Introduction |
|
xv | |
Chapter 1 Network Design Requirements |
|
1 | |
|
Cisco Hierarchical Model of Network Design |
|
|
1 | |
|
Cisco Enterprise Composite Network Model |
|
|
2 | |
|
Cisco Service-Oriented Network Architecture |
|
|
3 | |
|
Routing Protocol Comparison |
|
|
4 | |
|
Where to Implement Routing Protocols |
|
|
4 | |
|
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Network Lifecycle |
|
|
5 | |
Chapter 2 Implementing an EIGRP-based Solution |
|
7 | |
|
|
8 | |
|
|
10 | |
|
|
10 | |
|
"Pseudo" Passive EIGRP Interfaces |
|
|
11 | |
|
Injecting a Default Route into EIGRP: Redistribution of a Static Route |
|
|
11 | |
|
Injecting a Default Route into EIGRP: IP Default Network |
|
|
12 | |
|
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 |
|
|
13 | |
|
Accepting Exterior Routing Information: default-information |
|
|
14 | |
|
Load Balancing: Maximum Paths |
|
|
14 | |
|
|
15 | |
|
|
15 | |
|
|
16 | |
|
|
17 | |
|
|
19 | |
|
EIGRP over Frame Relay: Dynamic Mappings |
|
|
19 | |
|
EIGRP over Frame Relay: Static Mappings |
|
|
20 | |
|
EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces |
|
|
22 | |
|
EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces |
|
|
24 | |
|
EIGRP over MPLS: Layer 2 VPN |
|
|
26 | |
|
EIGRP over MPLS: Layer 3 VPN |
|
|
27 | |
|
|
29 | |
|
|
30 | |
|
Configuration Example: EIGRP |
|
|
30 | |
Chapter 3 Implementing a Scalable Multiarea Network OSPF-based Solution |
|
35 | |
|
|
36 | |
|
Using Wildcard Masks with OSPF Areas |
|
|
37 | |
|
Configuring Multiarea OSPF |
|
|
38 | |
|
|
38 | |
|
|
38 | |
|
|
39 | |
|
|
39 | |
|
|
40 | |
|
OSPF LSDB Overload Protection |
|
|
40 | |
|
OSPF auto-cost reference-bandwidth |
|
|
41 | |
|
|
41 | |
|
Authentication: Using MD5 Encryption |
|
|
42 | |
|
|
43 | |
|
Propagating a Default Route |
|
|
44 | |
|
|
44 | |
|
|
44 | |
|
|
45 | |
|
Not-So-Stubby Areas (NSSA) Stub Area |
|
|
46 | |
|
NSSA Totally Stubby Areas |
|
|
46 | |
|
|
47 | |
|
Inter-Area Route Summarization |
|
|
47 | |
|
External Route Summarization |
|
|
47 | |
|
Configuration Example: Virtual Links |
|
|
48 | |
|
|
49 | |
|
Full-Mesh Frame Relay: NBMA on Physical Interfaces |
|
|
49 | |
|
Full-Mesh Frame Relay: Broadcast on Physical Interfaces |
|
|
50 | |
|
Full-Mesh Frame Relay: Point-to-Multipoint Networks |
|
|
52 | |
|
Full-Mesh Frame Relay: Point-to-Point Networks with Subinterfaces |
|
|
53 | |
|
OSPF over NBMA Topology Summary |
|
|
54 | |
|
Verifying OSPF Configuration |
|
|
55 | |
|
|
55 | |
|
Configuration Example: Single-Area OSPF |
|
|
56 | |
|
Configuration Example: Multiarea OSPF |
|
|
59 | |
|
Configuration Example: OSPF and NBMA Networks |
|
|
65 | |
|
Configuration Example: OSPF and Broadcast Networks |
|
|
70 | |
|
Configuration Example: OSPF and Point-to-Multipoint Networks |
|
|
74 | |
|
Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces |
|
|
79 | |
Chapter 4 Implementing an IPv4-based Redistribution Solution |
|
85 | |
|
Route Filtering Using the distribute-list Command |
|
|
86 | |
|
|
86 | |
|
Configuration Example: Outbound Route Filters |
|
|
87 | |
|
Configuration Example: Inbound Route Filters |
|
|
89 | |
|
Using a Distribute List that References a Prefix List |
|
|
91 | |
|
Using a Distribute List that References a Route Map |
|
|
92 | |
|
Route Filtering Using Prefix Lists |
|
|
93 | |
|
Policy Routing Using Route Maps |
|
|
96 | |
|
Configuration Example: Route Maps |
|
|
97 | |
|
|
100 | |
|
|
101 | |
|
|
102 | |
|
|
102 | |
|
Assigning E1 or E2 Routes in OSPF |
|
|
103 | |
|
|
104 | |
|
Redistributing Static Routes |
|
|
105 | |
|
Redistributing OSPF Internal and External Routes |
|
|
105 | |
|
Using Route Maps with Route Redistribution and Route Tags to Prevent Routing Loops |
|
|
105 | |
|
Verifying Route Redistribution |
|
|
109 | |
|
|
109 | |
|
Static Routes: permanent Keyword |
|
|
110 | |
|
|
111 | |
|
Static Routes and Recursive Lookups |
|
|
111 | |
Chapter 5 Implementing Path Control |
|
113 | |
|
|
113 | |
|
Cisco MS IP Service Level Agreements |
|
|
114 | |
|
Step 1: Define One (or More) Probes |
|
|
115 | |
|
Step 2: Define One (or More) Tracking Objects |
|
|
116 | |
|
Step 3: Define the Action on the Tracking Object(s) |
|
|
116 | |
|
Step 4: Verify IP SLA Operations |
|
|
116 | |
|
Policy Routing Using Route Maps |
|
|
117 | |
|
Configuration Example: Route Maps |
|
|
120 | |
Chapter 6 Enterprise to ISP Connectivity |
|
125 | |
|
|
126 | |
|
BGP and Loopback Addresses |
|
|
127 | |
|
|
128 | |
|
Verifying BGP Connections |
|
|
129 | |
|
Troubleshooting BGP Connections |
|
|
129 | |
|
Autonomous System Synchronization |
|
|
131 | |
|
|
132 | |
|
|
132 | |
|
|
133 | |
|
|
133 | |
|
Route Selection Decision Process |
|
|
133 | |
|
|
134 | |
|
|
135 | |
|
Autonomous System Path: Remove Private Autonomous System |
|
|
136 | |
|
Autonomous System Path: Prepend |
|
|
137 | |
|
Weight: The Weight Attribute |
|
|
139 | |
|
|
141 | |
|
|
142 | |
|
Local Preference: bgp default local-preference Command |
|
|
143 | |
|
Local Preference: Route Maps |
|
|
145 | |
|
Multi-Exit Discriminator (MED) |
|
|
146 | |
|
|
149 | |
|
|
150 | |
|
Regular Expressions: Example One |
|
|
151 | |
|
Regular Expressions: Example Two |
|
|
152 | |
|
BGP Route Filtering Using Access Lists |
|
|
152 | |
|
BGP Route Filtering Using Prefix Lists |
|
|
154 | |
|
Configuration Example: BGP |
|
|
156 | |
Chapter 7 Implementing IPv6 |
|
163 | |
|
Assigning IPy6 Addresses to Interfaces |
|
|
164 | |
|
|
165 | |
|
Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6 |
|
|
166 | |
|
|
167 | |
|
Configuration Example: IPv6 RIP |
|
|
168 | |
|
|
170 | |
|
Enabling OSPF for IPv6 on an Interface |
|
|
171 | |
|
OSPFv3 and Stub/NSSA Areas |
|
|
171 | |
|
Enabling an OSPF for IPv6 Area Range |
|
|
172 | |
|
Enabling an IPv4 Router ID for OSPFv3 |
|
|
172 | |
|
Forcing an SPF Calculation |
|
|
173 | |
|
Configuration Example: OSPFv3 |
|
|
173 | |
|
|
177 | |
|
Enabling EIGRP for IPv6 on an Interface |
|
|
177 | |
|
Configuring the Percentage of Link Bandwidth (Ned by EIGRP |
|
|
178 | |
|
Configuring Summary Addresses |
|
|
178 | |
|
Configuring EIGRP Route Authentication |
|
|
178 | |
|
|
179 | |
|
Configuring EIGRP Stub Routing |
|
|
179 | |
|
Logging EIGRP Neighbor Adjacency Changes |
|
|
180 | |
|
Adjusting the EIGRP for IPv6 Metric Weights |
|
|
180 | |
|
|
180 | |
|
IPv6 Transition Techniques |
|
|
181 | |
|
Configuring Manual IPv6 Tunnels |
|
|
181 | |
|
Configuring Generic Routing Encapsulation IPv6 Tunnels |
|
|
184 | |
|
Configuring Automatic 6to4 Tunnels |
|
|
185 | |
|
Configuring IPv4-Compatible IPv6 Tunnels |
|
|
186 | |
|
Configuring ISATAP Tunnels |
|
|
186 | |
|
Verifying 1Pv6 Tunnel Configuration and Operation |
|
|
187 | |
|
Implementing NAT-PT for IPv6 |
|
|
187 | |
|
Configuring Basic IPv6 to IPv4 Connectivity for NAT-PT for IPv6 |
|
|
188 | |
|
Configuring IPv4-Mapped NAT-PT Connectivity |
|
|
189 | |
|
Configuring Mappings for IPv6 Hosts Accessing IPv4 Hosts |
|
|
189 | |
|
Configuring IPv6 Access Control Lists |
|
|
190 | |
|
Configuring Mappings for IPv4 Hosts Accessing IPv6 Hosts |
|
|
191 | |
|
Configuring Port Address Translation for IPv6 to IPv4 Address Mappings |
|
|
192 | |
|
Verifying NAT-PT Configuration and Operation |
|
|
192 | |
|
|
193 | |
|
Floating Static Routes in IPv6 |
|
|
194 | |
|
Verifying and Troubleshooting IPv6 |
|
|
194 | |
|
|
197 | |
Chapter 8 Routing for Branch Offices and Mobile Workers |
|
199 | |
|
Verifying Existing Services |
|
|
199 | |
|
Network Address Translation |
|
|
200 | |
|
Dynamic Host Control Protocol |
|
|
200 | |
|
Access Control Lists and Firewalls |
|
|
200 | |
|
Policy-Based Routing and Web Cache Communication Protocol |
|
|
201 | |
|
Hot Standby Router Protocol |
|
|
201 | |
|
Configuration Example: DSL Using PPPoE |
|
|
201 | |
|
Step 1: Configure PPPoE (External Modem) |
|
|
203 | |
|
Virtual Private Dial-Up Network (VPDN) Programming |
|
|
203 | |
|
Step 2: Configure the Dialer Interface |
|
|
204 | |
|
For Password Authentication Protocol (PAP) |
|
|
204 | |
|
For Challenge Handshake Authentication Protocol (CHAP) |
|
|
205 | |
|
Step 3: Define Interesting Traffic and Specify Default Routing |
|
|
205 | |
|
Step 4a: Configure NAT Using an ACL |
|
|
205 | |
|
Step 4b: Configure NAT Using a Route Map |
|
|
206 | |
|
Step 5: Configure DHCP Service |
|
|
207 | |
|
Step 6: Apply NAT Programming |
|
|
208 | |
|
Step 7: Verify a PPPoE Connection |
|
|
208 | |
|
|
209 | |
|
Step 1: Configure PPPoA on the WAN Interface (Using Subinterfaces) |
|
|
209 | |
|
Step 2: Configure the Dialer Interface |
|
|
210 | |
|
For Password Authentication Protocol (PAP) |
|
|
210 | |
|
For Challenge Handshake Authentication Protocol (CHAP) |
|
|
210 | |
|
Step 3: Verify a PPPoA Connection |
|
|
211 | |
|
Configuring a Teleworker to a Branch Office VPN Using CLI |
|
|
211 | |
|
Step 1: Configure the ISAKMP Policy (IKE Phase 1) |
|
|
213 | |
|
Step 2: Configure Policies for the Client Group(s) |
|
|
213 | |
|
Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) |
|
|
214 | |
|
Step 4: Configure Router AAA and Add VPN Client Users |
|
|
214 | |
|
Step 5: Create VPN Client Policy for Security Association Negotiation |
|
|
215 | |
|
Step 6: Configure the Crypto Map (IKE Phase 2) |
|
|
215 | |
|
Step 7: Apply the Crypto Map to the Interface |
|
|
216 | |
|
Step 8: Verify the VPN Service |
|
|
216 | |
|
Configuring IPsec Site-to-Site VPNs Using CLI |
|
|
217 | |
|
Step 1: Configure the ISAKMP Policy (IKE Phase 1) |
|
|
217 | |
|
Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) |
|
|
218 | |
|
Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) |
|
|
218 | |
|
Step 4: Configure the Crypto Map (IKE Phase 2) |
|
|
218 | |
|
Step 5: Apply the Crypto Map to the Interface (IKE Phase 2) |
|
|
219 | |
|
Step 6: Configure the Firewall Interface ACL |
|
|
219 | |
|
Step 7: Verify the VPN Service |
|
|
220 | |
|
Configuring GRE Tunnels over IPsec |
|
|
221 | |
|
Step 1: Create the GRE Tunnel |
|
|
221 | |
|
Step 2: Specify the IPsec VPN Authentication Method |
|
|
222 | |
|
Step 3: Specify the IPsec VPN IKE Proposals |
|
|
222 | |
|
Step 4: Specify the IPsec VPN Transform Sets |
|
|
223 | |
|
Step 5a: Specify Static Routing for the GRE over IPsec Tunnel |
|
|
224 | |
|
Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel |
|
|
224 | |
|
Step 6: Enable the Crypto Programming at the Interfaces |
|
|
225 | |
Appendix Create Your Own Journal Here |
|
226 | |