About the Authors |
|
xvi | |
Introduction |
|
xix | |
|
Part I Layer 2 Infrastructure |
|
|
|
|
1 | (22) |
|
|
1 | (10) |
|
Creating Static VLANs Using VLAN Configuration Mode |
|
|
2 | (1) |
|
Assigning Ports to Data and Voice VLANs |
|
|
2 | (1) |
|
|
3 | (1) |
|
Dynamic Trunking Protocol (DTP) |
|
|
3 | (1) |
|
Setting the Trunk Encapsulation and Allowed VLANs |
|
|
4 | (1) |
|
VLAN Trunking Protocol (VTP) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Verifying VLAN Information |
|
|
7 | (1) |
|
Saving VLAN Configurations |
|
|
7 | (1) |
|
Erasing VLAN Configurations |
|
|
7 | (1) |
|
Configuration Example: VLANs |
|
|
8 | (3) |
|
|
11 | (12) |
|
Interface Modes in EtherChannel |
|
|
12 | (1) |
|
Default EtherChannel Configuration |
|
|
12 | (1) |
|
Guidelines for Configuring EtherChannel |
|
|
12 | (2) |
|
Configuring Layer 2 EtherChannel |
|
|
14 | (1) |
|
Configuring Layer 3 EtherChannel |
|
|
14 | (1) |
|
Configuring EtherChannel Load Balancing |
|
|
15 | (1) |
|
Configuring LACP Hot-Standby Ports |
|
|
16 | (1) |
|
Monitoring and Verifying EtherChannel |
|
|
17 | (1) |
|
Configuration Example: EtherChannel |
|
|
18 | (5) |
|
Chapter 2 Spanning Tree Protocol |
|
|
23 | (22) |
|
Spanning Tree Protocol Definition |
|
|
24 | (1) |
|
Enabling Spanning Tree Protocol |
|
|
24 | (1) |
|
Changing the Spanning-Tree Mode |
|
|
25 | (1) |
|
Configuring the Root Switch |
|
|
25 | (1) |
|
Configuring a Secondary Root Switch |
|
|
26 | (1) |
|
Configuring Port Priority |
|
|
26 | (1) |
|
Configuring the Path Cost |
|
|
27 | (1) |
|
Configuring the Switch Priority of a VLAN |
|
|
27 | (1) |
|
|
27 | (1) |
|
Configuring Optional Spanning-Tree Features |
|
|
28 | (5) |
|
|
28 | (1) |
|
BPDU Guard (2xxx/older 3xxx Series) |
|
|
29 | (1) |
|
BPDU Guard (3650/9xxx Series) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Unidirectional Link Detection |
|
|
33 | (1) |
|
Configuring and Verifying Port Error Conditions |
|
|
33 | (3) |
|
Enabling Rapid Spanning Tree |
|
|
36 | (1) |
|
Rapid Spanning Tree Link Types |
|
|
36 | (1) |
|
Enabling Multiple Spanning Tree |
|
|
37 | (2) |
|
Verifying the Extended System ID |
|
|
39 | (1) |
|
|
39 | (1) |
|
Troubleshooting Spanning Tree Protocol |
|
|
40 | (1) |
|
Configuration Example: PVST+ |
|
|
40 | (3) |
|
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ |
|
|
43 | (2) |
|
Chapter 3 Implementing Inter-VLAN Routing |
|
|
45 | (16) |
|
Inter-VLAN Communication Using an External Router: Router-on-a-Stick |
|
|
45 | (1) |
|
Inter-VLAN Communication Tips |
|
|
46 | (1) |
|
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface |
|
|
46 | (1) |
|
Configuring Inter-VLAN Communication on an L3 Switch |
|
|
47 | (1) |
|
Removing L2 Switchport Capability of an Interface on an L3 Switch |
|
|
47 | (1) |
|
Configuration Example: Inter-VLAN Communication |
|
|
47 | (8) |
|
Configuration Example: IPv6 Inter-VLAN Communication |
|
|
55 | (6) |
|
Part II Layer 3 Infrastructure |
|
|
|
|
61 | (26) |
|
Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
|
62 | (1) |
|
Enabling EIGRP for IPv4 Using Classic Mode Configuration |
|
|
62 | (1) |
|
Enabling EIGRP for IPv6 Using Classic Mode Configuration |
|
|
63 | (1) |
|
EIGRP Using Named Mode Configuration |
|
|
64 | (2) |
|
EIGRP Named Mode Subconfiguration Modes |
|
|
66 | (1) |
|
Upgrading Classic Mode to Named Mode Configuration |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (3) |
|
Configuring Authentication in Classic Mode |
|
|
67 | (1) |
|
Configuring Authentication in Named Mode |
|
|
68 | (2) |
|
Verifying and Troubleshooting EIGRP Authentication |
|
|
70 | (1) |
|
Auto-Summarization for EIGRP |
|
|
70 | (1) |
|
IPv4 Manual Summarization for EIGRP |
|
|
70 | (1) |
|
IPv6 Manual Summarization for EIGRP |
|
|
71 | (1) |
|
|
71 | (1) |
|
Passive Interfaces for EIGRP |
|
|
72 | (1) |
|
"Pseudo" Passive EIGRP Interfaces |
|
|
72 | (1) |
|
Injecting a Default Route into EIGRP: Redistribution of a Static Route |
|
|
73 | (1) |
|
Injecting a Default Route into EIGRP: ip default-network |
|
|
74 | (1) |
|
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 |
|
|
74 | (1) |
|
Accepting Exterior Routing Information: default-information |
|
|
75 | (1) |
|
Equal-cost Load Balancing: maximum-paths |
|
|
75 | (1) |
|
Unequal-cost Load Balancing: variance |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
79 | (1) |
|
Adjusting the EIGRP Metric Weights |
|
|
80 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
Configuration Example: EIGRP for IPv4 and IPv6 Using Named Mode |
|
|
83 | (4) |
|
|
87 | (40) |
|
Comparing OSPFv2 and OSPFv3 |
|
|
88 | (1) |
|
|
89 | (1) |
|
Configuring Multiarea OSPF |
|
|
89 | (1) |
|
Using Wildcard Masks with OSPF Areas |
|
|
90 | (1) |
|
Configuring Traditional OSPFv3 |
|
|
91 | (2) |
|
Enabling OSPF for IPv6 on an Interface |
|
|
91 | (1) |
|
OSPFv3 and Stub/NSSA Areas |
|
|
92 | (1) |
|
Interarea 0SPFv3 Route Summarization |
|
|
92 | (1) |
|
Enabling an IPv4 Router ID for OSPFv3 |
|
|
93 | (1) |
|
Forcing an SPF Calculation |
|
|
93 | (1) |
|
|
93 | (2) |
|
Configuring the IPv6 Address Family in OSPFv3 |
|
|
94 | (1) |
|
Configuring the IPv4 Address Family in OSPFv3 |
|
|
94 | (1) |
|
Applying Parameters in Address Family Configuration Mode |
|
|
94 | (1) |
|
|
95 | (3) |
|
Configuring OSPFv2 Authentication: Simple Password |
|
|
95 | (1) |
|
Configuring OSPFv2 Cryptographic Authentication: SHA-256 |
|
|
96 | (1) |
|
Configuring OSPFv3 Authentication and Encryption |
|
|
97 | (1) |
|
Verifying OSPFv2 and OSPFv3 Authentication |
|
|
98 | (1) |
|
Optimizing OSPF Parameters |
|
|
98 | (4) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
OSPF LSDB Overload Protection |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
Propagating a Default Route |
|
|
102 | (1) |
|
|
103 | (1) |
|
Interarea Route Summarization |
|
|
103 | (1) |
|
External Route Summarization |
|
|
103 | (1) |
|
|
104 | (1) |
|
Using the filter-list Command |
|
|
104 | (1) |
|
Using the area range not-advertise Command |
|
|
104 | (1) |
|
Using the distribute-list in Command |
|
|
104 | (1) |
|
Using the summary-address not-advertise Command |
|
|
105 | (1) |
|
|
105 | (3) |
|
|
105 | (1) |
|
|
106 | (1) |
|
Not-So-Stubby Areas (NSSA) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Configuration Example: Virtual Links |
|
|
108 | (1) |
|
Verifying OSPF Configuration |
|
|
109 | (2) |
|
|
111 | (1) |
|
Configuration Example: Single-Area OSPF |
|
|
111 | (3) |
|
Configuration Example: Multiarea OSPF |
|
|
114 | (3) |
|
Configuration Example: Traditional OSPFv3 |
|
|
117 | (3) |
|
Configuration Example: OSPFv3 with Address Families |
|
|
120 | (7) |
|
Chapter 6 Redistribution and Path Control |
|
|
127 | (28) |
|
Defining Seed and Default Metrics |
|
|
128 | (1) |
|
Redistributing Connected Networks |
|
|
129 | (1) |
|
Redistributing Static Routes |
|
|
129 | (1) |
|
Redistributing Subnets into OSPF |
|
|
130 | (1) |
|
Assigning El or E2 Routes in OSPF |
|
|
130 | (1) |
|
Redistributing OSPF Internal and External Routes |
|
|
131 | (1) |
|
Configuration Example: Route Redistribution for IPv4 |
|
|
131 | (1) |
|
Configuration Example: Route Redistribution for IPv6 |
|
|
132 | (2) |
|
Verifying Route Redistribution |
|
|
134 | (1) |
|
Route Filtering Using the distribute-list Command |
|
|
134 | (3) |
|
Configuration Example: Inbound and Outbound Distribute List Route Filters |
|
|
134 | (1) |
|
Configuration Example: Controlling Redistribution with Outbound Distribute Lists |
|
|
135 | (1) |
|
|
136 | (1) |
|
Route Filtering Using Prefix Lists |
|
|
137 | (3) |
|
Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution |
|
|
139 | (1) |
|
|
140 | (1) |
|
Using Route Maps with Route Redistribution |
|
|
140 | (2) |
|
Configuration Example: Route Maps |
|
|
141 | (1) |
|
Manipulating Redistribution Using Route Tagging |
|
|
142 | (1) |
|
Changing Administrative Distance |
|
|
143 | (1) |
|
Path Control with Policy-Based Routing |
|
|
144 | (1) |
|
Verifying Policy-Based Routing |
|
|
145 | (1) |
|
Configuration Example: PBR with Route Maps |
|
|
146 | (1) |
|
|
147 | (3) |
|
Configuring Authentication for IP SLA |
|
|
149 | (1) |
|
Monitoring IP SLA Operations |
|
|
150 | (1) |
|
PBR with Cisco IOS IP SLA |
|
|
150 | (5) |
|
|
151 | (1) |
|
Step 2 Define Tracking Object(s) |
|
|
152 | (1) |
|
Step 3a Define the Action on the Tracking Object(s) |
|
|
152 | (1) |
|
Step 3b Define Policy Routing Using the Tracking Object(s) |
|
|
152 | (1) |
|
Step 4 Verify IP SLA Operations |
|
|
152 | (3) |
|
|
155 | (30) |
|
Configuring BGP: Classic Configuration |
|
|
156 | (1) |
|
Configuring Multiprotocol BGP (MP-BGP) |
|
|
157 | (1) |
|
Configuring BGP: Address Families |
|
|
158 | (1) |
|
Configuration Example: Using MP-BGP Address Families to Exchange IPv4 and IPv6 Routes |
|
|
159 | (1) |
|
BGP Support for 4-Byte AS Numbers |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (2) |
|
|
164 | (10) |
|
Route Selection Decision Process-The BGP Best Path Algorithm |
|
|
164 | (1) |
|
|
164 | (2) |
|
Using AS Path Access Lists to Manipulate the Weight Attribute |
|
|
166 | (1) |
|
Using Prefix Lists and Route Maps to Manipulate the Weight Attribute |
|
|
166 | (1) |
|
Local Preference Attribute |
|
|
167 | (1) |
|
Using AS Path Access Lists with Route Maps to Manipulate the Local Preference Attribute |
|
|
167 | (2) |
|
AS Path Attribute Prepending |
|
|
169 | (2) |
|
AS Path: Removing Private Autonomous Systems |
|
|
171 | (1) |
|
Multi-Exit Discriminator (MED) Attribute |
|
|
171 | (3) |
|
|
174 | (1) |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
Regular Expressions: Examples |
|
|
179 | (1) |
|
BGP Route Filtering Using Access Lists and Distribute Lists |
|
|
180 | (1) |
|
Configuration Example: Using Prefix Lists and AS Path Access Lists |
|
|
181 | (1) |
|
|
182 | (2) |
|
|
184 | (1) |
|
Configuring Authentication Between BGP Peers |
|
|
184 | (1) |
|
Verifying BGP Authentication |
|
|
184 | (1) |
|
Part III Infrastructure Services |
|
|
|
|
185 | (46) |
|
Network Address Translation (NAT) |
|
|
186 | (8) |
|
Private IP Addresses: RFC 1918 |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Configuring Port Address Translation (PAT) |
|
|
189 | (1) |
|
Configuring a NAT Virtual Interface |
|
|
190 | (1) |
|
Verifying NAT and PAT Configurations |
|
|
190 | (1) |
|
Troubleshooting NAT and PAT Configurations |
|
|
191 | (1) |
|
Configuration Example: PAT |
|
|
191 | (2) |
|
Configuration Example: NAT Virtual Interfaces and Static NAT |
|
|
193 | (1) |
|
First-Hop Redundancy Protocols |
|
|
194 | (23) |
|
Hot Standby Router Protocol |
|
|
194 | (7) |
|
Virtual Router Redundancy Protocol |
|
|
201 | (3) |
|
IPv4 Configuration Example: HSRP on L3 Switch |
|
|
204 | (5) |
|
IPv4 Configuration Example: VRRPv2 on Router and L3 Switch with IP SLA Tracking |
|
|
209 | (3) |
|
IPv6 Configuration Example: HSRPv2 on Router and L3 Switch |
|
|
212 | (5) |
|
Dynamic Host Control Protocol (DHCP) |
|
|
217 | (14) |
|
Implementing DHCP for IPv4 |
|
|
217 | (4) |
|
Implementing DHCP for IPv6 |
|
|
221 | (3) |
|
Configuration Example: DHCP for IPv4 |
|
|
224 | (2) |
|
Configuration Example: DHCP for IPv6 |
|
|
226 | (5) |
|
Chapter 9 Device Management |
|
|
231 | (14) |
|
|
231 | (2) |
|
Cleartext Password Encryption |
|
|
232 | (1) |
|
Password Encryption Algorithm Types |
|
|
233 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
The Cisco IOS File System |
|
|
236 | (1) |
|
Viewing the Cisco IOS File System |
|
|
236 | (1) |
|
Commonly Used URL Prefixes for Cisco Network Devices |
|
|
236 | (1) |
|
Deciphering IOS Image Filenames |
|
|
237 | (1) |
|
Backing Up Configurations to a TFTP Server |
|
|
238 | (1) |
|
Restoring Configurations from a TFTP Server |
|
|
238 | (1) |
|
Backing Up the Cisco IOS Software to a TFTP Server |
|
|
239 | (1) |
|
Restoring/Upgrading the Cisco IOS Software from a TFTP Server |
|
|
239 | (1) |
|
Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command |
|
|
240 | (1) |
|
Secure Copy Protocol (SCP) |
|
|
241 | (1) |
|
Configuring an SCP Server |
|
|
241 | (1) |
|
Verifying and Troubleshooting SCP |
|
|
241 | (1) |
|
Configuration Example: SCP |
|
|
241 | (1) |
|
Disabling Unneeded Services |
|
|
242 | (1) |
|
Useful Device Management Options |
|
|
243 | (2) |
|
Part IV Infrastructure Security |
|
|
|
Chapter 10 Infrastructure Security |
|
|
245 | (16) |
|
IPv4 Access Control Lists (ACLs) |
|
|
246 | (1) |
|
Configuring and Applying Standard IPv4 ACLs |
|
|
246 | (1) |
|
Configuring and Applying Extended IPv4 ACLs |
|
|
247 | (3) |
|
Configuring and Applying Time-based ACLs |
|
|
248 | (1) |
|
Configuring and Applying VTY ACLs |
|
|
249 | (1) |
|
|
250 | (1) |
|
Configuring and Applying IPv6 ACLs |
|
|
250 | (1) |
|
Verifying IPv4 and IPv6 ACLs |
|
|
251 | (1) |
|
Implementing Authentication Methods |
|
|
251 | (6) |
|
Simple Local Database Authentication |
|
|
252 | (1) |
|
AAA-based Local Database Authentication |
|
|
252 | (1) |
|
|
253 | (2) |
|
|
255 | (1) |
|
Configuring Authorization and Accounting |
|
|
256 | (1) |
|
|
257 | (1) |
|
Control Plane Policing (CoPP) |
|
|
257 | (3) |
|
Step 1 Define ACLs to Identify Permitted CoPP Traffic Flows |
|
|
258 | (1) |
|
Step 2 Define Class Maps for Matched Traffic |
|
|
258 | (1) |
|
Step 3 Define a Policy Map to Police Matched Traffic |
|
|
259 | (1) |
|
Step 4 Assign a Policy Map to the Control Plane |
|
|
259 | (1) |
|
|
260 | (1) |
|
Unicast Reverse Path Forwarding (uRPF) |
|
|
260 | (1) |
|
|
260 | (1) |
|
Verifying and Troubleshooting uRPF |
|
|
260 | (1) |
|
|
|
Chapter 11 Network Assurance |
|
|
261 | (38) |
|
Internet Control Message Protocol Redirect Messages |
|
|
262 | (1) |
|
|
262 | (1) |
|
Examples of Using the ping and the Extended ping Commands |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Conditionally Triggered Debugs |
|
|
266 | (1) |
|
|
267 | (2) |
|
Securing SNMPvl or SNMPv2c |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (2) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
Configuring Flexible NetFlow |
|
|
272 | (1) |
|
Step 1 Configure a Flow Record |
|
|
272 | (1) |
|
Step 2 Configure a Flow Exporter |
|
|
272 | (1) |
|
Step 3 Configure a Flow Monitor |
|
|
272 | (1) |
|
Step 4 Apply the Flow Monitor to an Interface |
|
|
273 | (1) |
|
|
273 | (1) |
|
Implementing Port Mirroring |
|
|
273 | (8) |
|
Default SPAN and RSPAN Configuration |
|
|
273 | (1) |
|
|
274 | (1) |
|
Local SPAN Guidelines for Configuration |
|
|
274 | (1) |
|
Configuration Example: Local SPAN |
|
|
274 | (3) |
|
|
277 | (1) |
|
Remote SPAN Guidelines for Configuration |
|
|
278 | (1) |
|
Configuration Example: Remote SPAN |
|
|
278 | (2) |
|
Configuring Encapsulated RSPAN (ERSPAN) |
|
|
280 | (1) |
|
Verifying and Troubleshooting Local and Remote SPAN |
|
|
281 | (1) |
|
Configuring Network Time Protocol |
|
|
281 | (13) |
|
|
281 | (1) |
|
|
282 | (2) |
|
|
284 | (2) |
|
Verifying and Troubleshooting NTP |
|
|
286 | (1) |
|
Setting the Clock on a Router |
|
|
286 | (4) |
|
|
290 | (1) |
|
Configuration Example: NTP |
|
|
290 | (4) |
|
Tool Command Language (Tel) |
|
|
294 | (1) |
|
Embedded Event Manager (EEM) |
|
|
295 | (4) |
|
EEM Configuration Examples |
|
|
296 | (2) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
|
Chapter 12 Wireless Security and Troubleshooting |
|
|
299 | (26) |
|
Authenticating Wireless Clients |
|
|
299 | (13) |
|
|
300 | (2) |
|
Authenticating with a Pre-shared Key |
|
|
302 | (2) |
|
|
304 | (6) |
|
Authenticating with WebAuth |
|
|
310 | (2) |
|
Troubleshooting from the Wireless LAN Controller |
|
|
312 | (6) |
|
Troubleshooting Wireless Client Connectivity |
|
|
318 | (7) |
|
Cisco AireOS Monitoring Dashboard GUI |
|
|
318 | (4) |
|
|
322 | (3) |
|
Part VII Overlays and Virtualization |
|
|
|
Chapter 13 Overlay Tunnels and VRF |
|
|
325 | (22) |
|
Generic Routing Encapsulation (GRE) |
|
|
325 | (6) |
|
Configuring an IPv4 GRE Tunnel |
|
|
326 | (1) |
|
Configuring an IPv6 GRE Tunnel |
|
|
326 | (1) |
|
Verifying IPv4 and IPv6 GRE Tunnels |
|
|
327 | (1) |
|
Configuration Example: IPv4 and IPv6 GRE Tunnels with OSPFv3 |
|
|
327 | (4) |
|
Site-to-Site GRE over IPsec |
|
|
331 | (4) |
|
GRE/IPsec Using Crypto Maps |
|
|
332 | (1) |
|
GRE/IPsec Using IPsec Profiles |
|
|
333 | (2) |
|
|
335 | (1) |
|
Site-to-Site Virtual Tunnel Interface (VTI) over IPsec |
|
|
335 | (1) |
|
Cisco Dynamic Multipoint VPN (DMVPN) |
|
|
336 | (7) |
|
Configuration Example: Cisco DMVPN for IPv4 |
|
|
337 | (5) |
|
|
342 | (1) |
|
|
343 | (4) |
|
|
343 | (2) |
|
|
345 | (2) |
Appendix A Create Your Own Journal Here |
|
347 | (14) |
Index |
|
361 | |