| |
| |
Introduction | |
| |
| |
| |
Routing Services | |
| |
| |
Complex Enterprise Network Frameworks, Architectures, and Models | |
| |
| |
Traffic Conditions in a Converged Network | |
| |
| |
Cisco IIN and SONA Framework | |
| |
| |
Cisco IIN | |
| |
| |
Cisco SONA Framework | |
| |
| |
Cisco Network Models | |
| |
| |
Cisco Enterprise Architecture | |
| |
| |
Cisco Hierarchical Network Model | |
| |
| |
Cisco Enterprise Composite Network Model | |
| |
| |
Creating, Documenting, and Executing an Implementation Plan | |
| |
| |
Approaches to Creating an Implementation Plan | |
| |
| |
Creating an Implementation Plan | |
| |
| |
Implementation Plan Documentation | |
| |
| |
Implementation Plan Example | |
| |
| |
Example Network Scenario | |
| |
| |
Example Network Requirements | |
| |
| |
Example Network Implementation Plan | |
| |
| |
Reviewing IP Routing Principles | |
| |
| |
IP Routing Overview | |
| |
| |
Principles of Static Routing | |
| |
| |
Principles of Dynamic Routing | |
| |
| |
Principles of On-Demand Routing | |
| |
| |
Characteristics of Routing Protocols | |
| |
| |
Distance Vector, Link-State, and Advanced Distance Vector | |
| |
| |
Routing Protocols | |
| |
| |
Classful Routing Protocol Concepts | |
| |
| |
Classless Routing Protocol Concepts | |
| |
| |
RIPv2 and EIGRP Automatic Network-Boundary Summarization | |
| |
| |
RIP | |
| |
| |
Characteristics of RIPv1 | |
| |
| |
Characteristics of RIPv2 | |
| |
| |
RIP Configuration Commands | |
| |
| |
Populating the Routing Table | |
| |
| |
Administrative Distance | |
| |
| |
Routing Protocol Metrics | |
| |
| |
Criteria for Inserting Routes into the IP Routing Table | |
| |
| |
Floating Static Routes | |
| |
| |
IP Routing Protocol Comparisons | |
| |
| |
Routing and Routing Protocols Within the Enterprise Composite | |
| |
| |
Network Model | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
| |
Configuring the Enhanced Interior Gateway Routing Protocol | |
| |
| |
Understanding EIGRP Terminology and Operation | |
| |
| |
EIGRP Capabilities and Attributes | |
| |
| |
EIGRP Terminology | |
| |
| |
EIGRP Operation | |
| |
| |
Populating EIGRP Tables | |
| |
| |
EIGRP Packets | |
| |
| |
EIGRP Neighbors | |
| |
| |
Initial Route Discovery | |
| |
| |
DUAL | |
| |
| |
Advertised Distance and Feasible Distance | |
| |
| |
Successor and Feasible Successor | |
| |
| |
DUAL Example | |
| |
| |
EIGRP Metric Calculation | |
| |
| |
Planning EIGRP Routing Implementations | |
| |
| |
Configuring and Verifying EIGRP | |
| |
| |
Planning and Configuring Basic EIGRP | |
| |
| |
Planning for Basic EIGRP | |
| |
| |
Basic EIGRP Configuration | |
| |
| |
Basic Configuration Example | |
| |
| |
Another Basic EIGRP Configuration Example | |
| |
| |
Verifying EIGRP Operation | |
| |
| |
Verifying EIGRP Neighbors | |
| |
| |
Verifying EIGRP Routes | |
| |
| |
Verifying EIGRP Operations | |
| |
| |
Using the passive-interface Command with EIGRP | |
| |
| |
Propagating an EIGRP Default Route | |
| |
| |
EIGRP Route Summarization | |
| |
| |
Configuring Manual Route Summarization | |
| |
| |
Verifying Manual Route Summarization | |
| |
| |
Configuring and Verifying EIGRP in an Enterprise WAN | |
| |
| |
EIGRP over Frame Relay and on a Physical Interface | |
| |
| |
Frame Relay Overview | |
| |
| |
EIGRP on a Physical Frame Relay Interface with | |
| |
| |
Dynamic Mapping | |
| |
| |
EIGRP on a Frame Relay Physical Interface with Static Mapping | |
| |
| |
EIGRP over Frame Relay Multipoint Subinterfaces | |
| |
| |
Frame Relay Multipoint Subinterfaces | |
| |
| |
EIGRP over Multipoint Subinterfaces | |
| |
| |
EIGRP Unicast Neighbors | |
| |
| |
EIGRP over Frame Relay Point-to-Point Subinterfaces | |
| |
| |
Frame Relay Point-to-Point Subinterfaces | |
| |
| |
EIGRP on Frame Relay Point-to-Point Subinterfaces | |
| |
| |
EIGRP over MPLS | |
| |
| |
MPLS | |
| |
| |
MPLS Operation | |
| |
| |
Service Provider Offerings | |
| |
| |
Layer 2 and Layer 3 MPLS VPN Solutions | |
| |
| |
Layer 3 MPLS VPNs | |
| |
| |
Layer 2 MPLS VPNs | |
| |
| |
EIGRP Load Balancing | |
| |
| |
EIGRP Equal-Cost Load Balancing | |
| |
| |
EIGRP Unequal-Cost Load Balancing | |
| |
| |
EIGRP Bandwidth Use Across WAN Links | |
| |
| |
EIGRP Link Utilization | |
| |
| |
Examples of EIGRP on WANs | |
| |
| |
Configuring and Verifying EIGRP Authentication | |
| |
| |
Router Authentication | |
| |
| |
Simple Authentication Versus MD5 Authentication | |
| |
| |
MD5 Authentication for EIGRP | |
| |
| |
Planning for EIGRP Authentication | |
| |
| |
Configuring EIGRP MD5 Authentication | |
| |
| |
MD5 Authentication Configuration Example | |
| |
| |
Verifying MD5 Authentication for EIGRP | |
| |
| |
EIGRP MD5 Authentication Verification | |
| |
| |
Troubleshooting MD5 Authentication | |
| |
| |
Optimizing EIGRP Implementations | |
| |
| |
EIGRP Scalability in Large Networks | |
| |
| |
EIGRP Queries and Stuck-in-Active | |
| |
| |
Stuck-in-Active Connections in EIGRP | |
| |
| |
Preventing SIA Connections | |
| |
| |
EIGRP Query Range | |
| |
| |
Limiting the EIGRP Query Range | |
| |
| |
Graceful Shutdown | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Configuring the Open Shortest Path First Protocol | |
| |
| |
Understanding OSPF Terminology and Operation | |
| |
| |
Link-State Routing Protocols | |
| |
| |
OSPF Area Structure | |
| |
| |
OSPF Areas | |
| |
| |
Area Terminology | |
| |
| |
OSPF Adjacencies | |
| |
| |
OSPF Metric Calculation | |
| |
| |
Link-State Data Structures | |
| |
| |
OSPF Packets | |
| |
| |
Establishing OSPF Neighbor Adjacencies: Hello | |
| |
| |
Exchange Process and OSPF Neighbor Adjacency States | |
| |
| |
OSPF Neighbor States | |
| |
| |
Maintaining Routing Information | |
| |
| |
OSPF Link-State Sequence Numbers | |
| |
| |
Verifying Packet Flow | |
| |
| |
Configuring and Verifying Basic OSPF Routing | |
| |
| |
Planning and Configuring OSPF | |
| |
| |
Planning OSPF Routing Implementations | |
| |
| |
Configuring Basic OSPF | |
| |
| |
Single-Area OSPF Configuration Example | |
| |
| |
Multiarea OSPF Configuration Example | |
| |
| |
OSPF Router ID | |
| |
| |
Loopback Interfaces | |
| |
| |
OSPF router-id Command | |
| |
| |
Verifying the OSPF Router ID | |
| |
| |
Verifying OSPF Operations | |
| |
| |
The show ip ospf interface Command | |
| |
| |
The show ip ospf neighbor Command | |
| |
| |
The show ip route ospf Command | |
| |
| |
The show ip protocols Command | |
| |
| |
The debug ip ospf events Command | |
| |
| |
Understanding OSPF Network Types | |
| |
| |
Types of OSPF Networks | |
| |
| |
Electing a DR and BDR and Setting Priority | |
| |
| |
Adjacency Behavior for a Point-to-Point Link | |
| |
| |
Adjacency Behavior for a Broadcast Network | |
| |
| |
Adjacency Behavior over a Layer 2 MPLS VPN | |
| |
| |
Adjacency Behavior over a Layer 3 MPLS VPN | |
| |
| |
Adjacency Behavior for an NBMA Network | |
| |
| |
DR Election in an NBMA Topology | |
| |
| |
OSPF over Frame Relay Topology Options | |
| |
| |
OSPF over NBMA Topology Modes of Operation | |
| |
| |
Selecting the OSPF Network Type for NBMA Networks | |
| |
| |
OSPF Configuration in Cisco Broadcast Mode | |
| |
| |
OSPF Nonbroadcast Mode Configuration | |
| |
| |
OSPF Configuration in Point-to-Multipoint Mode | |
| |
| |
OSPF Configuration in Cisco Point-to-Multipoint | |
| |
| |
Nonbroadcast Mode | |
| |
| |
Using Subinterfaces in OSPF over Frame Relay Configuration | |
| |
| |
OSPF Configuration in Cisco Point-to-Point Mode | |
| |
| |
OSPF over NBMA Modes of Operation Summary | |
| |
| |
Displaying OSPF Adjacency Activity | |
| |
| |
Understanding OSPF LSAs | |
| |
| |
LSA Type 1: Router LSA | |
| |
| |
LSA Type 2: Network LSA | |
| |
| |
LSA Type 3: Summary LSA | |
| |
| |
LSA Type 4: Summary LSA | |
| |
| |
LSA Type 5: External LSA | |
| |
| |
Example OSPF LSAs in a Network | |
| |
| |
Interpreting the OSPF LSDB and Routing Table | |
| |
| |
OSPF LSDB | |
| |
| |
OSPF Routing Table and Types of Routes | |
| |
| |
Calculating the Costs of E1 and E2 Routes | |
| |
| |
Configuring OSPF LSDB Overload Protection | |
| |
| |
Configuring and Verifying Advanced OSPF Features | |
| |
| |
Using the passive-interface Command with OSPF | |
| |
| |
Propagating an OSPF Default Route | |
| |
| |
Configuring OSPF Route Summarization | |
| |
| |
Configuring Inter-area OSPF Route Summarization on an ABR | |
| |
| |
Interarea Route Summarization Configuration Example | |
| |
| |
On an ABR | |
| |
| |
Configuring External OSPF Route Summarization on an ASBR | |
| |
| |
External Route Summarization Configuration Example | |
| |
| |
On an ASBR | |
| |
| |
OSPF Virtual Links | |
| |
| |
Configuring OSPF Virtual Links | |
| |
| |
Verifying OSPF Virtual Link Operation | |
| |
| |
OSPF LSDB for Virtual Links | |
| |
| |
Changing the Cost Metric | |
| |
| |
Configuring OSPF Special Area Types | |
| |
| |
Configuring Stub Areas | |
| |
| |
Configuring Totally Stubby Areas | |
| |
| |
Interpreting Routing Tables in Different Types of OSPF Areas | |
| |
| |
Configuring NSSAs | |
| |
| |
Configuring Totally Stubby NSSAs | |
| |
| |
Example OSPF Area Types in a Network | |
| |
| |
Verifying All Area Types | |
| |
| |
Configuring and Verifying OSPF Authentication | |
| |
| |
Planning for OSPF Authentication | |
| |
| |
Configuring, Verifying, and Troubleshooting OSPF Simple Password | |
| |
| |
Authentication | |
| |
| |
Configuring OSPF Simple Password Authentication | |
| |
| |
Simple Password Authentication Example | |
| |
| |
Verifying Simple Password Authentication | |
| |
| |
Troubleshooting Simple Password Authentication | |
| |
| |
Configuring OSPF Simple Password Authentication for Virtual Links | |
| |
| |
Configuring, Verifying, and Troubleshooting MD5 Authentication | |
| |
| |
Configuring OSPF MD5 Authentication | |
| |
| |
MD5 Authentication Example | |
| |
| |
Verifying MD5 Authentication | |
| |
| |
Troubleshooting MD5 Authentication | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Manipulating Routing Updates | |
| |
| |
Assessing Network Routing Performance Issues | |
| |
| |
Routing Protocol Performance Issues | |
| |
| |
Routing Protocol Performance Solutions | |
| |
| |
Using Multiple IP Routing Protocols on a Network | |
| |
| |
Understanding a Network with Complex Routing | |
| |
| |
Understanding Route Redistribution | |
| |
| |
Redistribution Overview | |
| |
| |
Redistributed Routes | |
| |
| |
Redistribution Implementation Considerations | |
| |
| |
Selecting the Best Route in a Redistribution Environment | |
| |
| |
Redistribution Techniques | |
| |
| |
One-Point Redistribution | |
| |
| |
Multipoint Redistribution | |
| |
| |
Preventing Routing Loops in a Redistribution Environment | |
| |
| |
Implementing Route Redistribution | |
| |
| |
Configuring Route Redistribution | |
| |
| |
Redistributing into RIP | |
| |
| |
Redistributing into OSPF | |
| |
| |
Redistributing into EIGRP | |
| |
| |
The default-metric Command | |
| |
| |
The passive-interface Command | |
| |
| |
Route Redistribution Example | |
| |
| |
Using Administrative Distance to Influence | |
| |
| |
The Route-Selection Process | |
| |
| |
Selecting Routes with Administrative Distance | |
| |
| |
Modifying Administrative Distance | |
| |
| |
Redistribution Using Administrative Distance Example | |
| |
| |
Verifying Redistribution Operation | |
| |
| |
Controlling Routing Update Traffic | |
| |
| |
Static and Default Routes | |
| |
| |
Using Route Maps | |
| |
| |
Route Map Applications | |
| |
| |
Understanding Route Maps | |
| |
| |
Configuring Route Maps to Control Routing Updates | |
| |
| |
Configuring Route Maps for Policy Based Routing | |
| |
| |
Configuring Route Redistribution Using Route Maps | |
| |
| |
Using Route Maps with Redistribution | |
| |
| |
Using Route Maps to Avoid Route Feedback | |
| |
| |
Using Route Maps with Tags | |
| |
| |
Using Route Maps with Redistribution and Tags | |
| |
| |
Using Distribute Lists | |
| |
| |
Configuring Distribute Lists to Control Routing Updates | |
| |
| |
Controlling Redistribution with Distribute Lists | |
| |
| |
Using Prefix Lists | |
| |
| |
Prefix List Characteristics | |
| |
| |
Filtering with Prefix Lists | |
| |
| |
Configuring Prefix Lists | |
| |
| |
Verifying Prefix Lists | |
| |
| |
Using Multiple Methods to Control Routing Updates | |
| |
| |
Comprehensive Example of Controlling Routing Updates | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Implementing Path Control | |
| |
| |
Understanding Path Control | |
| |
| |
Assessing Path Control Network Performance | |
| |
| |
Path Control Tools | |
| |
| |
Implementing Path Control Using Offset Lists | |
| |
| |
Using Offset Lists to Control Path Selection | |
| |
| |
Configuring Path Control Using Offset Lists | |
| |
| |
Verifying Path Control Using Offset Lists | |
| |
| |
Implementing Path Control Using Cisco IOS IP SLAs | |
| |
| |
Using Cisco IOS IP SLAs to Control Path Selection | |
| |
| |
Cisco IOS IP SLAs Operation | |
| |
| |
Cisco IOS IP SLAs Sources and Responders | |
| |
| |
Cisco IOS IP SLAs Operations | |
| |
| |
Cisco IOS IP SLAs Operation with Responders | |
| |
| |
Cisco IOS IP SLAs with Responder Time Stamps | |
| |
| |
Configuring Path Control Using IOS IP SLAs | |
| |
| |
Configuring Cisco IOS IP SLAs Operations | |
| |
| |
Configuring Cisco IOS IP SLAs Tracking Objects | |
| |
| |
Configuring the Action Associated with the Tracking Object | |
| |
| |
Verifying Path Control Using IOS IP SLAs | |
| |
| |
Examples of Path Control Using Cisco IOS IP SLAs | |
| |
| |
Tracking Reachability to Two ISPs | |
| |
| |
Tracking DNS Server Reachability in the Two ISPs | |
| |
| |
Implementing Path Control Using Policy-Based Routing | |
| |
| |
Using PBR to Control Path Selection | |
| |
| |
Configuring PBR | |
| |
| |
PBR match Commands | |
| |
| |
PBR set Commands | |
| |
| |
Configuring PBR on an Interface | |
| |
| |
Verifying PBR | |
| |
| |
PBR Examples | |
| |
| |
Using PBR When Connecting Two ISPs | |
| |
| |
Using PBR Based on Source Address | |
| |
| |
Alternative Solution IP SLAs Configuration Example Using PBR | |
| |
| |
Advanced Path Control Tools | |
| |
| |
Cisco IOS Optimized Edge Routing | |
| |
| |
Virtualization | |
| |
| |
Cisco Wide Area Application Services | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Implementing a Border Gateway Protocol Solution for ISP Connectivity | |
| |
| |
BGP Terminology, Concepts, and Operation | |
| |
| |
Autonomous Systems | |
| |
| |
BGP Use Between Autonomous Systems | |
| |
| |
Comparison with Other Scalable Routing Protocols | |
| |
| |
Connecting Enterprise Networks to an ISP | |
| |
| |
Public IP Address Space | |
| |
| |
Connection Link Type and Routing | |
| |
| |
Connection Redundancy | |
| |
| |
Using BGP in an Enterprise Network | |
| |
| |
BGP Multihoming Options | |
| |
| |
Multihoming with Default Routes from All Providers | |
| |
| |
Multihoming with Default Routes and Partial Table from All Providers | |
| |
| |
Multihoming with Full Routes from All Providers | |
| |
| |
BGP Path Vector Characteristics | |
| |
| |
When to Use BGP | |
| |
| |
When Not to Use BGP | |
| |
| |
BGP Characteristics | |
| |
| |
BGP Neighbor Relationships | |
| |
| |
External BGP Neighbors | |
| |
| |
Internal BGP Neighbors | |
| |
| |
IBGP on All Routers in a Transit Path | |
| |
| |
IBGP in a Transit Autonomous System | |
| |
| |
IBGP in a Nontransit Autonomous System | |
| |
| |
BGP Partial-Mesh and Full-Mesh Examples | |
| |
| |
TCP and Full Mesh | |
| |
| |
Routing Issues If BGP Not on in All Routers in a Transit Path | |
| |
| |
BGP Synchronization | |
| |
| |
BGP Tables | |
| |
| |
BGP Message Types | |
| |
| |
Open and Keepalive Messages | |
| |
| |
Update Messages | |
| |
| |
Notification Messages | |
| |
| |
BGP Attributes | |
| |
| |
Well-Known Attributes | |
| |
| |
Optional Attributes | |
| |
| |
Defined BGP Attributes | |
| |
| |
The AS-Path Attribute | |
| |
| |
The Next-Hop Attribute | |
| |
| |
The Origin Attribute | |
| |
| |
The Local Preference Attribute | |
| |
| |
The Community Attribute | |
| |
| |
The MED Attribute | |
| |
| |
The Weight Attribute (Cisco Only) | |
| |
| |
The Route-Selection Decision Process | |
| |
| |
BGP Route-Selection Process | |
| |
| |
The Path-Selection Decision Process with a Multihomed | |
| |
| |
Connection | |
| |
| |
Configuring BGP | |
| |
| |
Planning BGP Implementations | |
| |
| |
Peer Groups | |
| |
| |
Entering BGP Configuration Mode | |
| |
| |
Defining BGP Neighbors and Activating BGP Sessions | |
| |
| |
Shutting Down a BGP Neighbor | |
| |
| |
Defining the Source IP Address | |
| |
| |
EBGP Multihop | |
| |
| |
Changing the Next-Hop Attribute | |
| |
| |
Defining the Networks That BGP Advertises | |
| |
| |
BGP Neighbor Authentication | |
| |
| |
Configuring BGP Synchronization | |
| |
| |
Resetting BGP Sessions | |
| |
| |
Hard Reset of BGP Sessions | |
| |
| |
Soft Reset of BGP Sessions Outbound | |
| |
| |
Soft Reset of BGP Sessions Inbound | |
| |
| |
BGP Configuration Examples | |
| |
| |
Basic BGP Examples | |
| |
| |
Peer Group Example | |
| |
| |
IBGP and EBGP Examples | |
| |
| |
Verifying and Troubleshooting BGP | |
| |
| |
Show ip bgp Command Output Example | |
| |
| |
Show ip bgp rib-failure Command Output Example | |
| |
| |
Show ip bgp summary Command Output Example | |
| |
| |
Debug ip bgp updates Command Output Example | |
| |
| |
Understanding and Troubleshooting BGP Neighbor States | |
| |
| |
Idle State Troubleshooting | |
| |
| |
Active State Troubleshooting | |
| |
| |
Established State | |
| |
| |
Basic BGP Path Manipulation Using Route Maps | |
| |
| |
BGP Path Manipulation | |
| |
| |
Changing the Weight | |
| |
| |
Changing the Weight for All Updates from a Neighbor | |
| |
| |
Changing the Weight Using Route Maps | |
| |
| |
Setting Local Preference | |
| |
| |
Changing Local Preference for All Routes | |
| |
| |
Local Preference Example | |
| |
| |
Changing Local Preference Using Route Maps | |
| |
| |
Setting the AS-Path | |
| |
| |
Setting the MED | |
| |
| |
Changing the MED for All Routes | |
| |
| |
Changing the MED Using Route Maps | |
| |
| |
Implementing BGP in an Enterprise Network | |
| |
| |
Filtering BGP Routing Updates | |
| |
| |
BGP Filtering Using Prefix Lists | |
| |
| |
Planning BGP Filtering Using Prefix Lists | |
| |
| |
BGP Filtering Using Prefix Lists Example | |
| |
| |
BGP Filtering Using Route Maps | |
| |
| |
Planning BGP Filtering Using Route Maps | |
| |
| |
BGP Filtering with Route Maps Example | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Implementing Routing Facilities for Branch Offices and Mobile Workers | |
| |
| |
Planning the Branch Office Implementation | |
| |
| |
Branch Office Design | |
| |
| |
Upgrade Scenario | |
| |
| |
Implementation Plan | |
| |
| |
Deploying Broadband Connectivity | |
| |
| |
Satellite Broadband Information | |
| |
| |
Cable Background Information | |
| |
| |
DSL Background Information | |
| |
| |
PPPoA | |
| |
| |
Configuring Static Routing | |
| |
| |
Routing to the Internet | |
| |
| |
Floating Static Route | |
| |
| |
Verifying Branch Services | |
| |
| |
Configuring NAT | |
| |
| |
Verifying NAT | |
| |
| |
Verifying Other Services | |
| |
| |
Verifying and Tuning IPsec VPNs | |
| |
| |
IPsec Technologies | |
| |
| |
Encapsulation Process | |
| |
| |
IPsec Site-to-Site VPN Configuration | |
| |
| |
ISAKMP Policy | |
| |
| |
IPsec Details | |
| |
| |
VPN Tunnel Information | |
| |
| |
VPN ACL | |
| |
| |
Apply the Crypto Map | |
| |
| |
Verifying an IPsec VPN | |
| |
| |
Impact on Routing | |
| |
| |
Configuring GRE Tunnels | |
| |
| |
Generic Routing Encapsulation | |
| |
| |
Configuring GRE | |
| |
| |
Example of GRE Configuration | |
| |
| |
Planning for Mobile Worker Implementations | |
| |
| |
Connecting a Mobile Worker | |
| |
| |
Components for Mobile Workers | |
| |
| |
Business-Ready Mobile Worker and VPN Options | |
| |
| |
Routing Traffic to the Mobile Worker | |
| |
| |
VPN Headend Configuration | |
| |
| |
Allowing IPsec Traffic | |
| |
| |
Defining Address Pools | |
| |
| |
Providing Routing Services for VPN Subnets | |
| |
| |
Tuning NAT for VPN Traffic Flows | |
| |
| |
Verifying IPsec VPN Configuration | |
| |
| |
Reviewing Alternatives for Mobile Worker Connectivity | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Implementing IPv6 in an Enterprise Network | |
| |
| |
Introducing IPv6 | |
| |
| |
IPv4 Issues | |
| |
| |
Features of IPv6 | |
| |
| |
IPv6 Packet Header | |
| |
| |
Extension Headers | |
| |
| |
MTU Discovery | |
| |
| |
IPv6 Addressing | |
| |
| |
IPv6 Addressing in an Enterprise Network | |
| |
| |
IPv6 Address Representation | |
| |
| |
Interface Identifiers in IPv6 Addresses | |
| |
| |
IPv6 Address Types | |
| |
| |
IPv6 Global Unicast Addresses | |
| |
| |
IPv6 Link-Local Unicast Addresses | |
| |
| |
IPv6 Site-Local Unicast Addresses: Deprecated | |
| |
| |
IPv6 Multicast Addresses | |
| |
| |
Solicited-Node Multicast Addresses | |
| |
| |
IPv6 Anycast Addresses | |
| |
| |
Comparing IPv6 Addresses with IPv4 Addresses | |
| |
| |
Configuring and Verifying IPv6 Unicast Addresses | |
| |
| |
IPv6 Unicast Address Configuration and Verification Commands | |
| |
| |
Static IPv6 Address Assignment | |
| |
| |
Static Global Aggregatable Address Assignment | |
| |
| |
Assigning Multiple Global Aggregatable Addresses | |
| |
| |
IPv6 Unnumbered Interfaces | |
| |
| |
Static Link-Local Address Assignment | |
| |
| |
Stateless Autoconfiguration of IPv6 Addresses | |
| |
| |
Unicast Connectivity on Different Connection Types | |
| |
| |
Unicast Connectivity on Broadcast Multiaccess Links | |
| |
| |
Unicast Connectivity on Point-to-Point Links | |
| |
| |
Unicast Connectivity on Point-to-Multipoint Links | |
| |
| |
Routing IPv6 Traffic | |
| |
| |
IPv6 Routing Protocols | |
| |
| |
Static Routing | |
| |
| |
Static Route Configuration and Verification Commands | |
| |
| |
Static Route Configuration and Verification Example | |
| |
| |
RIPng | |
| |
| |
RIPng Configuration and Verification Commands | |
| |
| |
RIPng Configuration and Verification Example | |
| |
| |
OSPFv3 | |
| |
| |
Similarities Between OSPFv2 and OSPFv3 | |
| |
| |
Differences Between OSPFv2 and OSPFv3 | |
| |
| |
OSPFv3 Configuration and Verification Commands | |
| |
| |
OSPFv3 Configuration and Verification Examples | |
| |
| |
EIGRP for IPv6 | |
| |
| |
EIGRP for IPv6 Configuration and Verification Commands | |
| |
| |
EIGRP for IPv6 Configuration and Verification Example | |
| |
| |
MBGP | |
| |
| |
MBGP Configuration and Verification Commands | |
| |
| |
MBGP Configuration and Verification Example | |
| |
| |
IPv6 Policy-Based Routing | |
| |
| |
IPv6 PBR Configuration and Verification Commands | |
| |
| |
IPv6 PBR Configuration and Verification Example | |
| |
| |
IPv6 Redistribution | |
| |
| |
RIPng Redistribution | |
| |
| |
RIPng and OSPFv3 Redistribution | |
| |
| |
RIPng, OSPFv3, and MBGP Redistribution | |
| |
| |
Transitioning IPv4 to IPv6 | |
| |
| |
Dual Stack | |
| |
| |
Tunneling | |
| |
| |
Translation | |
| |
| |
Tunneling IPv6 Traffic | |
| |
| |
Manual IPv6 Tunnels | |
| |
| |
Manual IPv6 Tunnel Configuration and Verification Commands | |
| |
| |
Manual IPv6 Tunnel Configuration and Verification Example | |
| |
| |
GRE IPv6 Tunnels | |
| |
| |
GRE IPv6 Tunnel Configuration and Verification Commands | |
| |
| |
GRE IPv6 Tunnel Configuration and Verification Examples | |
| |
| |
6 to 4 Tunnels | |
| |
| |
6to4 Tunnel Configuration and Verification Commands | |
| |
| |
6to4 Tunnel Configuration and Verification Example | |
| |
| |
IPv4-Compatible IPv6 Tunnels | |
| |
| |
IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands | |
| |
| |
IPv4-Compatible IPv6 Tunnel Configuration and Verification Example | |
| |
| |
ISATAP Tunnels | |
| |
| |
ISATAP Tunnel Configuration and Verification Commands | |
| |
| |
ISATAP Tunnel Configuration and Verification Example | |
| |
| |
Translation Using NAT-PT | |
| |
| |
Static NAT-PT for IPv6 | |
| |
| |
Static NAT-PT Operation | |
| |
| |
Static NAT-PT Configuration and Verification Commands | |
| |
| |
Static NAT-PT Configuration and Verification Example | |
| |
| |
Dynamic NAT-PT for IPv6 | |
| |
| |
Dynamic NAT-PT Configuration and Verification Commands | |
| |
| |
Dynamic NAT-PT Configuration and Verification Examples | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Answers to Review Questions | |
| |
| |
Online Supplemental Material | |
| |
| |
| |
IPv4 Supplement | |
| |
| |
| |
BGP Supplement | |
| |
| |
Acronyms and Abbreviations | |
| |
| |
TOC, 9781587058820, 5/25/10 | |