100% found this document useful (3 votes)
47 views

CCNA Routing and Switching Portable Command Guide 3rd Edition by Scott Empson 1587204304 978-1587204302instant download

The document provides information on various CCNA Routing and Switching resources, including textbooks and guides by authors such as Scott Empson and Wendell Odom. It outlines steps for configuring a router, including IP planning, basic configurations, routing protocols, and access control lists. Additionally, it includes details about the authors and their qualifications, as well as the structure and contents of the CCNA Portable Command Guide.

Uploaded by

vudricanyar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
47 views

CCNA Routing and Switching Portable Command Guide 3rd Edition by Scott Empson 1587204304 978-1587204302instant download

The document provides information on various CCNA Routing and Switching resources, including textbooks and guides by authors such as Scott Empson and Wendell Odom. It outlines steps for configuring a router, including IP planning, basic configurations, routing protocols, and access control lists. Additionally, it includes details about the authors and their qualifications, as well as the structure and contents of the CCNA Portable Command Guide.

Uploaded by

vudricanyar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

CCNA Routing and Switching Portable Command

Guide 3rd Edition by Scott Empson 1587204304


978-1587204302 download

https://ebookball.com/product/ccna-routing-and-switching-
portable-command-guide-3rd-edition-by-scott-
empson-1587204304-978-1587204302-17140/

Instantly Access and Download Textbook at https://ebookball.com


Get Your Digital Files Instantly: PDF, ePub, MOBI and More
Quick Digital Downloads: PDF, ePub, MOBI and Other Formats

CCNA 200 301 Portable Command Guide 5th Edition by Scott Empson
0135937825 9780135937822

https://ebookball.com/product/ccna-200-301-portable-command-
guide-5th-edition-by-scott-empson-0135937825-9780135937822-18694/

Cisco CCNA Routing and Switching 200 125 Official Cert Guide Library
1st Edition by Wendell Odom 1587205815 9781587205811

https://ebookball.com/product/cisco-ccna-routing-and-
switching-200-125-official-cert-guide-library-1st-edition-by-
wendell-odom-1587205815-9781587205811-17136/

CCNA Cisco Certified Network Associate Study Guide 7th Edition by Todd
Lammle 0470901071 978-0470901076

https://ebookball.com/product/ccna-cisco-certified-network-
associate-study-guide-7th-edition-by-todd-
lammle-0470901071-978-0470901076-17142/

CCNA 200 301 Official Cert Guide Library 1st Edition by Wendell Odom
1587147149 9781587147142

https://ebookball.com/product/ccna-200-301-official-cert-guide-
library-1st-edition-by-wendell-
odom-1587147149-9781587147142-17144/
CCNA 200 301 Official Cert Guide Volume 1 1st Edition by Wendell Odom
0135792738 9780135792735

https://ebookball.com/product/ccna-200-301-official-cert-guide-
volume-1-1st-edition-by-wendell-
odom-0135792738-9780135792735-18692/

CCNA 200 301 Official Cert Guide Volume 2 1st Edition by Wendell Odom
1587147130 9781587147135

https://ebookball.com/product/ccna-200-301-official-cert-guide-
volume-2-1st-edition-by-wendell-
odom-1587147130-9781587147135-18688/

Data Networks Routing Security and Performance Optimization 1st


Edition by Tony Kenyon ISBN 0080503667 9780080503660

https://ebookball.com/product/data-networks-routing-security-and-
performance-optimization-1st-edition-by-tony-kenyon-
isbn-0080503667-9780080503660-12338/

Java Threads Understanding and Mastering Concurrent Programming 3rd


Edition by Scott Oaks, Henry Wong ISBN 0596007825 9780448446257

https://ebookball.com/product/java-threads-understanding-and-
mastering-concurrent-programming-3rd-edition-by-scott-oaks-henry-
wong-isbn-0596007825-9780448446257-12382/

HackNotes Windows Security Portable Reference 1st Edition by Michael


O'Dea ISBN 0072227850 9780072227857

https://ebookball.com/product/hacknotes-windows-security-
portable-reference-1st-edition-by-michael-o-dea-
isbn-0072227850-9780072227857-16858/
Steps to Configuring a Router

1. Create an IP plan as per your diagram.


a. Subnetting
b. VLSM

2. Cable your equipment as per your diagram.

3. Establish a basic router configuration.


a. Host names
b. Passwords:
i. Secret
ii. Console
iii. Terminal—vty
iv. Auxiliary
c. Turn off DNS so spelling mistakes will not slow you down
d. Banners: login or MOTD

4. Configure your interfaces.


a. Addresses and masks: IPv4/IPv6
b. Clock rates (for serial DCE interfaces)
c. Descriptions

5. Create IP host name tables for remote access.

6. Configure IPv4 routing.


a. Static
b. Default
c. Dynamic—Pick the routing protocol that best suits your needs:
i. OSPF
ii. EIGRP

7. Configure IPv6 routing.


a. Static
b. Default
c. Dynamic—Pick the routing protocol that best suits your needs:
i. OSPF
ii. EIGRP

8. Configure access control lists (ACL):


a. Standard
b. Extended
c. Named

9. Change the WAN encapsulation type.


a. PPP (authentication: CHAP)
b. HDLC (if returning to default)

10. Apply advanced IP configuration topics.


a. NAT/PAT
b. DHCP

11. Save your configuration.


a. Locally
b. Remote
First part of the table
will be placed on the
last page of the book.
CCNA Routing and Switching
Portable Command Guide
Third Edition

Scott Empson

Cisco Press
800 East 96th Street
Indianapolis, IN 46240
ii

CCNA Routing and Switching Portable Command Guide


Third Edition
Scott Empson
Copyright© 2013 Cisco Systems, Inc.
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or by any information storage
and retrieval system, without written permission from the publisher, except for the inclusion of brief
quotations in a review.
ISBN-13: 978-1-58720-430-2
ISBN-10: 1-58720-430-4
Library of Congress Control Number: 2013939799
Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
First Printing June 2013

Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropri-
ately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this information.
Use of a term in this book should not be regarded as affecting the validity of any trademark or service
mark.

Warning and Disclaimer


This book is designed to provide information about the Certified Cisco Networking Associate
(CCNA) Routing and Switching exam and the commands needed at this level of network administra-
tion. Every effort has been made to make this book as complete and as accurate as possible, but no
warranty or fitness is implied.
The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc.,
shall have neither liability nor responsibility to any person or entity with respect to any loss or dam-
ages arising from the information contained in this book or from the use of the discs or programs that
may accompany it.
The opinions expressed in this book belong to the author and are not necessarily those of Cisco
Systems, Inc.
iii

Corporate and Government Sales


The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or
special sales, which may include electronic versions and/or custom covers and content particular to your
business, training goals, marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales
1-800-382-3419
[email protected]
For sales outside of the U.S. please contact:
International Sales
[email protected]

Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each
book is crafted with care and precision, undergoing rigorous development that involves the unique
expertise of members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how
we could improve the quality of this book, or otherwise alter it to better suit your needs, you can
contact us through e-mail at [email protected]. Please make sure to include the book title
and ISBN in your message.
We greatly appreciate your assistance.

Publisher Paul Boger


Business Operation Manager, Cisco Press Jan Cornelssen
Associate Publisher: Dave Dusthimer
Executive Editor Mary Beth Ray
Senior Development Editor Christopher A. Cleveland
Managing Editor Sandra Schroeder
Copy Editor Keith Cline
Project Editor Mandie Frank
Technical Editor Elan Beer
Editorial Assistant Vanessa Evans
Proofreader Debbie Williams
Cover Designer Mark Shirar
Composition Trina Wurst
iv

About the Author


Scott Empson is the chair of the Bachelor of Applied Information Systems Technology
degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta,
Canada, where he teaches Cisco routing, switching, network design, and leadership courses
in a variety of different programs (certificate, diploma, and applied degree) at the postsecond-
ary level. Scott is also the program coordinator of the Cisco Networking Academy Program
at NAIT, an Area Support Centre for the province of Alberta. He has a Masters of Education
degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English;
a Bachelor of Education, again with a major in English/Language Arts; and a Bachelor
of Applied Information Systems Technology, with a major in Network Management. He
currently holds several industry certifications, including CCNP, CCDP, CCAI, C|EH and
Network+. Before instructing at NAIT, he was a junior/senior high school English/language
arts/computer science teacher at different schools throughout Northern Alberta. Scott lives in
Edmonton, Alberta, with his wife, Trina, and two children, Zachariah and Shaelyn.

About the Technical Reviewer


Elan Beer, CCIE No. 1837, is a senior consultant and Cisco instructor specializing in
data center architecture and multiprotocol network design. For the past 25 years, Elan
has designed networks and trained thousands of industry experts in data center archi-
tecture, routing, and switching. Elan has been instrumental in large-scale professional
service efforts designing and troubleshooting internetworks, performing data center and
network audits, and assisting clients with their short- and long-term design objectives.
Elan has a global perspective of network architectures through his international clientele.
Elan has used his expertise to design and troubleshoot data centers and internetworks
in Malaysia, North America, Europe, Australia, Africa, China, and the Middle East.
Most recently, Elan has been focused on data center design, configuration, troubleshoot-
ing, and service provider technologies. In 1993, Elan was among the first to obtain the
Cisco Certified System Instructor (CCSI) certification, and in 1996, Elan was among
the first to attain Cisco System’s highest technical certification, the Cisco Certified
Internetworking Expert. Since then, Elan has been involved in numerous large-scale data
center and telecommunications networking projects worldwide.

Dedications
As always, this book is dedicated to Trina, Zach, and Shae.

Acknowledgments
Anyone who has ever had anything to do with the publishing industry knows that it takes
many, many people to create a book. It may be my name on the cover, but there is no
way that I can take credit for all that occurred to get this book from idea to publication.
Therefore, I must thank:
The team at Cisco Press. Once again, you amaze me with your professionalism and the
ability to make me look good. Mary Beth, Chris, Mandie: Thank you for your continued
support and belief in my little engineering journal.
To my technical reviewer, Elan: Thanks for keeping me on track and making sure that
what I wrote was correct and relevant.
v

Contents at a Glance

Introduction xx

Part I TCP/IP v4
CHAPTER 1 How to Subnet 1
CHAPTER 2 VLSM 15
CHAPTER 3 Route Summarization 25

Part II Introduction to Cisco Devices


CHAPTER 4 Cables and Connections 31
CHAPTER 5 The Command Line Interface 37

Part III Configuring a Router


CHAPTER 6 Configuring a Single Cisco Router 45

Part IV Routing
CHAPTER 7 Static Routing 57
CHAPTER 8 EIGRP 63
CHAPTER 9 Single-Area OSPF 73
CHAPTER 10 Multi-Area OSPF 83

Part V Switching
CHAPTER 11 Configuring a Switch 91
CHAPTER 12 VLANs 101
CHAPTER 13 VLAN Trunking Protocol and Inter-VLAN Communication 107
CHAPTER 14 Spanning Tree Protocol and EtherChannel 121

Part VI Layer 3 Redundancy


CHAPTER 15 HSRP and GLBP 137

Part VII IPv6


CHAPTER 16 IPv6 153
CHAPTER 17 OSPFv3 163
CHAPTER 18 EIGRP for IPv6 171
vi

Part VIII Network Administration and Troubleshooting


CHAPTER 19 Backing Up and Restoring Cisco IOS Software and
Configurations 177
CHAPTER 20 Password-Recovery Procedures and the Configuration
Register 187
CHAPTER 21 Cisco Discovery Protocol (CDP) 193
CHAPTER 22 Remote Connectivity Using Telnet or SSH 195
CHAPTER 23 Verifying End-to-End Connectivity 199
CHAPTER 24 Configuring Network Management Protocols 203
CHAPTER 25 Basic Troubleshooting 207
CHAPTER 26 Cisco IOS Licensing 213

Part IX Managing IP Services


CHAPTER 27 Network Address Translation 219
CHAPTER 28 Dynamic Host Configuration Protocol (DHCP) 227

Part X WANs
CHAPTER 29 Configuring Serial Encapsulation: HDLC and PPP 233
CHAPTER 30 Establishing WAN Connectivity Using Frame Relay 239
CHAPTER 31 Configuring Generic Routing Encapsulation (GRE) Tunnels 249
CHAPTER 32 Configuring Point-to-Point Protocol over Ethernet (PPPoE) 251

Part XI Network Security


CHAPTER 33 Managing Traffic Using Access Control Lists (ACL) 257

Part XII Appendixes


APPENDIX A Binary/Hex/Decimal Conversion Chart 271
APPENDIX B Create Your Own Journal Here 296
vii

Table of Contents

Introduction xx

Part I TCP/IP v4

CHAPTER 1 How to Subnet 1


Class A–E Addresses 1
Converting Between Decimal Numbers and Binary 2
Subnetting a Class C Network Using Binary 2
Subnetting a Class B Network Using Binary 5
Binary ANDing 9
So Why AND? 10
Shortcuts in Binary ANDing 11
The Enhanced Bob Maneuver for Subnetting (or How to Subnet
Anything in Under a Minute) 12

CHAPTER 2 VLSM 15
IP Subnet Zero 15
VLSM Example 16
Step 1 Determine How Many H Bits Will Be Needed to Satisfy
the Largest Network 16
Step 2 Pick a Subnet for the Largest Network to Use 17
Step 3 Pick the Next Largest Network to Work With 18
Step 4 Pick the Third Largest Network to Work With 20
Step 5 Determine Network Numbers for Serial Links 21

CHAPTER 3 Route Summarization 25


Example for Understanding Route Summarization 25
Step 1: Summarize Winnipeg’s Routes 26
Step 2: Summarize Calgary’s Routes 27
Step 3: Summarize Edmonton’s Routes 27
Step 4: Summarize Vancouver’s Routes 28
Route Summarization and Route Flapping 30
Requirements for Route Summarization 30

Part II Introduction to Cisco Devices

CHAPTER 4 Cables and Connections 31


Connecting a Rollover Cable to Your Router or Switch 31
Using a USB Cable to Connect to Your Router or Switch 31
Terminal Settings 32
LAN Connections 33
viii

Serial Cable Types 33


Which Cable to Use? 35
568A Versus 568B Cables 35

CHAPTER 5 The Command Line Interface 37


Shortcuts for Entering Commands 37
Using the † Key to Complete Commands 37
Console Error Messages 38
Using the Question Mark for Help 38
enable Command 39
exit Command 39
disable Command 39
logout Command 39
Setup Mode 39
Keyboard Help 40
History Commands 41
terminal Commands 41
show Commands 42
Using the Pipe Parameter (|) with the show Command 42

Part III Configuring a Router

CHAPTER 6 Configuring a Single Cisco Router 45


Router Modes 45
Entering Global Configuration Mode 46
Configuring a Router Name 46
Configuring Passwords 46
Password Encryption 47
Interface Names 47
Moving Between Interfaces 50
Configuring a Serial Interface 50
Configuring a Fast Ethernet Interface 51
Configuring a Gigabit Ethernet Interface 51
Creating a Message-of-the-Day Banner 51
Creating a Login Banner 51
Setting the Clock Time Zone 52
Assigning a Local Host Name to an IP Address 52
The no ip domain-lookup Command 52
The logging synchronous Command 52
The exec-timeout Command 53
Saving Configurations 53
Erasing Configurations 53
show Commands 53
ix

EXEC Commands in Configuration Mode: The do Command 54


Configuration Example: Basic Router Configuration 54
Boston Router 55

Part IV Routing

CHAPTER 7 Static Routing 57


Configuring a Static Route on a Router 57
The permanent Keyword (Optional) 58
Static Routes and Administrative Distance (Optional) 58
Configuring a Default Route on a Router 59
Verifying Static Routes 59
Configuration Example: Static Routes 60
Boston Router 60
Buffalo Router 61
Bangor Router 61

CHAPTER 8 EIGRP 63
Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) 63
EIGRP Auto-Summarization 65
EIGRP Manual Summarization 65
Passive EIGRP Interfaces 65
Equal-Cost Load Balancing: Maximum Paths 66
Unequal-Cost Load Balancing: Variance 66
Bandwidth Use 67
Authentication 67
Verifying EIGRP 68
Troubleshooting EIGRP 69
Configuration Example: EIGRP 69
Austin Router 70
Houston Router 71

CHAPTER 9 Single-Area OSPF 73


Configuring OSPF 73
Using Wildcard Masks with OSPF Areas 74
Loopback Interfaces 75
Router ID 75
DR/BDR Elections 76
Modifying Cost Metrics 76
OSPF auto-cost reference-bandwidth 77
Authentication: Simple 77
Authentication: Using MD5 Encryption 78
Timers 78
x

Propagating a Default Route 78


Verifying OSPF Configuration 79
Troubleshooting OSPF 79
Configuration Example: Single Area OSPF 80
Austin Router 80
Houston Router 81
Galveston Router 82

CHAPTER 10 Multi-Area OSPF 83


Configuring Multi-Area OSPF 83
Passive Interfaces 84
Route Summarization 84
Configuration Example: Multi-Area OSPF 85
ASBR Router 86
ABR-1 Router 87
ABR-2 Router 88
Internal Router 89

Part V Switching

CHAPTER 11 Configuring a Switch 91


Help Commands 91
Command Modes 91
Verifying Commands 92
Resetting Switch Configuration 92
Setting Host Names 92
Setting Passwords 93
Setting IP Addresses and Default Gateways 93
Setting Interface Descriptions 94
The mdix auto Command 94
Setting Duplex Operation 95
Setting Operation Speed 95
Managing the MAC Address Table 95
Configuring Static MAC Addresses 95
Switch Port Security 96
Verifying Switch Port Security 96
Sticky MAC Addresses 97
Configuration Example 97

CHAPTER 12 VLANs 101


Creating Static VLANs 101
Using VLAN Configuration Mode 101
Using VLAN Database Mode 102
xi

Assigning Ports to VLANs 102


Using the range Command 103
Verifying VLAN Information 103
Saving VLAN Configurations 103
Erasing VLAN Configurations 104
Configuration Example: VLANs 104

CHAPTER 13 VLAN Trunking Protocol and Inter-VLAN Communication 107


Dynamic Trunking Protocol 107
Dynamic Trunking Protocol (DTP) 108
Setting the Encapsulation Type 108
VLAN Trunking Protocol (VTP) 109
Verifying VTP 110
Inter-VLAN Communication Using an External Router: Router-on-a-
Stick 110
Inter-VLAN Communication on a Multilayer Switch Through a Switch
Virtual Interface 111
Removing L2 Switchport Capability of a Switch Port 111
Configuring Inter-VLAN Communication 111
Inter-VLAN Communication Tips 112
Configuration Example: Inter-VLAN Communication 112
ISP Router 113
CORP Router 114
L2Switch2 (Catalyst 2960) 116
L3Switch1 (Catalyst 3560) 118
L2Switch1 (Catalyst 2960) 119

CHAPTER 14 Spanning Tree Protocol and EtherChannel 121


Spanning Tree Protocol 121
Enabling Spanning Tree Protocol 121
Configuring the Root Switch 122
Configuring a Secondary Root Switch 122
Configuring Port Priority 123
Configuring the Path Cost 123
Configuring the Switch Priority of a VLAN 123
Configuring STP Timers 124
Verifying STP 124
Optional STP Configurations 125
Changing the Spanning-Tree Mode 126
Extended System ID 126
Enabling Rapid Spanning Tree 127
Troubleshooting Spanning Tree 127
Configuration Example: STP 127
xii

EtherChannel 129
Interface Modes in EtherChannel 130
Guidelines for Configuring EtherChannel 130
Configuring Layer 2 EtherChannel 131
Verifying EtherChannel 131
Configuration Example: EtherChannel 132

Part VI Layer 3 Redundancy

CHAPTER 15 HSRP and GLBP 137


Hot Standby Router Protocol 137
Configuring HSRP on a Router 138
Configuring HSRP on an L3 Switch 138
Default HSRP Configuration Settings 139
Verifying HSRP 139
HSRP Optimization Options 139
Preempt 140
HSRP Message Timers 140
Interface Tracking 141
Multiple HSRP 141
Debugging HSRP 142
Virtual Router Redundancy Protocol 143
Configuring VRRP 143
Verifying VRRP 144
Debugging VRRP 145
Gateway Load Balancing Protocol 145
Configuring GLBP 145
Verifying GLBP 147
Debugging GLBP 148
Configuration Example: GLBP 148
DLS1 149
DLS2 150

Part VII IPv6

CHAPTER 16 IPv6 153


Assigning IPv6 Addresses to Interfaces 153
IPv6 and RIPng 154
Configuration Example: IPv6 RIP 155
Austin Router 155
IPv6 Tunnels: Manual Overlay Tunnel 157
Juneau Router 157
Fairbanks Router 158
xiii

Static Routes in IPv6 159


Floating Static Routes in IPv6 160
Default Routes in IPv6 160
Verifying and Troubleshooting IPv6 160
IPv6 Ping 162
IPv6 Traceroute 162

CHAPTER 17 OSPFv3 163


IPv6 and OSPFv3 163
Enabling OSPF for IPv6 on an Interface 163
Enabling an OSPF for IPv6 Area Range 164
Enabling an IPv4 Router ID for OSPFv3 165
Forcing an SPF Calculation 165
Verifying and Troubleshooting IPv6 and OSPFv3 165
Configuration Example: OSPFv3 166
R3 Router 166
R2 Router 167
R1 Router 168
R4 Router 169

CHAPTER 18 EIGRP for IPv6 171


IPv6 and EIGRP 171
Enabling EIGRP for IPv6 on an Interface 171
Configuring the Percentage of Link Bandwidth Used by EIGRP 172
Configuring Summary Addresses 172
Configuring EIGRP Route Authentication 172
Configuring EIGRP Timers 172
Logging EIGRP Neighbor Adjacency Changes 173
Adjusting the EIGRP for IPv6 Metric Weights 173
Verifying and Troubleshooting EIGRP for IPv6 173
Configuration Example: EIGRP for IPv6 174
R3 Router 174
R2 Router 175
R1 Router 176

Part VIII Network Administration and Troubleshooting

CHAPTER 19 Backing Up and Restoring Cisco IOS Software and


Configurations 177
Boot System Commands 177
The Cisco IOS File System 178
Viewing the Cisco IOS File System 178
Commonly Used URL Prefixes for Cisco Network Devices 178
xiv

Deciphering IOS Image Filenames 179


Backing Up Configurations to a TFTP Server 180
Restoring Configurations from a TFTP Server 180
Backing Up the Cisco IOS Software to a TFTP Server 181
Restoring/Upgrading the Cisco IOS Software from a TFTP Server 181
Restoring the Cisco IOS Software from ROM Monitor Mode Using
Xmodem 182
Restoring the Cisco IOS Software Using the ROM Monitor
Environmental Variables and tftpdnld Command 184

CHAPTER 20 Password-Recovery Procedures and the Configuration


Register 187
The Configuration Register 187
A Visual Representation 187
What the Bits Mean 187
The Boot Field 188
Console Terminal Baud Rate Settings 188
Changing the Console Line Speed: CLI 189
Changing the Console Line Speed: ROM Monitor Mode 189
Password-Recovery Procedures for Cisco Routers 190
Password Recovery for 2960 Series Switches 191

CHAPTER 21 Cisco Discovery Protocol (CDP) 193


Cisco Discovery Protocol 193

CHAPTER 22 Remote Connectivity Using Telnet or SSH 195


Configuring a Device to Accept a Remote Telnet Connection 195
Using Telnet to Remotely Connect to Other Devices 196
Verifying Telnet 197
Configuring the Secure Shell Protocol (SSH) 197
Verifying SSH 198

CHAPTER 23 Verifying End-to-End Connectivity 199


ICMP Redirect Messages 199
The ping Command 199
Examples of Using the ping and the Extended ping Commands 200
The traceroute Command 201

CHAPTER 24 Configuring Network Management Protocols 203


Configuring SNMP 203
Configuring Syslog 204
Syslog Message Format 204
Syslog Severity Levels 205
xv

Syslog Message Example 205


Configuring NetFlow 206
Verifying NetFlow 206

CHAPTER 25 Basic Troubleshooting 207


Viewing the Routing Table 207
Clearing the Routing Table 208
Determining the Gateway of Last Resort 208
Determining the Last Routing Update 208
OSI Layer 3 Testing 208
OSI Layer 7 Testing 209
Interpreting the show interface Command 209
Clearing Interface Counters 209
Using CDP to Troubleshoot 209
The traceroute Command 209
The show controllers Command 210
debug Commands 210
Using Time Stamps 210
Operating System IP Verification Commands 211
The ip http server Command 211
The netstat Command 211
The arp Command 211

CHAPTER 26 Cisco IOS Licensing 213


Cisco Licensing Earlier Than IOS 15.0 213
Cisco Licensing for the ISR G2 Platforms: IOS 15.0 and Later 215
Verifying Licenses 215
Cisco License Manager 215
Installing a Permanent License 216
Installing an Evaluation License 217
Backing Up a License 217
Uninstalling a License 217

Part IX Managing IP Services

CHAPTER 27 Network Address Translation 219


Configuring Dynamic NAT: One Private to One Public Address
Translation 219
Configuring PAT: Many Private to One Public Address Translation 221
Configuring Static NAT: One Private to One Permanent Public Address
Translation 222
Verifying NAT and PAT Configurations 223
Troubleshooting NAT and PAT Configurations 224
xvi

Configuration Example: PAT 224


ISP Router 224
Company Router 225

CHAPTER 28 Dynamic Host Configuration Protocol (DHCP) 227


Configuring a DHCP Server on an IOS Router 227
Verifying and Troubleshooting DHCP Configuration 228
Configuring a DHCP Helper Address 228
DHCP Client on a Cisco IOS Software Ethernet Interface 229
Configuration Example: DHCP 229
Edmonton Router 229
Gibbons Router 231

Part X WANs

CHAPTER 29 Configuring Serial Encapsulation: HDLC and PPP 233


Configuring HDLC Encapsulation on a Serial Line 233
Configuring Point-to-Point Protocol (PPP) on a Serial Line (Mandatory
Commands) 233
Configuring PPP on a Serial Line (Optional Commands):
Compression 234
Configuring PPP on a Serial Line (Optional Commands): Link
Quality 234
Configuring PPP on a Serial Line (Optional Commands):
Multilink 234
Configuring PPP on a Serial Line (Optional Commands):
Authentication 234
Verifying and Troubleshooting a Serial Link/PPP Encapsulation 235
Configuration Example: PPP with CHAP Authentication 236
Boston Router 236
Buffalo Router 237

CHAPTER 30 Establishing WAN Connectivity Using Frame Relay 239


Configuring Frame Relay 239
Setting the Frame Relay Encapsulation Type 239
Setting the Frame Relay Encapsulation LMI Type 239
Setting the Frame Relay DLCI Number 240
Configuring a Frame Relay map Statement 240
Configuring a Description of the Interface (Optional) 240
Configuring Frame Relay Using Subinterfaces 240
Verifying Frame Relay 241
Troubleshooting Frame Relay 242
Configuration Example: Point-to-Point Frame Relay Using
Subinterfaces and OSPF 242
xvii

Houston Router 242


Austin Router 244
Galveston Router 244
Laredo Router 245
Configuration Example: Point-to-Multipoint Frame Relay Using
Subinterfaces and EIGRP 246
R1 Router 246
R2 Router 247
R3 Router 248

CHAPTER 31 Configuring Generic Routing Encapsulation (GRE) Tunnels 249


Configuring a GRE Tunnel 249
Branch Router 249
HQ Router 250
Verifying a GRE Tunnel 250

CHAPTER 32 Configuring Point-to-Point Protocol over Ethernet (PPPoE) 251


Configuring a DSL Connection using PPPoE 251
Step 1: Configure PPPoE (External Modem) 252
Step 2: Configure the Dialer Interface 253
Step 3: Define Interesting Traffic and Specify Default
Routing 253
Step 4: Configure NAT Using an ACL 254
Step 5: Configure NAT Using a Route Map 254
Step 6: Configure DHCP Service 255
Step 7: Apply NAT Programming 255
Step 8: Verify a PPPoE Connection 255

Part XI Network Security

CHAPTER 33 Managing Traffic Using Access Control Lists (ACL) 257


Access List Numbers 257
Using Wildcard Masks 258
ACL Keywords 258
Creating Standard ACLs 259
Applying Standard ACLs to an Interface 260
Verifying ACLs 260
Removing ACLs 260
Creating Extended ACLs 261
Applying Extended ACLs to an Interface 262
The established Keyword (Optional) 262
Creating Named ACLs 262
Using Sequence Numbers in Named ACLs 263
xviii

Removing Specific Lines in Named ACLs Using Sequence


Numbers 264
Sequence Number Tips 264
Including Comments About Entries in ACLs 265
Restricting Virtual Terminal Access 265
Tips for Configuring ACLs 266
ACLs and IPv6 266
Configuration Examples: ACLs 267

Part XII Appendixes

APPENDIX A Binary/Hex/Decimal Conversion Chart 271

APPENDIX B Create Your Own Journal Here 279


xix

Command Syntax Conventions


The conventions used to present command syntax in this book are the same conventions
used in the IOS Command Reference. The Command Reference describes these conven-
tions as follows:
Q Boldface indicates commands and keywords that are entered literally, as shown.
In actual configuration examples and output (not general command syntax),
boldface indicates commands that are manually input by the user (such as a show
command).
Q Italics indicate arguments for which you supply actual values.
Q Vertical bars (|) separate alternative, mutually exclusive elements.
Q Square brackets [ ] indicate optional elements.
Q Braces { } indicate a required choice.
Q Braces within brackets [{ }] indicate a required choice within an optional element.
xx

Introduction
Welcome to CCNA Routing and Switching! This book is the result of a massive rede-
sign by Cisco of their entry-level certification exams to more closely align with indus-
try’s need for networking talent as we enter into the era of “the Internet of Everything.”
The success of the previous two editions of this book prompted Cisco Press to approach
me with a request to update the book with the necessary new content to help both stu-
dents and IT professionals in the field study and prepare for the new CCNA Routing and
Switching exam. For someone who originally thought that this book would be less than
100 pages in length and limited to the Cisco Networking Academy program for its com-
plete audience, I am continually amazed that my little engineering journal has caught on
with such a wide range of people throughout the IT community.

I have long been a fan of what I call the “engineering journal,” a small notebook that can
be carried around and that contains little nuggets of information—commands that you
forget, the IP addressing scheme of some remote part of the network, little reminders
about how to do something you only have to do once or twice a year (but is vital to the
integrity and maintenance of your network). This journal has been a constant companion
by my side for the past 15 years; I only teach some of these concepts every second or
third year, so I constantly need to refresh commands and concepts and learn new com-
mands and ideas as they are released by Cisco. My journals are the best way for me
to review because they are written in my own words (words that I can understand). At
least, I had better understand them, because if I can’t, I have only myself to blame.
My first published engineering journal was the CCNA Quick Command Guide; it was
organized to match to the (then) order of the Cisco Networking Academy program. That
book then morphed into the Portable Command Guide, the third edition of which you
are reading right now. This book is my “industry” edition of the engineering journal. It
contains a different logical flow to the topics, one more suited to someone working in
the field. Like topics are grouped together: routing protocols, switches, troubleshooting.
More-complex examples are given. New topics have been added, such as OSPFv3 and
EIGRPv6 for IPv6, multi-area OSPF, PPPoE, GRE tunnels, and Cisco IOS Version 15.
The popular “Create Your Own Journal” appendix is still here (blank pages for you to
add in your own commands that you need in your specific job). We all recognize the fact
that no network administrator’s job can be so easily pigeonholed as to just working with
CCNA topics; you all have your own specific jobs and duties assigned to you. That is
why you will find those blank pages at the end of the book. Make this book your own;
personalize it with what you need to make it more effective. That way your journal will
not look like mine.
xxi

Networking Devices Used in the Preparation of This


Book
To verify the commands in this book, I had to try them out on a few different devices.
The following is a list of the equipment I used when writing this book:
Q C2821 ISR with PVDM2, CMME, a WIC-2T, FXS and FXO VICs, running
12.4(10a) IPBase IOS
Q WS-C2960-24TT-L Catalyst switch, running 12.2(25)SE IOS
Q WS-C2950-12 Catalyst switch, running Version C2950-C3.0(5.3)WC(1)
Enterprise Edition software
Q C1941 ISRG2 router with WIC 2T and HWIC-4ESW, running Version 15.1(1)T
Cisco IOS with a technology package of IPBaseK9

Those of you familiar with Cisco devices will recognize that a majority of these commands
work across the entire range of the Cisco product line. These commands are not limited
to the platforms and Cisco IOS Software versions listed. In fact, these devices are in most
cases adequate for someone to continue his or her studies into the CCNP level, too.

Private Addressing Used in this Book


This book makes use of RFC 1918 addressing throughout. Because I do not have per-
mission to use public addresses in my examples, I have done everything with private
addressing. Private addressing is perfect for use in a lab environment or in a testing situ-
ation because it works exactly like public addressing, with the exception that it cannot be
routed across a public network. That is why you will see private addresses in my WAN
links between two routers using serial connections or in my Frame Relay cloud.

Who Should Read This Book


This book is for those people preparing for the CCNA Routing and Switching exam,
whether through self-study, on-the-job training and practice, or through study within the
Cisco Networking Academy program. There are also some handy hints and tips along
the way to make life a bit easier for you in this endeavor. It is small enough that you will
find it easy to carry around with you. Big, heavy textbooks might look impressive on
your bookshelf in your office, but can you really carry them all around with you when
you are working in some server room or equipment closet somewhere?

Optional Sections
A few sections in this book have been marked as optional. These sections cover topics
that are not on the CCNA Routing and Switching certification exam, but they are valuable
topics that I believe should be known by someone at a CCNA level. Some of the optional
topics might also be concepts that are covered in the Cisco Networking Academy program
courses.
xxii

Organization of This Book


This book follows what I think is a logical approach to configuring a small to mid-size net-
work. It is an approach that I give to my students when they invariably ask for some sort of
outline to plan and then configure a network. Specifically, this approach is as follows:

Part I: TCP/IP v4
Q Chapter 1, “How to Subnet”—An overview of how to subnet, examples of sub-
netting (both a Class B and a Class C address), the use of the binary AND opera-
tion, the Enhanced Bob Maneuver to Subnetting
Q Chapter 2, “VLSM”—An overview of VLSM, an example of using VLSM to
make your IP plan more efficient
Q Chapter 3, “Route Summarization”—Using route summarization to make your
routing updates more efficient, an example of how to summarize a network, nec-
essary requirements for summarizing your network

Part II: Introduction to Cisco Devices


Q Chapter 4, “Cables and Connections”—An overview of how to connect to Cisco
devices, which cables to use for which interfaces, and the differences between the
TIA/EIA 568A and 568B wiring standards for UTP
Q Chapter 5, “The Command-Line Interface”—How to navigate through Cisco IOS
Software: editing commands, keyboard shortcuts, and help commands

Part III: Configuring a Router


Q Chapter 6, “Configuring a Single Cisco Router”—Commands needed to config-
ure a single router: names, passwords, configuring interfaces, MOTD and login
banners, IP host tables, saving and erasing your configurations

Part IV: Routing


Q Chapter 7, “Static Routing”—Configuring static routes in your internetwork
Q Chapter 8, “EIGRP”—Configuring and verifying EIGRP
Q Chapter 9, “Single Area OSPF”—Configuring and verifying single-area OSPF
Q Chapter 10, “Multi-Area OSPF”—Configuring and verifying multi-area OSPF

Part V: Switching
Q Chapter 11, “Configuring a Switch”—Commands to configure Catalyst 2960
switches: names, passwords, IP addresses, default gateways, port speed and
duplex; configuring static MAC addresses; managing the MAC address table; port
security
Q Chapter 12, “VLANs”—Configuring static VLANs, troubleshooting VLANs, sav-
ing and deleting VLAN information.
Q Chapter 13, “VLAN Trunking Protocol and Inter-VLAN Communication”—
Configuring a VLAN trunk link, configuring VTP, verifying VTP, inter-VLAN
communication, router-on-a-stick, subinterfaces, and SVIs.
xxiii

Q Chapter 14, “Spanning Tree Protocol and EtherChannel”—Verifying STP, set-


ting switch priorities, and creating and verifying EtherChannel groups between
switches

Part VI: Layer 3 Redundancy

Q Chapter 15, “HSRP and GLBP”— Configuring HSRP, interface tracking, setting
priorities, configuring GLBP.

Part VII: IPv6

Q Chapter 16, “IPv6”— Transitioning to IPv6; format of IPv6 addresses; configur-


ing IPv6 (interfaces, tunneling, static routing)
Q Chapter 17, “OSPFv3”— Configuring OSPF to work with IPv6,
Q Chapter 18, “EIGRP for IPv6”— Configuring EIGRP to work with IPv6.

Part VIII: Network Administration and Troubleshooting


Q Chapter 19, “Backing Up and Restoring Cisco IOS Software and
Configurations”—Boot commands for Cisco IOS Software, backing
up and
restoring Cisco IOS Software using TFTP, Xmodem, and ROMmon environmen-
tal variables
Q Chapter 20, “Password-Recovery Procedures and the Configuration
Register”—The configuration register, password recovery procedure for routers
and switches
Q Chapter 21, “Cisco Discovery Protocol (CDP)”—Customizing and verifying CDP
Q Chapter 22, “Remote Connectivity Using Telnet or SSH”—Commands used for
Telnet and SSH to remotely connect to other devices
Q Chapter 23, “Verifying End-to-End Connectivity”—Commands for both ping and
extended ping; the traceroute command
Q Chapter 24, “Configuring Network Management Protocols”—Configuring
SNMP, working with syslog, Severity Levels, Configuring NetFlow
Q Chapter 25, “Basic Troubleshooting”—Various show commands used to view
the routing table; interpreting the show interface command; verifying your IP set-
tings using different operating systems
Q Chapter 26, “Cisco IOS Licensing”— Differences between licensing pre- and
post-Cisco IOS Version 15, installing permanent and evaluation licenses, backing
up and uninstalling licenses

Part IX: Managing IP Services


Q Chapter 27, “Network Address Translation”—Configuring and verifying NAT
and PAT
Q Chapter 28, “Dynamic Host Configuration Protocol (DHCP)”—Configuring and
verifying DHCP on a Cisco IOS router
xxiv

Part X: WANs

Q Chapter 29, “Configuring Serial Encapsulation: HDLC and PPP”—Configuring


PPP, authentication of PPP using CHAP, compression in PPP; multilink in PPP,
troubleshooting PPP, returning to HDLC encapsulation
Q Chapter 30, “Establishing WAN Connectivity Using Frame Relay”—Configuring
basic Frame Relay, Frame Relay and subinterfaces, DLCIs, verifying and trouble-
shooting Frame Relay
Q Chapter 31, “Configuring Generic Routing Encapsulation (GRE) Tunnels”—
Configuring and verifying GRE tunnels
Q Chapter 32, “Configuring Point-to-Point Protocol over Ethernet (PPPoE)”—
Configuring a DSL connection using PPPoE

Part XI: Network Security


Q Chapter 33, “Managing Traffic Using Access Control Lists (ACL)”—Configuring
standard ACLs, wildcard masking, creating extended ACLs, creating named
ACLs, using sequence numbers in named ACLs, verifying and troubleshooting
ACLs, ACLs and IPv6

Part XII: Appendixes

Q Appendix A, “Binary/Hex/Decimal Conversion Chart”—A chart showing num-


bers 0 through 255 in the three numbering systems of binary, hexadecimal, and
decimal
Q Appendix B, “Create Your Own Journal Here”—Some blank pages for you to
add in your own specific commands that might not be in this book

Did I Miss Anything?


I am always interested to hear how my students, and now readers of my books, do on
both certification exams and future studies. If you would like to contact me and let me
know how this book helped you in your certification goals, please do so. Did I miss any-
thing? Let me know. Contact me at [email protected] or through the Cisco Press
website, http://www.ciscopress.com.
This page intentionally left blank
CHAPTER 3
Route Summarization

Route summarization, or supernetting, is needed to reduce the number of routes that a


router advertises to its neighbor. Remember that for every route you advertise, the size
of your update grows. It has been said that if there were no route summarization, the
Internet backbone would have collapsed from the sheer size of its own routing tables
back in 1997!
Routing updates, whether done with a distance vector or link-state protocol, grow with
the number of routes you need to advertise. In simple terms, a router that needs to adver-
tise ten routes needs ten specific lines in its update packet. The more routes you have to
advertise, the bigger the packet. The bigger the packet, the more bandwidth the update
takes, reducing the bandwidth available to transfer data. But with route summarization,
you can advertise many routes with only one line in an update packet. This reduces the
size of the update, allowing you more bandwidth for data transfer.
Also, when a new data flow enters a router, the router must do a lookup in its routing
table to determine which interface the traffic must be sent out. The larger the routing
tables, the longer this takes, leading to more used router CPU cycles to perform the
lookup. Therefore, a second reason for route summarization is that you want to minimize
the amount of time and router CPU cycles that are used to route traffic.

NOTE This example is a very simplified explanation of how routers send updates to
each other. For a more in-depth description, I highly recommend you go out and read
Jeff Doyle’s book Routing TCP/IP, Volume I, 2nd edition, Cisco Press. This book has
been around for many years and is considered by most to be the authority on how the
different routing protocols work. If you are considering continuing on in your certifica-
tion path to try and achieve the CCIE, you need to buy Doyle’s book—and memorize it;
it’s that good.

Example for Understanding Route Summarization


Refer to Figure 3-1 to assist you as you go through the following explanation of an
example of route summarization.
26 Example for Understanding Route Summarization

172.16.64.0/24

172.16.65.0/24

172.16.66.0/24
Winnipeg Vancouver Seattle

172.16.67.0/24

172.16.68.0/24

172.16.69.0/24
Calgary

172.16.70.0/24
172.16.72.0/24 172.16.79.0/24

172.16.71.0/24
172.16.73.0/24 172.16.78.0/24
Edmonton

172.16.74.0/24 172.16.77.0/24

172.16.75.0/24 172.16.76.0/24

Figure 3-1 Four-City Network Without Route Summarization

As you can see from Figure 3-1, Winnipeg, Calgary, and Edmonton each have to adver-
tise internal networks to the main router located in Vancouver. Without route summari-
zation, Vancouver would have to advertise 16 networks to Seattle. You want to use route
summarization to reduce the burden on this upstream router.

Step 1: Summarize Winnipeg’s Routes


To do this, you need to look at the routes in binary to see if there are any specific bit
patterns that you can use to your advantage. What you are looking for are common bits
on the network side of the addresses. Because all of these networks are /24 networks,
you want to see which of the first 24 bits are common to all four networks.
172.16.64.0 = 10101100.00010000.01000000.00000000
172.16.65.0 = 10101100.00010000.01000001.00000000
172.16.66.0 = 10101100.00010000.01000010.00000000
172.16.67.0 = 10101100.00010000.01000011.00000000
Common bits: 10101100.00010000.010000xx

You see that the first 22 bits of the four networks are common. Therefore, you can sum-
marize the four routes by using a subnet mask that reflects that the first 22 bits are com-
mon. This is a /22 mask, or 255.255.252.0. You are left with the summarized address of
172.16.64.0/22
Example for Understanding Route Summarization 27

This address, when sent to the upstream Vancouver router, will tell Vancouver: “If you
have any packets that are addressed to networks that have the first 22 bits in the pattern
of 10101100.00010000.010000xx.xxxxxxxx, then send them to me here in Winnipeg.”
By sending one route to Vancouver with this supernetted subnet mask, you have adver-
tised four routes in one line, instead of using four lines. Much more efficient!

Step 2: Summarize Calgary’s Routes


For Calgary, you do the same thing that you did for Winnipeg—look for common bit
patterns in the routes:
172.16.68.0 = 10101100.00010000.01000100.00000000
172.16.69.0 = 10101100.00010000.01000101.00000000
172.16.70.0 = 10101100.00010000.01000110.00000000
172.16.71.0 = 10101100.00010000.01000111.00000000
Common bits: 10101100.00010000.010001xx

Once again, the first 22 bits are common. The summarized route is therefore
172.16.68.0/22

Step 3: Summarize Edmonton’s Routes


For Edmonton, you do the same thing that we did for Winnipeg and Calgary—look for
common bit patterns in the routes:
172.16.72.0 = 10101100.00010000.01001000.00000000
172.16.73.0 = 10101100.00010000.01001001.00000000
172.16.74.0 = 10101100.00010000 01001010.00000000
172.16.75.0 = 10101100.00010000 01001011.00000000
172.16.76.0 = 10101100.00010000.01001100.00000000
172.16.77.0 = 10101100.00010000.01001101.00000000
172.16.78.0 = 10101100.00010000.01001110.00000000
172.16.79.0 = 10101100.00010000.01001111.00000000
Common bits: 10101100.00010000.01001xxx

For Edmonton, the first 21 bits are common. The summarized route is therefore
172.16.72.0/21

Figure 3-2 shows what the network looks like, with Winnipeg, Calgary, and Edmonton
sending their summarized routes to Vancouver.
28 Example for Understanding Route Summarization

172.16.64.0/24

172.16.65.0/24

172.16.64.0/22
172.16.66.0/24
Winnipeg Vancouver Seattle

172.16.67.0/24 2
/2
.0
.68
16
172.16.68.0/24 2.
17

172.16.72.0/21
172.16.69.0/24
Calgary

172.16.70.0/24
172.16.72.0/24 172.16.79.0/24

172.16.71.0/24
172.16.73.0/24 172.16.78.0/24
Edmonton

172.16.74.0/24 172.16.77.0/24

172.16.75.0/24 172.16.76.0/24

/21 /22 /23 /24


172.16.64.0
172.16.64.0
172.16.64.0 172.16.65.0
172.16.66.0
172.16.66.0
172.16.67.0
172.16.64.0
172.16.68.0
172.16.68.0
172.16.69.0
172.16.68.0
172.16.70.0
172.16.70.0
172.16.71.0
172.16.72.0
172.16.72.0
172.16.73.0
172.16.72.0
172.16.74.0
172.16.74.0
172.16.75.0
172.16.72.0
172.16.76.0
172.16.76.0
172.16.77.0
172.16.76.0
172.16.78.0
172.16.78.0
172.16.79.0

Figure 3-2 Four-City Network with Edge Cities Summarizing Routes

Step 4: Summarize Vancouver’s Routes


Yes, you can summarize Vancouver’s routes to Seattle. You continue in the same format
as before. Take the routes that Winnipeg, Calgary, and Edmonton sent to Vancouver,
and look for common bit patterns:
172.16.64.0 = 10101100.00010000.01000000.00000000
172.16.68.0 = 10101100.00010000.01000100.00000000
172.16.72.0 = 10101100.00010000.01001000.00000000
Common bits: 10101100.00010000.0100xxxx
Example for Understanding Route Summarization 29

Because there are 20 bits that are common, you can create one summary route for
Vancouver to send to Seattle:
172.16.64.0/20

Vancouver has now told Seattle that in one line of a routing update, 16 different net-
works are being advertised. This is much more efficient than sending 16 lines in a rout-
ing update to be processed.
Figure 3-3 shows what the routing updates would look like with route summarization
taking place.
172.16.64.0/24

172.16.65.0/24
172.16.64.0/20
172.16.64.0/22
172.16.66.0/24
Winnipeg Vancouver Seattle

172.16.67.0/24 2
/2
.0
.68
16
172.16.68.0/24 2.
17
172.16.72.0/21

172.16.69.0/24
Calgary

172.16.70.0/24
172.16.72.0/24 172.16.79.0/24

172.16.71.0/24
172.16.73.0/24 172.16.78.0/24
Edmonton

172.16.74.0/24 172.16.77.0/24

172.16.75.0/24 172.16.76.0/24

/20 /21 /22 /23 /24


172.16.64.0
172.16.64.0
172.16.64.0 172.16.65.0
172.16.66.0
172.16.66.0
172.16.67.0
172.16.64.0
172.16.68.0
172.16.68.0
172.16.69.0
172.16.68.0
172.16.70.0
172.16.70.0
172.16.64.0 172.16.71.0
172.16.72.0
172.16.72.0
172.16.73.0
172.16.72.0
172.16.74.0
172.16.74.0
172.16.75.0
172.16.72.0
172.16.76.0
172.16.76.0
172.16.77.0
172.16.76.0
172.16.78.0
172.16.78.0
172.16.79.0

Figure 3-3 Four-City Network with Complete Route Summarization


30 Requirements for Route Summarization

Route Summarization and Route Flapping


Another positive aspect of route summarization has to do with route flapping. Route
flapping is when a network, for whatever reason (such as interface hardware failure
or misconfiguration), goes up and down on a router, causing that router to constantly
advertise changes about that network. Route summarization can help insulate upstream
neighbors from these problems.
Consider router Edmonton from Figure 3-1. Suppose that network 172.16.74.0/24 goes
down. Without route summarization, Edmonton would advertise Vancouver to remove
that network. Vancouver would forward that same message upstream to Calgary,
Winnipeg, Seattle, and so on. Now assume the network comes back online a few seconds
later. Edmonton would have to send another update informing Vancouver of the change.
Each time a change needs to be advertised, the router must use CPU resources. If that
route were to flap, the routers would constantly have to update their own tables, as well
as advertise changes to their neighbors. In a CPU-intensive protocol such as OSPF, the
constant hit on the CPU might make a noticeable change to the speed at which network
traffic reaches its destination.
Route summarization enables you to avoid this problem. Even though Edmonton would
still have to deal with the route constantly going up and down, no one else would
notice. Edmonton advertises a single summarized route, 172.16.72.0/21, to Vancouver.
Even though one of the networks is going up and down, this does not invalidate the
route to the other networks that were summarized. Edmonton will deal with its own
route flap, but Vancouver will be unaware of the problem downstream in Edmonton.
Summarization can effectively protect or insulate other routers from route flaps.

Requirements for Route Summarization


To create route summarization, there are some necessary requirements:
 Q Routers need to be running a classless routing protocol, as they carry subnet mask
information with them in routing updates. (Examples are RIP v2, OSPF, EIGRP,
IS-IS, and BGP.)
 Q Addresses need to be assigned in a hierarchical fashion for the summarized
address to have the same high-order bits. It does no good if Winnipeg has network
172.16.64.0 and 172.16.67.0 while 172.16.65.0 resides in Calgary and 172.16.66.0
is assigned in Edmonton. No summarization could take place from the edge rout-
ers to Vancouver.

TIP Because most networks use NAT and the ten networks internally, it is important
when creating your network design that you assign network subnets in a way that they
can be easily summarized. A little more planning now can save you a lot of grief later.
Other documents randomly have
different content
voice addressing herself, but could not distinguish the words
because of the low droning sound that filled her ears as she sat
passive on the rock. Who he was she quite well knew. It was not
possible for the member of a small congregation such as that in High
Tor church to be ignorant of the features of so notable an occupant
of Lord Wolverhampton’s pew as the Earl’s son and heir. Tall,
handsome, and manly, Lord Harrogate was worth looking at for his
own sake; but Ethel had never thus looked upon him until she found
herself thus confronted with him in the mist, as her rescuer from
certain suffering, perhaps from death.
‘If you are able to walk, Miss Gray,’ said Lord Harrogate earnestly,
‘will you take my arm and lean on me? My servant will charge
himself with the child here; indeed I do not think he can do better
than to set her on the pony, as she seems so tired. We must all of us
rely on Bates’s guidance to get clear of the waste. Happily, he is a
thorough moorman, and can pick his way where I should be at fault.’
‘Ay, ay, my Lord,’ returned Bates, flattered by the compliment, but
honestly unwilling to be pranked in borrowed plumage. ‘But if we
were t’ other side o’ Pinkney Ridge or Cranmere way, I’d not be so
gey ready to take the lead in a fog like this one. I’ve heard of
moormen straying round and round, and lying down to die in a drift
within gunshot o’ their own house-door. But we were on the hard
path just now, so if we can but strike it again, we’re safe.’
They started, Betty Mudge perched sideways on the pony, which the
keeper led; while Ethel, in spite of her protestation that she could
walk unaided, was glad to avail herself of the support of Lord
Harrogate’s arm. It was not all plain sailing, for so dense was the fog
that even the experienced keeper was puzzled for a time, until his
sharp ear caught the well-known babble of a brook.
‘’Tis running water!’ cried Bates in triumph. ‘Safest plan on the moor
is to follow running water, for that won’t deceive. We’ll win through
it.’
And indeed a short half-hour brought the party to the firm high-
road, with the gates of High Tor Park, topped by their stone
wyverns, within sight. Betty Mudge, who announced herself as
having an aunt in the village at whose cottage she could pass the
night, was despatched under convoy to that relative’s abode. But
Ethel Grey looked so worn and ill, that Lord Harrogate insisted on
her retaining his arm up the carriage-drive leading to the house,
where she could receive the attention her state required.
‘My mother and sisters will take care of you, I know,’ he said, as he
supported her slow steps through the park, where the fog, so dense
upon the frowning hills above, only floated in fitful wreaths. The
house was reached, and great was the surprise of those within when
Lord Harrogate appeared with Ethel, pale, patient, exhausted, but
beautiful still, her dark hair and her dress dripping with wet, leaning
on his strong arm. The Countess was kind; and her daughters,
beautiful golden-haired Lady Gladys, honest-eyed earnest Lady
Maud, even Lady Alice, a clever child of twelve, were still more kind.
A bright wood-fire was soon blazing in what was called the Yellow
Room; and Ethel, seated as near to the crackling logs as her chair
could be placed, and propped up with cushions, was able to dry her
wet tresses and drenched garments; while Lord Harrogate’s sisters,
and Lady Maud in especial, pressed her to partake of tea and other
refreshments, and spoke soothingly to her, and were very full of
tender womanly sympathy.
Lady Maud, the Earl’s second daughter, knew the new school-
mistress better than did the others, and liked her. She was herself a
constant visitor at the school-house, and had heard many and many
an urchin stammer through his or her lessons there, and could
therefore the better appreciate the motive which had led Ethel into
her late danger, through a natural wish to comfort little Lenny on his
bed of fever. Warmth, and that kindliness of manner which women
shew more than we do, did much towards bringing Ethel back from
that death-in-life which excessive fatigue and chill tend to produce;
and when the carriage was, in spite of her remonstrance, ‘ordered
round,’ to convey her home to the school, she had strength enough
to walk unaided to the door. Lord Harrogate had disappeared. The
Earl had not as yet returned from some meeting of magistrates. ‘I
will come down to see you, Miss Gray, to-morrow, if I can,’ said Lady
Maud, as the carriage drove off.

CHAPTER VI.‒SIR SYKES MAKES AN


ANNOUNCEMENT.
‘Lucy, my dear, and Blanche too, I want to know how you would like
to receive here, at Carbery, a young lady who is a total stranger to
all of us; but who, if she comes at all, comes with a distinct
understanding that this house, until she marries, is her home. I ask
you this, my dears, because I have received a letter’‒and the
baronet pointed to a black-bordered envelope that lay, with others,
beside his plate‒‘inclosing one penned, long ago, by a hand which
can write no more. George Willis‒Major, when he died, in the Indian
army‒was one of my earliest and truest friends. He is dead now. He
left behind him this one girl, his only and motherless child, and‒and
he begs me, in a letter, indorsed “After my death to be forwarded to
Sir Sykes Denzil,” to become the guardian of this‒this poor orphaned
thing. How do you say, my girls? Shall we have her here at Carbery,
or not?’
It was very neatly and prettily put on the part of Sir Sykes, and the
appeal was all the more effective because of the quietude and cool
indifference of the baronet’s ordinary manner. He was a cold,
unemotional person, in the everyday routine of life; and hence the
quivering of his lips, the faltering of his voice, added much of pathos
to what might otherwise have seemed commonplace.
As for the answer to the question asked, could there be a doubt of
it! It is to the credit of a woman’s heart that it always, when a plea
is well urged, responds to the Open Sesamé of compassion. They
may not, as men do, seek out hidden wrongs to be righted and
unseen pangs to be assuaged. But the distress that lies at their door
they seek to comfort; and had the young ladies of Carbery been very
much poorer than they were, their reply to their father’s question
would have been as generously outspoken.
‘By all means, yes, papa, let us have the poor girl here‒this Miss‒
Willis I think is her name; and we will try to make her happy. How
sad!’ And Blanche and Lucy were all but in tears over the woes of
this Anglo-Indian orphan; while Jasper, hiding his face behind his
coffee-cup, reflected that ‘the governor’ was a cool hand, and did his
little bit of acting in a manner worthy of Barnum himself.
In most houses of sufficient dignity to own a special letter-bag, the
temporary office of post-master is publicly discharged. The old Earl
of Wolverhampton, for instance, found it pleasant to sort and classify
the motley mass of correspondence which came daily to High Tor;
but he would almost as soon have opened a servant’s letter as have
opened the bag otherwise than in the presence of guests and
kindred. Carbery Chase, however, was not High Tor, and Sir Sykes
Denzil was a very different family chief from his noble neighbour.
The baronet was an early riser, as are many men who have spent
much of their lives in India; and he chose that the post-bag should
be brought to him in the library an hour or so before the usual
assembling for breakfast. Jasper, who was of a suspicious temper,
resented this exercise of parental authority; but he was wrong.
There may have been passages in Sir Sykes’s life which would not, if
published, have redounded to his credit, but tampering with letters
was not congenial to him. He never gave a second glance to any
envelope addressed to Captain Denzil or the captain’s sisters, and
was as loyal a custodian of the family correspondence as any
gentleman in the whole county of Devon. There was this advantage
in the baronet’s habit as regarded the post-bag, that nobody could
tell what letters Sir Sykes received or when he did receive them.
There are many of us, and those not the least loved or esteemed,
whose letters are as it were public property, and with whom
reticence on the subject of a missive newly received by the post
would diffuse disquiet and perhaps dismay through the domestic
circle. Sir Sykes had never been one of those who wear their hearts,
metaphorically, on their sleeves; he told those around him as much
as he wished them to know, and no more.
There was quite a flutter of pleasurable excitement among the
Denzil girls at the prospect of a new member of the household, a
new face at Carbery. They were sorry for this poor Miss Willis, sorrier
for her by far than for the many orphans whose bereavement is
notified to us every day by a grim list of deaths dryly chronicled in
the newspaper. And they felt doubly disposed to welcome her and be
good to her in that she was lonely and sad, and that her presence
would introduce a new element into Carbery. They made no sacrifice
in giving a cheerful acquiescence to their father’s suggestion that his
ward should be received beneath his roof. In such a house the
maintenance of an extra inmate was of no moment at all. But had
Sir Sykes been living in furnished lodgings, and forced to look twice
at half-a-crown, those honest girls would still not have grudged a
share of their hashed mutton and scanty house-room to the
daughter of an old friend of their father’s.
‘I don’t think, sir, that I remember to have heard you mention the
Major’s name,’ said Jasper, stolidly buttering his toast, but furtively
eyeing his father from beneath his pale eyelashes.
‘I think you have heard it,’ answered Sir Sykes, with a self-
possession that all but staggered Jasper’s unbelief. ‘We were
quartered together for years at Allahabad, Cawnpore, and Lahore.
There were Reynolds and L’Estrange, and Moreton who is living yet,
and this poor fellow Willis; the old set, with whom I was intimate. I
don’t often bore listeners who have never been in India, with the
details of my eastern experiences, else I think that the name of
Major‒or Captain‒George Willis would be tolerably familiar here.’
That the girls, in their newly awakened interest, should ask
questions was but natural. But their father had not very much
beyond the substance of his original announcement to communicate.
He had, he said, but a vague recollection of Mrs Willis, his friend’s
wife, a bride when Sir Sykes returned to Europe, and who had now
been dead for some years. She was a quiet domestic little person,
from Wales or Ireland, the baronet did not know which; and she had
some pittance of annual income, which would no doubt go to her
child at the husband’s decease. Major Willis had no private means, at
least so Sir Sykes thought. There was a London lawyer, however,
who knew all about the financial affairs of the orphan, and who
would of course render a proper statement to the baronet’s
solicitors. Miss Willis would be entitled, as the child of an Indian
officer, to no pension, being, as Sir Sykes understood, over the age
of twenty-one; but of that again he was not sure, not being certain
of the exact age of his friend’s daughter. She had no very near
relatives, and had never, to Sir Sykes’s knowledge, been in England
before.
‘It was the chaplain of the military station who wrote,’ continued Sir
Sykes, ‘inclosing in his letter that which poor Willis had left for
myself; and unless I telegraph to veto the arrangement, you are
likely to see Miss Ruth‒did I say that her name was Ruth‒very soon,
since she is to start by the next mail from Bombay.’
‘Well,’ muttered Jasper to himself, as some time later in the morning
he sauntered through the plantations, the path across which made a
short cut from Carbery Chase to Lord Wolverhampton’s park at High
Tor, ‘I have seen some cool hands; but‒‒ Well, well! It was neatly
done, very neatly. If the governor had not had the rare luck to come
into a fortune, he would have been as fit to make one as any man I
ever came across.’
The young man, whose preference for crooked ways was congenital,
and who knew of no road to Fortune’s temple save miry and devious
ones, began really to feel an admiration for his father’s abilities,
since he had discovered to what profound depths of dissimulation
the baronet could descend. His own craft had enabled him to lift a
corner of the fair seeming mask which Sir Sykes wore before the
world, but as yet his knowledge was too imperfect to enable its
possessor to make capital of the secret. Could he once‒‒
‘Why, Captain Denzil!’ exclaimed a ringing girlish voice, ‘I could
almost give you credit for poetic reveries, so complete is your
unconsciousness of the mere commonplace world around you. You
had all but passed us without a word or a bow.’
Jasper could not repress a slight start, as he found himself in
presence of the three Ladies De Vere and of their brother Lord
Harrogate, in the main avenue of the park. The young man’s moody
countenance brightened at once.
‘I am not, as a rule, greatly given to dreaming in broad daylight,
Lady Gladys,’ he said good-humouredly; ‘and as for the poetry, I’ll
promise to dedicate my first volume of sonnets, or whatever they
call them, to yourself. I am afraid, though, you will have to wait a
little before I take a plunge into literature.’
‘Of books‒of a sort, you have been rather a diligent compiler,’ said
Lord Harrogate, smiling.
Jasper bit his lip; but it was in a careless tone that he rejoined:
‘That’s only too true; but let me tell you, Harrogate, there goes more
of hard thinking to the composition of a betting-book than people
usually suppose.‒I was on my way to the house, meaning to inflict a
little of my dullness on you, Lady Maud, but you are early abroad.’
‘Yes; and you may as well walk down with us,’ said Lady Maud. ‘We
are going to the school, to see how my friend, Miss Gray, the school-
mistress, fares after her moorland adventure of Saturday. You heard
of it, Captain Denzil?’
No; Jasper had not heard of it. And on receiving an account of it
from Lady Maud’s lips, the captain said, with never so little of a
sneer, that the episode was ‘quite romantic.’
‘Come and see the heroine of it,’ said bright-eyed Lady Gladys; ‘and
you who affect to admire nothing, will be compelled to admit that
you have seen a face such as we very seldom behold except in a
picture.’
The party walked on together thus chatting until they reached the
village. The young people of the two great houses, High Tor and
Carbery Chase, had naturally been well acquainted with one another
from an early period; and the two elder of the De Vere girls were
disposed to pity Jasper rather than to blame him for the recklessness
that had brought about his exile from the haunts of fashion. But the
captain knew that Lord Harrogate and he were uncongenial spirits.
He did not like Harrogate, and he had a shrewd idea that Harrogate
despised him. We cannot, however, be very eclectic in the depths of
the country as regards those with whom we associate, and hence
these two young men, of natures so dissimilar, tolerated one another
because of the ancient friendship existing between their families.
The school was reached, and Ethel its mistress, still pale, but lovely
as one of the white roses in her tiny garden, came forward to
receive her distinguished visitors, and paid her tribute of thanks to
Lord Harrogate for the service he had rendered her, with a modest
grace which was all the more charming from its extreme simplicity of
words and manner.
‘I was too weak and faint the other evening, my Lord, to say what I
felt as to your‒your great kindness.’
And a princess could not have spoken better. It was Lord Harrogate
who seemed embarrassed, as your honest Briton, gentle or simple,
is embarrassed by being thanked. And then, while Lady Maud
eagerly told how jelly and hothouse fruit and port wine had been
despatched from High Tor to the moorland cottage for the benefit of
little Lenny Mudge, and how the parish doctor spoke hopefully of his
small patient, Jasper looked at Ethel Gray with a sort of wonder, as
at the most beautiful woman that he had ever seen, and the most
thoroughly a lady, not even excepting Lady Gladys De Vere. But he
said nothing, and lounged carelessly off with the party when adieus
had been exchanged with Miss Gray.
STORY OF CAPTAIN GLASS.
About the time of the accession of George III. to the throne, few
domestic events made a greater sensation in the papers and
periodicals of the day than the adventures and fate of a sea-captain
named George Glass, especially in connection with a mutiny on
board the brig Earl of Sandwich. This remarkable man, who was one
of fifteen children of John Glass, noted as the originator of the
Scottish sect known as the Glassites, was born at Dundee in 1725.
After graduating in the medical profession, he made several voyages,
as surgeon of a merchant-ship (belonging to London), to the Brazils
and the coast of Guinea; and in 1764, he published, by Dodsley, an
interesting work in one volume quarto, entitled The History of the
Discovery and Conquest of the Canary Islands, translated from a
Spanish manuscript.
He obtained command of a Guinea trader, and made several
successful voyages, till the war with Spain broke out in January
1762. Having saved a good round sum, he equipped a privateer, and
took command of her as captain, to cruise against the French and
Spaniards; but he had not been three days at sea, when his crew
mutinied, and sent him that which is called in sea-phraseology a
round-robin (a corruption of an old French military term, the ruban
rond, or round ribbon), in which they wrote their names in a circle;
hence none could know who was the leader.
Arming himself with his cutlass and pistols, Glass came on deck, and
offered to fight, hand to hand, any man who conceived himself to be
wronged in any way. But the crew, knowing his personal strength,
his skill and resolution, declined the challenge. He succeeded in
pacifying them by fair words; and the capture of a valuable French
merchantman a few days after put them all in excellent humour. This
gleam of good fortune was soon after clouded by an encounter with
an enemy’s frigate, which though twice the size of his privateer,
Glass resolved to engage; and for two hours they fought broadside
to broadside, till another French vessel bore down on him, and he
was compelled to strike his colours, after half his crew had been
killed and he had received a musket-shot in the shoulder.
He remained for some time a French prisoner of war in the Antilles,
where he was treated with excessive severity; but upon being
exchanged, he resolved to embark the remainder of his fortune in
another privateer, and ‘have it out,’ as he said, with the French and
Dons. But he was again taken in action, and lost everything he had
in the world.
On being released a second time, he was employed by London
merchants in several voyages to the West Indies, in command of
ships that fought their way without convoy; and according to a
statement in the Annual Register, he was captured no less than
seven times. But after various fluctuations of fortune, when the
general peace took place in 1763, he found himself possessed of two
thousand guineas prize-money, with the reputation of being one of
the best merchant captains in the Port of London.
About that time, a Company there resolved to make an attempt to
form a settlement on the west coast of Africa, by founding a harbour
and town midway between the Cape de Verd and the river Senegal.
In the London and other papers of the day we find many statements
urging the advantage of opening up the Guinea-trade; among
others, a strange letter from a merchant, who tells us he was taken
prisoner in a battle on that coast, and that when escaping he
‘crossed a forest within view of the sea, where there lay elephants’
teeth in quantities sufficient to load one hundred ships.’
In the interests of this new Company Glass sailed in a ship of his
own to the coast of Guinea, and selected and surveyed a harbour at
a place which he was certain might become the centre of a great
trade in teak and cam woods, spices, palm oil and ivory, wax and
gold. Elated with his success, he returned to England, and laid his
scheme before the ministry, among whom were John Earl of
Sandwich, Secretary of State, and the Earl of Hillsborough,
Commissioner of Trade and Plantations.
With truly national patience and perseverance, he underwent all the
procrastination and delays of office, but ultimately obtained an
exclusive right of trading to his own harbour for twenty years.
Assisted by two merchants‒the Company would seem to have
failed‒he fitted out his ship anew, and sailed for the intended
harbour; and sent on shore a man who knew the country well, to
make propositions of trade with the natives, who put him to death
the moment they saw him.
Undiscouraged by this event, Captain Glass found means to open up
a communication with the king of the country, to lay before him the
wrong that had been done, and the advantages that were certain to
accrue from mutual trade and barter. The sable potentate affected to
be pleased with the proposal, but only to the end that he might get
Glass completely into his power; but the Scotsman was on his guard,
and foiled him.
The king then attempted to poison the whole crew by provisions
which he sent on board impregnated by some deadly drug. Glass, by
his previous medical knowledge perhaps, discovered this in time; but
so scarce had food become in his vessel, that he was compelled to
go with a few hands in an open boat to the Canaries, where he
hoped to purchase what he wanted from the Spaniards.
In his absence the savages were encouraged to attack the ship in
their war-canoes; but were repulsed by a sharp musketry-fire
opened upon them by the remainder of the crew, who losing heart
by the protracted absence of the captain, quitted his fatal harbour,
and sailed for the Thames, which they reached in safety.
Meanwhile the unfortunate captain, after landing on one of the
Canaries, presented a petition to the Spanish governor to the effect
that he might be permitted to purchase food; but that officer,
inflamed by national animosity, cruelly threw him into a dark and
damp dungeon, and kept him there without pen, ink, or paper, on
the accusation that he was a spy. Being thus utterly without means
of making his case known, he contrived another way of
communicating with the external world. One account has it that he
concealed a pencilled note in a loaf of bread which fell into the
hands of the British consul; another states that he wrote with a
piece of charcoal on a ship-biscuit and sent it to the captain of a
British man-of-war that was lying off the island, and who with much
difficulty, and after being imprisoned himself, effected the release of
Glass. The latter, on being joined by his wife and daughter, who had
come in search of him, set sail for England in 1765, on board the
merchant brig Earl of Sandwich, Captain Cochrane.
Glass doubtless supposed his troubles were now over; but the
knowledge that much of his property and a great amount of specie,
one hundred thousand pounds, belonging to others, was on board,
induced four of the crew to form a conspiracy to murder every one
else and seize the ship. These mutineers were respectively George
Gidley, the cook, a native of the west of England; Peter M’Kulie, an
Irishman; Andrew Zekerman, a Hollander; and Richard H. Quintin, a
Londoner. On three different nights they are stated to have made
the attempt, but were baffled by the vigilance of Captain Glass,
rather than that of his countryman, Captain Cochrane; but at eleven
o’clock at night on the 30th of November 1765, it chanced, as shewn
at their trial, that these four miscreants had together the watch on
deck, when the Sandwich was already in sight of the coast of
Ireland; and when Captain Cochrane, after taking a survey aloft, was
about to return to the cabin, Peter M’Kulie brained him with ‘an iron
bar’ (probably a marline-spike), and threw him overboard.
A cry that had escaped Cochrane alarmed the rest of the crew, who
were all despatched in the same manner as they rushed on deck in
succession. This slaughter and the din it occasioned roused Captain
Glass, who was below in bed; but he soon discovered what was
occurring, and after giving one glance on deck, rushed away to get
his sword. M’Kulie imagining the cause of his going back, went down
the steps leading to the cabin, and stood in the dark, expecting
Glass’s return, and suddenly seized his arms from behind; but the
captain being a man of great strength, wrenched his sword-arm
free, and on being assailed by the other three assassins, plunged his
weapon into the arm of Zekerman, when the blade became wedged
or entangled. It was at length wrenched forth, and Glass was slain
by repeated stabs of his own weapon, while his dying cries were
heard by his wife and daughter‒two unhappy beings who were
ruthlessly thrown overboard and drowned.
Besides these four victims, James Pincent, the mate, and three
others lost their lives. The mutineers now loaded one of the boats
with the money, chests, and so forth, and then scuttled the
Sandwich, and landed at Ross on the coast of Ireland. But suspicion
speedily attached to them; they were apprehended; and confessing
the crimes of which they had been guilty, were tried before the
Court of King’s Bench, Dublin, and sentenced to death. They were
accordingly executed in St Stephen’s Green, on the 10th of October
1765.
AN EIGHTEENTH-CENTURY
ROMANCE.
On a bright cold day in April 1719, a travelling carriage with three
postillions dashed, full of the importance which always attends a
fashionable well-built vehicle, into the famous but not progressive
town of Innsbruck. The carriage contained four persons, said to be
going to Loretto on pilgrimage‒the Comte and Comtesse de Cernes,
with the brother and sister of the comtesse; and as the aristocratic
party alighted at their hotel, they created some sensation among
those who clustered round the porch in the clear sharp twilight. The
comtesse and her sister were very much enveloped in furs, and wore
travelling masks, which effectually screened their faces from the
vulgar gaze, and diverted the curiosity of the homely Tyrolese to the
undisguised figures of the comte and the comtesse’s brother. The
former was the statelier of the two, but the latter was universally
pronounced to be ein herrlicher Mensch. There was a certain
sprightly grace in his movements which yet did not detract from the
dignity essential in those days to a gentleman, and which would
have saved him from being addressed with too great familiarity. The
news soon circulated among the loungers that the fresh arrivals
were Flemings; and the pleasant blue eyes of the comte and his
brother-in-law‒though certainly not the sprightly grace of the latter‒
accorded with these floating accounts of their origin.
The pretty Tyrolese hostess, whose face was so charmingly set off
by the trim smartness of her velvet bodice and scarlet petticoat,
together with various silver chains, gleefully returned to her parlour
and her burly good-tempered husband, after attending the ladies to
their apartments. She had seen the Comtesse de Cernes without her
furs and travelling mask, dressed in lilac camlet turned up with silk;
so handsome, so gracious, so talkative, that the hostess thought she
must be French; for the hostess had seen plenty of French people
before now, besides Flemings. The comtesse was dark-haired and
dark-eyed; her sister, who had also divested herself of her mask, did
not equal her in appearance. Every one at the inn was glad that the
amiable party from Flanders were going to rest there four days.
Their supper was ordered in a private room, where the host and
hostess waited on them in person, and consequently had the best of
it with the loungers afterwards. The two gentlemen were in good
spirits, and the hostess thought their talk none the less amusing for
being in a language which she did not understand. Their laughing
looks and easy action conveyed to her mind a sufficient sense of fun
to make her fair face shine placidly in sympathy. Altogether they
were the liveliest Flemings she had ever seen; and their good-
humour seemed to be shared by the three postillions, two of whom
were Walloons and one Italian, and who were making themselves
very popular among the habitués of the inn.
‘Well, this is a pleasant little town of yours, mes amis,’ said the
vivacious Walloon outrider, who contrasted strikingly with his great,
tall, quietly smiling companion. ‘One could die of ennui here as well
as at Liege.’
‘No, you could not,’ returned a long spare poetic Tyrolese, who spent
most of his evenings at the inn, but never drank; notwithstanding
which peculiarity he and the host were warm friends. ‘We mountain-
folk are not dull; our hills and our torrents permit of no dullness.’
‘Very well perhaps for you who are born to it, to hang by your
eyelids on rocky ledges, or balance yourselves over what are called
in verses the silver threads of waterfalls, in pursuit of an
undoubtedly clever and pretty little animal; but all that would be dull
work to us. And then you have not a noblesse. What should we do
without ours? There would be no one to whom one could be
postillion.’
‘We are our own noblesse,’ said the spare poetic Tyrolese.
‘And you cannot say, Claude,’ observed the tall Walloon, ‘that
Innsbruck is without noblesse at the present moment; nay more, it
contains royalty in the shape of two captive princesses!’
‘One of them the grand-daughter of the hero who saved this empire
from the Turks, for which the Emperor now keeps her in durance.’
‘Take care, Monsieur,’ said the host (he pronounced ‘Monsieur’
execrably); ‘we are all the Kaiser’s loyal subjects here in Tyrol.’
‘Pardon, mein Wirth,’ replied Claude, who pronounced German as
badly as the host did French. ‘You know we men who run about the
world laugh at everything, and too often let our tongues run faster
than our feet.’
‘And after all,’ observed the Italian, ‘it is doing the young princess no
bad turn to prevent her marrying a prince out of place, who is not
likely to recover his situation.’
The Flemings spent the few days of their sojourn at Innsbruck in
visiting the churches and seeing what was to be seen in the town.
The Comtesse de Cernes’s brother was the busiest of the party. On
the morning after his arrival he met in a church porch a rather
impish-looking boy in the dress of a ‘long-haired page,’ and the two
held a brief colloquy. To this stylish page, in whom the rather
shapeless Slavonic type of countenance was widened out by smiles
of assurance, the gentleman from Flanders delivered a letter,
together with a wonderful snuff-box, cut out of a single turquoise,
‘for his mistress to look at.’ On the three remaining days likewise the
two met in different spots; the boy restored the snuff-box, and
brought some letters written in a fashionable pointed hand, in return
for those with which the Fleming had intrusted him.
The party were to set out on their southward way at two o’clock on
the morning of the 28th of April. The evening of the 27th was
overshadowed by clouds, driven by a sharp north-east wind.
Notwithstanding the aspects of the weather, the brother of the
Comtesse de Cernes, standing in the midst of his little party in their
private room, donned his cocked-hat and surtout.
‘Well, Wogan,’ said the comte, ‘if practice makes perfect, you are a
professor in the art of effecting escapes. After having burst your way
out of Newgate, and been valued at five hundred English guineas
(much below your worth of course), and cooled yourself for some
hours on the roof of a London house, and reached France safely
after all, you ought to be able to abstract a young lady from the
careless custody of Heister and his sentinels.’
‘I shall be ashamed if I fail, after wringing from Prince Sobieski his
consent to the attempt, and after his giving me the Grand Vizier’s
snuff-box; but I always find that doing things for other people is
more difficult than doing them for one’s self.’
‘I should say she was a clever girl,’ remarked the comte, ‘and her
page a clever page.’
‘I wonder if Jannetton is ready?’ said the comtesse, retiring into the
bedroom occupied by the ladies, whence she soon emerged with her
sister, who wore her paletot, and was smiling sufficiently to shew
two rows of exquisitely white teeth. The comtesse on the contrary
seemed somewhat affected. ‘Adieu, Jannetton, mais au revoir. There
will be no danger to you, and the Archduchess will take care that
you join me in Italy.’
Jannetton vowed she had no fears; and went forth into the
deepening twilight, being shortly afterwards followed by the
gentleman in cocked-hat and surtout. Curiosity did not now dog the
Flemish pilgrims, as it had done while they were altogether
novelties, and the adventurers slipped out unobserved. Meanwhile
the ‘long-haired page’ was busy at one of the side-doors of the
castle, where he was often wont to converse with the sentinel on
duty.
‘I don’t envy you your trade, Martin,’ he said, standing within the
porch, to the hapless soldier pacing up and down in the keen wind.
‘Glory is one thing and comfort another; but after all, very often no
one hears of the glory, whereas the comfort is a tangible benefit.
With the wind in the north-east and a snow-storm beginning, I at
least would rather be comfortable than glorious.’
‘A man who has seen campaigns thinks but little of a snow-storm,
Herr Konska.’
‘But they generally put you into winter-quarters,’ said Konska, not
wishing the sentinel to pique himself on his hardihood.
‘No matter; a soldier learns what hardship is. I wish you could see a
shot-and-shell storm instead of a snow-storm, or a forest of
bayonets poked into your face by those demons of Irish in the
French service.’
‘Well, I say it is a shame not to treat you men better who have
braved all that. See here; there is not even a sentry-box where you
can nurse your freezing feet. Ugh!’ And Konska withdrew,
presumably to warmer regions, while the soldier preserved a heroic
appearance as he paced shivering on his narrow beat. But a few
minutes later Konska, stealing back to the door, saw that his martial
friend was no longer at his post. The impish page pointed for a
moment in ecstasy to a tavern temptingly visible from the sentry’s
beat. Then he darted back in delight to whence he came.
While the snow-clouds were gathering over Innsbruck, and before
the Flemish chevalier had put on his surtout, two ladies conversed in
low tones in a chamber of the castle, of which General Heister was
then the commandant. Only one lady was visible; rather elderly, very
stately, and somewhat careworn in appearance. But that the other
speaker was of gentle sex and rank might be presumed from the
tones of a voice which issued from the closed curtains of the bed. It
might even be the voice of a young girl.
‘I hope you will not get into trouble, mamma,’ said the mysterious
occupier of the bed.
‘Hardly, if you write a proper letter on the subject of your departure,
as the Chevalier Wogan advises. You must cover my complicity by
begging my pardon.’
‘I am afraid you must write it yourself, mamma, as I am hors de
combat.’
‘That would not be to the purpose, my dear child: the general would
know my handwriting. I will push a table up to you; no one will
disturb us now till your substitute comes.’ She carried a light table,
furnished with inkstand and papetière to the side of the bed, and
made an aperture in the curtains, whence emerged the rosy bright-
eyed face of a girl‒who certainly did not look the invalid she
otherwise appeared to be‒and a white hand with an aristocratic
network of blue veins.
‘Will that do, mamma?’ she asked, after covering a page with writing
equally elegant and difficult to read. ‘Have I apologised and stated
my reasons for going, eloquently enough? Oh, how I hope that I
shall some day be a queen in my own capital, and that you and papa
will come and live there!’
The mamma sighed, as swift imagination presented to her mind all
the obstacles to so glorious a consummation; but she expressed
herself well satisfied with the letter, which she placed on the toilet
table. ‘I shall leave you now,’ she said; ‘you will find me in my room
when you wish to bid me farewell.’ She spoke with a certain stately
sadness as she left the apartment. The next person who entered it
was the Comtesse de Cernes’s sister in her paletot, with a hood
drawn forward over her face. She only said: ‘Que votre Altesse me
pardonne!’ (Pardon me, your Highness.)
Instantly the curtains divided once more, and the whole radiant
vision of the mysterious invalid, clad in a dressing-gown richly
trimmed with French lace, and shewing a face sparkling with
animation, sprang forth laughing: ‘You are the substitute?’
‘Yes, your Highness!’
‘I am sure I thank you very heartily, as well as Madame Misset and
the Chevalier Wogan, and all the kind and loyal friends who are
taking so much trouble for my consort and for me. The Archduchess
will take good care of you, Jannetton.’
Jannetton again shewed her teeth in a courtly smile as she
courtesied deeply. She was already persuaded that she would be
well cared for, in reward for the mysterious services she had come to
render the captive lady. She disencumbered herself of her paletot,
and looked amazingly like a very neat French waiting-maid until she
had bedizened herself in the young lady’s beautifully worked
dressing-gown. Then she speedily disappeared behind the curtains
of the bed; while the invalid, wrapping herself in the paletot, rushed
into the next room to embrace with tears and smiles her anxious
mamma, who said but little, and was now only eager to hurry her
away. There too she took possession of her page, and a small box
which was to accompany her flight down the dark staircases. ‘Your
Highness will find all safe,’ said the solemn page, who was careful to
suppress outer signs of his innate roguishness in the presence of his
mistresses.
‘The sentinel will not know me?’ said the young lady.
‘I am sure that he will not. Even if by chance he should look out
from the window of the tavern where he is now ensconced, it is not
very likely that he would know your Highness.’
The black clouds which obscured the blueness of the April night had
broken forth into a lashing storm of hail and wind before the young
girl and the page sallied forth into the darkness. She could hardly
keep her footing in the wet deserted streets; her hood was blown
back, and her fair hair became dangerously visible; her paletot was
splashed with the mud thrown up by her tread, and battered with
hail; still she laughed at all difficulties, for a hero’s blood flowed in
her veins, and now and then steadied herself by a touch on the
page’s shoulder as they floundered on. At the corner of a street they
suddenly came upon a dark figure, whose first appearance as it
crossed her path caused the fugitive to start back in some alarm.
But it was only the Comtesse de Cernes’s brother; and the young
lady’s mind was relieved when with a swift grace he bent for a
moment over her hand with the words: ‘My princess, soon to be my
sovereign, accept the homage, even in a dark street and a hail-
storm, of your loyal servant, Charles Wogan.’
‘Oh, my protector and good angel! is it indeed you?’ replied the
young lady. ‘Be assured that I would gladly go through many dark
streets and hail-storms to join my consort!’
And certainly this was a generous expression to use concerning a
consort whom she had never seen. She and the Flemish chevalier
were apparently old friends; and he had soon conducted her to the
inn, which the page Konska, however, was not to enter with his
mistress; he was to wait in a sheltered archway until the Comte de
Cernes’s travelling carriage should pick him up on its way out of
Innsbruck in the darkness of early morning. With a grimace he
departed for this covert, while his mistress was hurried into the
warm atmosphere of the Comtesse de Cernes’s bedroom, where that
would-be Loretto pilgrim knelt and kissed her hand. But better even
than loyal kisses were the bright wood-fire, the posset, and the dry
clothes which also awaited her in this room.
‘And you are Madame Misset, the noble Irish lady of whom my good
angel Wogan speaks in his letters! How can I thank you for the
trouble you take for me! I regard him quite in the place of my papa.
But you all seem to be as good as he is!’
‘Madame,’ replied the lady thus addressed, with all the loyalty of
eighteenth-century speech, ‘your Highness knows that it is a delight
to a subject to serve such a sovereign as our gracious prince; and all
that I have done is at my husband’s bidding.’
‘With such subjects, I am sure it will not be long before he regains
his throne. Ah, this delightful fire! Do you know, Madame, it is
snowing and hailing outside as if it were January!’
If Madame Misset felt some concern at the thought of the impending
journey‒if not for her own sake, at least for that of her husband, she
expressed none, except on her Highness’s account. However, her
Highness gaily laughed at hardship and difficulty, and was not at all
depressed at having left her mother in the castle-prison. Her only
fear was that she should be missed from the castle before she had
got clear of Innsbruck. But matters were too well arranged for so
speedy a termination of the romance. By two o’clock of the windy
spring morning the travelling carriage was ready, the Tyrolese
landlord and landlady little suspecting, as they sped their parting
guests, that the second lady who entered it in cloak and mask was
any other than that sister of the Comtesse de Cernes who had
arrived four days before.
‘Oh, my good Papa Wogan!’ exclaimed the latest addition to the
party of pilgrims, as they were rolled into the darkness of that wild
night, ‘how delighted I am to be free again, and about to join my
royal consort! I owe more than I can express to all, but most to you!’
Which she might well say, seeing that it was ‘Papa Wogan’ who had
selected her as the bride of this consort to whom her devotion was
so great. She chattered brightly away, with the natural vivacity of
eighteen in an adventure, rejoicing in her new-found freedom
however cold it might be; and the only clouded face in the carriage
was that of the Comtesse de Cernes. She was anxious on account of
the vivacious little man who had formerly been postillion, and who
was now riding far behind the carriage with his tall companion, to
keep at bay possible couriers, who might soon be hurrying to the
border fortresses with news that a prisoner had escaped the
vigilance of General Heister at the Castle of Innsbruck. The two
gentlemen in the carriage assured her that no harm would happen
to two such dashing cavaliers; but perhaps the comtesse thought
that to those who are safe it is easy to talk of safety. Not that any of
the party were really safe, but the cheerfulness of the young lady,
whose passport was shewn at all the towns as made out for the
sister of the Comtesse de Cernes, seemed to preclude the idea of
peril to her companions. At Venice the mind of the comtesse was
finally set at ease by the reappearance of the outriders, telling a
funny unscrupulous sort of story about having fallen in on the road
with a courier from Innsbruck, to whom they made themselves very
agreeable, and whom they finally left hopelessly tipsy at an inn near
Trent.
‘It was very wrong of you, Messieurs,’ said the escaped fugitive, ‘to
make him drink so much; you ought to have tied him up
somewhere. But I thank you very much for all the dangers you
incurred for my sake; and I assure all of you, my good friends, that
your king and queen will never forget you.’
There were no telegrams in those days; but before a week was over,
all Europe, or rather all political and fashionable Europe, was talking
of the escape of the Princess Clementina Sobieski, grand-daughter of
the hero who repulsed the hordes of Turkey on the plains before
Vienna, from her captivity at the Castle of Innsbruck, where she and
her mother had‒for political reasons connected with Great Britain‒
been placed by her cousin, the Emperor Charles VI. of Germany. It
was told with indignation at the courts of London and Vienna, with
laughter and admiration at those of Rome, Paris, and Madrid, how
she had been carried off by a party of dashing Irish people, calling
themselves noble Flemish pilgrims; and how she had left a French
maid-servant in her place in the castle, and a letter to her mother
apologising for her flight. The prime contriver of the adventure, it
was said was that Chevalier Wogan who had been in mischief for
some time past, and had made his own way with great aplomb out
of Newgate.
At Venice, a singular readjustment of the dashing party took place:
the vivacious outrider now appearing in the character of Captain
Misset, the husband of Madame Misset, hitherto called the Comtesse
de Cernes; and the tall outrider in that of Captain O’Toole, both
being of the Franco-Irish regiment of Count Dillon, as was also the
gallant Major Gaydon, alias the Comte de Cernes. The comtesse’s
brother was now no longer related to her, but acknowledged himself
to be that Charles Wogan who had really done much for the
Chevalier, having fought for him, been taken prisoner for him,
escaped for him, chosen his bride, and effected her liberation as
cleverly as he had effected his own. In fact the Italian postillion
Vezzosi was the only one of this curious group who had acted at all
in propriâ personâ.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!

ebookball.com

You might also like