Introduction |
|
xix | |
Part I: Route |
|
|
Chapter 1 Basic Network and Routing Concepts |
|
|
1 | (12) |
|
Cisco Hierarchical Network Model |
|
|
1 | (1) |
|
Cisco Enterprise Composite Network Model |
|
|
2 | (1) |
|
Typically Used Routing Protocols |
|
|
2 | (1) |
|
IGP Versus EGP Routing Protocols |
|
|
3 | (1) |
|
Routing Protocol Comparison |
|
|
3 | (1) |
|
|
3 | (1) |
|
Static Routes: permanent Keyword |
|
|
4 | (1) |
|
|
5 | (1) |
|
Static Routes and Recursive Lookups |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
Assigning IPv6 Addresses to Interfaces |
|
|
7 | (1) |
|
Implementing RIP Next Generation (RIPng) |
|
|
7 | (1) |
|
Verifying and Troubleshooting RIPng |
|
|
8 | (1) |
|
Configuration Example: RIPng |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Chapter 2 EIGRP Implementation |
|
|
13 | (28) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
"Pseudo" Passive EIGRP Interfaces |
|
|
17 | (1) |
|
|
17 | (1) |
|
Injecting a Default Route into EIGRP: Redistribution of a Static Route |
|
|
18 | (1) |
|
Injecting a Default Route into EIGRP: IP Default Network |
|
|
18 | (1) |
|
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 |
|
|
19 | (1) |
|
Accepting Exterior Routing Information: default-information |
|
|
20 | (1) |
|
Load Balancing: Maximum Paths |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
EIGRP over Frame Relay: Dynamic Mappings |
|
|
23 | (1) |
|
EIGRP over Frame Relay: Static Mappings |
|
|
24 | (1) |
|
EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces |
|
|
25 | (1) |
|
EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces |
|
|
26 | (2) |
|
EIGRP over MPLS: Layer 2 VPN |
|
|
28 | (3) |
|
EIGRP over MPLS: Layer 3 VPN 30 EIGRPv6 |
|
|
31 | (2) |
|
Enabling EIGRPv6 on an Interface |
|
|
31 | (1) |
|
Configuring the Percentage of Link Bandwidth Used by EIGRPv6 |
|
|
32 | (1) |
|
EIGRPv6 Summary Addresses |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Logging EIGRPv6 Neighbor Adjacency Changes |
|
|
33 | (1) |
|
Adjusting the EIGRPv6 Metric Weights |
|
|
33 | (1) |
|
|
33 | (1) |
|
Named EIGRP Configuration Modes |
|
|
34 | (1) |
|
Verifying EIGRP and EIGRPv6 |
|
|
35 | (2) |
|
|
37 | (1) |
|
Configuration Example: EIGRPv4 and EIGRPv6 using Named Address Configuration |
|
|
37 | (4) |
|
Chapter 3 Implementing a Scalable Multiarea Network OSPF-Based Solution |
|
|
41 | (50) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Using Wildcard Masks with OSPF Areas |
|
|
44 | (1) |
|
Configuring Multiarea OSPF |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
OSPF auto-cost reference-bandwidth |
|
|
47 | (1) |
|
OSPF LSDB Overload Protection |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Propagating a Default Route |
|
|
49 | (1) |
|
|
49 | (3) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Interarea Route Summarization |
|
|
52 | (1) |
|
External Route Summarization |
|
|
52 | (1) |
|
Configuration Example: Virtual Links |
|
|
52 | (5) |
|
|
53 | (4) |
|
OSPF over NBMA Topology Summary |
|
|
57 | (1) |
|
|
57 | (4) |
|
Enabling OSPF for IPv6 on an Interface |
|
|
58 | (1) |
|
OSPFv3 and Stub/NSSA Areas |
|
|
58 | (1) |
|
Interarea OSPFv3 Route Summarization |
|
|
59 | (1) |
|
Enabling an IPv4 Router ID for OSPFv3 |
|
|
59 | (1) |
|
Forcing an SPF Calculation |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
Verifying OSPF Configuration |
|
|
61 | (2) |
|
|
63 | (1) |
|
Configuration Example: Single-Area OSPF |
|
|
64 | (1) |
|
Configuration Example: Multiarea OSPF |
|
|
65 | (4) |
|
Configuration Example: OSPF and NBMA Networks |
|
|
69 | (3) |
|
Configuration Example: OSPF and Broadcast Networks |
|
|
72 | (4) |
|
Configuration Example: OSPF and Point-to-Multipoint Networks |
|
|
76 | (4) |
|
Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces |
|
|
80 | (3) |
|
Configuration Example: IPv6 and OSPFv3 |
|
|
83 | (3) |
|
Configuration Example: OSPFv3 with Address Families |
|
|
86 | (5) |
|
Chapter 4 Configuration of Redistribution |
|
|
91 | (20) |
|
Defining Seed and Default Metrics |
|
|
91 | (2) |
|
Redistributing Connected Networks |
|
|
93 | (1) |
|
Redistributing Static Routes |
|
|
93 | (1) |
|
Redistributing Subnets into OSPF |
|
|
93 | (1) |
|
|
E2 | |
|
|
94 | (1) |
|
Redistributing OSPF Internal and External Routes |
|
|
95 | (1) |
|
Configuration Example: Route Redistribution for IPv4 |
|
|
95 | (2) |
|
Configuration Example: Route Redistribution for IPv6 |
|
|
97 | (1) |
|
Verifying Route Redistribution |
|
|
98 | (1) |
|
Route Filtering Using the distribute-list Command |
|
|
98 | (3) |
|
Configuration Example: Inbound and Outbound Distribute List Route Filters |
|
|
99 | (1) |
|
Configuration Example: Controlling Redistribution with Outbound Distribute Lists |
|
|
100 | (1) |
|
|
100 | (1) |
|
Route Filtering Using Prefix Lists |
|
|
101 | (3) |
|
Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution |
|
|
103 | (1) |
|
|
104 | (1) |
|
Using Route Maps with Route Redistribution |
|
|
104 | (2) |
|
Configuration Example: Route Maps |
|
|
105 | (1) |
|
Manipulating Redistribution Using Route Tagging |
|
|
106 | (2) |
|
Changing Administrative Distance for Internal and External Routes |
|
|
108 | (1) |
|
|
108 | (3) |
|
Chapter 5 Path Control Implementation |
|
|
111 | (8) |
|
Verifying Cisco Express Forwarding |
|
|
111 | (1) |
|
Configuring Cisco Express Forwarding |
|
|
111 | (1) |
|
Path Control with Policy-Based Routing |
|
|
112 | (1) |
|
Verifying Policy-Based Routing |
|
|
113 | (1) |
|
Configuration Example: PBR with Route Maps |
|
|
114 | (1) |
|
Cisco IOS IP Service Level Agreements |
|
|
115 | (4) |
|
Step 1: Define One (or More) Probe(s) |
|
|
116 | (1) |
|
Step 2: Define One (or More) Tracking Object(s) |
|
|
117 | (1) |
|
Step 3a: Define the Action on the Tracking Object(s) |
|
|
117 | (1) |
|
Step 3b: Define Policy Routing Using the Tracking Object(s) |
|
|
117 | (1) |
|
Step 4: Verify IP SLA Operations |
|
|
118 | (1) |
|
Chapter 6 Enterprise Internet Connectivity |
|
|
119 | (36) |
|
Configuring a Provider Assigned Static or DHCP IPv4 Address |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Configuring NAT Overload (PAT) |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Configuration Example: NAT Virtual Interfaces and Static NAT |
|
|
124 | (1) |
|
Configure Basic IPv6 Internet Connectivity |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Configuring Redistribution of Default Routes with Different Metrics in a Dual-Homed Internet Connectivity Scenario |
|
|
127 | (1) |
|
|
128 | (1) |
|
BGP and Loopback Addresses |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (2) |
|
Verifying BGP Connections |
|
|
132 | (1) |
|
Troubleshooting BGP Connections |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (10) |
|
Route Selection Decision Process |
|
|
134 | (1) |
|
|
134 | (2) |
|
Using AS_PATH Access Lists to Manipulate the Weight Attribute |
|
|
136 | (1) |
|
Using Prefix Lists and Route Maps to Manipulate the Weight Attribute |
|
|
136 | (1) |
|
Local Preference Attribute |
|
|
137 | (1) |
|
Using AS_PATH Access Lists with Route Maps to Manipulate the Local Preference Attribute |
|
|
138 | (1) |
|
AS_PATH Attribute Prepending |
|
|
139 | (2) |
|
AS_PATH: Removing Private Autonomous Systems |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Regular Expressions: Examples |
|
|
146 | (1) |
|
BGP Route Filtering Using Access Lists and Distribute Lists |
|
|
147 | (2) |
|
Configuration Example: Using Prefix Lists and AS_PATH Access Lists |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (4) |
|
Configure MP-BGP Using Address Families to Exchange IPv4 and IPv6 Routes |
|
|
151 | (2) |
|
|
153 | (2) |
|
Chapter 7 Routers and Routing Protocol Hardening |
|
|
155 | (36) |
|
Securing Cisco Routers According to Recommended Practices |
|
|
156 | (13) |
|
Securing Cisco IOS Routers Checklist |
|
|
156 | (1) |
|
Components of a Router Security Policy |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
Restricting Virtual Terminal Access |
|
|
160 | (1) |
|
Securing Access to the Infrastructure Using Router ACLs |
|
|
161 | (1) |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
166 | (3) |
|
Disabling Unneeded Services |
|
|
169 | (1) |
|
Configuring Network Time Protocol |
|
|
169 | (13) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Setting the Clock on a Router |
|
|
174 | (4) |
|
|
178 | (1) |
|
Configuration Example: NTP |
|
|
178 | (4) |
|
Authentication of Routing Protocols |
|
|
182 | (9) |
|
Authentication Options for Different Routing Protocols |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
185 | (4) |
|
Authentication for BGP and BGP for IPv6 |
|
|
189 | (2) |
Part II: Switch |
|
|
Chapter 8 Basic Concepts and Network Design |
|
|
191 | (6) |
|
Hierarchical Model (Cisco Enterprise Campus Architecture) |
|
|
191 | (1) |
|
Verifying Switch Content-Addressable Memory |
|
|
192 | (1) |
|
Switching Database Manager Templates |
|
|
192 | (2) |
|
Configuring SDM Templates |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Chapter 9 Campus Network Architecture |
|
|
197 | (24) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Normal-Range static VLAN Configuration |
|
|
198 | (1) |
|
Extended-Range static VLAN Configuration |
|
|
199 | (1) |
|
Assigning Ports to Data and Voice VLANs |
|
|
199 | (1) |
|
|
200 | (1) |
|
Dynamic Trunking Protocol |
|
|
200 | (1) |
|
Setting the Trunk Encapsulation and Allowed VLANs |
|
|
201 | (1) |
|
Verifying VLAN Information |
|
|
202 | (1) |
|
Saving VLAN Configurations |
|
|
202 | (1) |
|
Erasing VLAN Configurations |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (2) |
|
Using Global Configuration Mode |
|
|
204 | (2) |
|
|
206 | (1) |
|
Configuration Example: VLANs |
|
|
206 | (3) |
|
|
209 | (7) |
|
Link Aggregation Interface Modes |
|
|
210 | (1) |
|
Guidelines for Configuring Link Aggregation |
|
|
210 | (1) |
|
Configuring L2 EtherChannel |
|
|
211 | (1) |
|
Configuring L3 EtherChannel |
|
|
211 | (1) |
|
|
212 | (1) |
|
Configuring EtherChannel Load Balancing |
|
|
212 | (1) |
|
Configuration Example: PAgP EtherChannel |
|
|
213 | (3) |
|
|
216 | (2) |
|
Configuring Basic DHCP Server for IPv4 |
|
|
216 | (1) |
|
Configuring DHCP Manual IP Assignment for IPv4 |
|
|
217 | (1) |
|
Implementing DHCP Relay IPv4 : |
|
|
:217 | |
|
|
218 | (1) |
|
Implementing DHCP for IPv6 |
|
|
218 | (1) |
|
Configuring DHCPv6 Server |
|
|
219 | (1) |
|
Configuring DHCPv6 Client |
|
|
219 | (1) |
|
Configuring DHCPv6 Relay Agent |
|
|
220 | (1) |
|
|
220 | (1) |
|
Chapter 10 Implementing Spanning Tree |
|
|
221 | (20) |
|
|
222 | (19) |
|
Enabling Spanning Tree Protocol |
|
|
222 | (1) |
|
Configuring the Root Switch |
|
|
223 | (1) |
|
Configuring a Secondary Root Switch |
|
|
224 | (1) |
|
Configuring Port Priority |
|
|
224 | (1) |
|
Configuring the Path Cost |
|
|
224 | (1) |
|
Configuring the Switch Priority of a VLAN |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (5) |
|
|
231 | (1) |
|
|
231 | (1) |
|
Changing the Spanning-Tree Mode |
|
|
231 | (1) |
|
|
232 | (1) |
|
Enabling Rapid Spanning Tree |
|
|
232 | (1) |
|
Enabling Multiple Spanning Tree |
|
|
233 | (2) |
|
|
235 | (1) |
|
Troubleshooting Spanning Tree |
|
|
235 | (1) |
|
Configuration Example: PVST+ |
|
|
235 | (4) |
|
Spanning-Tree Migration Example: PVST+ to Rapid- PVST+ |
|
|
239 | (2) |
|
Chapter 11 Implementing Inter-VLAN Routing |
|
|
241 | (18) |
|
Inter-VLAN Communication Using an External Router: Router-on-a- Stick |
|
|
241 | (1) |
|
|
242 | (1) |
|
Removing L2 Switch Port Capability of a Switch Port |
|
|
242 | (1) |
|
Configuring SVI Autostate |
|
|
243 | (1) |
|
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface |
|
|
243 | (1) |
|
Configuration Example: Inter-VLAN Communication |
|
|
244 | (7) |
|
Configuration Example: IPv6 Inter-VLAN Communication |
|
|
251 | (8) |
|
Chapter 12 Implementing High-Availability Networks |
|
|
259 | (18) |
|
Configuring IP Service Level Agreements (Catalyst 3750) |
|
|
260 | (2) |
|
Configuring Authentication for IP SLA |
|
|
262 | (1) |
|
Monitoring IP SLA Operations |
|
|
262 | (1) |
|
Implementing Port Mirroring |
|
|
262 | (7) |
|
Default SPAN and RSPAN Configuration |
|
|
262 | (1) |
|
|
263 | (1) |
|
Local SPAN Guidelines for Configuration |
|
|
263 | (1) |
|
Configuring Local SPAN Example |
|
|
264 | (3) |
|
|
267 | (1) |
|
Remote SPAN Guidelines for Configuration |
|
|
267 | (1) |
|
Configuring Remote SPAN Example |
|
|
268 | (1) |
|
Verifying and Troubleshooting Local and Remote SPAN |
|
|
269 | (1) |
|
|
269 | (8) |
|
|
270 | (1) |
|
|
271 | (6) |
|
Chapter 13 First-Hop Redundancy Implementation |
|
|
277 | (34) |
|
|
278 | (1) |
|
Hot Standby Router Protocol |
|
|
278 | (7) |
|
|
278 | (1) |
|
Default HSRP Configuration Settings |
|
|
279 | (1) |
|
|
279 | (1) |
|
HSRP Optimization Options |
|
|
279 | (2) |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Virtual Router Redundancy Protocol |
|
|
285 | (2) |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
Gateway Load Balancing Protocol |
|
|
287 | (4) |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
IPv4 Configuration Example: HSRP on L3 Switch |
|
|
291 | (5) |
|
IPv4 Configuration Example: GLBP |
|
|
296 | (4) |
|
IPv4 Configuration Example: VRRP on Router and L3 Switch |
|
|
300 | (4) |
|
IPv6 Configuration Example: HSRP on Router and L3 Switch |
|
|
304 | (7) |
|
Chapter 14 Campus Network Security |
|
|
311 | (26) |
|
Switch Security Recommended Practices |
|
|
312 | (1) |
|
Configuring Switch Port Security |
|
|
313 | (2) |
|
|
313 | (1) |
|
Verifying Switch Port Security |
|
|
314 | (1) |
|
Recovering Automatically from Error-Disabled Ports |
|
|
315 | (1) |
|
Verifying Autorecovery of Error-Disabled Ports |
|
|
315 | (1) |
|
Configuring Port Access Lists |
|
|
315 | (1) |
|
Creating and Applying Named Port Access List |
|
|
316 | (1) |
|
Configuring Storm Control |
|
|
316 | (1) |
|
Implementing Authentication Methods |
|
|
317 | (6) |
|
Local Database Authentication |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (2) |
|
Configuring Authorization and Accounting |
|
|
321 | (1) |
|
Configuring 802.1x Port-Based Authentication |
|
|
322 | (1) |
|
Configuring DHCP Snooping |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Mitigating VLAN Hopping: Best Practices |
|
|
326 | (1) |
|
|
327 | (4) |
|
|
329 | (1) |
|
Configuration Example: VACLs |
|
|
329 | (2) |
|
|
331 | |
|
|
332 | (1) |
|
Configuration Example: PVLANs |
|
|
333 | |
Appendixes |
|
|
Appendix A Private VLAN Catalyst Switch Support Matrix |
|
|
337 | (2) |
|
Appendix B Create Your Own Journal Here |
|
|
339 | (20) |
Index |
|
359 | |