CCNP Practical Studies: Routing
Routing redistribution is best described by examples, so the five practical scenarios in this chapter concentrate on how redistribution is
configured on Cisco IOS routers. You have already encountered some redistribution in previous scenarios, and the following five scenarios
are designed to enhance your knowledge of why, when, and how to successfully and efficiently redistribute routing protocols.
Scenarios
The following scenarios are designed to draw together some of the content described in this chapter and some of the content you have seen
in your own networks or practice labs. There is no one right way to accomplish many of the tasks presented, and the abilities to use good
practice and define your end goal are important in any real-life design or solution.
The five scenarios presented in this chapter are based on complex redistribution technologies so that you become fully aware of the
powerful nature of redistribution in large IP networks.
Figure 8-2 displays the three-router topology with the Router R1 running RIP and IGRP.
Figure 8-2 displays a simple scenario with the Class A network 9.0.0.0 subnetted with a Class C mask. Notice that R2 has the Class
10.1.1.0/24 network configured locally on the Ethernet interface.
Start by configuring the edge devices for IGRP on R3 and RIP on R2.
Example 8-1 displays the IP address configuration on R1 and the enabling of IGRP in AS 100.
- 285 -
CCNP Practical Studies: Routing
Notice, on R3, when enabling IGRP in AS 10, the network command used is network 9.0.0.0 because IGRP is classful and automatically
summarizes at the Class A network boundary.
R2 is running another classful IP routing protocol: RIP. Therefore, when defining networks under the RIP process, you need to identify
only the major network boundary, in this case 9.0.0.0 and 10.0.0.0.
R2 is configured for RIP and IGRP, and hence, requires redistribution, and you must ensure the metrics are converted from RIP (hop count)
to IGRP (composite metric).
Example 8-3 displays the IP address configuration on R1 along with enabling IGRP and RIP. No redistribution is configured at this time.
R1 is configured locally for the Class A subnet network 9.0.0.0 for both RIP and IGRP. Therefore, you must ensure that RIP updates are
not sent to R3, which is running only IGRP, and ensure IGRP updates are not sent to R2, which is running only IGRP.
Example 8-4 configures passive interfaces to ensure that only RIP updates are sent to R2 and IGRP updates are sent to R3.
- 286 -
CCNP Practical Studies: Routing
Currently, the IP routing table on R1 displays network connectivity to R2 and R3. R1 has full IP connectivity to R2 and R3. Also, notice
that R1 assumes that the entire Class A network 10.0.0.0/8 is reachable through R2 because R1 does not have any locally connected routes
in the 10.0.0.0 network.
The routing table on R2 in Example 8-6 displays no network connectivity to the LAN segment 9.1.3.0/24 because you have yet to
configure redistribution on R1.
Example 8-7 displays the redistribution command on R1. You set the metric for redistributing IGRP to RIP to a hop count of 1.
At this stage, you haven't configured redistribution from RIP into IGRP so that R3 has full connectivity to R2. Example 8-8 displays
redistribution from RIP to IGRP. The ? tool is used to displays IGRP metrics. Typically, the metrics used match those on the link from R1
to R2 (using the show interfaces serial 1/0 command and using the values output from this display).
- 287 -
CCNP Practical Studies: Routing
Examine the IP routing tables on R2 and R3 to ensure IP connectivity by pinging the remote network 9.1.3.1 as displayed in Example 8-9.
Example 8-9 displays the remote network 9.1.3.0 reachable through the next hop address 9.1.1.1, and the metric is 1, as defined by the
redistribution command in Example 8-7. A ping to the remote address 10.1.1.1/24 on R3 is successful.
Example 8-10 displays the IP routing table on R3, as well as a ping request and reply to the remote network 9.1.3.1/24.
A ping to the remote address 10.1.1.1/24 on R3 is successful because the remote network 10.0.0.0/8 is reachable through the next hop
address 9.1.2.1 or through R1.
Next, you configure a new subnet on R3 to make the networks a little more complex. Configure the address 10.1.2.1 as a loopback interface
on R3 using a 24-bit subnet mask, and enable IGRP on R3 to advertise the 10.0.0.0 network.
Example 8-11 displays the loopback creation on R3 and the enabling of IGRP to advertise the loopback under IGRP.
R3 does not advertise the 10.0.0.0 network to R1. Remember from Example 8-5, R1 had seen the 10.0.0.0/8 network advertised through
RIP with an AD of 120 through R2 (RIP). Example 8-12 displays the IP routing table on R1 after an IGRP update is sent from R3 to R1.
- 288 -
CCNP Practical Studies: Routing
R1 changes the path to 10.0.0.0 through R3 because the AD of IGRP is 100, compared to RIP, which is 120. In effect, R1 sends all traffic
for the 10.0.0.0 network through R3. Example 8-13 displays a ping request to the IP address 10.1.1.1 (R3's Ethernet interface) and 10.1.2.1
(R3's loopback interface).
All packets are sent to R3 because the IP routing table selects IGRP as the preferred path to all networks in the Class A range 10.0.0.0. Of
course, this is not the desired solution because you have 10.0.0.0 networks configured on R2 and R3. There are a number of different
solutions to this, but in this case, configure R1 to reject any networks in the 10.0.0.0 range because the only trusted information for this
Class A network is from the RIP domain.
NOTE
Another method to overcome network connectivity problems is to configure static routes on R1 or enable an interface in the 10.0.0.0/24
range on R1.
Example 8-14 configures a distribution list on R1, rejects all networks in the 10.0.0.0 range, and accepts all other networks.
The distribute-list command, when configured on R1, does not permit the 10.0.0.0 network, as displayed in Example 8-14. Therefore,
when 10.0.0.0 is advertised by R3 to R1, R1 does not accept the 10.0.0.0 network.
Example 8-15 confirms the installation on the RIP-discovered route through R2.
Any form of redistribution requires careful filtering. At this point, R1 has lost connectivity to the 10.1.2.0/24. To solve this problem,
configure a static route on R1 with a more specific destination pointing to R3.
- 289 -
CCNP Practical Studies: Routing
Cisco IOS routers, because the AD of static routes is 1 and is lower then RIP at 120, send traffic for the more specific route through Serial
1/1 for hosts in the range 10.1.2.1–254/24.
Example 8-17 displays the IP routing table on R1 and a successful ping request to 10.1.1.1 (to R2) and 10.1.2.1 (to R3)
In a simple three router network, you can determine that with even a few networks, redistribution causes routers to misinterpret information
based on network configuration and classful behavior of routing protocols, such as RIP and IGRP. In the scenarios that follow, you apply
route maps instead of distribution lists to learn to use other filtering methods. You also use the passive-interface command to ensure that a
network running route redistribution is configured as efficiently as possible.
- 290 -
CCNP Practical Studies: Routing
line con 0
line aux 0
line vty 0 4
end
- 291 -
CCNP Practical Studies: Routing
Figure 8-3 displays the current RIP network that you migrate to OSPF.
Loopbacks have been configured in R1, R2, and R3 to populate the IP routing tables. The Class B network, 141.108.0.0, has been subnetted
using a Class C mask throughout. Because all RIP-enabled routers have a local interface configured using a Class C mask, network
connectivity is maintained.
- 292 -
CCNP Practical Studies: Routing
Example 8-21 displays over 25 different networks. The main aim of converting the routing algorithm from RIP to OSPF is to enable VLSM
in the WAN and summarization among routers to reduce IP routing table sizes.
Example 8-22 displays the current working configuration on R1 running RIP as the primary routing algorithm.
- 293 -
CCNP Practical Studies: Routing
- 294 -
CCNP Practical Studies: Routing
end
To start, add OSPF to the center of the network, and place all the WAN interfaces in area 0. Maintain the Class C mask for now to make
redistribution relativity easy to configure. This step is common when migrating from one protocol to another.
Example 8-25 configures R1 for OSPF across the WAN to R1 and R2. You take the same configuration steps on R2 and R3.
- 295 -
CCNP Practical Studies: Routing
R1 is configured not to send any RIP updates to Serial 1/0 (to R2) and Serial 1/1 (to R3); this configuration stops the sending of
unnecessary updates across WAN links.
At this stage, you have not configured any redistribution, so there is no connectivity among the Ethernet and loopback interfaces. Example
8-26 confirms the status of IP connectivity after the show ip route command is entered on R1.
The only visible route on R1 is the locally connected routes and the WAN circuit between R2 and R3.
Next, configure redistribution on routers R1, R2, and R3 to advertise the RIP networks to the OSPF backbone.
Example 8-27 displays the RIP to OSPF redistribution on R1. Example 8-27 also displays redistribution from OSPF to RIP to allow
communication from R2/R3 Ethernet segments to R1's locally connected network, which, at the moment, is advertised by only RIP. The ?
tool is used to display the available options.
- 296 -
CCNP Practical Studies: Routing
R1 is now configured to redistribute from RIP to OSPF and vice versa. Example 8-27 displays the keyword subnets because the Class B
network 141.108.0.0 has been subnetted across the network. Without this keyword, only classful networks would not be advertised. (In this
case, you are using classless networks on all routers.) Also, the metrics have been set to 100 for all RIP-to-OSPF networks, and the hop
count for all redistributed OSPF networks into RIP is set to 3.
Typically, networks have some other paths or back doors between any given routing topologies. To ensure that networks residing on R1 are
never advertised by the OSPF backbone, the distribution list on R1 denies any networks residing in 141.108.1.0–141.108.7.255 from being
advertised from OSPF to RIP. This ensures that a routing loop cannot occur.
The access list 1, previously defined with seven statements, can be replaced with the configuration in Example 8-28 to deny the range of
networks 141.108.0.0–141.108.7.0 and permit all other networks.
Example 8-28 replaces the seven-line access list with two lines of IOS configuration. (The no access-list 1 command removes the
configuration currently present for access list 1.)
Confirm IP routing connectivity from R1. Example 8-31 displays the IP routing table on R1 and some sample ping requests that conform IP
connectivity.
- 297 -
CCNP Practical Studies: Routing
The next step in migration is to remove RIP and enable OSPF across all interfaces in the networks. Before you complete this migration,
look at the routing configurations on Routers R1, R2, and R3.
- 298 -
CCNP Practical Studies: Routing
Figure 8-4 displays the OSPF area assignment to complete the RIP to OSPF migration.
- 299 -
CCNP Practical Studies: Routing
Figure 8-4 displays the OSPF area assignment along with the ability to re-address the WAN circuit to /30 subnets because OSPF
understands VLSM.
Example 8-35 displays the removal of RIP on R1 and the OSPF and IP address assignment on R1. Also, note the new IP address
assignment for the WAN links with /30 subnets.
Example 8-36 displays the removal of RIP on R2 and the OSPF and IP address assignment on R2.
- 300 -
CCNP Practical Studies: Routing
Example 8-37 displays the removal of RIP on R3 and the OSPF and IP address assignment on R3.
NOTE
Removing RIP from Routers R1, R2, and R3 causes the Cisco IOS to remove any redistribution between RIP and OSPF automatically.
Therefore, manual removal of redistribution is not required on Routers R1, R2, and R3.
Now that OSPF is configured across all routers, view the IP routing table on R1. Example 8-38 displays R1's IP routing table.
In Example 8-32, the redistributed routes appear as E2 (External Type 2) and OSPF is configured across all three routers. The OSPF type
route is displayed as O IA in Example 8-38.
OSPF can support VLSM and network summarization, so configure each router in Figure 8-4 to summarize locally connected routes, which
are contiguous. (All routers are ABRs because each router resides in areas 0, 1, 2, or 3.) Example 8-39 displays the summarization for
- 301 -
CCNP Practical Studies: Routing
networks 141.108.0.0–141.108.7.0. To summarize internal OSPF routes, the area area-id range network subnet mask IOS command is
required.
The loopback addresses on R1 reside in OSPF area 1. Example 8-39 displays the area summary command on R1.
The ? tool is used to display the various options. The mask, 255.255.248.0, encompasses the seven networks ranging from 141.108.0.0–
141.108.7.0. You may ask yourself why you are not using 141.108.0.0 on R1 or subnet zero. With large IP networks, the network IP
designer should always use all the address space available; subnet zero is a perfect example.
To enable subnet zero, you must configure the global ip subnet-zero command on R1.
Example 8-41 displays the summarization required on R2 to encompass the networks 141.108.8.0–141.108.15.255. (These networks reside
in area 2.)
Example 8-42 displays the summarization required on R3 to encompass the networks 141.108.16.0–141.108.23.255. (These networks
reside in area 3.)
Example 8-43 displays the OSPF IP routing table on R1. (Initially, when RIP was the primary routing algorithm, you had 17 RIP entries, as
displayed in Example 8-21.)
- 302 -
CCNP Practical Studies: Routing
Now, you can see why networks are converted from classful routing protocols, such as RIP, to classless protocols, such as OSPF. The
migration in this scenario demonstrates the powerful use of redistribution and what you should be aware of when configuring metrics.
Before looking at another scenario, view the full working configurations of all three routers in Figure 8-4.
- 303 -
CCNP Practical Studies: Routing
- 304 -
CCNP Practical Studies: Routing
The internetwork in Figure 8-5 has an OSPF domain and three EIGRP domains.
- 305 -
CCNP Practical Studies: Routing
Routers R1, R2, and R3 are configured in OSPF process 1. (Remember that OSPF has a process ID that is only locally significant.) R4 is
configured in EIGRP domain 1, and R5 is configured in EIGRP domain 2. The WAN link between R4 and R5 resides in EIGRP domain 3.
Figure 8-5 details the IP address assignment. Also, notice that a redundant path exists between R4 and R5. Therefore, you must carefully
consider any route redistribution to avoid routing loops.
Start by enabling the routing protocols in use, namely OSPF on Routers R1–R3. Figure 8-5 depicts a simple OSPF network with one area,
the backbone.
All of Router R1's interfaces reside in area 0; hence, you can use one IOS command to place all R1's interfaces in OSPF area 0 or the
backbone.
Example 8-47 places all interfaces on R1 in area 0, the backbone network in OSPF. Figure 8-5 displays the OSPF area assignments
required for this topology.
Routers R2 and R3 reside in OSPF and EIGRP domains. Example 8-48 configures R2's serial link to R1 to reside in area 0.
The inverse mask, 0.0.0.0, configures the IP address 141.108.255.2 into area 0.
- 306 -
CCNP Practical Studies: Routing
R1 should now have full OSPF adjacency to R2 and R3. Example 8-50 confirms that OSPF has formed a full relationship to R2 and R3.
R1 is fully adjacent (Full) to R2 and R3, and no designated router (DR) or backup designated router (BDR) is selected over a point-to-point
(in this case back-to-back serial connected Cisco routers).
Before you configure redistribution, configure the EIGRP domains on R4 and R5. Example 8-51 configures R4 in EIGRP domains 1 and 3.
Automatic summarization is disabled on R4, so you can apply some summary commands later. Also on R4, for interfaces in EIGRP
domain 1, you need to apply the passive interface command to ensure that no routing updates are sent.
Similarly, in EIGRP domain 3, only one network resides in EIGRP 3, the WAN link to R5.
Example 8-52 confirms that the Ethernet interface and link to R3 reside in EIGRP 1 and the WAN link to R5 resides in EIGRP 3. The peers
on R4 confirm that EIGRP is configured on R3. There is no EIGRP peer to R5 because EIGRP is not enabled on R5 yet.
- 307 -
CCNP Practical Studies: Routing
At this stage, you have not configured any redistribution. Start by configuring redistribution in the EIGRP domains 1, 2, and 3.
Redistributing from one EIGRP AS to another does not require you to define a metric because EIGRP conserves the metric. Therefore, you
redistribute only networks using the metric from the original AS or domain. You do have to ensure that route maps or distribution lists are
used to avoid loops. You configure route maps on R2 and R3, the core routers in the network, later in this chapter.
Example 8-54 configures redistribution from EIGRP domain 1 to 3 on Router R4 and also configures a summary route on R4, advertising
the subnet 160.100.0.0/17.
Example 8-55 configures redistribution from EIGRP domain 2 to 3 on Router R5 and also configures a summary route on R4, advertising
the subnet 160.100.128.0/17.
To ensure IP connectivity, display the IP routing tables on R2 and R3. Example 8-56 displays the IP routing table (EIGRP only) on R2.
R2 has the summary route from R4 appearing as an internal EIGRP route (D) because the network resides in the same AS. The second
summary route redistributed from domain 3 to 2 appears as an external EIGRP (D EX) route.
- 308 -
CCNP Practical Studies: Routing
Similarly, R3 has an internal (D 160.100.0.0) and external summary route (D EX 160.100.128.0) for the remote Ethernet segments on R4
and R5, respectively.
R1's IP routing table does not contain the EIGRP networks because the OSPF routers R2 and R3 (ABRs and ASBRs) have yet to enable
redistribution from EIGRP (composite metric) to OSPF (cost metric). Because OSPF and EIGRP use different metrics for routing, you
must assign metrics when redistributing and ensure, by using route maps, that no redistributed information causes a routing loop.
Example 8-58 configures R2 for redistributing OSPF routes into EIGRP and EIGRP routes into OSPF. R2 is configured not to permit any
routes from R4 advertising networks in the range 141.108.0.0–141.108.7.255 and also the WAN subnets 141.108.255.0/30 (Link R1/R2)
and 141.108.255.4/30 (Link R1/R3); this prevents erroneous routing information and routing loops from occurring.
R2 is configured to redistribute OSPF networks with a route map named allowintoeigrp, indicating that only networks matching access list
1 are allowed into OSPF. Similarly, when redistributing EIGRP networks into OSPF, the route map named allowintoospf permits all
networks matching access-list 2, as shaded in Example 8-58.
Example 8-59 displays the OSPF to EIGRP redistribution on Router R3 with a route map configured to ensure that erroneous information
is not sent from either routing domain.
- 309 -
CCNP Practical Studies: Routing
NOTE
If the WAN link between R4 and R5 goes down, EIGRP domain 3 is isolated. In other words, R4 won't be able to get to the networks
connected to R5 because the 160.100.0.0 network is denied from being redistributed into EIGRP from OSPF. To fix this, you can add the
network 160.100.0.0 as part of the access list. For the purposes of this exercise, assume the back-to-back serial connections between R4 and
R5 never fail.
Now that redistribution is completed and filtered on core routers, examine some IP routing tables starting from the core router R1 in OSPF
area 0, or the backbone. A common technique to ensure network connectivity is to ping IP interfaces.
Example 8-60 displays the IP routing table (OSPF routes only) on R1 and some sample pings to the remote EIGRP networks
160.100.1.1/25 and 150.100.1.129/25.
- 310 -
CCNP Practical Studies: Routing
Full connectivity is displayed on R4, and notice that the shaded routes in Example 8-61 encompass all the routes from 141.108.0.0–
141.108.7.255. (These routes are the loopback interfaces on R1.)
Example 8-62 displays a successful ping from R4 to all the remote loopbacks on R1 to ensure that you have network connectivity from the
EIGRP domain.
- 311 -
CCNP Practical Studies: Routing
Because R4 and R5 have a redundant path to the OSPF backbone, the EIGRP topology table on R4 and R5 displays feasible successors.
Example 8-63 displays the output from the show ip eigrp topology command on R4.
- 312 -
CCNP Practical Studies: Routing
In Example 8-63, R4 has a number of dual paths to remote networks, as shaded in the output. Because the metric is lower through Serial 1,
the chosen path to the remote network 141.108.6.0/24 is through Serial 1, for example. Next, simulate a network failure by shutting down
the serial link to R5 on R4. Example 8-64 disables the link to R5.
The IP routing table on R4 displays the path to the remote loopbacks and OSPF network through Serial 0. Example 8-65 confirms the IP
routing table; note the EIGRP composite metric, which is higher than through Serial 1 to R5 (22016000 compared to 26112000).
- 313 -
CCNP Practical Studies: Routing
This scenario demonstrates the metric and filtering techniques common in today's large IP networks and the care that you must take when
sending networks from one routing algorithm to another. You must pay particular attention to the metric and avoid any routing loops.
- 314 -
CCNP Practical Studies: Routing
clockrate 128000
!
interface Serial1/1
ip address 141.108.255.5 255.255.255.252
clockrate 128000
!
router ospf 1
redistribute connected subnets
network 0.0.0.0 255.255.255.255 area 0
!
end
- 315 -
CCNP Practical Studies: Routing
- 316 -
CCNP Practical Studies: Routing
router eigrp 1
redistribute eigrp 3
passive-interface Serial1
network 141.108.0.0
network 160.100.0.0
no auto-summary
!
router eigrp 3
redistribute eigrp 1
passive-interface Ethernet0
passive-interface Serial0
network 141.108.0.0
no auto-summary
access-list 1 permit 160.100.0.0 0.0.127.255
access-list 2 permit 160.100.0.0 0.0.127.255
route-map allowtoR3 permit 10
match ip address 1
!
route-map allowtoR5 permit 10
match ip address 2
end
- 317 -
CCNP Practical Studies: Routing
The end goal of this scenario is to ensure full IP connectivity between the two different IP networks. The ability to configure networks from
a classless and classful domain and vice versa is critical. This scenario is designed to ensure that you are fully aware of all the potential
problems when routing between OSPF (classless routing protocol) and RIP (classful routing protocol).
Router R1 has a number of interfaces in OSPF area 333, and R2 is running RIP only.
This scenario uses static routes to ensure connectivity between the classless (RIP) domain to the classful (OSPF) domain.
Example 8-71 configures R1 for IP addressing and enables OSPF and RIP. Ensure that RIP updates are sent to only the Ethernet interfaces
on R1 by configuring R1 with passive interfaces, even on the loopbacks, because OSPF advertises these routes. To ensure that routing
resources are not wasted, allow only one routing algorithm to advertise each interface. To do this, you apply passive interfaces where
required.
- 318 -
CCNP Practical Studies: Routing
To enable R2 to learn the OSPF loopback interfaces on R1 dynamically, enable RIP-to-OSPF redistribution on R1, by setting the metric to
1 (hop count).
View the IP routing table on R2 to determine which RIP networks R1 advertises to R2.
The only IP network in Example 8-74 is the subnet 131.108.2.0, which is a Class C subnetted route. Because R2 is configured with a
classful routing protocol, only 24-bit networks are advertised by R1 and accepted by R2. You can use two methods to solve this scenario.
The first is to use static routes, and the second method uses summarization techniques on R1.
Configure R2 with static routes and ensure network connectivity to R1 loopback interfaces.
Example 8-75 configures R2 with four static routes pointing to the next hop destination to R1's Ethernet IP address of 131.108.1.1.
R2 is configured with static routing information, even though the remote networks are not Class C subnets. Confirm network connectivity
by viewing the IP routing table on R2 and pinging all remote loopback interfaces on R1.
Example 8-76 displays R2's IP routing table and five ping requests to all R1's loopback interfaces.
- 319 -
CCNP Practical Studies: Routing
Example 8-76 displays IP networks installed in the routing table. Even though RIP is classful, you can use static routes to overcome the
limitations of routing between VLSM networks or fixed-length subnet mask (FLSM) networks.
In the next scenario, you configure routing between VLSM and FLSM networks without using static routing.
- 320 -
CCNP Practical Studies: Routing
!
interface Loopback4
ip address 131.108.5.1 255.255.255.248
!
interface Ethernet0/0
ip address 131.108.1.1 255.255.255.0
router ospf 1
network 131.108.2.1 0.0.0.0 area 333
network 131.108.3.1 0.0.0.0 area 333
network 131.108.3.129 0.0.0.0 area 333
network 131.108.4.1 0.0.0.0 area 333
network 131.108.5.1 0.0.0.0 area 333
!
router rip
redistribute ospf 1 metric 1
passive-interface Loopback0
passive-interface Loopback1
passive-interface Loopback2
passive-interface Loopback3
passive-interface Loopback4
network 131.108.0.0
!
end
- 321 -
CCNP Practical Studies: Routing
The IP routing table on R2 now contains only the 131.108.2.0/24 network, as displayed in Example 8-74.
To redistribute the networks in R1's network, you can apply the summary-address network-mask command.
R1 is an ASBR, so you can use the summary command to send an update to RIP with any mask you need. Because all Cisco IOS routers
always choose a path with a more specific route, you can advertise all loopbacks on R1 as Class C subnets to R2.
The last command in Example 8-80 ensures that all connected routes (in this case, the loopbacks on R1) are redistributed to R2.
R2 assumes all 131.108.0.0 networks are subnetted as 24-bit networks, as displayed in Example 8-81. To ensure that routing loops cannot
occur, R1 sends only the loopbacks interfaces and R2 accepts only routes that are not locally connected.
Example 8-82 configures a route map, called allowout, that permits only the non-class C networks to be advertised to R2.
R1 is configured to permit only the loopback interfaces 1–4 to be redistributed into RIP. Loopback 0 is a Class C subnet route, so you do
not need to add this interface.
To ensure that R1 never accepts routes that are locally reachable, configure a distribution list that allows only the loopbacks configured on
R1.
- 322 -
CCNP Practical Studies: Routing
Example 8-83 configures a distribution list on R2 permitting only loopbacks 0–4 into R2's IP routing table; all other networks are rejected.
The same principles applied here can be applied to any number of routers, and as long as route maps and filtering are applied, the network
should be free of routing loops and maintain full network connectivity.
- 323 -
CCNP Practical Studies: Routing
!
router rip
redistribute ospf 1 metric 1
passive-interface Loopback0
passive-interface Loopback1
passive-interface Loopback2
passive-interface Loopback3
passive-interface Loopback4
network 131.108.0.0
!
route-map allowout permit 10
match interface Loopback1 Loopback2 Loopback3 Loopback4
!
end
- 324 -
CCNP Practical Studies: Routing
Practical Exercises are designed to test your knowledge of the topics covered in this chapter. The Practical Exercise begins by giving you
some information about a situation and then asks you to work through the solution on your own. The solution can be found at the end.
Figure 8-7 displays a three-router topology running four routing algorithms, all using /24-bit subnet masks. Loopbacks are used on Routers
R1–R3 to populate the network with IP routing entries.
Configure all three routers. Use filtering and make extensive use of passive interfaces to avoid routing loops. Ensure that routing updates
are sent to only the relevant interfaces.
The issue of FLSM and VLSM is not paramount in this topology because all subnets are /24. So the main issue to be aware of is filtering.
Each router is configured for local loopbacks and an interior routing protocol, EIGRP, is configured across the WAN.
After you configure the loopbacks and WAN links are operational, you start by enabling the local LAN interfaces. Then configure
redistribution by using filtering wherever required to avoid routing loops. One common troubleshooting scenario is to create a loop by
disabling split horizon and then configuring route maps and/or filtering to stop the routing loop—great fun, but only in a practice lab, of
course.
- 325 -
CCNP Practical Studies: Routing
The following configurations provide a sample working solution to the network topology in Figure 8-7. You can, however, configure this
network many different ways. Static routes are not used in this design.
R1 is configured for RIP and EIGRP. The redistribution on R1 is filtered to deny any locally sourced networks on R1. All other networks
are allowed into R1's IP routing table. The shaded portions in Example 8-87 are key configuration commands for filtering.
- 326 -
CCNP Practical Studies: Routing
!
access-list 1 deny 141.108.0.0 0.0.7.255
access-list 1 permit any
!
line con 0
line aux 0
line vty 0 4
end
- 327 -
CCNP Practical Studies: Routing
!
access-list 1 deny 141.108.8.0 0.0.7.255
access-list 1 permit any
!
line con 0
line aux 0
line vty 0 4
!
end
- 328 -
CCNP Practical Studies: Routing
distribute-list 1 in
!
router ospf 1
network 141.108.16.0 0.0.7.255 area 100
!
ip classless
access-list 1 deny 141.108.16.0 0.0.7.255
access-list 1 permit any
!
line con 0
line aux 0
line vty 0 4
!
end
Example 8-90 displays the IP routing table on R1, demonstrating full network connectivity.
The redistributed networks from R2 and R3 appear as external EIGRP routes (D EX). Also, because the composite metric to the WAN
network 151.108.253.0/24 is the same, EIGRP is load balancing. The EIGRP topology table on R1 confirms the same composite metric.
Example 8-91 displays the EIGRP topology table on R1. The shaded portions display the dual path to 151.108.253.0.
- 329 -
CCNP Practical Studies: Routing
- 330 -
CCNP Practical Studies: Routing
R1#
Example 8-92 confirms network IP connectivity by pinging all the remote networks from R1.
- 331 -
CCNP Practical Studies: Routing
Review Questions
The answers to these question can be found in Appendix C, "Answers to Review Questions."
1: How many IP routing tables are there when more than one routing protocol is configured on a Cisco router?
2: Which path is preferred if OSPF and EIGRP have dynamically discovered a remote network?
3: What common methods are used to control routing updates and filtering?
4: What is the metric used by OSPF, and is the lower or higher metric the chosen path?
6: Which command stops updates from being sent out of any interface?
7: Which parameter does the Cisco IOS always compare before looking at routing metrics, such as hop count or OSPF cost?
10: What are the three methods commonly applied to avoid routing loops when redistribution is required?
- 332 -
CCNP Practical Studies: Routing
Summary
Redistribution from one routing protocol to another has been extensively covered in this chapter. The issues of routing loops and metric
conversion from one routing protocol to another have been demonstrated, and you should now have the skills necessary to enable any form
of route redistribution. Routing between classless and classful domains is one of the major learning tools you must master quickly in any IP
network. In such a situation, information can be controlled to ensure that the network is routing IP as correctly and efficiently as possible.
Mastering distribution lists, static routing, and route maps enables you to avoid routing loops and ensure that full IP connectivity still exists.
You should now be ready to apply the information in this and all of the previous chapters to the self-study lab in Chapter 9, "CCNP
Routing Self-Study Lab."
Table 8-3 summarizes the most important commands used in this chapter.
- 333 -
CCNP Practical Studies: Routing
This lab is presented in small sections and provides you a specific amount of time to complete the tasks so that you can ensure that all
features are configured in a timely manner, allowing you the ability to tackle any similar Cisco-based certification or real-life network
topology configuration.
NOTE
The following lab is designed to draw together some of the content described in this book and some of the content you have seen in your
own networks or practice labs. There is no one right way to accomplish many of the tasks presented here. The abilities to use good practice
and define your end goal are important in any real-life design or solution.
The Ethernet interfaces on all routers are connected to a Catalyst 6509 switch.
Hints are provided to ensure that you are aware of any issues or extra configuration commands required to complete a specific task.
Full working solutions are provided, along with the configuration of a Catalyst 6509 used to create the LAN-based networks, and the two
ISP routers simulating an Internet service.
Following the full configurations in the solution section, a section displays sample routing tables taken from each router, as well as some
sample ping and telnet commands to demonstrate full IP connectivity.
The IBGP and EBGP network connectivity is demonstrated displaying the BGP tables.
- 335 -
CCNP Practical Studies: Routing
Use common Cisco defined techniques by using the IOS description name of link command to provide documentation for all serial links
and virtual LANs.
•
•
VLAN 100 is connected to R1 E0/0.
•
VLAN 200 is connected to R2 E0/0.
•
VLAN 300 is connected to R3 E0.
•
VLAN 400 is connected to R4 E0.
•
VLAN 500 is connected to R5 E0.
•
VLAN 550 is connected to R5 E1.
VLAN 600 is connected to R6 E0.
- 336 -
CCNP Practical Studies: Routing
Configure the management interface (or sc0) on the switch with the IP address 133.33.1.2/29, and ensure that all routers can Telnet to the
switch after you have completed configuring your IGP protocols.
Configure a default route pointing to R1's Ethernet interface, IP address 133.33.1.1/29 on Catalyst 6509.
•
•
Use a 29-bit mask for VLAN 100 and a 25-bit mask for VLAN 200 and VLAN 300.
•
Use a 27-bit mask for VLAN 400.
•
Use a 24-bit mask for VLAN 500, VLAN 550, and VLAN 600.
•
Use a 30-bit mask for all WAN connections on Routers R1, R2, R3, and R4.
Use a 24-bit mask for the WAN connection between Routers R4/R5 and R4/R6.
After IP routing is completed, all interfaces should be pingable from any router.
Configure each router with a loopback interface. Assign the loopbacks on each router using the range of addresses from 133.33.201.0–
133.33.206.0 and a Class C mask.
It must be possible to ping and telnet to the loopbacks from any one router. Test IP connectivity by pinging from R1, and ensure that you
can telnet to any router within your network after you complete all IGP routing protocol configurations.
- 337 -
CCNP Practical Studies: Routing
Table 9-2 displays the loopback addresses you need to assign to all six routers.
Ensure that all loopbacks in Table 9-2 appear as 24-bit networks in all IP routing tables, by using the interface ip ospf network point-to-
point command for all routers configured with OSPF.
Create seven loopback interfaces in R1 by using 24-bit network masks in major networks ranging from 133.33.16.0/24–133.33.23.0/24.
Create seven loopback interfaces in R2 by using 24-bit network masks in major networks ranging from 133.33.24.0/24 to 133.33.31.0/24.
Ensure that you perform network summarization of these loopbacks to reduce IP routing table size wherever possible.
Configure a static route on R5 to ensure that all loopbacks ranging from 133.33.16.0 to 133.33.31.0 are encompassed by a single static
routing entry. (Hint: The subnet mask for a static route is 255.255.240.0.)
•
•
Configure IGRP on R5 E0/E1 and for the serial link between R4 and R5.
•
Ensure proper filtering is configured on R4 to send only networks that do not reside on R5.
•
Redistribute the IGRP route into OSPF/EIGRP domain. View the OSPF section for details on redistribution.
•
Make sure you can see distributed IGRP routes throughout the topology.
By using the IOS passive-interface command, ensure that only the correct interfaces residing in the IGRP AS are configured to
send and receive IGRP updates. This ensures that router resources are not unnecessarily consumed.
•
•
Configure the link between R4 and R6 in EIGRP domain 1.
•
Configure VLAN 600 to reside in domain 2.
•
Redistribute between EIGRP 1 and 2 and ensure network connectivity.
•
Ensure that the IGRP domain and OSPF domain have these networks present in their respective IP routing tables.
Ensure that VLAN 600 (133.33.6.0/24) and the loopback subnet on R6 (133.33.206.0/24) OSPF cost metric are set to 1000.
(Metric type 2 by default is configured when redistributing from any protocol into OSPF.) Hint: Use the route-map command to
•
complete this task.
Configure R6 to set all external EIGRP routes (D EX) in AS 1 with an administrative distance of 90 (the same AD as internal
EIGRP routes).
- 338 -
CCNP Practical Studies: Routing
•
•
Configure the serial back-to-back links between R1/R2, R2/R3, and R1/R3 in the backbone (area 0.0.0.0).
•
Configure the serial link between R3 and R4 in OSPF area 350.
•
Configure VLAN 100 in area 100.
•
Configure VLAN 200 in area 200.
•
Configure VLAN 300 in area 300.
•
Configure VLAN 400 in area 350.
•
Additional areas are not required.
Ensure that any OSPF areas not connected to area 0 are configured with an OSPF virtual link to ensure IP connectivity. (Hint: No
•
virtual links are required because no OSPF areas are partitioned from the backbone area, or 0.0.0.0.)
•
Assign any loopbacks into already existing areas.
Redistribute OSPF into EIGRP and IGRP to maintain full-network connectivity.
•
•
Ensure that R3 is always the DR on VLAN 300 by setting the OSPF priority to 255.
•
Change the Hello interval between R1/R3 WAN link to 25 seconds.
Configure MD5 authentication between R1/R3 WAN link setting the password to ccnp. (Hint: All routers in area 0 require
•
authentication; hence, the serial link between R1/R2 requires MD5 authentication as well.)
Configure the local names of Routers R1–R6 so that all OSPF-enabled routers can perform an OSPF name lookup (using the
•
loopbacks in Table 9-2 as IP addresses) for all OSPF adjacencies.
Ensure that the router ID on all OSPF enabled-routers (R1 to R4) match the loopbacks used in Table 9-2. (Hint: Use the router-
•
id command under the OSPF process ID.)
•
Configure area 200 as a stub area.
Ensure that the OSPF cost as seen by R1 and R3 for VLAN 200 is 1000.
Configure IBGP (your autonomous system number is 1) within your network to meet the following conditions:
• All routers are configured with minimum number of IBGP peers for scalability; this means you must use route reflectors and
•
configure R1 as the route reflector to R2, R3, R4, R5, and R6 (route reflector clients).
•
Use BGP peer groups on R1 to minimize the BGP configuration code required on R1.
•
Disable BGP synchronization on all IBGP routers.
•
All IBGP routers should receive routing updates from R1 only.
All IBGP connections must be active as long as there is an active path between the routers; hence, use the assigned loopback
interfaces as your source and next hop peer address for establishing TCP sessions. (Hint: Because there are redundant paths, the
best practice in an IBGP network is to use loopback interfaces as the source and destination addresses for all IBGP peer sessions.)
- 339 -
CCNP Practical Studies: Routing
• Router R1 has two EBGP connections to the same ISP for redundancy purposes. Configure R1-R6 to meet the following
•
requirements:
•
Configure EBGP between R1 (AS 1) and ISP1/ISP2 (AS 1024).
•
The Routers ISP1/ISP2 are both connected to AS 1024.
Configure ISP1 and ISP2 to provide a default route to R1, along with some specific routing destinations using static routes to
Null0. Example 9-1 displays the static route configurations on ISP1 and ISP2.
• The ISP has provided you with the following next hop addresses and your local AS number:
- The R1 S0/0 next hop address is 171.108.1.1/30, and the remote AS is 1024.
- The R1 S1/3 next hop address is 171.108.1.5/30, and the remote AS is 1024.
• Configure EBGP on R1 and ensure that all advertised routes from ISP1 and ISP2 are present in R1's BGP table.
Using policy-based routing, ensure that all traffic sent from R3 (from users on VLAN 300) meets the following criteria:
•
•
All Internet traffic sent to the default route 0.0.0.0 is sent through R1.
•
All ICMP traffic is sent through R2.
•
All other traffic is sent through R1.
Using the IOS debug ip policy command, ensure that IP traffic is sent over the correct interface.
- 340 -
CCNP Practical Studies: Routing
Configure R1 to set the following attributes for networks from the ISP routers named ISP1/ISP2:
•
•
Prepend all networks in the range 1.0.0.0 to 9.0.0.0 with the AS_Path 400 300 200 and set the origin attribute to incomplete.
Set the weight of all networks received from ISP1 to 100 and ISP2 to 200.
- 341 -
CCNP Practical Studies: Routing
- 342 -
CCNP Practical Studies: Routing
- 343 -
CCNP Practical Studies: Routing
!
interface Loopback1
ip address 133.33.24.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback2
ip address 133.33.26.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback3
ip address 133.33.25.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback4
ip address 133.33.27.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback5
ip address 133.33.28.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback6
ip address 133.33.29.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback7
ip address 133.33.30.1 255.255.255.0
ip ospf network point-to-point
!
interface Loopback8
ip address 133.33.31.1 255.255.255.0
ip ospf network point-to-point
!
interface Ethernet0/0
description VLAN 200 (OSPF Area 200)
ip address 133.33.3.1 255.255.255.128
ip ospf cost 200
!
interface TokenRing0/0
no ip address
shutdown
ring-speed 16
!
interface Serial1/0
description Serial Link to R1 S1/0
bandwidth 125
ip address 133.33.7.2 255.255.255.252
ip ospf authentication message-digest
ip ospf authentication-key ccnp
no ip mroute-cache
no fair-queue
!
interface Serial1/1
description Serial Link to R3 S0
bandwidth 125
ip address 133.33.7.9 255.255.255.252
!
interface Serial1/2
no ip address
shutdown
- 344 -
CCNP Practical Studies: Routing
!
interface Serial1/3
no ip address
shutdown
!
router ospf 1
router-id 133.33.202.1
area 0 authentication message-digest
area 200 stub
area 200 range 133.33.24.0 255.255.248.0
network 133.33.3.1 0.0.0.0 area 200
network 133.33.7.2 0.0.0.0 area 0
network 133.33.7.9 0.0.0.0 area 0
network 133.33.24.0 0.0.7.255 area 200
network 133.33.202.1 0.0.0.0 area 0
!
router bgp 1
no synchronization
neighbor 133.33.201.1 remote-as 1
neighbor 133.33.201.1 update-source Loopback0
!
ip classless
ip ospf name-lookup
!
line con 0
line aux 0
line vty 0 4
!
end
- 345 -
CCNP Practical Studies: Routing
no ip directed-broadcast
shutdown
!
interface Serial0
description Serial Link to R2 S1/1
bandwidth 125
ip address 133.33.7.10 255.255.255.252
no ip directed-broadcast
ip ospf authentication-key ccnp
fair-queue 64 256 0
clockrate 125000
!
interface Serial1
description Serial Link to R4 S1
bandwidth 125
ip address 133.33.7.13 255.255.255.252
no ip directed-broadcast
fair-queue 64 256 0
clockrate 2000000
!
interface Serial2
description Serial Link to R1 S1/1
ip address 133.33.7.6 255.255.255.252
ip ospf authentication-key ccnp
ip ospf hello-interval 25
clockrate 125000
!
interface Serial3
shutdown
!
router ospf 1
router-id 133.33.203.1
area 0 authentication message-digest
network 133.33.4.1 0.0.0.0 area 300
network 133.33.7.6 0.0.0.0 area 0
network 133.33.7.10 0.0.0.0 area 0
network 133.33.7.13 0.0.0.0 area 350
network 133.33.203.1 0.0.0.0 area 0
!
router bgp 1
no synchronization
neighbor 133.33.201.1 remote-as 1
neighbor 133.33.201.1 update-source Loopback0
!
ip local policy route-map sendtraffic
ip ospf name-lookup
!
access-list 1 permit 0.0.0.0
access-list 100 permit icmp any any
access-list 101 permit ip any any
route-map sendtraffic permit 10
match ip address 1
set interface Serial2
!
route-map sendtraffic permit 20
match ip address 100
set interface Serial0
!
route-map sendtraffic permit 30
match ip address 101
- 346 -
CCNP Practical Studies: Routing
- 347 -
CCNP Practical Studies: Routing
router ospf 1
router-id 133.33.204.1
redistribute connected subnets route-map connectedroutes
redistribute eigrp 1 metric 100 subnets route-map eigrpnets
redistribute igrp 1 metric 100 subnets route-map igrpnets
network 133.33.5.1 0.0.0.0 area 350
network 133.33.7.14 0.0.0.0 area 350
network 133.33.204.1 0.0.0.0 area 350
!
router igrp 1
redistribute static metric 128 20000 255 1 1500
redistribute ospf 1 metric 128 20000 255 1 1500
passive-interface Ethernet0
passive-interface Loopback0
passive-interface Serial1
passive-interface Serial3
network 133.33.0.0
distribute-list 1 out
!
router bgp 1
no synchronization
neighbor 133.33.201.1 remote-as 1
neighbor 133.33.201.1 update-source Loopback0
!
ip classless
ip route 133.33.1.0 255.255.255.0 Null0
ip route 133.33.3.0 255.255.255.0 Null0
ip route 133.33.4.0 255.255.255.0 Null0
ip route 133.33.5.0 255.255.255.0 Null0
ip route 133.33.7.0 255.255.255.0 Null0
no ip http server
ip ospf name-lookup
!
access-list 1 deny 133.33.205.0
access-list 1 deny 133.33.8.0
access-list 1 deny 133.33.9.0
access-list 1 permit any
access-list 2 permit 133.33.205.0
access-list 2 permit 133.33.8.0
access-list 2 permit 133.33.9.0
access-list 2 permit 133.33.10.0
access-list 3 deny 133.33.206.0
access-list 3 deny 133.33.6.0
access-list 3 deny 133.33.11.0
access-list 3 permit any
access-list 4 permit 133.33.206.0
access-list 4 permit 133.33.6.0
access-list 5 deny 133.33.206.0
access-list 5 deny 133.33.6.0
access-list 5 permit any
access-list 6 permit 133.33.204.0
access-list 6 permit 133.33.5.0
access-list 6 permit 133.33.10.0
access-list 6 permit 133.33.7.12
access-list 6 permit 133.33.11.0
route-map igrpnets permit 10
match ip address 2
!
route-map eigrpnets permit 10
match ip address 4
- 348 -
CCNP Practical Studies: Routing
- 349 -
CCNP Practical Studies: Routing
ip classless
ip route 133.33.16.0 255.255.240.0 Serial0
!
line con 0
line aux 0
line vty 0 4
!
end
- 350 -
CCNP Practical Studies: Routing
- 351 -
CCNP Practical Studies: Routing
- 352 -
CCNP Practical Studies: Routing
Example 9-10 displays the full working configuration of the Catalyst 6509 switch. (The following configuration is also truncated; the #s are
comment lines in Catalyst 6500 series software placed by Catalyst IOS).
- 353 -
CCNP Practical Studies: Routing
!
#module 2 empty
!
#module 3 : 48-port 10/100BaseTX Ethernet
set vlan 100 3/1
set vlan 200 3/2
set vlan 700 3/11,3/15
set port name 3/1 R1 E0/0
set port name 3/2 R2 E0/0
set port name 3/3 R3 E0
set port name 3/5 R4 E0
set port name 3/7 R5 E0
set port name 3/8 R5 E1
set port name 3/9 R6 E0
set port name 3/11 ISP2 E0
set port name 3/15 ISP1 E0
set spantree portfast 3/1-48 enable
#module 4 empty
#module 5 empty
#module 6 empty
#module 7 empty
#module 8 empty
#module 9 : 8-port 1000BaseX Ethernet
#module 15 : 1-port Multilayer Switch Feature Card
#module 16 empty
end
Cat6509> (enable)
New catalyst software displays only nondefault configurations, as displayed in Example 9-10.
The following displays are presented here to demonstrate IP connectivity among all six routers. The first command used, show ip route, is
the most widely used command on Cisco IOS routers. Some ping and telnet requests from each router are also shown. Finally, BGP tables
are presented to display BGP attributes and next hop path taken from each router.
Any network designer must use common verification tools to ensure that IP connectivity is achieved. Cisco IOS contains bugs and caveats,
so even correct configurations do not always guarantee connectivity. You should familiarize yourself thoroughly with the common show,
debug, ping, and telnet commands.
This section starts by looking at the IGP network namely, OSPF, EIGRP, and IGRP.
- 354 -
CCNP Practical Studies: Routing
R1 has an OSPF cost metric to networks 133.33.3.0/24, 133.33.206.0/24, and 133.33.6.0/24 as 1000, as required. The OSPF adjacency on
R1 is displayed in Example 9-12.
Because R1 is configured with the IOS ip ospf name-lookup command and there is a host entry for R2 and R3, the remote neighboring
routers are listed as R2 and R3 in Example 9-12.
Example 9-13 displays a ping request to all IP interfaces present in Figure 9-1's interior IP routing network to demonstrate IP connectivity.
The loopbacks in Table 9-2 are used to ping from R1.
Example 9-14 displays IP connectivity to the remaining IP interfaces as described in Table 9-1. (Note the local interfaces on R1 are not
displayed or pinged from R1.)
- 355 -
CCNP Practical Studies: Routing
- 356 -
CCNP Practical Studies: Routing
Example 9-15 displays output when the show ip ospf interface command is entered on R1.
- 357 -
CCNP Practical Studies: Routing
- 358 -
CCNP Practical Studies: Routing
Example 9-15 displays the area assignments, the OSPF neighbor states, and whether authentication is in use. You can verify OSPF area
assignments and other details, such as Hello and dead intervals, with the same command (show ip ospf interface).
Example 9-17 displays a successful ping request to all six loopbacks interfaces demonstrating full IP connectivity among all six routers in
Figure 9-1.
- 359 -
CCNP Practical Studies: Routing
Example 9-18 displays the output from the IOS show ip ospf interface command.
- 360 -
CCNP Practical Studies: Routing
- 361 -
CCNP Practical Studies: Routing
Example 9-21 displays a successful ping request to all routers by using the names configured on R3. (Refer to the full configuration in
Example 9-4).
- 362 -
CCNP Practical Studies: Routing
Example 9-22 displays the output when the show ip ospf interface command is entered on R3.
- 363 -
CCNP Practical Studies: Routing
R4 is configured for three interior routing protocols: OSPF, IGRP, and EIGRP. Example 9-23 displays the full IP routing table on R4
including the BGP routes.
- 364 -
CCNP Practical Studies: Routing
- 365 -
CCNP Practical Studies: Routing
R4's IP routing table has entries for OSPF, IGRP, and EIGRP. BGP is supplied a default route from R1, and hence, the gateway of last
resort is set.
Example 9-24 displays the output from the IOS show ip ospf interface command.
- 366 -
CCNP Practical Studies: Routing
Example 9-25 displays the output from the IOS show ip ospf neighbor command on R4.
Example 9-26 displays the output from the IOS show ip eigrp interfaces command.
Example 9-27 displays the output from the IOS show ip eigrp neighbors command on R4.
Example 9-28 displays a ping request from R4 to all IP addresses in Table 9-2 to demonstrate IP connectivity.
- 367 -
CCNP Practical Studies: Routing
R5 is running only IGRP, and because the local interfaces are configured with the Class B network 133.33.0.0 with a Class C mask, R4 has
been configured to send all networks as /24, as displayed in Example 9-29.
Example 9-30 demonstrates full IP connectivity by pinging all the loopback interfaces in Table 9-2 and some of the non-Class C networks,
such as the subnets 133.33.7.0 and 133.3.1.0/29.
- 368 -
CCNP Practical Studies: Routing
Example 9-31 displays the EIGRP routing IP table on R6, which is running EIGRP in two domains: 1 and 2.
- 369 -
CCNP Practical Studies: Routing
Note that only one neighbor is pointing to R4. No EIGRP routers exist in domain 2.
Example 9-34 displays a successful ping request to all loopback interfaces in Figure 9-1.
- 370 -
CCNP Practical Studies: Routing
Telnet from the classful domain on R5 and ensure that you can telnet to all five remote routers. Example 9-35 displays an executive user
telneting from R5 to all remote routers using the loopback interfaces in Table 9-2.
Example 9-35 Telnet into R1, R2, R3, R4, and R6 from R5.
R5>telnet 133.33.204.1
Trying 133.33.204.1 ... Open
R4>quit
[Connection to 133.33.204.1 closed by foreign host]
R5>telnet 133.33.206.1
Trying 133.33.206.1 ... Open
R6>quit
[Connection to 133.33.206.1 closed by foreign host]
R5>telnet 133.33.201.1
Trying 133.33.201.1 ... Open
R1>quit
[Connection to 133.33.201.1 closed by foreign host]
R5>telnet 133.33.202.1
Trying 133.33.202.1 ... Open
R2>quit
[Connection to 133.33.202.1 closed by foreign host]
R5>telnet 133.33.203.1
Trying 133.33.203.1 ... Open
R3>quit
[Connection to 133.33.203.1 closed by foreign host]
R5>telnet 133.33.204.1
Trying 133.33.204.1 ... Open
R4>quit
[Connection to 133.33.204.1 closed by foreign host]
R5>telnet 133.33.206.1
Trying 133.33.206.1 ... Open
R6>quit
[Connection to 133.33.206.1 closed by foreign host]
R5>
Telnet is an application layer protocol, so if you can telnet from the router, users on connected interfaces routed throughout this network
also have full IP connectivity.
View the BGP tables on R1 and R2. Because IBGP is running among R1 (route reflector) and route reflector client, Routers R2–R6, the
BGP tables on R3–R6 are exactly the same as R2. Therefore, only R2's BGP table is presented here for your reference.
- 371 -
CCNP Practical Studies: Routing
- 372 -
CCNP Practical Studies: Routing
- 373 -
CCNP Practical Studies: Routing
Example 9-38 displays the BGP peer sessions on R1 in summary format using the IOS show ip bgp summary command.
The shaded peers in Example 9-38 are route reflector clients to R1.
Example 9-39 displays the TCP sessions on R1 with the IOS show tcp brief command.
R1 is configured with seven BGP TCP peers, and Example 9-39 confirms that BGP is configured with the TCP port number 179. (BGP
uses TCP port 179.)
- 374 -
CCNP Practical Studies: Routing
Summary
You have completed a complex routing topology, and although it may not be a network you will ever need to configure, you have
discovered how to route IP with any routing protocol and subnet addressing.
IP routing algorithms are complex, and the ability to configure OSPF or RIP correctly and ensure network connectivity is a rare skill, not
found in many engineers.
It is now up to you to take the skills you learned in this book and extend them further, even into areas you thought you could never master.
For example, as a further exercise, you could modify the topology in Figure 9-1 and change the routing algorithms in use to see whether
you can maintain a fully routable network.
- 375 -
CCNP Practical Studies: Routing
Becoming Cisco certified in one of the certification tracks requires much more than simply picking up a manual or book and cramming or
learning. Cisco certifications, including the most coveted CCIE examination, are regarded as the most difficult and well-respected IT
certification exams in the world. CCNPs are highly regarded in the IT industry.
Taking any Cisco examination is not an exercise you want to do repeatedly. A typical computer-based exam costs approximately $250, so
you do not want to attempt an exam more than once if you can help it.
Cisco (www.cisco.com/warp/customer/10/wwtraining/training_over/) offers many training courses, so it's best to determine whether you
need a training course to help lay the foundations.
Training courses are always packed with other candidates and offer a particular learning style, so you might not get the attention you
require. If this is the case, self-study is where you will acquire most of your knowledge.
Cisco certification exams are computer-based. As such, they are constantly evolving and questions are changed, removed, or added at any
time. Ensure that you are always updated about exam changes through the Cisco Web site.
Cisco computer-based examinations contain all multiple-choice questions. Typically, you are provided four or five possible answers, and
some questions require more than one answer. Any incorrect answer you select results in zero points.
NOTE
The following link provides all the information you need on the Routing exam, including free sample examination questions:
www.cisco.com/warp/public/10/wwtraining/certprog/testing/current_exams/640-503.html
Download the free challenge test and grade yourself. This simple tool can be useful in determining weak areas before you even book the
real examination.
In any multiple-choice examination, the process of elimination is important. To achieve time-management proficiency and the skills
required to answer questions correctly, you must practice with a simulation that places you in an exam situation. (See the previous note for
a sample simulation program.)
Typically, the questions have two options that initially appear to be correct, so you can quickly eliminate two or three options. If you can
narrow the options to two choices, you give yourself a 50 percent chance of scoring the valuable points. The tests always include easy and
hard questions, so if you come across a difficult question, mark the question for later review and move on to the next question. Time
management is crucial; if you don't attempt every question, you are at a severe disadvantage because you will not score any points for
questions you do not attempt.
- 377 -
CCNP Practical Studies: Routing
Hands-On Experience
Almost all CCIE, CCNP, and CCNA engineers will tell you that hands-on experience with Cisco routers and switches is the most valuable
learning tool. If you work daily with routers in your present job, ensure that you utilize your daily access to view how the network is
functioning using the techniques presented in this guide.
By building a small practice lab, even with just two routers, you can study any routing algorithm using loopback interfaces, as discussed in
several scenarios in this book.
Cisco Systems even provides lab access at various Cisco sites around the world, so you can view the technology and spend time
configuring Cisco IOS features for free. Take advantage of this free access to try new configurations and get expert advice from local Cisco
engineers. Contact your Cisco representative for more information.
Various Internet sites, too many to mention here, provide tuition and virtual labs. (These labs are called virtual but, in fact, are real Cisco
devices.) You can hire and actually configure Cisco IOS routers and switches for a set fee. Point your search engine toward the keywords,
Cisco virtual labs. Cisco provides an excellent product called Cisco Interactive Mentor (CIM). CIM is a virtual IOS simulator that enables
you to configure a set number of IOS features without having to purchase expensive Cisco routers.
The following link provides more details about this virtual lab program:
www.cisco.com/warp/public/710/cim/index.html
•
•
Call Sylvan Prometrics or whomever is hosting your examination and confirm your seat, the time, and the location of the exam.
•
Ensure that you have the correct directions for the testing center.
•
Confirm that your photo ID will be accepted; it's best to take your passport so you will not have any problems.
Have a relaxing evening. Some candidates attempt to cram in too much learning the night before at the cost of a good night's
sleep. The examination questions are written by folks who want you to pick the first answer that looks good, so you need to be on
your guard mentally.
• Leave plenty of time to get to the testing center; park and take a few moments to relax before the exam. Allow at least an extra
hour for any traveling involved. Sometimes, you can go in early, so you can take advantage of your adrenaline rush if you arrive
•
early.
The testing center provides a pen and some form of writing paper, typically an erasable sheet. You are not allowed anything in
•
the exam room, except a refreshment and the provided writing materials.
•
Leave all those heavy books at home.
Wear loose, comfortable clothing and take a sweater in case the room is too cold.
• If you do not know the answer to a question, try answering the question by a process of elimination. Always attempt a question
even if you are unsure of the correct answer. Mark questions you are unsure of or didn't answer so that you can return to them
•
with a fresh perspective after you have worked through other questions.
Use the materials provided to work out the logic of some questions. Typically, two answers will stand out, so try and eliminate
•
the two obviously incorrect answers as soon as you can.
Try to stay calm. Remember that you can take the exam multiple times, so even if you are struggling, you can use the exam to
your advantage by remembering the topics that are not your strengths.
Immediately after the examination, write down the topics you were not comfortable with and the source materials you need to acquire that
knowledge, even if you passed. What makes you a CCNP is passing a couple of exams, but what makes you a quality CCNP is the desire to
extend your ability with every passing moment.
- 378 -
CCNP Practical Studies: Routing
Cisco also provides online tracking, so you can track your status of any certification path at www.galton.com/~cisco/.
This Web site takes about seven days from your examination date to be updated. You can also download Certification logos for use on your
business cards, and you can keep your demographic information up to date so you are always informed of any changes.
- 379 -
CCNP Practical Studies: Routing
You can pursue one more challenging step: the coveted Cisco Certified Internetwork Expert (CCIE) certification. Cisco introduced the
CCNA and CCNP certifications so candidates can follow a preferred, gradually building path to the CCIE certification. However, CCNA
and CCNP are not prerequisites to attempt the CCIE examination.
NOTE
If you are interested in leading training courses, another difficult certification option is Cisco Certified Systems Instructor (CCSI). This
certification is aimed mainly at partners who supply the Cisco course material to the general public. For information, go to
www.cisco.com/partner/training/course_channelpartners.shtml
You need an account to access some of the URLs presented in this chapter. To obtain a guest account, visit www.cisco.com/pcgi-
bin/register/main?page=start&relation=clnc.
The guest account also enables you to book a lab seat for the CCIE examination.
CCIE is regarded as the most sought-after certification in the industry today; more and more vendors are devising their own certification
programs and trying to catch up to the industry-leading Cisco Systems. While working in the CCIE program every day for the past two
years, I have seen the many changes and challenges facing potential CCIEs. As of September 30, 2001, there were approximately 6700
CCIEs. About 110 of these 6700 CCIEs hold more than one CCIE qualification. The majority of CCIEs are located in Europe and North
America.
Before you decide to take this step, you need to be aware of the challenges in front of you. You cannot hope to become a CCIE by simply
buying a book or a series of books. Hands-on experience is required; at least two years of internetworking experience is critical, and even
then you must fully prepare for the difficult examination. Three varieties of CCIE certification are currently available:
•
•
CCIE Routing and Switching (Released 1993)
•
CCIE Security (Released August 2001)
CCIE Communications and Services (Released August 2001)
This discussion concentrates on the Routing and Switching (R&S) certification, as newer certifications generally take months or even years
to become well established. The Security examination is one examination you should also consider, especially considering today's climate
of Internet firewall frailty and demand for security experts.
NOTE
Recently, four CCIE tracks were retired: ISP Dial, SNA, Design, and WAN Switching.
Step 1. Pass a two-hour, computer-based qualification examination consisting of 100 questions. The passing mark is
approximately 70 percent, but varies according to statistics and may float between 65-75 percent.
Step 2. Pass an eight-hour lab examination where the passing score is set at 80 percent. Historically, the lab examination was a
full two-day lab; that changed in October 2001.
- 381 -
CCNP Practical Studies: Routing
•
•
Cisco device operation
•
General networking theory
•
Bridging and LAN switching
•
Internet Protocol
•
IP routing protocols
•
Desktop protocols
•
Performance management
•
WAN (addressing, signaling, framing, and so on)
•
LAN
•
Security
Multiservice
The two-hour, computer-based examination is similar to other Cisco certifications, although it is a little more difficult with many more in-
depth questions. You can view some sample questions at www.cisco.com/warp/customer/625/ccie/certifications/sample_routing.html.
NOTE
Occasionally, Cisco announces a beta trial for the Routing and Switching qualification test, and if you book the test, you pay only a small
fee compared to the standard fee of approximately $250. The following link has more information:
www.cisco.com/warp/customer/625/ccie/ccie_program/whatsnew.html
After you pass the qualification test, you are eligible to sit for the lab examination. You can book your lab examination online at the
following address:
http://tools.cisco.com/CCIE/Schedule_Lab/jsp/login.jsp
•
•
2500 series routers
•
2600 series routers
•
3600 series routers
•
4000 and 4500 series routers
•
3900 series Token Ring switches
Catalyst 5000 series switches
- 382 -
CCNP Practical Studies: Routing
Ensure that you practice with and understand these devices. Practice configuring almost every IOS feature, and fully understand what each
IOS command actually enables, instead of relying on limited experience with certain commands. Anyone can configure a Cisco router, but
the ability to understand the full consequence of a command is crucial to passing the CCIE Lab Examination.
The following are some frequently asked questions regarding the difficult one-day CCIE Lab Examination:
1: When did the lab format change from two days to one day?
A: October 2001. All CCIE certification labs around the world are testing candidates in the new one-day format.
• For lab locations in North America, South America, Europe, and Africa
Brussels, Belgium
E-mail: [email protected]
Fax: 1-919-392-0166
E-mail: [email protected]
E-mail: [email protected]
- 383 -
CCNP Practical Studies: Routing
Tel: +81-3-5324-4111
Fax: +81-3-5324-4022
E-mail: [email protected]
3: What are the maximum score and the passing score required?
A: The total examination is worth 100 points and the passing grade is 80 percent. The passing rate for first attempts is low, so expect to
take the examination more than once. Cisco will not release the passing rate.
A: E-mail your question to [email protected]. The CCIE team responds to all questions.
A: You will be escorted outside the lab. You will receive an e-mail notification within 24 hours. The e-mail notification will notify you
that the result of your lab attempt is available online at tools.cisco.com/CCIE/Schedule_Lab/jsp/login.jsp.
A: Yes you can, but you are not permitted to save any files. You can cut and paste to and from Notepad, however. The calculator is
useful for determining subnets and bit boundaries or converting hexadecimal to decimal.
A: You must allow 30 days between lab attempts. There is no limit on the number of lab attempts.
A: In addition to becoming a CCIE, you also gain access to an exclusive CCIE chat forum and CCIE merchandise, and you get a CCIE
medallion and certificate. Cisco also provides a forum accessible only by CCIE's at www.cisco.com/kobayashi/chat/cciechat.html,
which allows you to communicate with other CCIEs from anywhere around the world.
www.cisco.com/warp/customer/625/ccie/recertifications/ccie_information.html
A: Cisco will not tell you specific areas of weakness; that is left to you to decipher from the brief score report. You can, however, pay a
fee to have your lab routers re-examined for accuracy. Even with a regrade, no additional information is provided to you; you're
provided only a brief score report through e-mail with your new grade, pass or fail.
A: You are permitted to bring only necessary medication and a dictionary. No other materials are permitted. Cisco provides
refreshments at all CCIE lab sites. Lunch is also provided.
A: You can seek clarification from a proctor if you do not understand a question or the objective of a question. The proctor will not
provide answers but will ensure you understand the question. The proctor may also make any changes required in case of network
hardware failures or examination mistakes. At the end of the day, you are provided an electronic feedback form so that you can make
any comment on the lab exam or proctor. The proctor is there to ensure that you have the best possible chance of success and should
not hinder your ability to pass the test. If you feel otherwise, you can e-mail your concerns to [email protected].
12: Where can I find out more about CCIE and all the different certification tracks?
- 384 -
CCNP Practical Studies: Routing
A: The following URL provides all the material required for any of the three main CCIE tracks:
www.cisco.com/warp/customer/625/ccie/
- 385 -
CCNP Practical Studies: Routing
Chapter 1
1: Given the following host address and subnet mask combinations, determine the subnet address and broadcast addresses:
•
•
131.108.1.24 255.255.255.0
•
151.108.100.67 255.255.255.128
•
171.199.100.10 255.255.255.224
161.88.40.54 255.255.255.192
•
•
Subnet 131.18.1.0 and broadcast address 131.108.1.255
•
Subnet 151.108.100.0 and broadcast address 151.108.1.127
•
Subnet 171.199.100.0 and broadcast address 171.199.100.31
Subnet 161.88.40.0 and broadcast address 161.88.40.63
2: Given the network 141.56.80.0 and a subnet mask of 255.255.254.0, how many hosts are available on this subnet?
A: Using the formula 2n-2 = 29-2 = 512 hosts, the subnet mask 255.255.254.0 borrows nine (or n) bits from the subnet mask.
A: The broadcast address is 131.145.1.255 where 255 represents all binary 1s.
A: The main purpose of a broadcast address in the case of IP is to send out onto the wire a packet that all hosts common to the
particular subnets will see and receive. Cisco routers drop broadcasts unless you configure bridging.
5: Given the subnet in binary notation 1111111.11111111.00000000.00000000, what is the decimal equivalent?
A: RIPv2, OSPF, IS-IS, EIGRP, and BGP. These routing protocols support VLSM because the routing protocols send the subnet
mask as part of any routing update.
A: IGRP and RIP I. The only way to overcome this is to use a combination of static IP routes or a default route.
A: 2n-2 = 1022, or 2n=1024. The number of bits required in the subnet mask is 10 bits, or the subnet mask 255.255.252.0
(1111111.11111111.11111100.00000000)
- 387 -
CCNP Practical Studies: Routing
A: The slash notation is common in today's documentation and on Cisco IOS, the slash bit notation represents the number of bits
assigned to the subnet mask: /24 means 24 bits. In binary this is 11111111.11111111.11111111.00000000 or 255.255.255.0.
A: RFC 1918 defines three major classes for private use, which are address ranges that are not routable in the Internet. The
following are the three private ranges:
•
•
Class A: 10.0.0.0-10.255.255.255
•
Class B: 172.16.0.0-172.16.255.255
Class C:192.168.1-192.168.255.255
It is common in large organizations to utilize the private Class A address and use public addresses only on the Internet
connection using Network Address Translation (NAT).
Chapter 2
4: How many subnets are known by R1 using the Class B network 131.108.0.0/16?
A: There are nine subnets using two masks, 255.255.255.0 (or /24) and 255.255.255.252 (or /30).
5: From R1, a ping test is sent to three remote networks. Is the ping test successful or not? Explain why or why not?
A: The ping tests to remote networks 131.108.7.0/24, 131.108.8.0/24, and 131.108.9.0/24 are all successful because the 5 ICMP
packets are all reachable as displayed by the five ! characters.
A: Because you are using two types of masks, or VLSM. RIPv1 does not understand VLSM, so RIPv2 has been enabled to cater
to the 30-bit mask between the routers.
7: Each remote routing entry is labeled with the following information: [120/1]. What does the 120 represent and what does the 1
represent?
A: The 120 is the default administrative distance or trustworthiness of the information, and 1 represents the hop count to reach the
remote network. In this case, all the remote networks are 1 hop count away.
8: Besides a ping test, what other methods could you use to ensure connectivity to the remote networks?
A: You can use the telnet application or the trace command to ensure connectivity.
- 388 -
CCNP Practical Studies: Routing
Chapter 3
3: How many subnets are known by R1 using the Class B networks 131.108.0.0/16 and 141.108.0.0/16?
A: There are eight subnets using three masks for the Class B address 141.108.0.0. There are nine subnets using three different
masks for the Class B network 131.108.0.0.
A: R1's routing table has no entry for the network 141.108.100.1, and because there is no default network or gateway of last
resort, packets to this network are dropped.
5: Why is the remote network 141.108.6.0/32 displayed as learned through the denotation: O IA?
A: O IA indicates this remote network is learned through OSPF (O) and resides in an area not local to the router (IA). In other
words, this is an intra-area OSPF route.
6: What is the cost associated with the remote network 131.108.33.0/24 [110/74]?
Chapter 4
A: The IP route labeled as R* means that any IP packet designated for a remote destination not specifically listed in the IP routing
table is to be sent to the next hop address of 141.108.1.4 (router Simon). This is commonly referred to as the Gateway of Last
Resort (GOLR). This is typically Internet-based traffic. The gateway of last resort is also set to 141.108.1.4.
2: In Example 4-64, what is the hop count or metric to the remote network 141.108.2.0/24?
A: The RIP metric is set to 2. The actual hop count is set by the ASBR (router Simon) in Figure 4-8. Simon is configured to set all
networks with a hop count of 2 by using the command redistribute ospf 1 metric 2.
3: What path does the packet sent to the IP subnet 171.108.255.0/24 take?
A: Because this network is not listed in Sydney's IP routing table, the packet is sent to the default routing entry or the next hop
address of 141.108.1.4.
4: What type of OSPF routers are the Routers Simon, Mel, and SanFran?
A: Simon is a backbone OSPF router in area 0, as well as a router that performs route redistribution (an ASBR).
Mel is contained within one area only and because that area is the backbone, Mel is a backbone router.
SanFran is also a backbone router, but it supplies a default router and can also be classed as an ASBR.
- 389 -
CCNP Practical Studies: Routing
5: Why are static routes injected into the router named Simon?
A: Static routes are configured on this ASBR to install them into the IP routing table. Because Simon has more specific routing
entries, namely 141.108.3.1/29 and 141.108.4.1/28, the longest match rule is used to route packets to the remote networks.
Example 4-65 displays the IP routing table on Simon.
6: How many OSPF neighbor adjacencies do you expect to see on the router named Simon?
A: There should be two OSPF neighbors: one to SanFran and one to Mel. Configure the command ip ospf domain-lookup in
global configuration mode to allow OSPF to assign a name to an IP address.
7: Two methods are used in OSPF to summarize IP networks. What are they and what IOS command is used to provide
summarization?
External summarization with the IOS command summary network mask command.
8: Why does creating areas reduce the size of the OSPF database?
A: Reducing the number of areas leads to the reduction of SPF calculations and, in turn, reduces the topology table. Changes are
less likely to occur within a small group of routers than in a large group, leading to fewer SPF calculations as well.
Chapter 5
Example 5-79 displays the detailed paths to the three remote networks, 171.109.1.0, 171.109.2.0, and 171.109.3.0/24, as seen by the router
SanFran along with a successful ping to the remote networks.
- 390 -
CCNP Practical Studies: Routing
If you perform a show ip route of the network 171.109.4.0/24 on SanFran, you see the output displayed in Example 5-80.
The reason that subnet 4 is not included in the IP routing table is that the summary address configured on the router Sydney includes only
the subnets 1, 2, and 3.
- 391 -
CCNP Practical Studies: Routing
1: Example 5-79 displays the IP routing table of the Router SanFran. Which networks does the entry 171.109.0.0/22 embrace?
A: The /22 indicates a mask of 255.255.252.0 when applied to the Class B address 171.109.0.0. In binary, 252 is 1111 11100. The
last three bits includes the networks 1 (00000001), 2 (00000010), and 3 (00000011). Notice, the last two are not the same, but
the first six are (11111100 is 252). Example 5-79 confirms connectivity by displaying detailed IP route entries for the remote
networks 171.109.1.0/24, 171.109.2.0, and 171.109.3.0/24 on SanFran.
A: The default value is 90, which is more trusted than OSPF at 110. Cisco IOS developers figure that their own routing protocol is
more trustworthy than OSPF, an industry standard.
A: Example 5-81 displays adjacent EIGRP neighbors with the show ip eigrp neighbors command.
4: Why does EIGRP need to be manually configured to redistribute into another autonomous system?
A: EIGRP manually redistributes only between IGRP in the same AS. Manual redistribution is required between different
autonomous systems or routing domains.
A: Whenever a change occurs in the network, such as a network failure, the EIGRP topology table is updated by update packets
sent to all EIGRP routers in the same AS.
A: The no auto-summary command enables you to transmit subprefix routing information across classful network boundaries, and
it disables automatic summarization of subnet routes into network-level routes.
A: The variance command, under the EIGRP process, is used to allow additional paths to a remote destination when the
composite metric is not the same.
A: Stuck in Active (SIA) is not a good network condition because the EIGRP router places the network in an active state (in the
EIGRP topology table) and sends out a query to a neighbor; a failure to reply leaves the router in an active state. In the end, the
EIGRP neighbors are reset, resulting in network down times and the loss of IP data.
Chapter 6
A: clear ip bgp *.
A: router bgpas.
- 392 -
CCNP Practical Studies: Routing
3: Example 6-82 displays the output from the show tcp brief command. How many BGP sessions are in use?
A: There are two BGP TCP sessions (the foreign TCP port number is 179). Port 23 (local port) is used by Telnet.
Use Example 6-83 to answer questions 4-6. Example 6-83 displays the BGP table on a Cisco BGP router.
A: The path chosen is indicated by > on the left side of the BGP table, which indicates the next hop address 131.108.255.1.
6: What is the metric and local preference for the remote network 131.108.101.0/24?
A: The metric is set to 100 (lower is preferred) and the local preference is 200 (higher values preferred).
7: Example 6-84 displays the output from the show ip bgp summary command for a Cisco BGP-enabled router. What is the
BGP autonomous system that R2 resides in? How many BGP sessions are active, and what version of BGP is configured on
the router named R2?
A: [click here]R2's local AS number is 2 and the number of active BGP sessions is two because the state is blank. The version of
BGP in use is 4, the default setting.
- 393 -
CCNP Practical Studies: Routing
8: On a Cisco router, what value is preferred, higher or lower weight, and what is the range of values for weight?
A: Higher weight values are preferred, and the range of values for weight is 0–294967295. The default value is 0.
A: The BGP table is a collection of local and remote network entries describing the next hop address, local preference, weight,
and AS path. Based on these entries, networks are inserted into the IP routing table.
Chapter 7
A: A route reflector reflects information to only configured clients. All other peers must be fully meshed.
A: Cluster is a term used to describe a router reflector and the configured route reflector clients. Route reflectors are used in
IBGP networks only.
A: Route reflector clients are configured for normal IBGP peering. The route reflector has additional commands to ensure that
updates are reflected from one route reflector client to another.
A: This display is a BGP table and is output when the IOS show ip bgp command is used in exec or privileged mode.
A: The number of peers without the use of route reflectors is n(n-1)/2, where n is the number of BGP routers. For example, with
1000 BGP routers, the number of peers is 1000(999)/2 = 499500. With the use of route reflectors, you would only need 999
peers (use the formulae (n-1) where n is the number of routers), which is only 0.2 percent of the same fully meshed network.
6: Provide the IOS command syntax to enable a default route to be sent to a remote peer.
7: To display route reflector clients, which show command(s) can you use, if any?
A: To view route reflectors, you can use two methods on the route reflector: one is to use the IOS show ip bgp neighbors
command, and the second is to view the running configuration with the IOS show running-config command.
8: View the following BGP table. What is the originating AS for the remote preferred path to the remote network
- 394 -
CCNP Practical Studies: Routing
141.108.1.0/24?
R5#show ip bgp
BGP table version is 22, local router ID is 171.108.1.2
Status codes: s suppressed, d damped, h history, * valid, > best, i -
internal
Origin codes: i - IGP, e - EGP, ? - incomplete
A: Cisco IOS always displays the AS path taken, and in this example, the path traversed to reach the remote network 141.108.1.0
is through the AS 2000, then 100, and originating from AS 300.
9: Using a route map, which IOS command sets the weight and local preference attribute to 100?
A: First, you must define a route map with an arbitrary name (ccnp in this example) and then complete the following set of
commands:
R5(config)#route-map ?
WORD Route map tag
R5(config)#route-map ccnp
R5(config-route-map)#set weight 100
R5(config-route-map)#set local
R5(config-route-map)#set local-preference 100
After defining the route map, you must apply it to remote BGP peers on the inbound or outbound direction required.
10: Can you set the BGP attribute next-hop-self to both EBGP and IBGP peers?
A: No. The next-hop-self attribute is used for IBGP peers only. The IOS command to set this attribute to remote peers is
neighbor ip-address next-hop-self.
Chapter 8
1: How many IP routing tables are there when more than one routing protocol is configured on a Cisco router?
A: There is only one IP routing table, which can include routing information dynamically discovered using OSPF or RIP. For
example, the following indicates all the possible routing methods on a Cisco router:
2: Which path is preferred if OSPF and EIGRP have dynamically discovered a remote network?
A: The Cisco IOS gives administrative distance first priority given. EIGRP AD is 90 and OSPF is 110. The lower AD is more
trustworthy, so the Cisco IOS chooses EIGRP. You can change the default AD values by using the IOS distance command.
- 395 -
CCNP Practical Studies: Routing
3: What common methods are used to control routing updates and filtering?
A: The main methods are passive interfaces, distribution lists, and route maps.
4: What is the metric used by OSPF, and is the lower or higher metric the chosen path?
A: OSPF's metric is cost (ranging from 1 to 65535). The lower cost is always preferred to a remote destination.
A: No, directly connected interfaces have an AD of 0, compared to 1 for static routes. Lower ADs are always preferred.
6: Which command stops updates from being sent out of any interface?
A: passive-interface interface stops updates from being sent, although, updates are still received and processed.
7: Which parameter does the Cisco IOS always compare before looking at routing metrics, such as hop count or OSPF cost?
A: Before looking at routing protocol metrics, Cisco IOS chooses any remote path by comparing administrative distance. For
example, EIGRP (AD 90) is preferred over OSPF (AD 110) routers. Lower ADs are always preferred.
10: What are the three methods commonly applied to avoid routing loops when redistribution is required?
Passive interfaces— A passive interface is a Cisco interface configured for routing, but it does not send any routing
information on the outbound interface. Routing information (if any) is still received and processed normally.
Distribution lists— Distribution lists define which networks are permitted or denied when receiving or sending routing
updates. Distribution lists require that you configure access lists to define which networks are permitted or denied.
Route maps— Route maps can also be used to define which networks are permitted or denied. Route maps can also be
used along with access lists to define which networks are permitted or denied when you apply match statements under
any route map configuration options.
- 396 -
CCNP Practical Studies: Routing
Today, many published books describe how to achieve CCIE, but in reality, no matter how many books you purchase, it all comes down to
your level of hands-on experience. The strict nondisclosure agreement policed by Cisco ensures that candidates do not share any
information about the lab content. Therefore, you'll know little about the lab content before your first attempt. In fact, the FBI has been
involved in recent cases in which individuals have been jailed for selling information directly related to CCIE lab examinations.
The CCIE team has approved a sample CCIE multiprotocol lab for inclusion in this book so that you can be aware of the level of difficulty
you must prepare to encounter when attempting the CCIE lab. Solutions are not provided in this book per a request from Cisco's CCIE
department, so you must research the various solutions on your own.
The end goal of any CCIE lab is a working network solution. You might be restricted in the way you provide a working solution, as you
will discover in this sample CCIE lab.
Candidates who prepare for the CCIE lab often ask me how to best prepare for the lab. My answer to them is to practice and configure
every feature available and then practice even more. Of course, not every feature is tested, and you are encouraged to read the most up-to-
date information on the Web at www.cisco.com/warp/customer/625/ccie/.
You must be able to provide a working solution quickly and adhere to the guidelines stated in the lab. A good analogy is a driving test.
Imagine you are asked to drive down a 100-mile length of perfectly straight road. Imagine every 100 feet, a sign indicates a possible action
you must take. The exam designer does not necessarily ask about the best solution, and you must have a broad knowledge of all IOS
features to configure challenging and difficult scenarios.
The CCIE lab changed dramatically in format in October 2001 from a two-day lab to a one-day lab. A CCIE candidate is no longer
required to sit through a separate troubleshooting section but must configure a network in eight hours.
One of the most critical skills in the new CCIE lab format is time management. Therefore, in this guide, each section describes the time
constraints within which you should complete that section. This lab is designed to be completed within eight hours. If a section has no time
allocation, that section has already been completed for you in the real CCIE lab. For example, this sample lab asks you to physically cable
the network. No time allocation is provided, because in the real CCIE lab, the physical cabling is already completed for you.
NOTE
This sample lab incorporates many of the technologies and concepts covered in this guide, but often at an elevated level. Because this
appendix covers a sample CCIE lab, the exercises presented in this lab require a broad perspective and knowledge base and experience that
goes beyond even the practical examples presented earlier in this guide.
Figures D-1 and D-2 show the topology and assignments for this sample lab.
- 397 -
CCNP Practical Studies: Routing
NOTE
- 398 -
CCNP Practical Studies: Routing
Configure the communication server so that when you type the host name of a router on the server, you are connected across the console
port to that router:
•
•
Set up the routers as shown in Figure D-1.
•
Configure R1 as the communication server by using the ip host command.
•
Communication server ports 2 through 8 are connected to routers R2 through R8, respectively.
•
Communication server port 9 connects to the Catalyst Ethernet switch.
•
Communication server port 10 connects to the Catalyst Token Ring switch.
R9 is a Catalyst 6509 switch with a Multilayer Switch Feature Card (MSFC) module installed.
NOTE
From October 1, 2001 onward, a CCIE candidate is not required to cable the lab network physically. Therefore, no time allocation is given
to this section. This section is added for completeness only.
You network is already physically patched. Construct your network as shown in Figure D-1.
•
•
All rings should be set to 16 Mbps and should have an MTU size of 1500.
•
All serial links between routers are connected through a Frame Relay switch.
Routers R1 and R4 are connected to an ISDN service with the switch type defined as basic-5ess. R1 connects to number plan
•
0298017705, and R4 connects to number plan 0296307050.
•
Routers R1, R2, R3, R4, R6, and R7 are connected to the Catalyst Ethernet switch (Catalyst 6509 series switch).
Routers R1, R5, and R8 are connected to the Catalyst Token Ring switch (Catalyst 3900 series switch).
•
•
VLAN 2, named VLAN_A, is connected to R1 and R2.
•
VLAN 3, named VLAN_B, is connected to R3.
•
VLAN 4, named VLAN_C, is connected to R4.
•
VLAN 6, named VLAN_D, is connected to R6 and R9.
VLAN 7, named VLAN_E, is connected to R7.
Using VLAN_A, configure the management interface SC0 with the address 131.108.0.2/25. Ensure that all devices in your network can
telnet to the switch even if R1 or R2 is down.
Ensure that the switch is configured in the VTP domain Cisc0_vTp and the switch can create and delete VLANs in the future.
•
•
Ensure that the switch never becomes the root bridge on VLAN_D.
•
Ensure that the switch has the best possible chance of becoming the root bridge in VLAN_E.
•
Set all Ethernet ports to forward data immediately after a device is plugged in or activated.
Set the hello time on VLAN_B to 10 seconds.
- 399 -
CCNP Practical Studies: Routing
•
•
Disable Cisco Discovery Protocol on ports 3/1-8.
•
Ensure that any IP phones installed or connected to Card 3 are supplied inline power.
•
Ensure that the switches get a clock source from R1 using NTP.
Ensure that the only MAC address permitted to access the switch on port 3/3 is the MAC address 2010-2010-2010 or 4000-0000-
•
4000.
•
Disable power redundancy on the switch.
Warn all Telnet clients that any "unauthorized access is not permitted" by displaying a warning message when any Telnet session
•
is activated to the SC0 interface only.
If any ports become disabled because of hardware errors, ensure that the switch automatically enables the affected ports after 10
minutes.
Example D-1 displays the hardware profile on the Catalyst 6509 switch.
By using the information displayed in Example D-1, configure the MSFC for IP routing in VLAN 6 using RIPv2 only.
Because of recent changes to the CCIE exam, the candidate is not required to configure IP addressing; however, the subject is presented
here to ensure potential CCIE candidates have a good understanding of IP address spaces and subnetting. Therefore, no time is projected
for this section.
- 400 -
CCNP Practical Studies: Routing
Use the Class B subnetted IP address 131.108.0.0 to 131.108.255.255 to design your network. You must use this address space for all
addresses unless a different address space is specified in a particular question. Ensure that you read the entire paper before designing your
IP address space.
After your IP address space and IP routing are complete, it must be possible to reach all your routers and switches. Set the enable password
for all routers and switches to ccieToBe.
•
•
Use a 25-bit mask for VLAN 2.
•
Use a 27-bit mask for VLAN 3.
•
Use a 28-bit mask for VLAN D.
•
Use a 24-bit mask for VLAN E.
•
Use a 26-bit mask for all Token Ring networks.
•
Use a subnet with the least number of hosts for the ISDN link.
•
Use a 29-bit mask for all Frame Relay connections running classless IP routing protocols.
Use a 24-bit mask for all Frame Relay connections running classful IP routing protocols.
Assign each router a 24-bit subnet for the loopback address to use. It must be possible to ping and telnet from any one router using the
loopback address.
Configure local IP host addresses on each router so that an exec or privilege user can type the router name to ping or telnet without having
to type the full IP address.
•
•
You have to use static maps for each protocol. No dynamic mapping is permitted.
•
No subinterfaces are allowed on any router.
•
Use a most efficient subnetwork for IP addresses on the Frame cloud.
•
You may assign a subnet from your Class B range.
Use LMI type to Cisco only, and do not rely on autosensing the LMI type on any routers. All router interface types are DTE. The
•
Frame port type is DCE.
•
Do not use the keyword broadcast for the Frame Relay link between R6 and R7 when mapping IP.
Ensure that you can also ping the local interface from each router configured for Frame Relay.
•
•
Configure RIP on R6 E0 and R9 E0.
•
Ensure that only unicast updates are sent and received.
•
Authenticate any RIP packets.
•
Redistribute the RIP route into IGRP domain.
Make sure you can see distributed RIP routes throughout your topology.
- 401 -
CCNP Practical Studies: Routing
•
•
Use 10 as the AS number for IGRP.
•
IGRP covers the link between R6 and R7 only.
•
Redistribute the IGRP routes into OSPF domain.
•
Make sure you can see distributed IGRP routes throughout your topology as Type 1 OSPF routes.
Redistribute the OSPF and external EIGRP routes with an administrative distance of 199 in the EIGRP domain.
•
•
Configure EIGRP in domain 333 between the serial link on R7 to R8, R3 to R8, and Ring 800.
Summarize as much as possible to reduce the redistributed routes into OSPF, but ensure that all routes appear in the IGRP and
•
RIP domains.
•
Ensure that EIGRP is authenticated across the Frame Relay connections.
•
Redistribute the EIGRP routes into OSPF domains with a cost metric of 1000 seen on all OSPF routers.
Ensure that R3 never sends any updates across the Ethernet (E0) segment.
Configure OSPF as described in Figure D-1. Do not create any unspecified OSPF areas:
•
•
Configure the OSPF backbone over the Frame Relay network between the three routers: R2, R4, and R7.
•
The ISDN link between R1 and R4 resides in the area 0.0.0.0.
•
The link between R4 and R5 is in area 4.
•
Ring 100 is in area 100.
•
Ring 500 is in area 500.
•
The Ethernet segment between R1 and R2 resides in area 1.
•
The Ethernet segment on R4 resides in area 0.0.0.40.
•
Ensure that all OSPF routes are redistributed and reachable in the IGRP, RIP, and EIGRP domains.
•
Ensure that the OSPF backbone in the Frame cloud is authenticated.
•
Ensure that R1 will never be the DR on all segments.
•
Ensure that R4 is the DR in the OSPF backbone network.
•
Ensure that the router ID of all OSPF-enabled routers is the loopback address.
•
Do not create any additional areas.
•
Set the hello interval between the link R1 and R4 to 25 seconds.
•
Set the hello interval on R2 Ethernet segment to 20 seconds.
Ensure that all loopbacks appear as /24 bit networks on all IP routing tables. Do not use the redistribute connected command on
•
any router to accomplish this.
Ensure that area 0.0.0.40 is configured so that excessive CPU resources are not consumed on Router R4. You can assume no
other areas or routers are attached to this segment.
•
•
Configure IPX directly on all interfaces except all WAN and loopback interfaces.
•
All routers must be able to see all other IPX routes and must be able to IPX ping each router.
•
You can use IPX EIGRP as your routing protocol.
•
Disable IPX RIP wherever possible.
Configure NLSP between R6 and R7. You cannot configure IPX addressing on the Frame Relay link. Between R6 and R7, do not
•
enable EIGRP IPX.
Configure two IPX services on R1 named IPXServ1, acting as an IPX server, and IPXPrn1, acting as a printer server. Ensure that
•
all IPX-enabled routers can reach these two server SAPs, except Router R3.
Ensure that you can IPX ping across your network.
- 402 -
CCNP Practical Studies: Routing
•
•
ISDN switch type: basic-5ess
ISDN numbering:
- R1: 0298017705
- R4: 0296307050
•
•
Only when S0 of R1 goes down, R1 should place an outgoing call to R4.
•
R4 cannot call R1 under any circumstances.
•
Use PPP encapsulation and the strongest authentication available.
•
Ensure that you never bring up more than one B channel to keep costs to a minimum.
•
When the Frame Relay link is restored, bring down the ISDN link after 25 minutes.
When the ISDN is active, all routers must be able to ping and telnet the local ISDN interfaces on R1 and R4.
•
•
Rings 100, 500, and 800 should have connectivity to VLAN 2 and 3.
•
SNA hosts reside on Rings 100 and 500.
•
Hosts on Ring 500 are used only when Ring 100 is not reachable.
•
Ensure that all routers peer to R1 and only in a network failure do DLSw+ circuits terminate on R5.
•
DLSw+ peers should be active only when user-based traffic (SNA/NetBIOS) is sent or received.
•
If IP connectivity exists, ensure that DLSw+ remains established.
•
Use a different virtual ring group on each router.
Configure a filter that blocks NetBIOS packets with the destination name SimonisaCCIE from leaving R5 and R8. Permit all
•
other NetBIOS traffic starting with the name Simonis?***.
Ensure that remote DLSW+ peers do not send too many queries for the destination MAC address 0200.0200.0200 on Ring 100 or
•
VLAN 2.
•
Ensure that VLAN 2 can reach hosts on Ring 100.
Ensure that the only SAPs enabled on R3 are null SAPs and SAP 08.
R1 and R2 are running the same IOS code and are the same router hardware type (Cisco 2503 routers).
Administrators must still use the enable password ccieToBe on all routers to access privilege mode.
To allow nonprivileged users access to R1 and the ability to clear terminal server lines, ensure that all exec users can use the IOS clear in
exec mode on Router R1 only.
- 403 -
CCNP Practical Studies: Routing
Ensure that the remaining network can access the host with the IP address 10.10.1.100/24.
•
•
Do not use any WAN IP interfaces for IBGP sessions, as your network is prone to failures across the Frame Relay cloud.
•
Configure R5 and R8 as route reflectors, and ensure that all traffic uses a preferred path through router R5.
•
Minimize IBGP configurations as much as possible.
•
Do not disable BGP synchronization.
•
Use AS 2002 on all IBGP routers.
•
As long as there is IP connectivity in your network, ensure BGP is active in all routers.
•
Using the network command only, ensure that all networks are advertised to the route reflectors R5 and R3.
•
Do not change the administrative distance on any interior routing protocol.
•
Make sure your have full BGP connectivity.
Ensure that all routers have entries in their IP routing tables.
•
•
R5's remote peer is 171.108.1.2/24 and remote AS is 1024.
•
R8's remote peer is 191.200.1.2/30 and remote AS is 4345.
•
ISP1 and ISP2 are advertising the full Internet routing table.
Ensure that the only route accepted is a default route and routes of the form 110.100.0.0 to 121.110.255.255.
Set all routes in the range 110.100.0.0 to 121.110.255.255 with the following attributes:
•
•
Ensure that BGP origin is set to IGP.
•
Prepend with paths with the AS paths 1000 999 100.
Set the weight to 1000 for all even networks and 2000 for all odd networks.
- 404 -