Skip to content

Implementing Cisco IP Routing (Route) Foundation Learning for the CCNP ROUTE 642-902 Exam

Best in textbook rentals since 2012!

ISBN-10: 1587058820

ISBN-13: 9781587058820

Edition: 2010

Authors: Diane Teare

List price: $79.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

CCNP Authorized Self-Study Guide: Implementing Cisco IP Routing (ROUTE)is the only Cisco authorized, self-paced foundational learning tool designed to help network professionals prepare for the brand new CCNP ROUTE exam from Cisco. This book covers all CCNP ROUTE exam objectives for mastering routed network construction, support, and scalability, including: " Assessing complex enterprise network requirements and planning routing services " Applying standards, models and best practices to complex networks " Creating and documenting routing implementation plans " Planning, configuring, verifying, and troubleshooting EIGRP solutions " Implementing scalable OSPF multiarea network solutions "…    
Customers also bought

Book details

List price: $79.95
Copyright year: 2010
Publisher: Cisco Press
Publication date: 7/22/2009
Binding: Hardcover
Pages: 99998
Size: 7.00" wide x 9.00" long x 2.00" tall
Weight: 3.938
Language: English

Introduction
Routing Services
Complex Enterprise Network Frameworks, Architectures, and Models
Traffic Conditions in a Converged Network
Cisco IIN and SONA Framework
Cisco IIN
Cisco SONA Framework
Cisco Network Models
Cisco Enterprise Architecture
Cisco Hierarchical Network Model
Cisco Enterprise Composite Network Model
Creating, Documenting, and Executing an Implementation Plan
Approaches to Creating an Implementation Plan
Creating an Implementation Plan
Implementation Plan Documentation
Implementation Plan Example
Example Network Scenario
Example Network Requirements
Example Network Implementation Plan
Reviewing IP Routing Principles
IP Routing Overview
Principles of Static Routing
Principles of Dynamic Routing
Principles of On-Demand Routing
Characteristics of Routing Protocols
Distance Vector, Link-State, and Advanced Distance Vector
Routing Protocols
Classful Routing Protocol Concepts
Classless Routing Protocol Concepts
RIPv2 and EIGRP Automatic Network-Boundary Summarization
RIP
Characteristics of RIPv1
Characteristics of RIPv2
RIP Configuration Commands
Populating the Routing Table
Administrative Distance
Routing Protocol Metrics
Criteria for Inserting Routes into the IP Routing Table
Floating Static Routes
IP Routing Protocol Comparisons
Routing and Routing Protocols Within the Enterprise Composite
Network Model
Summary
Review Questions
Configuring the Enhanced Interior Gateway Routing Protocol
Understanding EIGRP Terminology and Operation
EIGRP Capabilities and Attributes
EIGRP Terminology
EIGRP Operation
Populating EIGRP Tables
EIGRP Packets
EIGRP Neighbors
Initial Route Discovery
DUAL
Advertised Distance and Feasible Distance
Successor and Feasible Successor
DUAL Example
EIGRP Metric Calculation
Planning EIGRP Routing Implementations
Configuring and Verifying EIGRP
Planning and Configuring Basic EIGRP
Planning for Basic EIGRP
Basic EIGRP Configuration
Basic Configuration Example
Another Basic EIGRP Configuration Example
Verifying EIGRP Operation
Verifying EIGRP Neighbors
Verifying EIGRP Routes
Verifying EIGRP Operations
Using the passive-interface Command with EIGRP
Propagating an EIGRP Default Route
EIGRP Route Summarization
Configuring Manual Route Summarization
Verifying Manual Route Summarization
Configuring and Verifying EIGRP in an Enterprise WAN
EIGRP over Frame Relay and on a Physical Interface
Frame Relay Overview
EIGRP on a Physical Frame Relay Interface with
Dynamic Mapping
EIGRP on a Frame Relay Physical Interface with Static Mapping
EIGRP over Frame Relay Multipoint Subinterfaces
Frame Relay Multipoint Subinterfaces
EIGRP over Multipoint Subinterfaces
EIGRP Unicast Neighbors
EIGRP over Frame Relay Point-to-Point Subinterfaces
Frame Relay Point-to-Point Subinterfaces
EIGRP on Frame Relay Point-to-Point Subinterfaces
EIGRP over MPLS
MPLS
MPLS Operation
Service Provider Offerings
Layer 2 and Layer 3 MPLS VPN Solutions
Layer 3 MPLS VPNs
Layer 2 MPLS VPNs
EIGRP Load Balancing
EIGRP Equal-Cost Load Balancing
EIGRP Unequal-Cost Load Balancing
EIGRP Bandwidth Use Across WAN Links
EIGRP Link Utilization
Examples of EIGRP on WANs
Configuring and Verifying EIGRP Authentication
Router Authentication
Simple Authentication Versus MD5 Authentication
MD5 Authentication for EIGRP
Planning for EIGRP Authentication
Configuring EIGRP MD5 Authentication
MD5 Authentication Configuration Example
Verifying MD5 Authentication for EIGRP
EIGRP MD5 Authentication Verification
Troubleshooting MD5 Authentication
Optimizing EIGRP Implementations
EIGRP Scalability in Large Networks
EIGRP Queries and Stuck-in-Active
Stuck-in-Active Connections in EIGRP
Preventing SIA Connections
EIGRP Query Range
Limiting the EIGRP Query Range
Graceful Shutdown
Summary
References
Review Questions
Configuring the Open Shortest Path First Protocol
Understanding OSPF Terminology and Operation
Link-State Routing Protocols
OSPF Area Structure
OSPF Areas
Area Terminology
OSPF Adjacencies
OSPF Metric Calculation
Link-State Data Structures
OSPF Packets
Establishing OSPF Neighbor Adjacencies: Hello
Exchange Process and OSPF Neighbor Adjacency States
OSPF Neighbor States
Maintaining Routing Information
OSPF Link-State Sequence Numbers
Verifying Packet Flow
Configuring and Verifying Basic OSPF Routing
Planning and Configuring OSPF
Planning OSPF Routing Implementations
Configuring Basic OSPF
Single-Area OSPF Configuration Example
Multiarea OSPF Configuration Example
OSPF Router ID
Loopback Interfaces
OSPF router-id Command
Verifying the OSPF Router ID
Verifying OSPF Operations
The show ip ospf interface Command
The show ip ospf neighbor Command
The show ip route ospf Command
The show ip protocols Command
The debug ip ospf events Command
Understanding OSPF Network Types
Types of OSPF Networks
Electing a DR and BDR and Setting Priority
Adjacency Behavior for a Point-to-Point Link
Adjacency Behavior for a Broadcast Network
Adjacency Behavior over a Layer 2 MPLS VPN
Adjacency Behavior over a Layer 3 MPLS VPN
Adjacency Behavior for an NBMA Network
DR Election in an NBMA Topology
OSPF over Frame Relay Topology Options
OSPF over NBMA Topology Modes of Operation
Selecting the OSPF Network Type for NBMA Networks
OSPF Configuration in Cisco Broadcast Mode
OSPF Nonbroadcast Mode Configuration
OSPF Configuration in Point-to-Multipoint Mode
OSPF Configuration in Cisco Point-to-Multipoint
Nonbroadcast Mode
Using Subinterfaces in OSPF over Frame Relay Configuration
OSPF Configuration in Cisco Point-to-Point Mode
OSPF over NBMA Modes of Operation Summary
Displaying OSPF Adjacency Activity
Understanding OSPF LSAs
LSA Type 1: Router LSA
LSA Type 2: Network LSA
LSA Type 3: Summary LSA
LSA Type 4: Summary LSA
LSA Type 5: External LSA
Example OSPF LSAs in a Network
Interpreting the OSPF LSDB and Routing Table
OSPF LSDB
OSPF Routing Table and Types of Routes
Calculating the Costs of E1 and E2 Routes
Configuring OSPF LSDB Overload Protection
Configuring and Verifying Advanced OSPF Features
Using the passive-interface Command with OSPF
Propagating an OSPF Default Route
Configuring OSPF Route Summarization
Configuring Inter-area OSPF Route Summarization on an ABR
Interarea Route Summarization Configuration Example
On an ABR
Configuring External OSPF Route Summarization on an ASBR
External Route Summarization Configuration Example
On an ASBR
OSPF Virtual Links
Configuring OSPF Virtual Links
Verifying OSPF Virtual Link Operation
OSPF LSDB for Virtual Links
Changing the Cost Metric
Configuring OSPF Special Area Types
Configuring Stub Areas
Configuring Totally Stubby Areas
Interpreting Routing Tables in Different Types of OSPF Areas
Configuring NSSAs
Configuring Totally Stubby NSSAs
Example OSPF Area Types in a Network
Verifying All Area Types
Configuring and Verifying OSPF Authentication
Planning for OSPF Authentication
Configuring, Verifying, and Troubleshooting OSPF Simple Password
Authentication
Configuring OSPF Simple Password Authentication
Simple Password Authentication Example
Verifying Simple Password Authentication
Troubleshooting Simple Password Authentication
Configuring OSPF Simple Password Authentication for Virtual Links
Configuring, Verifying, and Troubleshooting MD5 Authentication
Configuring OSPF MD5 Authentication
MD5 Authentication Example
Verifying MD5 Authentication
Troubleshooting MD5 Authentication
Summary
References
Review Questions
Manipulating Routing Updates
Assessing Network Routing Performance Issues
Routing Protocol Performance Issues
Routing Protocol Performance Solutions
Using Multiple IP Routing Protocols on a Network
Understanding a Network with Complex Routing
Understanding Route Redistribution
Redistribution Overview
Redistributed Routes
Redistribution Implementation Considerations
Selecting the Best Route in a Redistribution Environment
Redistribution Techniques
One-Point Redistribution
Multipoint Redistribution
Preventing Routing Loops in a Redistribution Environment
Implementing Route Redistribution
Configuring Route Redistribution
Redistributing into RIP
Redistributing into OSPF
Redistributing into EIGRP
The default-metric Command
The passive-interface Command
Route Redistribution Example
Using Administrative Distance to Influence
The Route-Selection Process
Selecting Routes with Administrative Distance
Modifying Administrative Distance
Redistribution Using Administrative Distance Example
Verifying Redistribution Operation
Controlling Routing Update Traffic
Static and Default Routes
Using Route Maps
Route Map Applications
Understanding Route Maps
Configuring Route Maps to Control Routing Updates
Configuring Route Maps for Policy Based Routing
Configuring Route Redistribution Using Route Maps
Using Route Maps with Redistribution
Using Route Maps to Avoid Route Feedback
Using Route Maps with Tags
Using Route Maps with Redistribution and Tags
Using Distribute Lists
Configuring Distribute Lists to Control Routing Updates
Controlling Redistribution with Distribute Lists
Using Prefix Lists
Prefix List Characteristics
Filtering with Prefix Lists
Configuring Prefix Lists
Verifying Prefix Lists
Using Multiple Methods to Control Routing Updates
Comprehensive Example of Controlling Routing Updates
Summary
References
Review Questions
Implementing Path Control
Understanding Path Control
Assessing Path Control Network Performance
Path Control Tools
Implementing Path Control Using Offset Lists
Using Offset Lists to Control Path Selection
Configuring Path Control Using Offset Lists
Verifying Path Control Using Offset Lists
Implementing Path Control Using Cisco IOS IP SLAs
Using Cisco IOS IP SLAs to Control Path Selection
Cisco IOS IP SLAs Operation
Cisco IOS IP SLAs Sources and Responders
Cisco IOS IP SLAs Operations
Cisco IOS IP SLAs Operation with Responders
Cisco IOS IP SLAs with Responder Time Stamps
Configuring Path Control Using IOS IP SLAs
Configuring Cisco IOS IP SLAs Operations
Configuring Cisco IOS IP SLAs Tracking Objects
Configuring the Action Associated with the Tracking Object
Verifying Path Control Using IOS IP SLAs
Examples of Path Control Using Cisco IOS IP SLAs
Tracking Reachability to Two ISPs
Tracking DNS Server Reachability in the Two ISPs
Implementing Path Control Using Policy-Based Routing
Using PBR to Control Path Selection
Configuring PBR
PBR match Commands
PBR set Commands
Configuring PBR on an Interface
Verifying PBR
PBR Examples
Using PBR When Connecting Two ISPs
Using PBR Based on Source Address
Alternative Solution IP SLAs Configuration Example Using PBR
Advanced Path Control Tools
Cisco IOS Optimized Edge Routing
Virtualization
Cisco Wide Area Application Services
Summary
References
Review Questions
Implementing a Border Gateway Protocol Solution for ISP Connectivity
BGP Terminology, Concepts, and Operation
Autonomous Systems
BGP Use Between Autonomous Systems
Comparison with Other Scalable Routing Protocols
Connecting Enterprise Networks to an ISP
Public IP Address Space
Connection Link Type and Routing
Connection Redundancy
Using BGP in an Enterprise Network
BGP Multihoming Options
Multihoming with Default Routes from All Providers
Multihoming with Default Routes and Partial Table from All Providers
Multihoming with Full Routes from All Providers
BGP Path Vector Characteristics
When to Use BGP
When Not to Use BGP
BGP Characteristics
BGP Neighbor Relationships
External BGP Neighbors
Internal BGP Neighbors
IBGP on All Routers in a Transit Path
IBGP in a Transit Autonomous System
IBGP in a Nontransit Autonomous System
BGP Partial-Mesh and Full-Mesh Examples
TCP and Full Mesh
Routing Issues If BGP Not on in All Routers in a Transit Path
BGP Synchronization
BGP Tables
BGP Message Types
Open and Keepalive Messages
Update Messages
Notification Messages
BGP Attributes
Well-Known Attributes
Optional Attributes
Defined BGP Attributes
The AS-Path Attribute
The Next-Hop Attribute
The Origin Attribute
The Local Preference Attribute
The Community Attribute
The MED Attribute
The Weight Attribute (Cisco Only)
The Route-Selection Decision Process
BGP Route-Selection Process
The Path-Selection Decision Process with a Multihomed
Connection
Configuring BGP
Planning BGP Implementations
Peer Groups
Entering BGP Configuration Mode
Defining BGP Neighbors and Activating BGP Sessions
Shutting Down a BGP Neighbor
Defining the Source IP Address
EBGP Multihop
Changing the Next-Hop Attribute
Defining the Networks That BGP Advertises
BGP Neighbor Authentication
Configuring BGP Synchronization
Resetting BGP Sessions
Hard Reset of BGP Sessions
Soft Reset of BGP Sessions Outbound
Soft Reset of BGP Sessions Inbound
BGP Configuration Examples
Basic BGP Examples
Peer Group Example
IBGP and EBGP Examples
Verifying and Troubleshooting BGP
Show ip bgp Command Output Example
Show ip bgp rib-failure Command Output Example
Show ip bgp summary Command Output Example
Debug ip bgp updates Command Output Example
Understanding and Troubleshooting BGP Neighbor States
Idle State Troubleshooting
Active State Troubleshooting
Established State
Basic BGP Path Manipulation Using Route Maps
BGP Path Manipulation
Changing the Weight
Changing the Weight for All Updates from a Neighbor
Changing the Weight Using Route Maps
Setting Local Preference
Changing Local Preference for All Routes
Local Preference Example
Changing Local Preference Using Route Maps
Setting the AS-Path
Setting the MED
Changing the MED for All Routes
Changing the MED Using Route Maps
Implementing BGP in an Enterprise Network
Filtering BGP Routing Updates
BGP Filtering Using Prefix Lists
Planning BGP Filtering Using Prefix Lists
BGP Filtering Using Prefix Lists Example
BGP Filtering Using Route Maps
Planning BGP Filtering Using Route Maps
BGP Filtering with Route Maps Example
Summary
References
Review Questions
Implementing Routing Facilities for Branch Offices and Mobile Workers
Planning the Branch Office Implementation
Branch Office Design
Upgrade Scenario
Implementation Plan
Deploying Broadband Connectivity
Satellite Broadband Information
Cable Background Information
DSL Background Information
PPPoA
Configuring Static Routing
Routing to the Internet
Floating Static Route
Verifying Branch Services
Configuring NAT
Verifying NAT
Verifying Other Services
Verifying and Tuning IPsec VPNs
IPsec Technologies
Encapsulation Process
IPsec Site-to-Site VPN Configuration
ISAKMP Policy
IPsec Details
VPN Tunnel Information
VPN ACL
Apply the Crypto Map
Verifying an IPsec VPN
Impact on Routing
Configuring GRE Tunnels
Generic Routing Encapsulation
Configuring GRE
Example of GRE Configuration
Planning for Mobile Worker Implementations
Connecting a Mobile Worker
Components for Mobile Workers
Business-Ready Mobile Worker and VPN Options
Routing Traffic to the Mobile Worker
VPN Headend Configuration
Allowing IPsec Traffic
Defining Address Pools
Providing Routing Services for VPN Subnets
Tuning NAT for VPN Traffic Flows
Verifying IPsec VPN Configuration
Reviewing Alternatives for Mobile Worker Connectivity
Summary
References
Review Questions
Implementing IPv6 in an Enterprise Network
Introducing IPv6
IPv4 Issues
Features of IPv6
IPv6 Packet Header
Extension Headers
MTU Discovery
IPv6 Addressing
IPv6 Addressing in an Enterprise Network
IPv6 Address Representation
Interface Identifiers in IPv6 Addresses
IPv6 Address Types
IPv6 Global Unicast Addresses
IPv6 Link-Local Unicast Addresses
IPv6 Site-Local Unicast Addresses: Deprecated
IPv6 Multicast Addresses
Solicited-Node Multicast Addresses
IPv6 Anycast Addresses
Comparing IPv6 Addresses with IPv4 Addresses
Configuring and Verifying IPv6 Unicast Addresses
IPv6 Unicast Address Configuration and Verification Commands
Static IPv6 Address Assignment
Static Global Aggregatable Address Assignment
Assigning Multiple Global Aggregatable Addresses
IPv6 Unnumbered Interfaces
Static Link-Local Address Assignment
Stateless Autoconfiguration of IPv6 Addresses
Unicast Connectivity on Different Connection Types
Unicast Connectivity on Broadcast Multiaccess Links
Unicast Connectivity on Point-to-Point Links
Unicast Connectivity on Point-to-Multipoint Links
Routing IPv6 Traffic
IPv6 Routing Protocols
Static Routing
Static Route Configuration and Verification Commands
Static Route Configuration and Verification Example
RIPng
RIPng Configuration and Verification Commands
RIPng Configuration and Verification Example
OSPFv3
Similarities Between OSPFv2 and OSPFv3
Differences Between OSPFv2 and OSPFv3
OSPFv3 Configuration and Verification Commands
OSPFv3 Configuration and Verification Examples
EIGRP for IPv6
EIGRP for IPv6 Configuration and Verification Commands
EIGRP for IPv6 Configuration and Verification Example
MBGP
MBGP Configuration and Verification Commands
MBGP Configuration and Verification Example
IPv6 Policy-Based Routing
IPv6 PBR Configuration and Verification Commands
IPv6 PBR Configuration and Verification Example
IPv6 Redistribution
RIPng Redistribution
RIPng and OSPFv3 Redistribution
RIPng, OSPFv3, and MBGP Redistribution
Transitioning IPv4 to IPv6
Dual Stack
Tunneling
Translation
Tunneling IPv6 Traffic
Manual IPv6 Tunnels
Manual IPv6 Tunnel Configuration and Verification Commands
Manual IPv6 Tunnel Configuration and Verification Example
GRE IPv6 Tunnels
GRE IPv6 Tunnel Configuration and Verification Commands
GRE IPv6 Tunnel Configuration and Verification Examples
6 to 4 Tunnels
6to4 Tunnel Configuration and Verification Commands
6to4 Tunnel Configuration and Verification Example
IPv4-Compatible IPv6 Tunnels
IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands
IPv4-Compatible IPv6 Tunnel Configuration and Verification Example
ISATAP Tunnels
ISATAP Tunnel Configuration and Verification Commands
ISATAP Tunnel Configuration and Verification Example
Translation Using NAT-PT
Static NAT-PT for IPv6
Static NAT-PT Operation
Static NAT-PT Configuration and Verification Commands
Static NAT-PT Configuration and Verification Example
Dynamic NAT-PT for IPv6
Dynamic NAT-PT Configuration and Verification Commands
Dynamic NAT-PT Configuration and Verification Examples
Summary
References
Review Questions
Answers to Review Questions
Online Supplemental Material
IPv4 Supplement
BGP Supplement
Acronyms and Abbreviations
TOC, 9781587058820, 5/25/10