iNetCCIE -R&S Advan..

advertisement
CCIE R&S Advanced
1
Agenda
Day 1 Session 1
Day 1 Session 2
CCIE Program Overview
CCIE Foundation Overview
Day 1 Session 3
Catalyst
Day 1 Session 4
Frame Relay
Day 1 Session 5
IPv6
Day 2 Session 6
Ripv2
Day 2 Session 7
Eigrp
Day 3 Session 8
OSPF
Day 3 Session 9
Day 4 Session 10
Day 4 Session 11
Day 4 Session 12
BGP
Multicast
QoS
Others
© 2007 Network Learning, Inc.
2
Housekeeping
•
•
•
•
Restrooms
Kitchen - Softdrinks and snacks available
Cellphones - PLEASE put them on vibrate or turn
them off. If you need to take/make a call, please
exit the classroom.
Smoking - out side in front of building
© 2007 Network Learning, Inc.
3
SESSION 1
CCIE R&S Program Overview
© 2007 Network Learning, Inc.
4
CCIE R&S Program Overview
1.
2.
3.
CCNA/CCNP Certification (Optional)
CCIE Written Exam
CCBOOTCAMP’s R&S Foundation Course
4.
Develop a Study Plan and Timeline to Prepare for LAB
a)
b)
c)
d)
e)
f)
Review CCIE Blueprint
Purchase and Download recommended reading from Cisco Press and CCO web
site
Purchase LAB workbooks
Purchase and Setup Home Lab
Reserve Online Rack rentals
Save money or work out a deal with your employer to budget for multiple lab
attempts
5.
6.
Schedule a Lab Date commensurate with the Timeline
Study, Practice, Practice some more, and then study
7.
8.
CCIE Advanced Bootcamp
CCIE Mock LAB Bootcamp
© 2007 Network Learning, Inc.
5
CCIE LAB Overview
• A 8-hour, hands-on, 100-point lab exam. Candidates
must score 80 or above to pass.
• Students builds a network to supplied specifications
on a provided Cisco equipment rack.
• Lab questions can be completed in any order,
although some questions depends on the completion
of previous part of the exam.
• Physical cabling is done.
• Some of the basic functionality is preconfigured.
• Some of the equipment you can not configure such as
the Backbone routers.
© 2007 Network Learning, Inc.
6
Cisco R&S Equipment List
• 3725 series routers - IOS 12.4 mainline – Advanced
Enterprise Services
• 3825 series routers - IOS 12.4 mainline – Advanced
Enterprise Services
• Catalyst 3550 series switches running IOS version
12.2 – IP Services
• Catalyst 3560 Series switches running IOS version
12.2 - Advanced IP Services
© 2007 Network Learning, Inc.
7
Pre-lab Checklist
• Remove the Variables, increase your chances, and get your body physically and mentally
ready!
• Get to the testing city/location at least one day prior to your exam. If your time zone is
plus/minus more than six hours different than the time zone of the Cisco office you are
taking your exam, plan on getting there at least two days prior to the exam.
• Drive over to the facility where your lab exam will be held. Make sure you know how long
it will take you to get to the testing location.
• Look for a good place to eat breakfast near the facility.
• Eat a healthy dinner consisting of protein and complex carbohydrates. Stay away from
greasy, fatty, and sugary foods. Also, if you want to eat meat, try and eat chicken or fish
(avoid red meat as it takes your body longer to digest).
• Get a good night’s rest. Do not stay up the entire night trying to cram or study last
minute materials. Do NOT take any type of sleep aid that could still be in your system the
following day.
• Wake up at least ninety minutes before your exam start time. Get showered, dressed,
and go out for breakfast.
• At breakfast, eat only healthy foods. No greasy, fatty, or sugary items should be
consumed. Eat fruits, vegetables, oatmeal, etc.
• Arrive at the facility at least fifteen minutes prior to your exam.
© 2007 Network Learning, Inc.
8
CCIE R&S Blueprint
• Bridging and Switching
– Frame relay
– Catalyst configuration: VLANs, VTP, STP, MSTP, RSTP, Trunk, Etherchannel, management,
features, advanced configuration, Layer 3
• IP IGP Routing
– OSPF
– EIGRP
– RIPv2
•
•
•
•
•
•
•
•
IPv6: Addressing, RIPng, OSPFv3
GRE
ODR
Filtering, redistribution, summarization and other advanced features
BGP
iBGP
eBGP
Filtering, redistribution, summarization, synchronization, attributes and other advanced
features
© 2007 Network Learning, Inc.
9
CCIE (R&S) Blueprint Cont.
These topics would be covered in the Advanced Boot camp
• IP and IOS Features
• QoS
– IP addressing
– DHCP
– Quality of service solutions
– HSRP
– IP services
– IOS user interfaces
– Congestion management, congestion
avoidance
• System management
– NAT
– NTP
– SNMP
– RMON
– Accounting
• IP Multicast
– PIM, bi-directional PIM
– MSDP
– Multicast tools, source specific multicast
– DVMRP
– Anycast
– Classification
– Policing and shaping
– Signaling
– Link efficiency mechanisms
– Modular QoS command line
• Security
– AAA
– Security server protocols
– Traffic filtering and firewalls
– Access lists
– Routing protocols security, catalyst
security
– CBAC
– Other security features
© 2007 Network Learning, Inc.
10
SESSION 2
CCIE Advanced Bootcamp
Overview
© 2007 Network Learning, Inc.
11
Advanced Class Hours - Instructor
• Monday
9:00 AM till your head hurts
• Tuesday
9:00 AM till your head hurts
• Wednesday
9:00 AM till your head hurts
• Thursday
9:00 AM till your head is spinning
• Friday
9:00 AM till 3-ish [Mock Lab]
Lunch Break at 1:00 PM to 2:00 PM (60 minutes)
© 2007 Network Learning, Inc.
12
CCBOOTCAMP R&S Rack Layout
SW1
R2
R1
DCE
DCE
S1 S0/0/0
S0/1/1
DCE
DCE
Fas0/0
2811
R1
S0/0/1
S0/1/0
DCE
R3
S0/1/1
FR
S0/0/1 S0/1/0
S2 S0/0/0
DCE
Fas0/0
R1
SW1
SW1
R6
S0/0/1
FR
DCE
S5 S0/0/0
Fas0/1
SW1
S0/0/1
Fas0/1
Fas0/0
Fas0/1
SW2
FR
S0
DCE
2811
FR
S0/0/1
S8 S0/0/0
DCE
Fas0/1
Fas0/0
2811
Fas0/1
R8
SW4
Fas0/17
BB2
S0/0/1
Fas0/17
SW3
Fas0/18
SW4
Fas0/18
ATM1/0
S0/0
DCE
Fas0/0
2811
Fas0/1
E0/0
BB2
Fas0/9
SW2
Fas0/4
LS1010
ATM0/0/1
S0/0/1
BB1
Fas0/9
07
S0/1/0
SW3
SW2
Fas0/1
DCE
DCE
Fas0/0
Fas0/6
DCE
2811
SW1
Fas0/4
R7
S0/0/1 S0/0/0
DCE
2811
R7
DCE
BB1
DCE
R4
S0/0/1
FR
R2
S0/1/1 S0/1/1
S0/0/1
BB3
DCE
Fas0/0
SW2
S0/0/0
S0/0/1
Fas0/1
DCE
2811
Fas0/6
BB2
S4 S0/0/0
Fas0/3
S7 S0/0/0
SW1
SW2
S9 S0/0/0
Fa
s0
/
SW1
Fas0/3
Fas0/2
R6
Fas0/5
2811
FR
DCE
R8
Fas0/0
S0/0/0
SW1
Fas0/0
R1
DCE
S0/1/1
S0/0/1
R5
Fas0/5
DCE
S0/1/1
R3
S0/1/0
DCE
S0/0/1 S0/1/0
R3
DCE
Fas0/0
FR
Fas0/1
S6 S0/0/0
DCE
DCE
DCE
R5
2811
DCE
S3 S0/0/0
S0/0/1
DCE
R3
S0/0/1
S0/0/1 S0/1/0
FR
SW2
Fas0/2
Fas0/1
S0/0/1
FR
R4
R2
SW2
Fas0/1
2811
R4
S0/1/1
TFTP Server Address:
172.22.1.254 /24
S0/1/0
S0/0/1
DCE
S0/1/1
DCE
Fas0/1
R4
S0/1/0
PublicNet
172.22.10X.0 /24
(DG: 172.22.10X.1)
SW4
SW3
S0/0/0
S0/0/1 S0/1/0
FR
Fas0/20
Fas0/21
R2
S0/0/1
Fas0/20
Fas0/22
S0/0/0
Fas0/19
Fas0/21
S0/0/0
Fas0/19
Fas0/22
Frame Relay Cloud
BB1
R7
R8
08
S0/0/0
07
S0/1/0
/
s0
Fa
R6
S8
Fas0/24
/
s0
Fa
S6
S7
08
S9
R7
07
DCE
S0
Fas0/20
/
s0
Fa
S0/0/0
Fas0/21
S5
Fas0/22
S1
Fas0/21
S0/0/0
ACS/CA Server
192.168.0.0 /16
R5
S4
Fas0/20
/
s0
Fa
S2
Fas0/22
R1
Fas0/24
S0/0/0
S3
Fas0/19
0/
08
S0/0/0
S0/0/0
SW2
Fas0/19
Fa
s
R4
Fa
s0
Fa
/0
s0
7
/0
8
R3
R2
SW1
Fas0/10
3640
E0/1
BB3
SW2
Fas0/10
SW1
© 2007 Network
SW2Learning, Inc.
Fas0/11
Fas0/11
13
SESSION 3
Switching
© 2007 Network Learning, Inc.
14
First Things First (Ping Script)
tclsh
foreach address {
150.10.1.1
150.10.2.2
150.10.3.3
150.20.5.5
150.20.35.35
} {ping $address}
© 2007 Network Learning, Inc.
15
On a switch
© 2007 Network Learning, Inc.
16
Things You should already know (not covered)
• Interface Commands
• VTP
• Spanning Tree
• SPAN
• Strom Control
• Protected Ports
• 802.1X authentication
• Trunking
• MAC Address expiration
• Templates
© 2007 Network Learning, Inc.
17
Topics Covered
• Ether-channel and Load Balancing
• MST spanning tree
• Rapid Spanning Tree
• Advanced Switch Security
• Switch QoS
© 2007 Network Learning, Inc.
18
Ether channel
• PAgP can automatically groups interfaces with the same speed, duplex, mode, native
VLAN, VLAN range, and trunking status and type.
• The Ether Channel group looks like a single switch port to Spanning tree.
• PAgP modes: auto, desirable, on
• The first port in the channel that comes up provides its MAC address to the EtherChannel
© 2007 Network Learning, Inc.
19
Link Aggregation Control Protocol
• LACP is defined in IEEE 802.3ad and enables Cisco switches to manage Ethernet
channels between switches
• Similarly configured ports are grouped based on hardware, administrative, and port
parameter constraints such as same speed, duplex mode, native VLAN, VLAN range, and
trunking status and type
• A port in the active mode can form an EtherChannel with another port that is in the active
or passive mode.
• A port in the passive mode cannot form an EtherChannel with another port that is also in
the passive mode because neither port starts LACP negotiation.
• Can have 8 active and 8 standby ports per ether channel. (16)
*Note on mode configured manually on both ends of the EtherChannel must have the same
configuration. If the group is misconfigured, packet loss or spanning-tree loops can
occur.
© 2007 Network Learning, Inc.
20
Load Balancing and Forwarding
• Reduces part of the binary pattern formed from the addresses
in the frame to a numerical value that selects one of the links
in the channel.
• EtherChannel load balancing can use MAC addresses or IP
addresses, source or destination addresses, or both source
and destination addresses.
© 2007 Network Learning, Inc.
21
Source/destination MAC load balancing
• The PCs uses different ports on sw1
• The router will use different ports to reply to the PCs
© 2007 Network Learning, Inc.
22
Switch Security
• MAC Flood Attacks
• Port Security
• ARP Inspection
• MAC ACLs
• VACLs
• Private VLANs
© 2007 Network Learning, Inc.
23
Rapid Spanning Tree Protocol (RSTP)
© 2007 Network Learning, Inc.
24
RSTP Port Roles
© 2007 Network Learning, Inc.
25
RSTP Port States
• RSTP provides rapid convergence of
the spanning tree.
• Reconfiguration of the spanning tree
can occur in less than 1 second (in
contrast to 50 seconds with the
802.1D
• Only non-edge ports moving to the
forwarding state cause a topology
change.
© 2007 Network Learning, Inc.
26
Rapid PVST
© 2007 Network Learning, Inc.
27
802.1s (Multiple Spanning Tree)
• MSTs (IEEE 802.1s) combine the best aspects from both the PVST+
and the 802.1q.
• When you enable MST you enable 802.w (RSTP)
• The idea is that several VLANs can be mapped to a reduced number
of spanning tree instances because most networks do not need more
than a few logical topologies.
• There is no need to run 1000 instances. If you map half of the 1000
VLANs to a different spanning tree instance, as shown in this
diagram, these statements are true:
–The desired load balancing scheme can still be achieved, because half of
the VLANs follow one separate instance.
–The CPU is spared because only two instances are computed.
•
© 2007 Network Learning, Inc.
28
MST Configuration
© 2007 Network Learning, Inc.
29
MAC Flood Attacks
• Affects Transparent Switches
• Switches Learn and populate the CAM table based
on Source MAC addresses
• If to many MAC addresses are sent – open fail
mode
• The switch forwards out every frame on every port
• This allows hackers to sniff other clients uni-cast
information.
© 2007 Network Learning, Inc.
30
Preventing MAC Flooding with Port Security
© 2007 Network Learning, Inc.
31
Port Security - Aging
• Static- enables timer to static entries
• Time - <1-1440> Aging time in minutes
• Type –
– absolute Absolute aging (default)
– inactivity Aging based on inactivity time period
© 2007 Network Learning, Inc.
32
Mac-address
• Can manually input the actual Mac address
• Also can store dynamically learned Mac addresses with Sticky
© 2007 Network Learning, Inc.
33
Maximum
• The total amount of Mac addresses allowed on a
port
© 2007 Network Learning, Inc.
34
Violations
• The action to take if port security is violated
– protect—When the number of port secure MAC addresses reaches the maximum
limit allowed on the port, packets with unknown source addresses are dropped until
you remove a sufficient number of secure MAC addresses to drop below the
maximum value or increase the number of maximum allowable addresses. You are
not notified that a security violation has occurred. (no syslogs/snmp)
– restrict—When the number of secure MAC addresses reaches the limit allowed on
the port, packets with unknown source addresses are dropped until you remove a
sufficient number of secure MAC addresses or increase the number of maximum
allowable addresses. An SNMP trap is sent, a syslog message is logged, and the
violation counter increments.
– shutdown—The interface is error disabled when a violation occurs, and the port LED
turns off. An SNMP trap is sent, a syslog message is logged, and the violation
counter increments
© 2007 Network Learning, Inc.
35
Apply Port Security and Verify
• If more than 3 mac-addresses are learned any
additional sources will cause the port to be
shutdown (error disabled).
© 2007 Network Learning, Inc.
36
HSRP and Port Security
• HSRP has a virtual mac-address that counts towards the
maximum allowed on a port configured for port security.
• Options:
–Switchport port-security maximum 2 (still can cause violation for
a short period of time
–Static Mac-address entry for HSRP virtual mac-address
– (Best choice) Use-bia command on the router’s interface
•standby use-bia scope interface
http://www.cisco.com/en/US/products/ps6350/products_command_
reference_chapter09186a00804462c4.html#wp1165870
© 2007 Network Learning, Inc.
37
ARP Spoofing
• Gratuitous ARP
–Detect IP conflicts. When a machine receives an ARP request
containing a source IP that matches its own, then it knows there
is an IP conflict.
–They assist in the updating of other machines' ARP tables.
–They inform switches of the MAC address of the machine on a
given switch port, so that the switch knows that it should transmit
packets sent to that MAC address on that switch port.
–Every time an IP interface or link goes up, the driver for that
interface will typically send a gratuitous ARP to preload the ARP
tables of all other local hosts.
© 2007 Network Learning, Inc.
38
ARP DoS
• Overloads a switch port with ARP traffic
• Switch can handle untrusted host connecting to as
many as 15 new hosts per second. checks every 1
second
• Exceed limit than port changes to error disabled
© 2007 Network Learning, Inc.
39
IP ARP Inspection
• This feature helps prevent malicious attacks on the
switch by not relaying invalid ARP requests and
responses to other ports in the same VLAN
• How does it work?
–DHCP Snooping (Recommended in production)
–Static ARP Access-list (Use for Lab situation)
© 2007 Network Learning, Inc.
40
ARP inspection Cont.
• Option to change defaults per port
© 2007 Network Learning, Inc.
41
IP Source Guard
• By watching which IP addresses are assigned by DHCP, a
switch can create dynamic ACL's to block all traffic except
traffic from DHCP-assigned IP addresses.
• Benefits:
–Prevents a hacker from spoofing their IP address to launch an
anonymous attack.
–Prevents users from ignoring DHCP and manually configuring a
static IP address.
© 2007 Network Learning, Inc.
42
IP Source Guard Configuration
© 2007 Network Learning, Inc.
43
DHCP Snooping
• Create a DHCP database on flash or TFTP
• Enable DHCP Snooping
• "The option-82 information contains the switch MAC address
(the remote ID suboption) and the port identifier, vlan-modport, from which the packet is received (circuit ID suboption).
The switch forwards the DHCP request that includes the
option-82 field to the DHCP server. "
• ip dhcp snooping database flash:file01.txt"
• ip dhcp snooping
• ip dhcp snooping information option
© 2007 Network Learning, Inc.
44
Show IP DHCP Snooping Bindings
Switch> show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- -------------------01:02:03:04:05:06 10.1.2.150 9837 dhcp-snooping 20
GigabitEthernet0/1
00:D0:B7:1B:35:DE 10.1.2.151 237 dhcp-snooping 20
GigabitEthernet0/2
Total number of bindings: 2
© 2007 Network Learning, Inc.
45
Mac-address Access-list
• You can configure a MAC address ACL using either of the following:
• Access-list 700-799 48-bit MAC address access-list
• or the extended version of the 48-bit MAC address access-list is 1100-1199
• To filter using the MAC address access-list, first you would define your
access-list. Say that you wanted to allow only a host with the MAC address of
0800001234567 to access-list Ethernet0/0 interface. You would define the
access-list like this:
Router(config)# access-list 700 permit 0800.0123.4567
You can use these same methods to filter by “vendor code”. All companies who
create Ethernet devices are designated a block of MAC addresses and all of
these blocks begin with a specific string. This prefix for each vendor is
known as the “vendor code”.
© 2007 Network Learning, Inc.
46
Protocol Type-Code Access-Lists (ACL)
• Used for non IP traffic
• Inbound only
© 2007 Network Learning, Inc.
47
MAC ACLs Cont.
© 2007 Network Learning, Inc.
48
Vlan ACLs (VACLs)
© 2007 Network Learning, Inc.
49
Private VLANs
• The private-VLAN feature addresses two problems
that service providers face when using VLANs:
–Scalability: The switch supports up to 1005 active VLANs.
If a service provider assigns one VLAN per customer, this
limits the numbers of customers the service provider can
support.
–To enable IP routing, each VLAN is assigned a subnet
address space or a block of addresses, which can result in
wasting the unused IP addresses, and cause IP address
management problems.
© 2007 Network Learning, Inc.
50
Primary to Secondary VLAN
• There are two types of secondary VLANs:
–Isolated VLANs—Ports within an isolated VLAN cannot
communicate with each other at the Layer 2 level.
–Community VLANs—Ports within a community VLAN can
communicate with each other but cannot communicate
with ports in other communities at the Layer 2 level.
© 2007 Network Learning, Inc.
51
Private Vlan Access Ports
• Private VLANs provide Layer 2 isolation between ports within the
same private VLAN. Private-VLAN ports are access ports that are one
of these types:
–Promiscuous—A promiscuous port belongs to the primary VLAN and can
communicate with all interfaces, including the community and isolated
host ports that belong to the secondary VLANs associated with the
primary VLAN. (Default Gateway)
–Isolated—An isolated port is a host port that belongs to an isolated
secondary VLAN. It has complete Layer 2 separation from other ports
within the same private VLAN, except for the promiscuous ports.
–Community—A community port is a host port that belongs to a
community secondary VLAN. Community ports communicate with other
ports in the same community VLAN and with promiscuous ports.
* Note Trunk ports carry traffic from regular VLANs and also from
primary, isolated, and community VLANs.
© 2007 Network Learning, Inc.
52
Issues with VTP V3 and Private VLANs
• Private VLANs need VTPv3
• If configuring in a 3550 or 3560 set VTP to
transparent
© 2007 Network Learning, Inc.
53
Private Vlan Compatibility
• Do not configure private-VLAN ports on interfaces configured
for these other features:
–– dynamic-access port VLAN membership
–– Dynamic Trunking Protocol (DTP)
–– Port Aggregation Protocol (PAgP)
–– Link Aggregation Control Protocol (LACP)
–– Multicast VLAN Registration (MVR)
–– voice VLAN
–– Web Cache Communication Protocol (WCCP)
© 2007 Network Learning, Inc.
54
Private VLAN configuration
© 2007 Network Learning, Inc.
55
Show private Vlans
© 2007 Network Learning, Inc.
56
Promiscuous Port / Default Gateway
Primary
Secondary
© 2007 Network Learning, Inc.
57
Applying a Community to interfaces
© 2007 Network Learning, Inc.
58
3560 QOS Considerations
•
•
•
•
Uses shaped round robin (SRR)
Q1 can be configured as a priority queue
Queues can operate in shaped or sharing modes
Each Interface can be assigned to one of two queue-sets
–4 queues Egress
–2 queues Inbound
• Congestion avoidance algorithm is Weighted Tail Drop (WTD)
*Note 3550 only has egress queues and queue 4 = priority
queue by default
© 2007 Network Learning, Inc.
59
Weighted Tail Drop
• Queue size is 1000 frames.
• Three drop percentages are configured: 40 percent
(400 frames), 60 percent (600 frames), and 100
percent (1000 frames).
• 400 frames can be queued at the 40-percent
threshold, up to 600 frames at the 60-percent
threshold, and up to 1000 frames at the 100-percent
threshold.
© 2007 Network Learning, Inc.
60
SRR Shaping and Sharing
• Both the ingress and egress queues are serviced
by Shaped Round Robin (SRR)
• SRR controls the rate at which packets are sent.
• On the ingress queues, SRR sends packets to the
internal ring.
• On the egress queues, SRR sends packets to the
egress port.
© 2007 Network Learning, Inc.
61
Input Queue
Bandwidth
weight queue 1 and queue 2cv
DSCP values
Queue Id
© 2007 Network Learning, Inc.
62
Output Queue
queue-set id
drop threshold
Reserved Maximum
queue id
threshold threshold
buffer
Percentage
buffer
Queue 3
Percentage
buffer
Queue 1 buffer
Percentage
Percentage
Queue 4
Queue 2
© 2007 Network Learning, Inc.
63
SRR applied
© 2007 Network Learning, Inc.
64
Frame Relay
• Interfaces
• Inverse ARP
• Mesh
• Hub and spoke
• Point-to-point
• Combination
• Issues
• Advanced Frame-relay and PPP
© 2007 Network Learning, Inc.
65
Frame-Relay Interface Configuration
© 2007 Network Learning, Inc.
66
Inverse ARP
© 2007 Network Learning, Inc.
67
Static Mappings
© 2007 Network Learning, Inc.
68
Sub Interfaces
© 2007 Network Learning, Inc.
69
Point-to-Multipoint Sub interface
© 2007 Network Learning, Inc.
70
Point-to-point Sub Interface
© 2007 Network Learning, Inc.
71
Mesh Topology
© 2007 Network Learning, Inc.
72
Full Mesh Frame-relay
• Requirements Phys Interface
–With Inverse ARP
•NO frame relay maps required
–NO inverse-arp allowed
–A PVC/FR Map configured between each router
–Total PVCs = k(k-1)/2 where k=router
–3 routers need 6 DLCIs
–All routers are on the same subnet
–All routers are using the physical interface
–Can support Broadcast or NBMA
© 2007 Network Learning, Inc.
73
Full Mesh Frame-relay Point-to-Multipoint Sub
• In a frame-relay mesh multipoint configuration the
following must be true before two routers can
communicate;
–The destination IP address must be in the routing table
–There must be a frame-relay map for the destination IP
address. The destination IP address can be any IP address
including yours. (need a map statement to ping your own
interface)
© 2007 Network Learning, Inc.
74
Hub and Spoke Topology
© 2007 Network Learning, Inc.
75
Frame Relay Hub and Spoke
• Requirements
–With Physical Interfaces and inverse-arp
•No map statements needed on spokes
•Map statements needed on hub to all spokes
–With Physical Interfaces and No inverse-arp
•Map statements needed on hub to each spoke and one
map from the spoke to hub
–Enable broadcasts over the NBMA if required for routing
protocol or multicast
–All routers are on a common subnet
© 2007 Network Learning, Inc.
76
Example Configuration from the HUB router
On r1lablab
Int S0/0/0
Ip address 131.1.234.1 255.255.255.0
Encapsulation frame
Frame-relay map ip 131.1.234.2 102 broadcast
Frame-relay map ip 131.1.234.3 103 broadcast
Frame-relay map ip 131.1.234.4 104 broadcast
No frame-relay inverse-arp
No shut
To prevent inverse-arp
wait until all routers
have been configured
for FR
before un
shutting
the interfaces
© 2007 Network Learning, Inc.
77
Frame Relay Hub and Spoke Point-to-Multipoint
• Inverse ARP not recommended should be disabled
• Need FR map statements configured on sub interface to each
hub.
• Need FR map statements from each spoke to the hub.
–Enable broadcasts over the NBMA if required for routing protocol
or multicast
–All routers are on a common subnet
– Still need a map statement to ping your own interface)
© 2007 Network Learning, Inc.
78
Frame Relay Point-to-Point
• Requirements
–Uses sub interfaces
–A separate L3 subnet for each pair of routers
–Works the same with or without Inverse ARP
 Note if the routers are configured in a point-to-point manner
they will NOT generate inverse-arp requests; however, if they
receive a request, they will respond. Useful for
combinations of one end p2p sub and the other
physical
© 2007 Network Learning, Inc.
79
Troubleshoot Frame Relay
• Show interface
• Show controllers serial
• Show frame-relay lmi
• Show frame-relay pvc
• Show frame-relay map
• Debug frame-relay lmi
© 2007 Network Learning, Inc.
80
PPP 2-way authentication (PAP and Chap)
© 2007 Network Learning, Inc.
81
Debug PPP authentication
© 2007 Network Learning, Inc.
82
PAP/CHAP configuration
R1
R2
© 2007 Network Learning, Inc.
83
FREEK (Frame relay end to end keepalives
• There are four modes determine the type of keepalive traffic each device sends and
responds to:
– In bidirectional mode, the device will send keepalive requests to the other end of the
VC and will respond to keepalive requests from the other end of the VC.
– In request mode, the device will send keepalive requests to the other end of the VC.
– In reply mode, the device will respond to keepalive requests from the other end of the
VC.
– In passive-reply mode, the device will respond to keepalive requests from the other
end of the VC, but will not track errors or successes.
© 2007 Network Learning, Inc.
84
Configuring FREEK
For example, could require
3 in a row
© 2007 Network Learning, Inc.
85
Objectives
• IPv6 Addressing
• IPv6 Address Scopes
• Enabling IPv6
• RIPng
• EIGRP for IPv6
• OSPFv3
• OSPFv3 over NBMA
• IPv6 over IPv4
© 2007 Network Learning, Inc.
86
Things not covered
• IPv6 Neighbor Discovery
• Duplicate Address Detection
• Solicited Node
• Stateless Auto-configuration
• DHCPv6
• DNSv6
© 2007 Network Learning, Inc.
87
Larger Address Space
• IPv4
–32 bits or 4 bytes long
~
= • 4,200,000,000 possible addressable nodes
• IPv6
–128 bits or 16 bytes: four times the bits of IPv4
undecillion
36
~
= • 3.4 * 10 possible addressable nodes
~
= • 340,282,366,920,938,463,374,607,432,768,211,456
28
~
= • 5 * 10 address
© 2007 Network Learning, Inc.
88
IPV6 Addressing
• IPV6 addresses are 128 bits long
• Consecutive zeroes can be eliminated (::)
• 2001:0:0:A1::1E2A/64
• 2001:0:0:A1 is the network portion
• Interface portion is 0:0:0:1E2A or ::1E2A
© 2007 Network Learning, Inc.
89
IPV6 Address Scopes
• Link-local Scope
• Unique-local Scope
• Global Scope
© 2007 Network Learning, Inc.
90
Link-local
128 bits
0
Interface ID
64 bits
1111 1110 10
FE80::/10
10 bits
• Identifies all hosts within a single layer 2 domain
• Unicast addresses within this scope are called link-local addresses
• They are assigned by default when ipv6 is enabled on an interface
• Network address is always FE80::/10
• Host portion derived from MAC address (Modified EUI-64)
• Can be manually added too R3(config-if)#ipv6 address FE80::3 link-local
• Independent of the global addressing scheme
• Cannot be routed
© 2007 Network Learning, Inc.
91
IPv6 Address Configuration (Cont.)
LAN: 3ffe:b00:c18:1::/64
Ethernet0
ipv6 unicast-routing
interface Ethernet0
ipv6 address 3ffe:b00:c18:1::/64 eui-64
MAC address: 0060.3e47.1530
router# show ipv6 interface Ethernet0
Ethernet0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::160:3EFF:FE47:1530
Global unicast address(es):
3FFE:B00:C18:1:160:3EFF:FE47:1530, subnet is 3FFE:B00:C18:1::/64
Joined group address(es):
FF02::1:FF47:1530
FF02::1
FF02::2
MTU is 1500 bytes
© 2007 Network Learning, Inc.
92
Unique-local
128 bits
0
1111 1110 11
Interface ID
Subnet ID
FEC0::/10
16 bits
10 bits
• Previously referred to as site local
• Identifies all devices within an administrative domain containing
multiple distinct links
• Unicast addresses within this scope are called unicast-local
addresses
• Have a scope limited to the site
• Network address is always FEC0::/10
• 16 bits in the network address identify the subnet
• Host portion derived from MAC address (Modified EUI-64)
© 2007 Network Learning, Inc.
93
Global Unicast Addresses
Provider
Site
Interface
64 bits
Usually given a /48
Global Routing Prefix
Subnet ID
Interface ID
• Global unicast addresses are:
–Addresses for generic use of IPv6
• Identifies all devices reachable across the Internet
• Unicast addresses within this scope are called global unicast addresses
• Have to be globally unique and routable
• Addresses reserved for global scope 2000 /3
• Can have a variable subnet portion
• Last 64 bits for the interface identifier
© 2007 Network Learning, Inc.
94
Unspecified and Loopback Addresses
• Unspecified address:
–0:0:0:0:0:0:0:0
–Used as a placeholder when no address is available (initial DHCP
request, DAD)
• Loopback address:
–0:0:0:0:0:0:0:1
–Same as 127.0.0.1 in IPv4
–Identifies self
© 2007 Network Learning, Inc.
95
IPv4-Mapped Addresses
80 bits
16 bits
32 bits
0
FFFF
IPv4 Address
0:0:0:0:0:FFFF:192.168.30.1
= ::FFFF:192.168.30.1
= ::FFFF:C0A8:1E01
• IPv4-mapped addresses:
–Used to represent the addresses of IPv4 nodes as IPv6 addresses
© 2007 Network Learning, Inc.
96
IPv4-Compatible Addresses
80 bits
16 bits
32 bits
0
0000
IPv4 Address
0:0:0:0:0:0:192.168.30.1
= ::192.168.30.1
= ::C0A8:1E01
• IPv4-compatible addresses:
–Refer to an IPv4/IPv6 node that supports automatic tunneling
© 2007 Network Learning, Inc.
97
Enabling IPV6
• ipv6 unicast-routing (global config mode)
• ipv6 address 2001:200:1:1::1/64 (interface mode)
• Link-local addresses are generated by default or
use manual configuration
© 2007 Network Learning, Inc.
98
RIPng
• Neighbors need not be on the same global subnet since they
are on the same link-local subnet
• Hence router has to advertise its own prefix for the link out
that interface
• In addition to the frame-relay map ipv6 broadcast to the
Global Address you also need a map to the link local address.
• RIP messages are sent to the all RIP routers link-local
multicast address FF02::9/128
• RIPng uses the authentication headers present in IPv6 for
authentication purposes
© 2007 Network Learning, Inc.
99
RIPng Configuration
• ipv6 rip abc enable (interface mode)
• show ipv6 protocol
• show ipv6 rip
• show ipv6 rip database
© 2007 Network Learning, Inc.
100
OSPFv3
• Basic mechanisms such as flooding, DR election, areas and spf
calculations remain the same
• Additionally link lsa’s announce link-local addresses and a list of
ipv6 prefixes to associate with the link
• Intra-area prefix lsa’s carry all ipv6 prefixes to all ospfv3 routers
within an area (correspond to router and network lsa’s in ipv4)
• Inter-area prefix lsa 0x2003 replaces summary or type 3 lsa’s
• Inter-area router lsa 0x2004 replaces type 4 lsa
• ospfv3 runs on a link basis rather than on a subnet basis as in
ospfv2
• Authentication removed from ospf, relies on ipv6 authentication
© 2007 Network Learning, Inc.
101
LSA Type Review
LSA
Function Code
LSA type
Router-LSA
1
0x2001
Network-LSA
2
0x2002
Inter-Area-Prefix-LSA
3
0x2003
Inter-Area-Router-LSA
4
0x2004
AS-External-LSA
5
0x4005
Group-membership-LSA
6
0x2006
Type-7-LSA
7
0x2007
Link-LSA
8
0x0008
Intra-Area-Prefix-LSA
9
0x2009
© 2007 Network Learning, Inc.
102
OSPFv3 Configuration
• ipv6 ospf 100 area 0 (interface mode)
• In case of an ipv6 only router configure a 32 bit router id under ipv6
router ospf 100
• Summary can be configured under ipv6 router ospf 100 using the
command area 1 range 2001::/48
• show ipv6 ospf
• show ipv6 ospf neighbor
© 2007 Network Learning, Inc.
103
OSPFv3 over NBMA
• OSPFv3 over NBMA is very much similar to OSPF over NBMA
• The hub interface priority has to be increased to make it the DR
• The spokes should be configured with a priority of 0 so that they
never participate in the DR elections
© 2007 Network Learning, Inc.
104
OSPFv3 over NBMA
• Moreover neighbors have to be specified
• The address for the neighbor has to be the link local addresses
• Neighbors have to be specified only on the hub not on the spokes
• frame-relay maps have to be configured pointing to the neighbor’s
link local address on both hub and spokes as well as the global
addresses (if configured)
• sh ipv6 int s0/1/0 displays the link-local address
© 2007 Network Learning, Inc.
105
OSPFv3 over NBMA Hub
• interface Serial0/1/0
• ipv6 ospf priority 100
• ipv6 ospf neighbor FE80::20A:B8FF:FE6B:A478
• ipv6 ospf neighbor FE80::20A:B8FF:FE2C:7DC8
• ipv6 ospf 10 area 0
• frame-relay map ipv6 FE80::20A:B8FF:FE6B:A478 106
• frame-relay map ipv6 FE80::20A:B8FF:FE2C:7DC8 105
© 2007 Network Learning, Inc.
106
OSPFv3 over NBMA Spoke
• interface Serial0/1/0
• ipv6 ospf priority 0
• ipv6 ospf 10 area 0
• frame-relay map ipv6 FE80::217:95FF:FE27:B900 601
• frame-relay map ipv6 FE80::20A:B8FF:FE2C:7DC8 601
© 2007 Network Learning, Inc.
107
IPv6 over IPv4
• IPv6 can be tunneled under ipv4
• Tunnel mode by default is gre can to be changed to ipv6ip
• The tunnel itself needs an ipv6 address
• The tunnel source and destination will be ipv4 addresses
• Routing protocol can be enabled on the tunnel
interface Tunnel0
no ip address
ipv6 address 2002:100:24:1::2/64
ipv6 ospf 100 area 0
tunnel source 10.86.72.17
tunnel destination 10.86.72.18
© 2007 Network Learning, Inc.
108
ISATAP
• ISATAP is an IETF transition mechanism that allows IPv6
networks to connect over IPv4 networks, even though this is a
draft and it has not yet standardized, it is a better solution
than 6to4 tunnel mechanism.
• ISATAP works like 6to4 tunnels, with one major difference, it
is a special IPv6 address that it uses on the edge routers; this
special IPv6 address is formed as follows:
–The network portion can be any IPv6 address.
–The host portion of the IPv6 address starts with “0000.5EFE” and
then the rest of the host portion is the translated IPv4 address of
the tunnel’s source IPv4 address.
• This translation is performed automatically.
© 2007 Network Learning, Inc.
109
ISATAP cont.
© 2007 Network Learning, Inc.
110
End of Day 1 Lecture
© 2007 Network Learning, Inc.
111
SESSION 6
RIPv2
© 2007 Network Learning, Inc.
112
RIPv2
• Outline
–Updates
–Optimize
–Filtering
–Summary
–Authentication
–Default Routes
–Advanced
© 2007 Network Learning, Inc.
113
Classless Routing (RIPv2)
The version 2 extensions provide the following
enhancements to RIP:
•
SUBNET MASKING INFORMATION IS NOW INCLUDED IN
ROUTING UPDATES ALLOWING RIP TO HANDLE VLSM
ADDRESSING
•
A NEXT-HOP ADDRESS IS CARRIED WITH EACH ROUTE
ENTRY
•
EXTERNAL
ROUTE
TAGS
CAN
BE
USED
MULTICAST
ROUTING UPDATES
•
SUPPORT FOR MD5 AUTHENTICATION
© 2007 Network Learning, Inc.
114
Split Horizon
Never advertise an network on the
interface from which it was learned
© 2007 Network Learning, Inc.
115
Poison Reverse
• Once you learn of a route through an interface, than
advertise it as unreachable back through the same
interface
© 2007 Network Learning, Inc.
116
Timers
• Update - rate (time in seconds [30] between updates) at which
routing updates are sent
• Invalid - interval of time (in [180] seconds) after which a route is
declared invalid
• Hold - interval (in [180] seconds) during which routing information
regarding better paths is suppressed
• Flush - amount of time (in [240] seconds) that must pass before a
route is removed from the routing table
© 2007 Network Learning, Inc.
117
Optimize
© 2007 Network Learning, Inc.
118
Obscure Topics
• Offset List – increases the value of routing metrics
r1lab(config)# access-list 1 permit 10.1.10.0
r1lab(config)# router rip
Hops
r1lab(config-router)# offset-list 1 in 3
• Source IP address validation – Default validates the source IP address
of incoming RIP routing updates - can be disabled for “off network”
routes
r1lab(config-router)# no validate-update-source
* Note For unnumbered IP interfaces (interfaces configured as ip unnumbered), no checking is performed.
• Interpacket delay – slows down sending routing update packets;
typically useful to slow down high speed routers when communicating
with low speed routers
r1lab(config)# router rip
r1lab(config-router)# output-delay <8-50 milliseconds>
© 2007 Network Learning, Inc.
119
Filtering
• Allow only odd routes from 1.1.0.0 from R1 to other routers
Network 1.1.1.0 0.0.254.255
My network =0
My mask = 1
128 64 32 16 8 4 2 1
1.1.1.0
0 0 0 0 000 1
1.1.3.0
0 0 0 0 001 1
1.1.5.0
0 0 0 0 0 10 1
Inverse Mask
On the third octet
Odds always
include a binary 1
Evens never have a binary
1
Mask
11111111.11111111.11111110.00000000
Network 00000001.00000001.00000001.00000000
First host 00000001.00000001.00000001.00000000
In ACL Must Match on this
Binary value
The 254 translates to 11111110 which tells the acl to not care
about anything in that octet except the least significant bit.
© 2007 Network Learning, Inc.
120
Distribute List
© 2007 Network Learning, Inc.
121
RIP V2 Summarization
• Applied to an interface
r1lab(config-if)# ip summary-address rip 10.20.0.0 255.255.255.0
• Split horizon must be disabled on the interface
• Auto summary can only summarize to the classful boundary, the
summary-address allows for classless summarization
• Does not insert a NULL0 entry into the routing table
© 2007 Network Learning, Inc.
122
RIP V2 Features
• Authentication
r1lab(config)# interface s0
r1lab(config-if)# ip rip authentication key-chain cisco
r1lab(config-if)# ip rip authentication mode <md5,text>
r1lab(config)# key chain cisco
r1lab(config-keychain)# key 1
r1lab(config-keychain-key)# key-string cisco
• Classless
• Route summarization (enabled by default)
r1lab(config)# router rip
r1lab(config-router)# no auto-summary
© 2007 Network Learning, Inc.
123
IP RIP Triggered
• When you enable triggered extensions to RIP, routing updates are
transmitted on the WAN only if one of the following events occurs:
–The router receives a specific request for a routing update, which causes
the full database to be sent.
–Information from another interface modifies the routing database, which
causes only the latest changes to be sent.
–The interface comes up or goes down, which causes a partial database to
be sent.
–The router is powered on for the first time to ensure that at least one
update is sent, which causes the full database to be sent
© 2007 Network Learning, Inc.
124
Default routes in RIP
• Redistribute static <ip route 0.0.0.0 0.0.0.0 null0 permanent>
• Default information originate
• <ip default network 1.0.0.0>
© 2007 Network Learning, Inc.
125
Example of default information
© 2007 Network Learning, Inc.
126
Advanced Workaround with RIP / RSPAN
RIPv2 F1/0
• R4 must receive RIP routes from BB2 but not permitted to redistribute from
OSPF
• SPAN or RSPAN used and no validate update source
© 2007 Network Learning, Inc.
127
Redistribution
© 2007 Network Learning, Inc.
128
Advertising Routes between routing protocol
• Longest Match
• Administrative Distance
• Redistribution
• Route Maps
• Distribute Lists
• Prefix Lists
© 2007 Network Learning, Inc.
129
Longest Match
• >show ip route
D 172.33.1.0/25 via 192.168.1.1
Preferred
R 172.33.1.0/24 via 192.168.1.2
O 172.33.1.0/23 via 192.168.1.3
© 2007 Network Learning, Inc.
130
Administrative Distance
© 2007 Network Learning, Inc.
131
Allow Redistribute on R1
Maintain R routes on R1 even after redistribution
© 2007 Network Learning, Inc.
132
Example Configuration with AD
© 2007 Network Learning, Inc.
133
Route Maps
•
•
•
•
•
•
•
Route filtering
Metric control
Used extensively in BGP
Used for setting IP Precedence
Policy routing (not part of redistribution)
Can use match and sets
->rout-map lab permit 10
–>match ip access-list 1 , 3 (values separated with , creates an or
statement)
Multiple
–>match ip prefix-list lab
match lines
are
considered an
and
© 2007 Network Learning, Inc.
134
Distribute Lists
• Used with access-lists to filter incoming or outgoing updates
• Be as specific as possible when applying the distribute list
• RIP & EIGRP
–distribute-list 1 in ethernet 0 (also can use a route map)
–distribute-list 1 out ethernet 0
• OSPF – only allows inbound
–distribute-list 1 in ethernet 0
• IS-IS does not use distribute lists
• BGP – applied to the neighbor
–neighbor 2.2.2.2 distribute-list 1 in
© 2007 Network Learning, Inc.
135
Prefix Lists
• Prefix lists are more sophisticated forms that Cisco provides
for filtering route advertisements. They filter on IP address
just as distribute-lists do, however they are easier to read, and
require fewer commands to configure. The other advantage to
a distribute list is that it is easier to add, remove and organize
the statements in the manner you chose.
• For example:
prefix-list xx seq 10 permit 204.134.12.0/22
prefix-list xx seq 20 permit 204.134.16.0/21
prefix-list xx seq 30 permit 204.134.24.0/24
© 2007 Network Learning, Inc.
136
Redistribution Problems
• When redistributing OSPF in to BGP, by default, BGP only
accepts internal routes not external type 1 or type 2
• Watch for administrative distance problems
• Beware of the metric used by RIP
• Redistributing in to RIP requires a metric or default-metric
or it will get set to 16
• Redistributing in to EIGRP requires a metric or defaultmetric or it will get set to infinity
• Always filter routes when doing redistribution
© 2007 Network Learning, Inc.
137
Advanced RIP
• One static route allowed
Receive the rip routes
© 2007 Network Learning, Inc.
138
SESSION 7
EIGRP
© 2007 Network Learning, Inc.
139
EIGRP
• Outline
–Overview
–Updates
–Authentication
–Default Routes
–Summarization
–Metrics
© 2007 Network Learning, Inc.
140
EIGRP
• Eigrp is a Cisco proprietary routing protocol loosely based on their original
IGRP
• EIGRP is an advanced distance-vector routing protocol, with optimizations to
minimize both the routing instability incurred after topology changes, as well
as the use of bandwidth and processing power in the router.
• EIGRP and IGRP are compatible with each other.
• Eigrp uses the Diffusing Update Algorithm (DUAL), which guarantees loopfree operation.
• In particular, DUAL avoids the "count to infinity" behavior common in
distance-vector routing protocols.
• The maximum hop count of EIGRP-advertised routes (i.e. destination
networks) is 255. 100 is the default but in the routing process <metric
maximum-hops >
• EIGRP is considered an Advanced Distance or Hybrid routing protocol
• Classless (VLSM)
© 2007 Network Learning, Inc.
141
EIGRP Updates
•
Send Hellos between neighbors which must include
–
–
–
–
AS #
Subnet
Authentication
K- Values
1.
Neighbor Table
2.
Topology Table (Determine successor (Primary) and Feasible Successor
3.
Dual Algorithm (Loop Free)
4.
Routing Table (Move successor from primary
*Note updates sent on 224.0.0.10 and EIGRP uses IP protocol number 88
© 2007 Network Learning, Inc.
142
Successor versus Feasible Successor
• Reported Distance (RD) is from your neighbor( next hop ) to the destination.
• Feasible Distance (FD) is from the current router, all the way to the destination, this
would include all other routers in between your router and the destination.
FD--------RD---------Destination.
R1--------R2-----------R3
• To qualify as a feasible successor, a next-hop router must have an RD less than the FD of
the current successor route
• Eigrp metric = lowest bandwidth + all delays x 256
•
© 2007 Network Learning, Inc.
143
EIGRP Authentication
• Similar to RIP V2 Authentication
• Only MD5 Authentication supported
r1lab(config)# interface s0
r1lab(config-if)# ip authentication mode eigrp 222 md5
r1lab(config-if)# ip authentication key-chain eigrp 222 cisco
r1lab(config)# key chain cisco
r1lab(config-keychain)# key 1
r1lab(config-keychain-key)# key-string ccie
© 2007 Network Learning, Inc.
144
Default Routes in EIGRP
• <ip summary address eigrp 100 0.0.0.0 0.0.0.0>
• <ip default network
• <redistribute ip route 0.0.0.0 0.0.0.0 null 0>
–<redistribute static or network 0.0.0.0
© 2007 Network Learning, Inc.
145
EIGRP Summarization
• Auto summary is on by default – disable
• Summarization is done on the interface
r1lab(config-if)# ip summary-address eigrp 222 10.2.0.0 255.255.255.0 5
• No way to get rid of the NULL0 entry, it is added to
avoid loops
Default AD is 5 but higher
can be used for floating summary
You can bump the AD to 255 to remove the null0 but
Then the Summary could cause a loop if you do not properly filter
© 2007 Network Learning, Inc.
146
EIGRP Leak Map
On the remote router
© 2007 Network Learning, Inc.
147
Virtual Template in PPP with Leak Map
• Problem- Can not use Leak Map with Sub Interfaces
• Must use PPP and Virtual Template
© 2007 Network Learning, Inc.
148
EIGRP Stub Areas
• Affects what the router will advertise
• Reduces processing on the router
• Controls what networks are advertised
• Four options: receive-only, summary, connected,
and static
–Router eigrp 1
Eigrp stub summary leak-map leaky
© 2007 Network Learning, Inc.
149
Problems with EIGRP Stub
• All routers in EIGRP AS need the stub command or
neighbors could become stuck inactive situation
because of no stub flag in hello packets
• Work around use Stub configuration on all routers
that need to be a stub on a single AS
• Use a separate AS for all other EIGRP routers and
redistribute between the EIGRP AS processes on
the Hub router
© 2007 Network Learning, Inc.
150
Tuning EIGRP
OPTIONAL EIGRP COMMANDS :
•
•
•
•
•
•
•
•
ip hello-interval eigrp –use this interface command to change the hello
timer
ip hold-time eigrp – use this command to change the EIGRP hold time
for routes received by this interface
metric weights - allows you to set the weight of the EIGRP metric
distance – used to change the administrative distance of routes
received from a neighbor
delay – specifies the delay of an interface in tens of microseconds
bandwidth –specifies the bandwidth of an interface in kilobits per
second
passive-interface - prevents the sending of EIGRP hellos on the link
Offset-list - used to increase the value of the routing metrics
© 2007 Network Learning, Inc.
151
Miscellaneous Topics
• Offset List
r1lab(config)# access-list 1 permit 10.2.1.0
r1lab(config)# router eigrp 222
Delay
r1lab(config-router)# offset-list 1 in 10000
• Adjust the Percentage of Bandwidth used for
routing updates - 50% is default
r1lab(config-if)# ip bandwidth-percent eigrp 222 10
Very important to summarize and use stubs in a large EIGRP
networks, otherwise the query traffic to find successor routes
could easily take 50% of the bandwidth. If we throttle the
percentage too much the convergence times will be effected
© 2007 Network Learning, Inc.
152
Equal Cost Load Balancing
Change with the maximum-paths command in EIGRP
process
© 2007 Network Learning, Inc.
153
EIGRP Unequal-Cost Load Balancing
• EIGRP offers unequal-cost Load balancing
– variance command
• Variance allows the router to include routes
with a metric smaller than multiplier times the
minimum metric route to that destination
– Multiplier is the number specified by the variance
command
© 2007 Network Learning, Inc.
154
Traffic-Share
• Determines how traffic is load balanced.
• Two options:
–Balanced (balances across paths)
–Min across-interfaces (traffic still uses lowest metric path)
Router eigrp 1
Variance 2
Traffic-share balanced (actively uses the lower speed link to load balance with higher
speed links)
* Note Min – only add to the routing table for fall back but does not load balance
Under the interface you can configure per packet or per flow load balancing
Ip load-balancing per-packet or per-destination
© 2007 Network Learning, Inc.
155
Variance Example
• Router E chooses router C to get to network Z because FD = 20.
• With a variance of 2, router E chooses router B to get to network Z (20 +
10 = 30) < [2 * 20(FD) = 40].
• Router D is not used to get to network Z (45 > 40).
• To use D we need a variance of 3 because 3x20=60 and 60 is > 45
© 2007 Network Learning, Inc.
156
End Day 2 Lecture
© 2007 Network Learning, Inc.
157
Session 8 OSPF
© 2007 Network Learning, Inc.
158
OSPF
• Outline
–OSPF Network Types
–RID
–LSA
–Adjacencies
–Area types
–New Features
–Authentication
–Summaries
–Filtering
© 2007 Network Learning, Inc.
159
Network Types
• The easiest configuration is to configure all OSPF frame relay
interfaces for point-to-multipoint
• If the lab prohibits you from changing the network type you
can try the neighbor command
Physical Frame Relay Interface
OSPF Network Type
Physical
Non-Broadcast
Multipoint Sub
Non-Broadcast
Point-to-Point Sub
Point-to-Point
© 2007 Network Learning, Inc.
160
OSPF Over NBMA Topology Summary
Mode
Non-broadcast
Preferred
Topology
Fully meshed
Broadcast
Fully meshed
Point-to-point
multipoint
nonbroadcast
Point-to-point
and Point-toMultipoint sub
interface
Partial mesh
(hub and
spoke)
Partial mesh
(hub and
spoke using
subinterfaces
Subnet
Address
Same
Adjacency
Manual
configuration
DR/BDR Elected
Same
Automatic
DR/BDR elected
Same
Manual
configuration No
DR/BDR
Different for Manual DR on
each subint.
hub
And SAME
for point-tomultipoint
© 2007 Network Learning, Inc.
161
Hello and Dead Timers
• In order to form neighbor adjacency, hello and dead
timers must match
• Timer differ based on network type configuration
broadcast–Hello time (10 seconds), dead time (40 seconds)
point-to-point–Hello time (30 seconds), dead time(120 seconds)
non-broadcast– Hello Time (30 seconds), dead time (120 seconds)
• Timers can be manually adjusted through the “ip ospf
hello-interval” and “ip ospf dead-interval” interface
commands
© 2007 Network Learning, Inc.
162
Hello and Dead Timers
Physical Interface
Non- Broadcast
Hello 30 Dead 120
Sub Interface P2P
Point-to-Point
Hello 10 Dead 40
Sub Interface Point
to multipoint
Non- Broadcast
Hello 30 Dead 120
Physical changed to Broadcast
Hello 10 Dead 40
Ip ospf Broadcast
P2P sub interface
changed to NBMA
Hello 30 Dead 120
Non-Broadcast
© 2007 Network Learning, Inc.
163
Miscellaneous OSPF - Timers
• Basic Timers
–Hello-interval
•interface serial 1/0
•ip ospf hello-interval 20 – automatically changes the
dead-interval to 80, dead = hello x 4
–Dead-interval
•interface serial 1/0
•ip ospf dead-interval 50 – does NOT change the
hello-interval
• Unless - See next slide
© 2007 Network Learning, Inc.
164
OSPF Timers – Fast Hellos
• Added in 12.2T15
• Enables faster convergence
• Sets Dead timer to 1 second, hello timer based on hellomultiplier.
• Example – set hello to 250ms
ip ospf dead-interval minimal hello-multiplier 4
© 2007 Network Learning, Inc.
165
Router ID
• Identifies an OSPF neighbor
• Dotted Decimal 32 bits
• 223.255.255.255 highest possible router ID
• Statically set the Router ID (Prefered) *note they may
reboot the routers before they grade
router ospf 1
router-id 150.5.50.5
• Uses highest IP address of all configured loopbacks
• If no loopback is present it uses the highest IP address
• Used for virtual-link commands
• Highest Router ID wins DR election – Priority can offset
election
© 2007 Network Learning, Inc.
166
Link State Announcement (LSA) Types
• 1 - Router LSA - Each OSPF router generates a single Type 1 LSA to describe the
status and cost (metric) of all links on the router. This LSA is flooded to each router within the OSPF area only.
• 2 - Network LSA - the designated router on a broadcast segment (e.g. Ethernet) lists
which routers are joined together by the segment
• 3 - Network summary LSA - an Area Border Router (ABR) takes information it has
learned on one of its attached areas and summarizes it before sending it out on other
areas
• 4 - ASBR Summary LSA - Type 5 External LSAs are flooded to all areas and the
detailed next-hop information may not be available in those other areas. The ABR floods
the information for the router (i.e. the Autonomous System Border Router) where the
type 5 originated.
• 5 - AS External LSA - these LSAs contain information imported into OSPF from
other routing processes. They are flooded to all areas (except stub areas).
• 6 - Group Membership LSA - this was defined for Multicast extensions to OSPF
(MOSPF),
• 7 - NSSA External LSA -
Not-so-stubby-area (NSSA) do not receive external LSAs
from Area Border Routers, but are allowed to send external routing information for
redistribution. They use type 7 LSAs to tell the ABRs about these external routes, which
the Area Border Router then translates to type 5 external LSAs and floods as normal to
the rest of the OSPF network.
© 2007 Network Learning, Inc.
167
LSA Table
Intra/Internal
LSA
Adv Router
R/Table
Display Database
Intra
1 (Router)
All in Area
O
<sh ip ospf
database router
Intra
2 (Network)
DR only
N/A
<sh ip ospf
database network
Inter
3 (Summary)
ABR
IA
<sh ip ospf
database summary
Inter
4 (Announce
ABR
N/A
<sh ip ospf
database ASBR
summary
5 (Type 1 or Type
2)
ASBR
E2 (default) or E1
<sh ip ospf
database external
6 (MOSPF)
Cisco can generate
a syslog error
7
ASBR (In NSSA)
N1 or N2
<sh ip ospf nssaexternal
ASBRs)
External
External
To DR Router 224.0.0.6
To Area Network 224.0.0.5
© 2007 Network Learning, Inc.
168
Problem preventing Neighbor Adjacency
• Mismatched hello
• Subnet information
• Authentication
• Area ID doesn’t match
• Area Stub flag not set
• Duplicate RID
© 2007 Network Learning, Inc.
169
Neighbor States
•
•
•
•
Down State
Init (Clear or start new OSPF process)
2way (Elect DR / BDR)
Exstart (Master/ Slave)
–Master sends data descriptor packets (Contain link-state advertisement
(LSA) headers only)
–Higher IP is Master
• Exchange
–Use ip ospf mtu ignore to avoid MTU problems (Exchange LSDB)
• Loading
–LSR (Request) -----
–---LSU (Updates)
• Full (Database synchronized and all Routes have been exchanged)
© 2007 Network Learning, Inc.
170
Electing the DR and BDR
• Hello packets are exchanged via IP multicast.
• The router with the highest OSPF priority is
selected as the DR.
• Use the OSPF router ID as the tie breaker.
•If no RID, than use highest Loopback IP
•If no Loopback than use highest interface IP
• The DR election is nonpreemptive.
© 2007 Network Learning, Inc.
171
Setting Priority for DR Election
Router(config-if)#
ip ospf priority number
• This interface configuration command assigns the
OSPF priority to an interface.
• Different interfaces on a router may be assigned
different values.
• The default priority is 1. The range is from 0 to 255.
• 0 means the router is a DROTHER; it can’t be the DR or
BDR.
© 2007 Network Learning, Inc.
172
Area Type
• All routers in an OSPF area
must have the same area type
set or no neighbor will be
formed
• Totally Stubby and Totally
NSSA have the ‘no-summary’
command added to ONLY the
ABR
• NSSA does not inject a default
route automatically. Must
configure for the default to be
sent on the ABR:
Area Type
ABR
LSA
Area
Routers
Stub
stub
2,3,4
stub
1
Totally
Stubby
NSSA
Totally
– area 2 nssa default-informationNSSA
originate
Stub nosummary
2, 0.0.0.0
stub
1
Nssa
2, 0.0.0.0
default3,4
informatio
1,7
noriginate
nssa
nssa nosummary
nssa
2, 0.0.0.0
1,7
© 2007 Network Learning, Inc.
173
Types of OSPF Routers
© 2007 Network Learning, Inc.
174
OSPF Authentication
• Uses either Clear Text or MD5
• Can do either Area Authentication or Link
Authentication
• If area 0 has authentication, any virtual links must
have the same authentication configured
• Watch for extra spaces on your passwords
© 2007 Network Learning, Inc.
175
Area Authentication
• Clear Text
r1lab(config)# router ospf 1
r1lab(config-router)# area 0 authentication
r1lab(config)# int serial 0
r1lab(config-if)# ip ospf authentication-key cisco
• MD5
r1lab(config)# router ospf 1
r1lab(config-router)# area 0 authentication message-digest
r1lab(config)# int s0
r1lab(config-if)# ip ospf message-digest-key 1 md5 cisco
© 2007 Network Learning, Inc.
176
Link Authentication
• Clear Text
r1lab(config-if)# int s0
r1lab(config-if)# ip ospf authentication
r1lab(config-if)# ip ospf authentication-key cisco
• MD5
r1lab(config-if)# int s0
r1lab(config-if)# ip ospf authentication message-digest
r1lab(config-if)# ip ospf message-digest-key 1 md5 cisco
© 2007 Network Learning, Inc.
177
Virtual Links
• Avoid in real word
• Used to connect an area to the backbone through another
area – extension of area 0
• Configuration uses router-id
• If authentication is configured on area 0 it must also be
configured on the virtual link and the far side router.
• Needed in two cases
–Discontiguous area 0
–Router touching two areas, but not area 0.
• Use Area Border routers as endpoints
© 2007 Network Learning, Inc.
178
Virtual Link Authentication
• Clear Text
r1lab(config)# router ospf 1
r1lab(config-router)# area 1 virtual-link 2.2.2.2 authentication-key cisco
• MD5
r1lab(config)# router ospf 1
r1lab(config-router)# area 1 virtual-link 2.2.2.2 message-digest-key 1 md5
cisco
• Remember that the far side of the virtual link must
know what type of authentication area 0 is using
• VL cannot traverse over a stub area
• If you are required to traverse a VL to area 0 you must negate
capability transit.
© 2007 Network Learning, Inc.
179
Connecting a Non-Backbone Area Through
a Stub Area
• Generic Routing Encapsulation (GRE) allows you to
connect a discontiguous area to the backbone through a
stub area
• GRE will cause extra packet overhead due to tunnel
header information
© 2007 Network Learning, Inc.
180
OSPF New Features
• Max LSA (Internal)
© 2007 Network Learning, Inc.
181
OSPF New Features Cont.
• Maximum Prefixes (Networks)
© 2007 Network Learning, Inc.
182
OSPF New Features Cont.
• Prevent OSPF router from being transit
• Max Metric uses 64000 – 65535 (16 bits)
© 2007 Network Learning, Inc.
183
OSPF Summarization
• Two ways to summarize
–Area range used to summarize between OSPF areas. Always
done on an ABR
•area 2 range 100.5.50.0 255.255.255.0
–Summary-address used to summarize external routes
redistributed into OSPF. Always done on an ASBR
•summary-address 100.5.50.0 255.255.255.0
• Will inject a NULL0 route into the routing table. MUST get
rid of the NULL0
•no discard-route internal – used with area range
•no discard-route external – used with summary-address
© 2007 Network Learning, Inc.
184
Configuring Route Summarization
router (config-router)#
area area-id range address mask
• Consolidates inter-area (IA) routes on an ABR
router (config-router)#
Summary-address address mask (not-advertise) (tag tag)
• Consolidates external routes, usually on an ASBR
© 2007 Network Learning, Inc.
185
Filtering in OSPF
• Distribute list only inbound and can not stop LSAs
© 2007 Network Learning, Inc.
186
Break Area 0
• R1 and R1 have full knowledge of Area 0 routes and
R3 and R4 have no knowledge.
Or on R2 OSPF
© 2007 Network Learning, Inc.
187
Prevent type 7 to 5 routes from Area 0
© 2007 Network Learning, Inc.
188
SESSION 8
BGP
© 2007 Network Learning, Inc.
189
BGP
• Outline
–Operation
–State
–Attributes
–Order/Preference
–Aggregation
–Security
–Peer Groups
–Dampening
© 2007 Network Learning, Inc.
190
iBGP Full Mesh Requirement
• All BGP speakers within an AS must be connected
together in a Full Mesh. For n BGP speakers within
an AS that requires to maintain n*(n-1)/2 unique
iBGP sessions to connect the eBGP routers
• If not meshed, routes must be redistributed into
and syncronized with IGP.
• Route Reflectors and Confederations may be used
to avoid the full mesh requirement or redistribution
© 2007 Network Learning, Inc.
191
BGP Route Reflector
• Scales well unlike full mesh
• Optional Peer groups could be used to save configuration on the route
reflector
r1lab(config-router)# neighbor 1.1.1.2 update-source loopback 0
r1lab(config-router)# neighbor 1.1.1.2 next-hop-self
r1lab(config-router)# neighbor 1.1.1.2 distribute-list 1 out
r1lab(config-router)# neighbor 1.1.1.2 route-reflector-client
r1lab(config-router)# neighbor 1.1.2.2 update-source loopback 0
r1lab(config-router)# neighbor 1.1.2.2 next-hop-self
r1lab(config-router)# neighbor 1.1.2.2 distribute-list 1 out
r1lab(config-router)# neighbor 1.1.2.2 route-reflector-client
© 2007 Network Learning, Inc.
192
Route Reflector
© 2007 Network Learning, Inc.
193
BGP Confederations
• Splits one AS into many smaller Private AS’s
–Private AS numbers are 64512 – 65535
• Connections between the Private AS’s are treated as special
eBGP connections
• External AS’s only participate in the Public AS – they are not
aware of the Private AS’s inside
© 2007 Network Learning, Inc.
194
Confederation
AS 6502
6503
AS 6503
6502
© 2007 Network Learning, Inc.
195
Manual Confederation
• Uses private AS for IBGP and Public AS for EBGP
• Need to remove the private AS information
© 2007 Network Learning, Inc.
196
Basic BGP Configuration
• Neighbors must be configured on both sides
• Neighbors must be directly connected or have a specific IGP route
(default route will not work) to the neighbor.
• Neighbors in the same AS are iBGP
– iBGP will go 255 hops by default to find a neighbor
• Neighbors in different AS’s are eBGP
– eBGP will only go 1 hop to find a neighbor
•neighbor 1.1.1.1 eBGP-multihop <1-255> (need IGP)
• If you use loopback to neighbor don’t forget to change the update
source
– BGP expects the directly connected interface to be the update source unless
you specify
•neighbor 1.1.1.1 update-source loopback 0
• Advertised networks must have an exact match in the routing table in
order for BGP to advertise the route
© 2007 Network Learning, Inc.
197
State
• Idle
• Connect
–Active – resets the retry timer kickbacks to idle
• Open send – version must be 4
• Open confirm
• Established
© 2007 Network Learning, Inc.
198
Neighbors
© 2007 Network Learning, Inc.
199
Synchronization Example
AS 45
AS 40
eBGP
C
E
D
iBG
P
B
AS 50
A
eBGP
F
31.106.0.0
• An IGP running only on Routers B and C
• 31.106.0.0 will not appear in D’s IP Routing
Table
© 2007 Network Learning, Inc.
200
Synchronization Problem
• An eBGP learned route cannot be installed in
the routing table of iBGP connected routers until
the route has already been learned by the IGP
connecting these routers
• It is almost always recommended to disable
synchronization or need to redistribute eBGP
routes directly in the IGP
r1lab(config)# router bgp 10
r1lab(config-router)# no synchronization
© 2007 Network Learning, Inc.
201
Next Hop
• IGP should carry route to next hops
• Recursive route look-up
• Decouples BGP from actual physical topology
• If an IGP router does not have a direct route to the
Next Hop EBGP than Next hop self can be used on
the IBGP/Ebgp neighbor to provide connect
© 2007 Network Learning, Inc.
202
Next Hop Example
eBGP
A
D
1.1.1.2
iBGP
31.106.0.0
1.1.1.1
eBGP
B
F
20.2.2.1/ 24
• B Does Not Advertise Network 20.2.2.0 to A
• A Will Not Install Network 31.106.0.0 in its Routing Table since
A does not know how to reach the next hop (20.2.2.1)
© 2007 Network Learning, Inc.
203
Next-Hop-Self Problem
• An eBGP learned route cannot be installed in the IP routing
table of iBGP connected routers unless the route’s next-hop
address is reachable
r1lab(config)# router bgp 10
r1lab(config-router)# neighbor 10.1.1.2 next-hop-self
• eBGP neighbors always advertise themselves as the "next
hop" for any routes sent.
• iBGP neighbors retain the original advertiser's address as the
next hop.
• The issue with next-hop information is whether or not that
next hop ( the eBGP neighbor address ) is reachable to any
iBGP neighbor.
© 2007 Network Learning, Inc.
204
Transit AS
• If an AS has 2 or more connections to the Internet,
by default some traffic not destined for your AS
may pass through your routers
• Two ways to stop this
–AS-Path access-lists
–Communities
Explained later
© 2007 Network Learning, Inc.
205
BGP Characteristics
• Distance-vector protocol with enhancements:
–Reliable updates
–Triggered updates only
–Rich metrics (called path attributes)
• Designed to scale to huge internetworks
© 2007 Network Learning, Inc.
206
BGP Path Attributes
• BGP metrics are called path attributes
• BGP attributes are categorized as well-known and
optional
• Well-known attributes must be recognized by all
compliant implementations
• Optional attributes are only recognized by some
implementations (could be private), expected not to
be recognized by everyone
© 2007 Network Learning, Inc.
207
Well-Known BGP Attributes
• Well-known attributes are divided into mandatory
and discretionary
• Well-known mandatory attributes must be present
in all update messages
• Well-known discretionary attributes are optional they could be present in update messages
• All well-known attributes are propagated to other
neighbors
© 2007 Network Learning, Inc.
208
WELL-KNOWN, MANDATORY
• AS-path: A list of the Autonomous Systems (AS) numbers that
a route passes through to reach the destination. As the
update passes through an AS the AS number is inserted at
the beginning of the list. The AS-path attribute has a reverseorder list of AS passed through to get to the destination.
• Next-hop: The next-hop address that is used to reach the
destination.
• Origin: Indicates how BGP learned a particular route. There
are three possible types -- IGP (route is internal to the AS),
EGP (learned via EBGP), or Incomplete (origin unknown or
learned in a different way).
© 2007 Network Learning, Inc.
209
WELL-KNOWN, DISCRETIONARY
• Local Preference: Defines the preferred exit point
from the local AS for a specific route.
• Atomic Aggregate: Set if a router advertises an
aggregate causes path attribute information to be
lost.
© 2007 Network Learning, Inc.
210
Optional BGP Attributes
• Optional BGP attributes are transitive or non-transitive
• Optional transitive attributes
–Aggregator: Specifies the router ID and AS of the router that
originated an aggregate prefix. Used in conjunction with the
atomic aggregate attribute.
–Community: Used to group routes that share common properties
so that policies can be applied at the group level.
• Optional non-transitive attributes
–Multi-exit-discriminator (MED): Indicates the preferred path into
an AS to external neighbors when multiple paths exist.
• Recognized optional attributes are propagated to other
neighbors based on their meaning (not constrained by
transitive bit)
© 2007 Network Learning, Inc.
211
Priority of Attributes
1.
If the path specifies a next hop that is inaccessible, drop the update.
2.
Prefer the path with the largest weight.
3.
If the weights are the same, prefer the path with the largest local
preference.
4.
If the local preferences are the same, prefer the path that was originated
by BGP running on this router.
5.
If no route was originated, prefer the route that has the shortest AS_path.
6.
If all paths have the same AS_path length, prefer the path with the lowest
origin type (where IGP is lower than EGP, and EGP is lower than
incomplete).
7.
If the origin codes are the same, prefer the path with the lowest MED
attribute.
8.
If the paths have the same MED, prefer the external path over the internal
path.
9.
If the paths are still the same, prefer the path through the closest IGP
neighbor.
10. Prefer the path with the lowest IP address, as specified by the BGP
router ID.
© 2007 Network Learning, Inc.
212
Weight
• The weight attribute is a Cisco-defined attribute
used for the path selection process. The weight is
configued locally to a router and is not propagated
to any other routers.
© 2007 Network Learning, Inc.
213
Origin
• The origin attribute indicates how BGP learned about
a particular route. The origin attribute can have one
of three possible values:
–IGP—The route is interior to the originating AS. This value
is set when the network router configuration command is
used to inject the route into BGP. [0] i
–EGP—The route is learned via the Exterior Border Gateway
Protocol (EGP). [1] e
–Incomplete—The origin of the route is unknown or learned
in some other way. An origin of incomplete occurs when a
route is redistributed into BGP. [?]
© 2007 Network Learning, Inc.
214
AS-Path
• The AS-path attribute is empty when a local route is inserted in the
BGP table
• The sender’s AS number is prepended to the AS-path attribute when
the routing update crosses AS boundary
• The receiver of BGP routing information can use the AS-path to
determine through which AS the information has passed
• An AS that receives routing information with its own AS number in
the AS-path silently ignores the information
Prepend as-path can be used as a metric
<routemap prepend permit 10
<match ip address 1
<set as-path prepend 100 100 100
© 2007 Network Learning, Inc.
215
Next-Hop Attribute
• Next-hop attribute indicates the next-hop IP address used for packet
forwarding
• Usually set to the IP address of the sending BGP router
© 2007 Network Learning, Inc.
216
Multi-Exit Discriminator Attribute
• The multi-exit discriminator (MED) or metric attribute is
used as a suggestion to an external AS regarding
the preferred route into the AS that is advertising
the metric.
• Only works from directly connected AS. It is not
transitive
• Default MED 0
© 2007 Network Learning, Inc.
217
Local Preference
• The local preference attribute is used to prefer an
exit point from the local autonomous system (AS).
Unlike the weight attribute, the local preference
attribute is propagated throughout the local AS. If
there are multiple exit points from the AS, the local
preference attribute is used to select the exit point
for a specific route.
• Default Local Preference 100
© 2007 Network Learning, Inc.
218
Atomic aggregate
• The Atomic aggregate serves as an indication to the receiver that it
can't "deaggregate" the prefix per some of the granularity associated
with the AS paths may have been lost when the aggregate was
created, and deaggregation could result in the introduction of loops.
• Border Gateway Protocol (BGP) allows the aggregation of specific routes into
one route with use of the aggregate-address address mask [as-set] [summaryonly] [suppress-map map-name] [advertise-map map-name] [attribute-map mapname] command. When you issue the aggregate-address command without
any arguments, there is no inheritance of the individual route attributes (such
as AS_PATH or community)
© 2007 Network Learning, Inc.
219
Aggregator
• AGGREGATOR is an optional transitive attribute of
length 6. The attribute contains the last AS number
that formed the aggregate route (encoded as 2
octets), followed by the IP address of the BGP
speaker that formed the aggregate route (encoded
as 4 octets). This SHOULD be the same address as
the one used for the BGP Identifier of the speaker.
• Created from enabling AS-Set
© 2007 Network Learning, Inc.
220
Communities
•
•
•
•
RFC1997, RFC1998
Optional attribute
Range: 0 to 4,294,901,760
Method to group destinations into communities and apply routing
decisions (accept, prefer, redistribute, etc.) using route-maps
• Route maps are used to set the community attribute. Predefined
community attributes are listed here:
–no-export—Do not advertise this route to EBGP peers.
–no-advertise—Do not advertise this route to any peer.
–internet—Advertise this route to the Internet community; all routers in the
network belong to it.
–local-AS — Use in confederation scenarios to prevent sending packets
outside the local autonomous system (AS).
• Commuties are AS specific and are stripped when transit through an
AS
© 2007 Network Learning, Inc.
221
Originator-ID
• Originator-ID is an optional, nontransitive BGP
attribute. This is a 4-byte attributed created by a
route reflector. The attribute carries the router ID of
the originator of the route in the local autonomous
system. Therefore, if a misconfiguration causes
routing information to come back to the originator,
the information is ignored.
© 2007 Network Learning, Inc.
222
Cluster List
• Cluster-list is an optional, nontransitive BGP attribute. It is a
sequence of cluster IDs that the route has passed. When a
route reflector reflects a route from its clients to nonclient
peers, and vice versa, it appends the local cluster ID to the
cluster-list. If the cluster-list is empty, it creates a new one.
Using this attribute, a route reflector can identify if routing
information is looped back to the same cluster due to
misconfiguration. If the local cluster ID is found in the clusterlist, the advertisement is ignored.
© 2007 Network Learning, Inc.
223
BGP Path Attribute Summary
Well-known mandatory attributes
–Recognized by everone, always present
–AS-Path, Next-Hop, Origin
Well-known discretionary
–Recognized by everone, optional
–Local Preference, Atomic Aggregate
Optional transitive
–Might not be recognized, propagated if not
–BGP Community, Aggregator
Optional non-transitive
–Might not be recognized, dropped if not
–Multi-exit-discriminator
© 2007 Network Learning, Inc.
224
Announcing Networks in BGP
• Only administratively defined networks are
announced in BGP
–Manually configure networks to be announced <network mask>
–Use redistribution from IGP
–Use aggregation to announce summary prefixes
© 2007 Network Learning, Inc.
225
Manually Announce Classless
Prefix in BGP
router(config-router)#
network ip-prefix-address mask subnet-mask
Configures a classless prefix to be advertised
into BGP
The prefix must exactly match an entry in the IP
forwarding table
Hint: use a static route to null 0 to create a
matching prefix in the IP forwarding table
© 2007 Network Learning, Inc.
226
Redistributing Routes
from IGP
• Easier than listing networks in BGP process in large networks
• Redistributed routes carry origin-attribute ‘incomplete’
• Always filter redistributed routes to prevent route leaking
© 2007 Network Learning, Inc.
227
Aggregating BGP Networks
• Summarization is called aggregation in BGP
–Aggregation creates summary routes (called aggregates) from
networks already in BGP table
–Individual networks could be announced or suppressed
© 2007 Network Learning, Inc.
228
Configuring Aggregation
router(config)#
router bgp as-number
aggregate-address address-prefix mask
• Specify aggregation range in BGP routing
process
• The aggregate will be announced if there is at
least one network in the specified range in the
BGP table
• Individual networks will still be announced in
outgoing BGP updates
© 2007 Network Learning, Inc.
229
Configuring Aggregation
router(config)#
router bgp as-number
aggregate-address address-prefix mask summary-only
• Configure aggregation of BGP routes
• Advertise only the aggregate and not the
individual networks
• Benefits:
• Smaller BGP routing tables
• More stable internetworks (less route
flapping)
• Drawbacks:
• Problems with multi-homed customers
© 2007 Network Learning, Inc.
230
Configuring Aggregation with other options
• Summary plus AS path
• Prevents loops in the summary
© 2007 Network Learning, Inc.
231
Aggregate cont.
• Other options that can be enabled are:
–Attribute maps are used to configure the attributes of the
aggregate route since the attributes of the original routes are
used by default when summarized
–Advertise maps allow the aggregate to inherit the attributes from
the specific networks identified in the advertise map. It is
important to note the attribute map overrides the advertise map
–Suppress maps this command overrides the summary only
keyword and suppresses on the routes configured in the
suppress map.
–Un-suppress maps selectively un-suppresses networks
suppressed in a suppress-map
© 2007 Network Learning, Inc.
232
Configuring BGP Communities
• BGP communities are configured in the following steps:
–Configure route tagging with BGP communities
–Configure BGP community propagation
–Define BGP community access-lists (community-lists) to match
BGP communities
–Configure route-maps that match on community-lists and filter
routes or set other BGP attributes
–Apply route-maps to incoming or outgoing updates
© 2007 Network Learning, Inc.
233
Community Setting Through
Route-Map
router(config)#
route-map name
match condition
set community value [ value … ] [additive]
• Route tagging with communities is always done
with a route-map
• Any number of communities can be specified
• Communities specified in the set keyword
overwrites existing communities unless you
specify the additive option
© 2007 Network Learning, Inc.
234
Attaching Communities to a Route
router(config-router)#
neighbor ip-address route-map map in | out
• Applies a route-map to inbound or outbound
BGP updates
• The route-map can set BGP communities or
other BGP attributes
router(config-router)#
redistribute protocol route-map map
• Applies a route-map to redistributed routes
© 2007 Network Learning, Inc.
235
Configure Community Propagation
router(config-router)#
neighbor ip-address send-community
• By default, communities are stripped in
outgoing BGP updates
• Community propagation to BGP neighbors has
to be manually configured
• BGP peer groups are ideal for configuring BGP
community propagation toward a large number
of neighbors
© 2007 Network Learning, Inc.
236
Related Commands
Set community none – Removes all community attributes
Set comm-list delete – Removes specific communities
ip community-list 1 permit 200:100
route map REM_COM permit 10
set comm-list 1 delete
Set community additive – Appends to existing communities
set community 450 additive
ip community-list 1 permit 200:10 – Matches any route that
has 200:10 as one of its communities
ip community-list permit 200:10 100:10 - Matches any route
that has either or both communities
ip community-list permit 200:10 100:10 exact-match –
Matches only those routes that are members of both
communities
© 2007 Network Learning, Inc.
237
AS Path Filtering
• Several scenarios require BGP route filtering based on AS-path
–Announce only local routes to the ISP - AS-path needs to be
empty
–Select routes based on a specific AS-number in the AS-path
–Accept routes for specific AS only from some BGP neighbors
• AS-path filters use regular expressions
© 2007 Network Learning, Inc.
238
Regular Expressions
Ranges and Wildcard Characters
• A range of characters matches any single character
in the range
examples:[1234] or [1-4]
• dot (.) matches any single character
© 2007 Network Learning, Inc.
239
Regular Expressions
Matching Delimiters
^ matches beginning of string
$ matches end of string
_
matches any delimiter (beginning,
whitespace, tab, comma)
end,
© 2007 Network Learning, Inc.
240
Regular Expressions
Repeating Operators
• matches zero or more instances
? matches zero or one instances
+ matches one or more instances
© 2007 Network Learning, Inc.
241
Sample Regular Expressions
• _100_
Going through AS 100
• ^100$
Directly connected to AS 100
• _100$
Originated in AS 100
• ^100_.*
networks behind AS 100
• ^ [0-9]+$
AS paths one AS long
• ^$
networks originated in local AS
• .*
matches everything
© 2007 Network Learning, Inc.
242
Regular Expression Examples
• Routes originated from a directly connected AS ( 5 ).
^5$
• Routes that passed through AS 6.
_6_
• Routes that originated in AS 7.
_7$
• Routes that originated in an odd AS.
[1,3,5,7,9]$
• Routes that originated in AS 3, or in an AS directly attached to AS 3.
^3_[0-9]*$
© 2007 Network Learning, Inc.
243
Configuring BGP AS-path Filters
router(config)#
ip as-path access-list number permit|deny regexp
• Configures AS-path access list
router(config-router)#
neighbor ip-address filter-list as-path-filter in|out
• Configures inbound or outbound AS-path filter
for specified BGP neighbor
© 2007 Network Learning, Inc.
244
Conditional Route Injection
• Used to inject more specific into BGP based on
existence of aggregated route or originate default route
based on certain route existence
© 2007 Network Learning, Inc.
245
BGP Authentication
• Authentication is MD5
• Configured on a per neighbor basis
r1lab(config)# router bgp 10
r1lab(config-router)# neighbor 2.2.2.2 remote-as 10
r1lab(config-router)# neighbor 2.2.2.2 password CISCO
r2(config)# router bgp 10
r1lab(config-router)# neighbor 1.1.1.1 remote-as 10
r2(config-router)# neighbor 1.1.1.1 password CISCO
© 2007 Network Learning, Inc.
246
BGP Route Flap Dampening Goals
• Minimize the amount of BGP update processing in the Internet
• Do not suppress routes that occasionally flap
• Suppress routes that are likely to flap in the future based on the
history of their behavior
Flap = removal of route
Suppress= do not use a route after it reappears
© 2007 Network Learning, Inc.
247
Route Flap Dampening Implementation
• Every time an eBGP route flaps it gets 1000 penalty points (iBGP
routes are not dampened)
• The penalty placed on a route is decayed using the exponential
decay algorithm
• When the penalty exceeds “suppress limit”, the route is dampened
(no longer used or propagated to other neighbors)
• A dampened route is propagated when the penalty drops below
“reuse limit”
© 2007 Network Learning, Inc.
248
Route Flap Dampening Implementation
• Flap history is forgotten when the penalty drops below half of
“reuse limit”
• The route is never dampened for more than “max-suppress”
time
• An unreachable route with flap history is put in “history state”
- it stays in the BGP table but only to maintain the flap history
• A penalty is applied on the individual path in the BGP table,
not on the IP prefix
© 2007 Network Learning, Inc.
249
Configuring BGP Route Flap Dampening
router(config-router)#
bgp dampening [half-time [reuse-limit suppress-limit maxsuppress]] [route-map route-map]
Configures BGP route flap dampening
Parameter meaning:
Half-time
Exponential decay half-time (time in which
the penalty is halved)
Suppress-limit Penalty value where the route is starting to
be dampened
Reuse-limit
Penalty value where the dampened route is
reused
Max-suppress Maximum suppression time
Route-map
Dampening parameters are specified with a
route-map
© 2007 Network Learning, Inc.
250
Default BGP Dampening
Parameter Values
The following default dampening parameter values are used if you
don’t specify them:
– half-time
15 minutes
– per-flap penalty
1,000 (non-configurable)
– suppress limit
2,000
– reuse limit
750
– max-suppress-time60 minutes
© 2007 Network Learning, Inc.
251
Limiting the Number of Routes Received
from a Neighbor
Problem definition:
–A misconfigured BGP neighbor can send a huge number of
prefixes that exhaust router’s memory or overload the CPU
(several Internet-wide incidents have already occurred)
–All other filtering mechanisms only specify what we’re willing to
accept but not how much
–A new tool is needed to establish a hard limit on the number of
prefixes received from a neighbor
© 2007 Network Learning, Inc.
252
Maximum-Prefix Command
router(config-router)#
neighbor ip-address maximum-prefix maximum [threshold]
[warning-only]
• Controls how many prefixes can be received from a neighbor
• Optional threshold parameter specifies the percentage where a
warning message is logged (default is 75%)
• Optional warning-only keyword specifies the action on
exceeding the maximum number (default is to drop
neighborship)
© 2007 Network Learning, Inc.
253
End of Day 3 Lecture
© 2007 Network Learning, Inc.
254
SESSION 9
Multicast
© 2007 Network Learning, Inc.
255
Multicast
• Outline
–Address
–RFP
–Dense/Sparse
–Source/shared
–Static RP
–Auto-RP
–BSR
–Stub
–M-B-M
–MSDP /Anycast
© 2007 Network Learning, Inc.
256
Multicast Address Range
© 2007 Network Learning, Inc.
257
Mapping a MAC Address
© 2007 Network Learning, Inc.
258
Reverse Path Forwarding
© 2007 Network Learning, Inc.
259
RPF Calculation
© 2007 Network Learning, Inc.
260
RPF with two paths
© 2007 Network Learning, Inc.
261
Multicast Distribution Trees
Dense Mode uses Source
Push Technology that is
very chatty
© 2007 Network Learning, Inc.
262
Shared Distribution Tree
Sparse uses Shared
Pull Mode
© 2007 Network Learning, Inc.
263
Characteristics of Distribution Trees
© 2007 Network Learning, Inc.
264
Multicast Tree Creation
© 2007 Network Learning, Inc.
265
Multicast Distribution Tree Example
© 2007 Network Learning, Inc.
266
Different types of PIM
© 2007 Network Learning, Inc.
267
PIM Sparse Mode
© 2007 Network Learning, Inc.
268
How does the network know about the RP?
© 2007 Network Learning, Inc.
269
Static RPs
© 2007 Network Learning, Inc.
270
Auto RP
• Uses
–Intended for PIMv1
–C_RP Candidates
–Mapping Agent (Collects announcements and sends RP
discovery messages on 224.0.1.40)
–The RPs announce on 224.0.1.39
–Recommended to locate Can_RP and Mapping Agent on
same router
–Uses dense mode to find the RP as a fallback
© 2007 Network Learning, Inc.
271
Auto RP
© 2007 Network Learning, Inc.
272
Auto RP Cont.
© 2007 Network Learning, Inc.
273
Auto-RP configured
© 2007 Network Learning, Inc.
274
BSR Election
© 2007 Network Learning, Inc.
275
BSR Overview
PIM join messages that might inadvertently cross the border
© 2007 Network Learning, Inc.
276
BSR Highest Priority
© 2007 Network Learning, Inc.
277
Cont.
© 2007 Network Learning, Inc.
278
BSR Cont.
© 2007 Network Learning, Inc.
279
Configuring BSR
Hash Mask
Priority
RP priority
© 2007 Network Learning, Inc.
280
Anycast – RP Overview
© 2007 Network Learning, Inc.
281
MSDP
© 2007 Network Learning, Inc.
282
Anycast RP RP
© 2007 Network Learning, Inc.
283
Anycast RP Cont.
© 2007 Network Learning, Inc.
284
Multicast-Broadcast-Multicast
© 2007 Network Learning, Inc.
285
IGMP Stub
© 2007 Network Learning, Inc.
286
SESSION 10
QoS
© 2007 Network Learning, Inc.
287
QoS
• Outline
–Modular QoS CLI (MQC)
–LLQ
–Police/CAR
–WRED, CBWRED
–Marking
–Shaping, FRTS
–Fragmenting
–NBAR
© 2007 Network Learning, Inc.
288
MQC Class-maps
• <class-map lab (match all is the default)
– Match any
• <match = Classify
• ?
– Input interface f0/0
– Destination Mac address
– Source Mac address
– Fr-de, fr-dlci
– Cos, dscp, IP-prec
– Any
– Access-group
– Protocol=NBAR (download PDLMs)
•CEF requires
•Can run <ip protocol NBAR protocol discovery
– Packet length min or max
© 2007 Network Learning, Inc.
289
Policy-Map and DSCP
• Class Lab
–<set cos,dscp,ip-prec
• DSCP has 64 different colors to mark traffic
• <mls qos map dscp-map lab 31 to 41
© 2007 Network Learning, Inc.
290
CBWFQ
• <Int f0/0
–<max reserve bandwidth 100 (75% is default)
• Policy-map can use Kbps or Percent but not both
• <policy-map voice
–<class CONTROL
–<bandwidth 1000
When applying a strict priority queue
To a CBWFQ it is referred to as a LLQ
–<class VOICE
–<priority 10000
• Can have 255 classes total
© 2007 Network Learning, Inc.
291
Police/CAR
• Use on edge routers to classify and/ or rate limit traffic
• Can be applied to all traffic or a subset of the traffic selected by
an access list
• Configured on an interface
• rate- limit {input| output} bps normal- burst max- burst conformaction action exceed- action action
• rate- limit {input| output} access- group index bps normal- burst
max- burst conform- action action exceed- action action
Bits per second
Maximum burst bytes
Normal burst bytes
© 2007 Network Learning, Inc.
292
CBWFQ Architecture Insertion policy
© 2007 Network Learning, Inc.
293
Applying RED
You can change to DSCP based
random-detect dscp-based
© 2007 Network Learning, Inc.
294
Configuring WRED on an interface
mark probability
denominator
minimum threshold
maximum threshold
(number of packets) (number of packets)
When the average queue size is above the minimum threshold, RED starts
dropping packets.
The rate of packet drop increases linearly as the average queue size
increases, until the average queue size reaches the maximum threshold.
The mark probability denominator is the fraction of packets dropped when
the average queue size is at the maximum threshold. For example, one out
of every 100 packets is dropped when the average queue size is at the
maximum threshold.
© 2007 Network Learning, Inc.
295
Shaping
• Shape
© 2007 Network Learning, Inc.
296
Shape Peak
• Allow the router to peak to 64k
• Peak rate = CIR(1+BE/BC)
• Router(config-pmap-c)# shape {average | peak} cir [bc] [be]
• Shape adaptive – BECN field set to 1
• 25% slow down is BECN received if 16 TCs received with no
BECNs increase 1/16 every TC
• Can also use Fecn-adapt to send ahead to your other router to
set BECN field.
© 2007 Network Learning, Inc.
297
Frame Relay Traffic Shaping
• Time Committed (TC) = 125micro
© 2007 Network Learning, Inc.
298
Network Based Application Recognition (NBAR)
© 2007 Network Learning, Inc.
299
NBAR Application Support
© 2007 Network Learning, Inc.
300
Packet Description Language Module
© 2007 Network Learning, Inc.
301
NBAR Protocol Discovery
© 2007 Network Learning, Inc.
302
SESSION 11
Others
© 2007 Network Learning, Inc.
303
NTP
© 2007 Network Learning, Inc.
304
Optimizing HSRP
© 2007 Network Learning, Inc.
305
Gateway Load Balancing Protocol (GLBP)
© 2007 Network Learning, Inc.
306
GLBP Operations
© 2007 Network Learning, Inc.
307
GLBP Cont.
© 2007 Network Learning, Inc.
308
Virtual Router Redundancy Protocol (VRRP)
© 2007 Network Learning, Inc.
309
VRRP Operational Status
© 2007 Network Learning, Inc.
310
VRRP Configuration
© 2007 Network Learning, Inc.
311
NAT
© 2007 Network Learning, Inc.
312
NAT with Access List—Multiple Address
Pools
© 2007 Network Learning, Inc.
313
NAT with Extended Access List
Configuration
ip nat pool trusted_pool 192.168.2.1 192.168.2.254 prefix-length 24
ip nat pool untrusted_pool 192.168.3.1 192.168.3.254 prefix-length 24
!
ip nat inside source list 102 pool trusted_pool
ip nat inside source list 103 pool untrusted_pool
!
interface ethernet 0
ip address 10.1.1.1 255.255.0.0
ip nat inside
!
interface serial 0
ip address 172.16.2.1 255.255.255.0
ip nat outside
!
access-list 102 permit ip 10.1.1.0 0.0.0.255 172.16.1.0 0.0.0.255
access-list 102 permit ip 10.1.1.0 0.0.0.255 192.168.200.0 0.0.0.255
access-list 103 permit ip 10.1.1.0 0.0.0.255 any
© 2007 Network Learning, Inc.
314
Benefits of Route Maps with NAT
© 2007 Network Learning, Inc.
315
Route Map Configuration
© 2007 Network Learning, Inc.
316
Verifying NAT
© 2007 Network Learning, Inc.
317
Session 10
Security
© 2007 Network Learning, Inc.
318
Session 10 Outline
• Unicast Reverse Path Forwarding (uRPF)
• Context Based Access Control (CBAC)
© 2007 Network Learning, Inc.
319
CBAC Configuration
© 2007 Network Learning, Inc.
320
Enable Audit Trails and Alerts
© 2007 Network Learning, Inc.
321
Enable TCP Syn and Fin times
© 2007 Network Learning, Inc.
322
TCP UDP and DNS Idle Times
© 2007 Network Learning, Inc.
323
Port to Application Mapping
© 2007 Network Learning, Inc.
324
Port Mapping Configuration
© 2007 Network Learning, Inc.
325
Global Half Open Connection Limits
© 2007 Network Learning, Inc.
326
Configuring Inspection Rules
© 2007 Network Learning, Inc.
327
Apply Inspection Rule to an Interface
© 2007 Network Learning, Inc.
328
Unicast Reverse Path Forwarding (uRPF)
• Unicast Reverse Path Forwarding (uRPF) is a
feature originally created to implement Network
Ingress Filtering: Defeating Denial of Service
Attacks Which Employ IP Source Address Spoofing
© 2007 Network Learning, Inc.
329
Configuring uRPF
• By enabling Unicast Reverse Path Forwarding
(uRPF), all spoofed packets will be dropped at the
first device. To enable uRPF, use the following
commands.
© 2007 Network Learning, Inc.
330
IP Source Guard
• By watching which IP addresses are assigned by DHCP, a
switch can create dynamic ACL's to block all traffic except
traffic from DHCP-assigned IP addresses.
• Benefits:
–Prevents a hacker from spoofing their IP address to launch an
anonymous attack.
–Prevents users from ignoring DHCP and manually configuring a
static IP address.
© 2007 Network Learning, Inc.
331
IP Source Guard Configuration
© 2007 Network Learning, Inc.
332
Download