Introduction |
|
xxv | |
|
Chapter 1 Basic Network and Routing Concepts |
|
|
1 | (58) |
|
Differentiating Routing Protocols |
|
|
2 | (8) |
|
Enterprise Network Infrastructure |
|
|
2 | (1) |
|
Role of Dynamic Routing Protocols |
|
|
3 | (2) |
|
Choosing a of Dynamic Routing Protocols |
|
|
5 | (1) |
|
|
5 | (2) |
|
Types of Routing Protocols |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Route Protocol Scalability |
|
|
10 | (8) |
|
Understanding Network Technologies |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
13 | (1) |
|
ICMPv6 Neighbor Discovery |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (2) |
|
Routing Over the Internet |
|
|
18 | (1) |
|
Connecting Remote Locations with Headquarters |
|
|
18 | (22) |
|
Principles of Static Routing |
|
|
19 | (1) |
|
Configuring an IPv4 Static Route |
|
|
20 | (2) |
|
Configuring a Static Default Route |
|
|
22 | (1) |
|
|
23 | (1) |
|
PPP Authentication Overview |
|
|
23 | (3) |
|
|
26 | (2) |
|
Basic Frame Relay Overview |
|
|
28 | (3) |
|
VPN Connectivity Overview |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
Dynamic Multipoint Virtual Private Network |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
Routing and TCP/IP Operations |
|
|
40 | (3) |
|
MSS, Fragmentation, and PMTUD |
|
|
40 | (1) |
|
IPv4 Fragmentation and PMTUD |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (12) |
|
|
43 | (2) |
|
|
45 | (2) |
|
|
47 | (1) |
|
Basic RIPng Configuration |
|
|
47 | (3) |
|
Propagating a Default Route |
|
|
50 | (3) |
|
Investigating the RIPng Database |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (3) |
|
Chapter 2 EIGRP Implementation |
|
|
59 | (96) |
|
Establishing EIGRP Neighbor Relationships |
|
|
60 | (16) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Configuring and Verifying Basic EIGRP for IPv4 |
|
|
64 | (9) |
|
Manipulating EIGRP Timers |
|
|
73 | (1) |
|
EIGRP Neighbor Relationship over Frame Relay |
|
|
74 | (1) |
|
Establishing EIGRP over Layer 3 MPLS VPN |
|
|
74 | (1) |
|
Establishing EIGRP over Layer 2 MPLS VPN |
|
|
75 | (1) |
|
Building the EIGRP Topology Table |
|
|
76 | (18) |
|
Building and Examining the EIGRP Topology Table |
|
|
77 | (3) |
|
|
80 | (8) |
|
Exchange of Routing Knowledge in EIGRP |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
EIGRP Metric Calculation Example |
|
|
90 | (1) |
|
EIGRP Metric Calculation Example |
|
|
91 | (1) |
|
EIGRP Path Calculation Example |
|
|
92 | (2) |
|
Optimizing EIGRP Behavior |
|
|
94 | (34) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Configuring EIGRP Stub Routing |
|
|
97 | (3) |
|
|
100 | (8) |
|
|
108 | (1) |
|
Reducing Query Scope by Using Summary Routes |
|
|
109 | (1) |
|
Configuring EIGRP Summarization |
|
|
110 | (6) |
|
Determining the Summary Route |
|
|
116 | (4) |
|
|
120 | (3) |
|
Load Balancing with EIGRP |
|
|
123 | (1) |
|
Configuring EIGRP Load Balancing |
|
|
123 | (1) |
|
|
124 | (2) |
|
EIGRP Load Balancing Across Unequal-Metric Paths |
|
|
126 | (2) |
|
Configuring EIGRP for IPv6 |
|
|
128 | (8) |
|
Overview of EIGRP for IPv6 |
|
|
128 | (1) |
|
Configuring and Verifying EIGRP for IPv6 |
|
|
129 | (1) |
|
EIGRP for IPv6 Configuration |
|
|
130 | (4) |
|
Determining the IPv6 Summary Route |
|
|
134 | (2) |
|
Named EIGRP Configuration |
|
|
136 | (15) |
|
Introduction to Named EIGRP Configuration |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
EIGRP for IPv4 Address Family |
|
|
139 | (3) |
|
EIGRP for IPv6 Address Family |
|
|
142 | (6) |
|
Named EIGRP Configuration Modes |
|
|
148 | (2) |
|
Classic Versus Named EIGRP Configuration |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (3) |
|
Chapter 3 OSPF Implementation |
|
|
155 | (112) |
|
Establishing OSPF Neighbor Relationships |
|
|
155 | (32) |
|
|
156 | (1) |
|
|
157 | (1) |
|
Hierarchical Structure of OSPF |
|
|
158 | (2) |
|
Design Restrictions of OSPF |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (9) |
|
Optimizing OSPF Adjacency Behavior |
|
|
170 | (4) |
|
Using OSPF Priority in the DR/BDR Election |
|
|
174 | (1) |
|
OSPF Behavior in NBMA Hub-and-Spoke Topology |
|
|
175 | (2) |
|
|
177 | (2) |
|
|
179 | (3) |
|
OSPF Neighbor Relationship over Point-to-Point Links |
|
|
182 | (1) |
|
OSPF Neighbor Relationship over Layer 3 MPLS VPN |
|
|
182 | (2) |
|
OSPF Neighbor Relationship over Layer 2 MPLS VPN |
|
|
184 | (1) |
|
|
184 | (2) |
|
|
186 | (1) |
|
Configuring Passive Interfaces |
|
|
187 | (1) |
|
Building the Link-State Database |
|
|
187 | (28) |
|
|
188 | (1) |
|
Examining the OSPF Link-State Database |
|
|
189 | (1) |
|
|
190 | (6) |
|
|
196 | (1) |
|
|
197 | (2) |
|
OSPF Type 4 ASBR Summary LSA |
|
|
199 | (2) |
|
|
201 | (2) |
|
Periodic OSPF Database Changes |
|
|
203 | (1) |
|
Exchanging and Synchronizing LSDBs |
|
|
204 | (2) |
|
Synchronizing the LSDB on Multiaccess Networks |
|
|
206 | (1) |
|
Running the SPF Algorithm |
|
|
207 | (1) |
|
Configuring OSPF Path Selection |
|
|
208 | (1) |
|
|
208 | (2) |
|
OSPF Best Path Calculation |
|
|
210 | (1) |
|
|
211 | (3) |
|
Calculating the Cost of Intra-Area Routes |
|
|
214 | (1) |
|
Calculating the Cost of Interarea Routes |
|
|
214 | (1) |
|
Selecting Between Intra-Area and Interarea Routes |
|
|
215 | (1) |
|
|
215 | (24) |
|
|
216 | (1) |
|
Benefits of Route Summarization |
|
|
217 | (1) |
|
Configuring OSPF Route Summarization |
|
|
218 | (5) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Configuring OSPF Virtual Links |
|
|
227 | (2) |
|
Configuring OSPF Stub Areas |
|
|
229 | (1) |
|
|
230 | (4) |
|
OSPF Totally Stubby Areas |
|
|
234 | (2) |
|
Cost of the Default Route in a Stub Area |
|
|
236 | (1) |
|
The default-information originate Command |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (23) |
|
|
240 | (1) |
|
|
241 | (5) |
|
|
246 | (14) |
|
Configuring Advanced OSPFv3 |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (4) |
|
Chapter 4 Manipulating Routing Updates |
|
|
267 | (60) |
|
Using Multiple IP Routing Protocols on a Network |
|
|
267 | (3) |
|
Why Run Multiple Routing Protocols? |
|
|
269 | (1) |
|
Running Multiple Routing Protocols |
|
|
269 | (1) |
|
|
269 | (1) |
|
Multiple Routing Protocols Solutions |
|
|
270 | (1) |
|
Implementing Route Redistribution |
|
|
270 | (22) |
|
Defining Route Redistribution |
|
|
270 | (1) |
|
Planning to Redistribute Routes |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
Configuring and Verifying Basic Redistribution in IPv4 and IPv6 |
|
|
275 | (1) |
|
Redistributing OSPFv2 Routes into the EIGRP Routing Domain |
|
|
276 | (3) |
|
Redistributing OSPFv3 Routes into the EIGRP for IPv6 Routing Domain |
|
|
279 | (2) |
|
Redistributing EIGRP Routes into the OSPFv2 Routing Domain |
|
|
281 | (4) |
|
Redistributing EIGRP for IPv6 Routes into the OSPFv3 Routing Domain |
|
|
285 | (2) |
|
Types of Redistribution Techniques |
|
|
287 | (1) |
|
|
287 | (1) |
|
Multipoint Redistribution |
|
|
288 | (1) |
|
|
289 | (2) |
|
Preventing Routing Loops in a Redistribution Environment |
|
|
291 | (1) |
|
Verifying Redistribution Operation |
|
|
292 | (1) |
|
Controlling Routing Update Traffic |
|
|
292 | (28) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Configuring Distribute Lists |
|
|
294 | (1) |
|
Distribute List and ACL Example |
|
|
295 | (2) |
|
|
297 | (1) |
|
Prefix List Characteristics |
|
|
297 | (1) |
|
|
298 | (1) |
|
Distribute List and Prefix List Example |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
Manipulating Redistribution Using ACLs, Prefix Lists, and Distribute Lists |
|
|
302 | (3) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (2) |
|
Route Map Match and Set Statements |
|
|
308 | (2) |
|
Configuring Route Redistribution Using Route Maps |
|
|
310 | (1) |
|
Using Route Maps with Redistribution |
|
|
310 | (1) |
|
Manipulating Redistribution Using Route Maps |
|
|
311 | (1) |
|
Mutual Redistribution without Route Filtering |
|
|
312 | (1) |
|
Mutual Redistribution with Route Maps |
|
|
313 | (2) |
|
Change Administrative Distance to Enable Optimal Routing |
|
|
315 | (3) |
|
Manipulating Redistribution Using Route Tagging |
|
|
318 | (1) |
|
Caveats of Redistribution |
|
|
319 | (1) |
|
|
320 | (3) |
|
|
323 | (1) |
|
|
323 | (4) |
|
Chapter 5 Path Control Implementation |
|
|
327 | (46) |
|
Using Cisco Express Forwarding Switching |
|
|
327 | (16) |
|
|
328 | (1) |
|
Cisco Switching Mechanisms |
|
|
328 | (4) |
|
Process and Fast Switching |
|
|
332 | (1) |
|
|
333 | (2) |
|
Analyzing Cisco Express Forwarding |
|
|
335 | (1) |
|
Verify the Content of the CEF Tables |
|
|
335 | (6) |
|
Enable and Disable CEF by Interface and Globally |
|
|
341 | (2) |
|
Understanding Path Control |
|
|
343 | (26) |
|
The Need for Path Control |
|
|
343 | (1) |
|
Implementing Path Control Using Policy-Based Routing |
|
|
344 | (1) |
|
|
344 | (1) |
|
Steps for Configuring PBR |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
348 | (6) |
|
Implementing Path Control Using Cisco IOS IP SLAs |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
354 | (2) |
|
Steps for Configuring IP SLAs |
|
|
356 | (4) |
|
Verifying Path Control Using IOS IP SLAs |
|
|
360 | (1) |
|
Configuring IP SLA Example |
|
|
361 | (3) |
|
Configuring PBR and IP SLA Example |
|
|
364 | (5) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (3) |
|
Chapter 6 Enterprise Internet Connectivity |
|
|
373 | (50) |
|
Planning Enterprise Internet Connectivity |
|
|
374 | (7) |
|
Connecting Enterprise Networks to an ISP |
|
|
374 | (1) |
|
Enterprise Connectivity Requirements |
|
|
374 | (1) |
|
|
375 | (1) |
|
Public IP Address Assignment |
|
|
376 | (1) |
|
The Internet Assigned Numbers Authority |
|
|
376 | (1) |
|
Regional Internet Registries |
|
|
377 | (1) |
|
|
377 | (1) |
|
Autonomous System Numbers |
|
|
378 | (3) |
|
Establishing Single-Homed IPv4 Internet Connectivity |
|
|
381 | (17) |
|
Configuring a Provider-Assigned IPv4 Address |
|
|
381 | (1) |
|
|
382 | (1) |
|
Obtaining a Provider-Assigned IPv4 Address with DHCP |
|
|
383 | (1) |
|
Configuring a Router as a DHCP Server and DHCP Relay Agent |
|
|
384 | (1) |
|
|
385 | (3) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (2) |
|
|
392 | (1) |
|
|
393 | (1) |
|
Configuring NAT Virtual Interface |
|
|
393 | (3) |
|
Verifying NAT Virtual Interface |
|
|
396 | (2) |
|
Establishing Single-Homed IPv6 Internet Connectivity |
|
|
398 | (12) |
|
Obtaining a Provider-Assigned IPv6 Address |
|
|
398 | (1) |
|
|
399 | (1) |
|
Configuring Basic IPv6 Internet Connectivity |
|
|
399 | (2) |
|
Stateless Address Autoconfiguration |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (3) |
|
Securing IPv6 Internet Connectivity |
|
|
409 | (1) |
|
Improving Internet Connectivity Resilience |
|
|
410 | (5) |
|
Drawbacks of a Single-Homed Internet Connectivity |
|
|
410 | (1) |
|
Dual-Homed Internet Connectivity |
|
|
410 | (1) |
|
Dual-Homed Connectivity Options |
|
|
411 | (1) |
|
Configuring Best Path for Dual-Homed Internet Connectivity |
|
|
411 | (2) |
|
Multihomed Internet Connectivity |
|
|
413 | (2) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
418 | (5) |
|
Chapter 7 BGP Implementation |
|
|
423 | (104) |
|
BGP Terminology, Concepts, and Operation |
|
|
424 | (11) |
|
BGP Use Between Autonomous Systems |
|
|
424 | (1) |
|
Comparison with Other Scalable Routing Protocols |
|
|
425 | (1) |
|
BGP Path Vector Characteristics |
|
|
426 | (2) |
|
|
428 | (2) |
|
|
430 | (1) |
|
|
431 | (1) |
|
Open and Keepalive Messages |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
435 | (32) |
|
BGP Neighbor Relationships |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
iBGP on All Routers in a Transit Path |
|
|
438 | (4) |
|
Basic BGP Configuration Requirements |
|
|
442 | (1) |
|
Entering BGP Configuration Mode |
|
|
442 | (1) |
|
Defining BGP Neighbors and Activating BGP Sessions |
|
|
443 | (1) |
|
Basic BGP Configuration and Verification |
|
|
444 | (1) |
|
Configuring and Verifying an eBGP Session |
|
|
445 | (4) |
|
Configuring and Verifying an iBGP Session |
|
|
449 | (1) |
|
Advertising Networks in BGP and Verifying That They Are Propagated |
|
|
450 | (7) |
|
Using the Next-Hop-Self Feature |
|
|
457 | (1) |
|
Understanding and Troubleshooting BGP Neighbor States |
|
|
458 | (2) |
|
|
460 | (1) |
|
Sourcing BGP from Loopback Address |
|
|
461 | (2) |
|
|
463 | (1) |
|
|
464 | (3) |
|
BGP Attributes and the Path-Selection Process |
|
|
467 | (24) |
|
|
467 | (1) |
|
BGP Path-Selection Process |
|
|
468 | (1) |
|
The Path-Selection Decision Process with a Multihomed Connection |
|
|
469 | (2) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
The Local-Preference Attribute |
|
|
475 | (1) |
|
|
475 | (1) |
|
|
476 | (2) |
|
The Weight Attribute (Cisco Only) |
|
|
478 | (1) |
|
Changing the Weight for All Updates from a Neighbor |
|
|
479 | (1) |
|
Changing the Weight Using Route Maps |
|
|
479 | (1) |
|
Influencing BGP Path Selection |
|
|
480 | (5) |
|
|
485 | (1) |
|
Changing Local Preference |
|
|
486 | (2) |
|
|
488 | (3) |
|
Controlling BGP Routing Updates |
|
|
491 | (11) |
|
Filtering BGP Routing Updates |
|
|
492 | (1) |
|
BGP Filtering Using Prefix Lists |
|
|
492 | (2) |
|
BGP Filtering Using AS-Path Access Lists |
|
|
494 | (2) |
|
BGP Filtering Using Route Maps |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (2) |
|
|
500 | (1) |
|
Peer Group Configuration Example |
|
|
500 | (2) |
|
Implementing BGP for IPv6 Internet Connectivity |
|
|
502 | (18) |
|
|
502 | (2) |
|
Exchanging IPv6 Routes over an IPv4 Session |
|
|
504 | (2) |
|
Exchanging IPv6 Routes over an IPv6 Session |
|
|
506 | (1) |
|
BGP for IPv6 Configuration and Verification |
|
|
507 | (1) |
|
|
508 | (3) |
|
Enable eBGP IPv6 Route Exchange |
|
|
511 | (5) |
|
Enable iBGP IPv6 Route Exchange |
|
|
516 | (2) |
|
Comparing IPv4 to Dual (IPv4/IPv6) BGP Transport |
|
|
518 | (1) |
|
BGP Filtering Mechanisms for IPv6 |
|
|
518 | (1) |
|
IPv6 Prefix List Filtering |
|
|
518 | (1) |
|
IPv6 Path Selection with BGP Local Preference |
|
|
519 | (1) |
|
|
520 | (2) |
|
|
522 | (1) |
|
|
523 | (4) |
|
Chapter 8 Routers and Routing Protocol Hardening |
|
|
527 | (80) |
|
Securing the Management Plane on Cisco Routers |
|
|
528 | (42) |
|
Securing the Management Plane |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (4) |
|
Authentication, Authorization, Accounting |
|
|
536 | (1) |
|
RADIUS and TACACS+ Overview |
|
|
536 | (2) |
|
Enabling AAA and Local Authentication |
|
|
538 | (1) |
|
Enabling AAA RADIUS Authentication with Local User for Backup |
|
|
539 | (2) |
|
Enabling AAA TACACS+ Authentication with Local User for Backup |
|
|
541 | (1) |
|
Configuring Authorization and Accounting |
|
|
542 | (1) |
|
Limitations of TACACS+ and RADIUS |
|
|
542 | (1) |
|
Use SSH Instead of Telnet |
|
|
543 | (4) |
|
Securing Access to the Infrastructure Using Router ACLs |
|
|
547 | (2) |
|
Implement Unicast Reverse Path Forwarding |
|
|
549 | (1) |
|
uRPF in an Enterprise Network |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
Implementing Network Time Protocol |
|
|
552 | (1) |
|
|
552 | (2) |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (3) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (2) |
|
|
565 | (1) |
|
|
565 | (2) |
|
Disabling Unused Services |
|
|
567 | (1) |
|
|
568 | (1) |
|
Enabling Conditional Debugging |
|
|
569 | (1) |
|
Routing Protocol Authentication Options |
|
|
570 | (6) |
|
The Purpose of Routing Protocol Authentication |
|
|
570 | (1) |
|
Plain-Text Authentication |
|
|
571 | (1) |
|
|
572 | (2) |
|
|
574 | (1) |
|
|
574 | (1) |
|
Authentication Options with Different Routing Protocols |
|
|
575 | (1) |
|
Configuring EIGRP Authentication |
|
|
576 | (7) |
|
EIGRP Authentication Configuration Checklist |
|
|
577 | (1) |
|
Configuring EIGRP Authentication |
|
|
577 | (1) |
|
Configure EIGRP MD5 Authentication Mode |
|
|
578 | (1) |
|
Configure EIGRP Key-Based Routing Authentication |
|
|
579 | (2) |
|
Configuring EIGRP for IPv6 Authentication |
|
|
581 | (1) |
|
Configure EIGRP for IPv6 MD5 Authentication Mode |
|
|
581 | (1) |
|
Configuring Named EIGRP Authentication |
|
|
582 | (1) |
|
Configuring OSPF Authentication |
|
|
583 | (10) |
|
|
583 | (1) |
|
|
584 | (1) |
|
Configure OSPF MD5 Authentication |
|
|
584 | (1) |
|
Configure OSPF MD5 Authentication on Interfaces |
|
|
585 | (1) |
|
Configure OSPF MD5 Authentication in an Area |
|
|
586 | (1) |
|
OSPFv2 Cryptographic Authentication |
|
|
587 | (1) |
|
Configuring OSPFv2 Cryptographic Authentication |
|
|
587 | (1) |
|
Configure OSPFv2 Cryptographic Authentication Example |
|
|
588 | (2) |
|
|
590 | (1) |
|
Configuring OSPFv3 Authentication |
|
|
590 | (1) |
|
Configuring OSPFv3 Authentication on an Interface Example |
|
|
591 | (1) |
|
Configuring OSPFv3 Authentication in an Area Example |
|
|
592 | (1) |
|
Configuring BGP Authentication |
|
|
593 | (4) |
|
BGP Authentication Configuration Checklist |
|
|
594 | (1) |
|
BGP Authentication Configuration |
|
|
594 | (2) |
|
BGP for IPv6 Authentication Configuration |
|
|
596 | (1) |
|
|
597 | (4) |
|
|
597 | (1) |
|
|
597 | (4) |
|
|
601 | (2) |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (3) |
|
Appendix A Answers to End of Chapter Review Questions |
|
|
607 | (6) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
612 | (1) |
|
Appendix B IPv4 Supplement |
|
|
613 | (58) |
|
IPv4 Addresses and Subnetting Job Aid |
|
|
614 | (1) |
|
Decimal-to-Binary Conversion Chart |
|
|
614 | (4) |
|
|
618 | (7) |
|
Converting IP Addresses Between Decimal and Binary |
|
|
618 | (1) |
|
Determining an IP Address Class |
|
|
619 | (1) |
|
|
620 | (1) |
|
Extending an IP Classful Address Using a Subnet Mask |
|
|
620 | (1) |
|
Calculating a Subnet Mask |
|
|
621 | (2) |
|
Calculating the Networks for a Subnet Mask |
|
|
623 | (1) |
|
Using Prefixes to Represent a Subnet Mask |
|
|
624 | (1) |
|
|
625 | (23) |
|
|
625 | (1) |
|
|
626 | (2) |
|
|
628 | (1) |
|
Access List Configuration Tasks |
|
|
629 | (1) |
|
IP Standard Access List Configuration |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
631 | (1) |
|
Standard Access List Example |
|
|
632 | (1) |
|
Location of Standard Access Lists |
|
|
633 | (1) |
|
|
634 | (1) |
|
Extended Access List Processing |
|
|
634 | (1) |
|
Extended IP Access List Configuration |
|
|
635 | (7) |
|
Extended Access List Examples |
|
|
642 | (1) |
|
Location of Extended Access Lists |
|
|
643 | (1) |
|
|
644 | (1) |
|
Restricting Virtual Terminal Access |
|
|
645 | (1) |
|
How to Control vty Access |
|
|
645 | (1) |
|
Virtual Terminal Line Access Configuration |
|
|
646 | (1) |
|
Verifying Access List Configuration |
|
|
647 | (1) |
|
|
648 | (5) |
|
Benefits of an Optimized IP Addressing Plan |
|
|
648 | (2) |
|
Scalable Network Addressing Example |
|
|
650 | (1) |
|
Nonscalable Network Addressing |
|
|
651 | (1) |
|
|
651 | (1) |
|
Unsummarized Internetwork Topology Changes |
|
|
652 | (1) |
|
Summarized Network Topology Changes |
|
|
652 | (1) |
|
Hierarchical Addressing Using Variable-Length Subnet Masks |
|
|
653 | (9) |
|
|
653 | (1) |
|
|
653 | (1) |
|
|
653 | (1) |
|
Implementing VLSM in a Scalable Network |
|
|
654 | (2) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
658 | (3) |
|
Summary of Addresses Used in the VLSM Example |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
662 | (5) |
|
Route Summarization Overview |
|
|
662 | (2) |
|
Route Summarization Calculation Example |
|
|
664 | (1) |
|
Summarizing Addresses in a VLSM-Designed Network |
|
|
665 | (1) |
|
Route Summarization Implementation |
|
|
666 | (1) |
|
Route Summarization Operation in Cisco Routers |
|
|
666 | (1) |
|
Route Summarization in IP Routing Protocols |
|
|
667 | (1) |
|
Classless Interdomain Routing |
|
|
667 | (4) |
|
|
668 | (3) |
|
Appendix C BGP Supplement |
|
|
671 | (26) |
|
|
671 | (9) |
|
CIDR and Aggregate Addresses |
|
|
671 | (2) |
|
Network Boundary Summarization |
|
|
673 | (1) |
|
BGP Route Summarization Using the network Command |
|
|
674 | (3) |
|
Creating a Summary Address in the BGP Table Using the aggregate-address Command |
|
|
677 | (3) |
|
|
680 | (2) |
|
Advertising Networks into BGP |
|
|
680 | (1) |
|
Advertising from BGP into an IGP |
|
|
681 | (1) |
|
|
682 | (5) |
|
|
682 | (1) |
|
Setting and Sending the Communities Configuration |
|
|
682 | (3) |
|
Using the Communities Configuration |
|
|
685 | (2) |
|
|
687 | (8) |
|
|
689 | (1) |
|
Route Reflector Terminology |
|
|
689 | (1) |
|
|
690 | (1) |
|
Route Reflector Design Example |
|
|
690 | (1) |
|
Route Reflector Operation |
|
|
691 | (1) |
|
Route Reflector Migration Tips |
|
|
692 | (2) |
|
Route Reflector Configuration |
|
|
694 | (1) |
|
|
694 | (1) |
|
Verifying Route Reflectors |
|
|
695 | (1) |
|
Advertising a Default Route |
|
|
695 | (1) |
|
Not Advertising Private Autonomous System Numbers |
|
|
696 | (1) |
|
Appendix D Acronyms and Abbreviations |
|
|
697 | |
Index |
|
701 | |
Introduction |
|
xx | |
|
Chapter 1 Fundamentals Review |
|
|
1 | (8) |
|
|
2 | (6) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
The Basic Ethernet Frame Format |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
The Spanning Tree Protocol |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Chapter 2 Network Design Fundamentals |
|
|
9 | (32) |
|
|
9 | (13) |
|
Hierarchical Network Design |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (3) |
|
Layer 3 in the Access Layer |
|
|
17 | (2) |
|
The Cisco Enterprise Campus Architecture |
|
|
19 | (1) |
|
The Need for a Core Layer |
|
|
20 | (2) |
|
|
22 | (12) |
|
Comparing Layer 2 and Multilayer Switches |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Layer 3 (Multilayer) Switch Operation |
|
|
26 | (1) |
|
Useful Commands for Viewing and Editing Catalyst Switch MAC Address Tables |
|
|
27 | (1) |
|
|
28 | (1) |
|
Distributed Hardware Forwarding |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (6) |
|
Chapter 3 Campus Network Architecture |
|
|
41 | (78) |
|
Implementing VLANs and Trunks in Campus Environment |
|
|
41 | (29) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Comparison of End-to-End VLANs and Local VLANs |
|
|
46 | (1) |
|
Mapping VLANs to a Hierarchical Network |
|
|
47 | (2) |
|
Implementing a Trunk in a Campus Environment |
|
|
49 | (3) |
|
Understanding Native VLAN in 802.1Q Trunking |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Configuring, Verifying, and Troubleshooting VLANs and Trunks |
|
|
55 | (2) |
|
Verifying the VLAN Configuration |
|
|
57 | (4) |
|
Configuring VLANs and Trunks |
|
|
61 | (4) |
|
Best Practices for VLANs and Trunking |
|
|
65 | (2) |
|
|
67 | (2) |
|
Switch Configuration for Wireless Network Support |
|
|
69 | (1) |
|
|
70 | (24) |
|
|
70 | (1) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Configuring and Verifying VTP |
|
|
78 | (9) |
|
Overwriting VTP Configuration (Very Common Issue with VTP) |
|
|
87 | (6) |
|
Best Practices for VTP Implementation |
|
|
93 | (1) |
|
Implementing EtherChannel in a Switched Network |
|
|
94 | (15) |
|
The Need for EtherChannel |
|
|
94 | (3) |
|
EtherChannel Mode Interactions |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Layer 2 EtherChannel Configuration Guidelines |
|
|
99 | (1) |
|
EtherChannel Load-Balancing Options |
|
|
100 | (2) |
|
Configuring EtherChannel in a Switched Network |
|
|
102 | (1) |
|
EtherChannel Configuration and Load Balancing |
|
|
103 | (5) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (9) |
|
Chapter 4 Spanning Tree in Depth |
|
|
119 | (84) |
|
Spanning Tree Protocol Overview |
|
|
120 | (13) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (2) |
|
Bridge Protocol Data Units |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Per-VLAN STP Plus (PVST+) |
|
|
130 | (1) |
|
|
131 | (2) |
|
Rapid Spanning Tree Protocol |
|
|
133 | (18) |
|
|
134 | (1) |
|
Comparison of RSTP and STP Port States |
|
|
135 | (1) |
|
|
136 | (2) |
|
|
138 | (2) |
|
Configuring and Modifying STP Behavior |
|
|
140 | (3) |
|
|
143 | (2) |
|
|
145 | (3) |
|
|
148 | (3) |
|
Implementing STP Stability Mechanisms |
|
|
151 | (28) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (2) |
|
Securing PortFast Interface with BPDU Guard |
|
|
158 | (1) |
|
Disabling STP with BPDU Filter |
|
|
159 | (2) |
|
|
161 | (3) |
|
|
164 | (2) |
|
|
166 | (4) |
|
UDLD Recommended Practices |
|
|
170 | (1) |
|
|
171 | (4) |
|
STP Stability Mechanisms Recommendations |
|
|
175 | (4) |
|
Configuring Multiple Spanning Tree Protocol |
|
|
179 | (17) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (2) |
|
Extended System ID for MST |
|
|
185 | (1) |
|
Configuring and Verifying MST |
|
|
185 | (7) |
|
Configuring MST Path Cost |
|
|
192 | (1) |
|
Configuring MST Port Priority |
|
|
193 | (1) |
|
|
194 | (1) |
|
MST Recommended Practices |
|
|
194 | (2) |
|
|
196 | (2) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Unidirectional Link Failure |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
PortFast Configuration Errors |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (3) |
|
Chapter 5 Inter-VLAN Routing |
|
|
203 | (44) |
|
Describing Inter-VLAN Routing |
|
|
204 | (21) |
|
Introduction to Inter-VLAN Routing |
|
|
204 | (2) |
|
Inter-VLAN Routing Using an External Router |
|
|
206 | (1) |
|
Configuring Inter-VLAN Routing Using an External Router |
|
|
207 | (1) |
|
Routing with an External Router |
|
|
208 | (3) |
|
External Routers: Advantages Disadvantages |
|
|
211 | (1) |
|
Inter-VLAN Routing Using Switch Virtual Interfaces |
|
|
212 | (2) |
|
SVI: Advantages and Disadvantages |
|
|
214 | (1) |
|
Routing with Routed Ports |
|
|
214 | (1) |
|
|
215 | (1) |
|
Configuring Inter-VLAN Routing Using SVI and Routed Ports |
|
|
216 | (1) |
|
Routing on a Multilayer Switch |
|
|
217 | (3) |
|
Using the SVI autostate exclude Command |
|
|
220 | (1) |
|
SVI Configuration Checklist |
|
|
221 | (1) |
|
Troubleshooting Inter-VLAN Problems |
|
|
222 | (1) |
|
Example of a Troubleshooting Plan |
|
|
223 | (2) |
|
Layer 2 Versus Layer 3 EtherChannel |
|
|
225 | (6) |
|
Layer 3 EtherChannel Configuration |
|
|
226 | (3) |
|
Verifying Routing Protocols |
|
|
229 | (2) |
|
|
231 | (9) |
|
|
231 | (2) |
|
Configuring DHCP in Multilayer Switched Network |
|
|
233 | (6) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (5) |
|
Chapter 6 First-Hop Redundancy |
|
|
247 | (58) |
|
Overview of FHRP and HSRP |
|
|
247 | (27) |
|
The Need for First-Hop Redundancy |
|
|
248 | (2) |
|
|
250 | (3) |
|
|
253 | (1) |
|
Aligning HSRP with STP Topology |
|
|
254 | (1) |
|
Configuring and Tuning HSRP |
|
|
255 | (2) |
|
Forwarding Through the Active Router |
|
|
257 | (6) |
|
|
263 | (2) |
|
The Need for Interface Tracking with HSRP |
|
|
265 | (1) |
|
|
266 | (2) |
|
|
268 | (3) |
|
Configuring HSRP Authentication |
|
|
271 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
|
Configuring Layer 3 Redundancy with VRRP |
|
|
274 | (8) |
|
|
275 | (1) |
|
Configuring VRRP and Spotting the Differences from HSRP |
|
|
276 | (3) |
|
|
279 | (1) |
|
|
280 | (2) |
|
Configuring Layer 3 Redundancy with GLBP |
|
|
282 | (18) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Configuring and Verifying GLBP |
|
|
285 | (9) |
|
GLBP Load-Balancing Options |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (4) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (3) |
|
Chapter 7 Network Management |
|
|
305 | (46) |
|
|
305 | (11) |
|
|
307 | (1) |
|
RADIUS and TACACS+ Overview |
|
|
308 | (1) |
|
RADIUS Authentication Process |
|
|
309 | (1) |
|
TACACS+ Authentication Process |
|
|
310 | (1) |
|
|
311 | (1) |
|
Configuring RADIUS for Console and vty Access |
|
|
311 | (1) |
|
Configuring TACACS+ for Console and vty Access |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Limitations of TACACS+ and RADIUS |
|
|
315 | (1) |
|
Identity-Based Networking |
|
|
316 | (3) |
|
IEEE 802.1X Port-Based Authentication Overview |
|
|
316 | (2) |
|
IEEE 802.1X Configuration Checklist |
|
|
318 | (1) |
|
|
319 | (17) |
|
The Need for Accurate Time |
|
|
320 | (1) |
|
Configuring the System Clock Manually |
|
|
320 | (3) |
|
Network Time Protocol Overview |
|
|
323 | (1) |
|
|
324 | (2) |
|
Other NTP Configuration Options |
|
|
326 | (1) |
|
|
326 | (3) |
|
|
329 | (2) |
|
|
331 | (2) |
|
|
333 | (1) |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (8) |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
339 | (1) |
|
SNMPv3 Configuration Example |
|
|
340 | (2) |
|
Verifying SNMP Version 3 Configuration |
|
|
342 | (2) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (6) |
|
Chapter 8 Switching Features and Technologies for the Campus Network |
|
|
351 | (42) |
|
|
352 | (5) |
|
|
352 | (1) |
|
Basic Configuration of LLDP |
|
|
353 | (2) |
|
Discovering Neighbors Using LLDP |
|
|
355 | (2) |
|
Unidirectional Link Detection |
|
|
357 | (3) |
|
UDLD Mechanisms and Specifics |
|
|
358 | (1) |
|
|
358 | (2) |
|
Leveraging UDLD and STP Loop Guard Together |
|
|
360 | (1) |
|
|
360 | (4) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
Configuring and Verifying PoE |
|
|
363 | (1) |
|
|
364 | (4) |
|
|
365 | (2) |
|
Choosing the Right SDM Template |
|
|
367 | (1) |
|
System Resource Configuration on Other Platforms |
|
|
367 | (1) |
|
|
368 | (6) |
|
|
368 | (3) |
|
|
371 | (1) |
|
|
372 | (2) |
|
|
374 | (10) |
|
|
375 | (2) |
|
IP SLA Source and Responder |
|
|
377 | (1) |
|
|
377 | (2) |
|
IP SLA Operation with Responder |
|
|
379 | (2) |
|
|
381 | (1) |
|
Configuring Authentication for IP SLA |
|
|
382 | (1) |
|
IP SLA Example for UDP Jitter |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (8) |
|
Chapter 9 High Availability |
|
|
393 | (16) |
|
The Need for Logical Switching Architectures |
|
|
394 | (1) |
|
|
395 | (2) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (4) |
|
|
398 | (1) |
|
|
399 | (2) |
|
Redundant Switch Supervisors |
|
|
401 | (4) |
|
Supervisor Redundancy Modes |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (3) |
|
Chapter 10 Campus Network Security |
|
|
409 | (60) |
|
Overview of Switch Security Issues |
|
|
410 | (1) |
|
Cisco Switch Security Configuration Best Practices |
|
|
411 | (3) |
|
Campus Network Vulnerabilities |
|
|
414 | (5) |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (2) |
|
Introducing Port Security |
|
|
419 | (6) |
|
Port Security Configuration |
|
|
420 | (2) |
|
|
422 | (1) |
|
Err-Disabled Automatic Recovery |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (5) |
|
Introduction to Storm Control |
|
|
426 | (1) |
|
Configuring and Verifying Storm Control on an Interface |
|
|
427 | (3) |
|
Mitigating Spoofing Attacks |
|
|
430 | (13) |
|
|
430 | (2) |
|
|
432 | (1) |
|
|
433 | (1) |
|
DHCP Snooping Example Configuration |
|
|
433 | (3) |
|
|
436 | (2) |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
441 | (2) |
|
|
443 | (8) |
|
|
444 | (2) |
|
|
446 | (1) |
|
Protecting Against VLAN Hopping |
|
|
447 | (1) |
|
|
448 | (1) |
|
VACL Interaction with ACLs and PACLs |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
451 | (7) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
454 | (2) |
|
|
456 | (1) |
|
PVLANs Across Multiple Switches |
|
|
457 | (1) |
|
Using the Protected Port Feature |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (9) |
|
Appendix A Answers to Chapter Review Questions |
|
|
469 | |
Index |
|
473 | |
Introduction |
|
xxi | |
|
Chapter 1 Troubleshooting Methods |
|
|
1 | (14) |
|
Troubleshooting Principles |
|
|
1 | (3) |
|
Structured Troubleshooting Approaches |
|
|
4 | (8) |
|
The Top-Down Troubleshooting Approach |
|
|
6 | (1) |
|
The Bottom-Up Troubleshooting Approach |
|
|
7 | (1) |
|
The Divide-and-Conquer Troubleshooting Approach |
|
|
8 | (1) |
|
The Follow-the-Path Troubleshooting Approach |
|
|
9 | (1) |
|
The Compare-Configurations Troubleshooting Approach |
|
|
10 | (1) |
|
The Swap-Components Troubleshooting Approach |
|
|
11 | (1) |
|
Troubleshooting Example Using Six Different Approaches |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Chapter 2 Structured Troubleshooting |
|
|
15 | (14) |
|
Troubleshooting Method and Procedure |
|
|
16 | (9) |
|
|
17 | (1) |
|
|
18 | (2) |
|
Analyzing the Information |
|
|
20 | (1) |
|
Eliminating Potential Causes |
|
|
21 | (1) |
|
Proposing a Hypothesis (Likely Cause of the Problem) |
|
|
21 | (2) |
|
Testing and Verifying Validity of the Proposed Hypothesis |
|
|
23 | (1) |
|
Solving the Problem and Documenting the Work |
|
|
24 | (1) |
|
Troubleshooting Example Based on the Structured Method and Procedures |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
Chapter 3 Network Maintenance Tasks and Best Practices |
|
|
29 | (32) |
|
Structured Network Maintenance |
|
|
29 | (2) |
|
Network Maintenance Processes and Procedures |
|
|
31 | (6) |
|
|
32 | (1) |
|
Network Maintenance Planning |
|
|
33 | (1) |
|
|
33 | (1) |
|
Formalizing Change-Control Procedures |
|
|
34 | (1) |
|
Establishing Network Documentation Procedures |
|
|
34 | (1) |
|
Establishing Effective Communication |
|
|
35 | (1) |
|
Defining Templates/Procedures/Conventions (Standardization) |
|
|
36 | (1) |
|
Planning for Disaster Recovery |
|
|
36 | (1) |
|
Network Maintenance Services and Tools |
|
|
37 | (10) |
|
|
39 | (1) |
|
|
40 | (2) |
|
Performing Backup and Restore |
|
|
42 | (5) |
|
Integrating Troubleshooting into the Network Maintenance Process |
|
|
47 | (7) |
|
Network Documentation and Baseline |
|
|
48 | (2) |
|
|
50 | (3) |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
57 | (4) |
|
Chapter 4 Basic Switching and Routing Process and Effective IOS Troubleshooting Commands |
|
|
61 | (38) |
|
Basic Layer 2 Switching Process |
|
|
61 | (8) |
|
Ethernet Frame Forwarding (Layer 2 Data Plane) |
|
|
62 | (5) |
|
Layer 2 Switching Verification |
|
|
67 | (2) |
|
Basic Layer 3 Routing Process |
|
|
69 | (7) |
|
IP Packet Forwarding (Layer 3 Data Plane) |
|
|
70 | (3) |
|
Using IOS Commands to Verify IP Packet Forwarding |
|
|
73 | (3) |
|
Selective Information Gathering Using IOS show Commands, debug Commands, Ping, and Telnet |
|
|
76 | (16) |
|
Filtering and Redirecting show Command's Output |
|
|
76 | (5) |
|
Testing Network Connectivity Using Ping and Telnet |
|
|
81 | (4) |
|
Collecting Real-Time Information Using Cisco IOS debug Commands |
|
|
85 | (1) |
|
Diagnosing Hardware Issues Using Cisco IOS Commands |
|
|
86 | (1) |
|
|
87 | (1) |
|
Checking Memory Utilization |
|
|
88 | (1) |
|
|
89 | (3) |
|
|
92 | (2) |
|
|
94 | (5) |
|
Chapter 5 Using Specialized Maintenance and Troubleshooting Tools |
|
|
99 | (18) |
|
Categories of Troubleshooting Tools |
|
|
100 | (1) |
|
Traffic-Capturing Features and Tools |
|
|
101 | (4) |
|
|
102 | (1) |
|
|
103 | (2) |
|
Information Gathering with SNMP |
|
|
105 | (2) |
|
Information Gathering with NetFlow |
|
|
107 | (2) |
|
Network Event Notification |
|
|
109 | (4) |
|
|
113 | (1) |
|
|
114 | (3) |
|
Chapter 6 Troubleshooting Case Study: SECHNIK Networking |
|
|
117 | (56) |
|
SECHNIK Networking Trouble Ticket 1 |
|
|
118 | (16) |
|
Troubleshooting PCTs Connectivity Problem |
|
|
118 | (1) |
|
|
119 | (1) |
|
Analyzing Information, Eliminating Causes, and Gathering Further Information |
|
|
119 | (2) |
|
|
121 | (1) |
|
Testing the Hypotheses and Solving the Problem |
|
|
121 | (1) |
|
Troubleshooting Ethernet Trunks |
|
|
122 | (1) |
|
Troubleshooting PC2's Connectivity Problem |
|
|
123 | (1) |
|
|
124 | (2) |
|
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem |
|
|
126 | (1) |
|
|
127 | (1) |
|
Troubleshooting PC3's Connectivity Problem |
|
|
128 | (1) |
|
|
129 | (1) |
|
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis |
|
|
129 | (1) |
|
Troubleshooting Network Device Interfaces |
|
|
130 | (1) |
|
Troubleshooting PC4's IPv6 Connectivity Problem |
|
|
131 | (1) |
|
|
131 | (1) |
|
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis |
|
|
132 | (1) |
|
Troubleshooting IPv6 Address Assignment on Clients |
|
|
133 | (1) |
|
SECHNIK Networking Trouble Ticket 2 |
|
|
134 | (18) |
|
Troubleshooting PC1's Internet Connectivity Problem |
|
|
134 | (1) |
|
|
135 | (2) |
|
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem |
|
|
137 | (1) |
|
Troubleshooting Network Layer Connectivity |
|
|
138 | (3) |
|
Troubleshooting PC2's SSH Connectivity Problem |
|
|
141 | (1) |
|
Verifying and Defining the Problem |
|
|
141 | (1) |
|
|
142 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
143 | (2) |
|
|
145 | (1) |
|
Troubleshooting PC4's DHCP Address Problem |
|
|
146 | (1) |
|
Verifying and Defining the Problem |
|
|
146 | (1) |
|
|
147 | (1) |
|
Proposing a Hypothesis, Testing a Hypothesis, and Solving the Problem |
|
|
148 | (3) |
|
Troubleshooting Error-Disabled Ports |
|
|
151 | (1) |
|
SECHNIK Networking Trouble Ticket 3 |
|
|
152 | (14) |
|
Troubleshooting PCI and PC2's Internet Connectivity Issues |
|
|
153 | (1) |
|
Verifying and Defining the Problem |
|
|
153 | (1) |
|
|
153 | (4) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (1) |
|
The passive-interface Command |
|
|
161 | (1) |
|
Troubleshooting PC3's Internet Connectivity Issues |
|
|
162 | (1) |
|
Verifying and Defining the Problem |
|
|
162 | (1) |
|
|
162 | (2) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (3) |
|
|
169 | (4) |
|
Chapter 7 Troubleshooting Case Study: TINC Garbage Disposal |
|
|
173 | (84) |
|
TINC Garbage Disposal Trouble Ticket 1 |
|
|
174 | (19) |
|
Troubleshooting Lack of Backup Internet Connectivity Through GW2 |
|
|
174 | (2) |
|
|
176 | (2) |
|
Analyzing Information, Eliminating Possibilities, and Proposing a Hypothesis |
|
|
178 | (1) |
|
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem |
|
|
178 | (3) |
|
Troubleshooting BGP Neighbor Relationships |
|
|
181 | (1) |
|
Troubleshooting PCTs Connectivity Problem |
|
|
182 | (1) |
|
|
182 | (1) |
|
Analyzing Information and Gathering Further Information |
|
|
183 | (1) |
|
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem |
|
|
184 | (2) |
|
Troubleshooting Port Security |
|
|
186 | (1) |
|
Troubleshooting PC2's Connectivity Problem |
|
|
187 | (1) |
|
|
188 | (2) |
|
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
TINC Garbage Disposal Trouble Ticket 2 |
|
|
193 | (19) |
|
Troubleshooting GW1's OSPF Neighbor Relation Problem with Router R1 |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (5) |
|
Analyzing Information, Eliminating Possibilities, and Proposing a Hypothesis |
|
|
199 | (1) |
|
Testing the Hypothesis and Solving the Problem |
|
|
199 | (2) |
|
Troubleshooting OSPF Adjacency |
|
|
201 | (1) |
|
Troubleshooting Secure Shell Version 2 Access to Router R2 from PC4 |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
204 | (1) |
|
|
205 | (1) |
|
Troubleshooting SSH and Telnet |
|
|
206 | (1) |
|
Troubleshooting Duplicate Address Problem Discovered Through R1 and R2's Log Messages |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (3) |
|
Analyzing the Information and Proposing a Hypothesis |
|
|
210 | (1) |
|
Testing the Hypothesis and Solving the Problem |
|
|
210 | (1) |
|
|
211 | (1) |
|
TINC Garbage Disposal Trouble Ticket 3 |
|
|
212 | (19) |
|
Troubleshooting Sporadic Internet Connectivity Problem Experienced by Users of PCI and PC2 |
|
|
212 | (1) |
|
Verifying and Defining the Problem |
|
|
213 | (1) |
|
|
213 | (2) |
|
Analyzing Information and Proposing a Hypothesis |
|
|
215 | (2) |
|
Testing the Hypothesis and Solving the Problem |
|
|
217 | (1) |
|
Troubleshooting Erroneous Routing Information |
|
|
218 | (2) |
|
Troubleshooting Multiple Masters within a VRRP |
|
|
220 | (1) |
|
Verifying and Defining the Problem |
|
|
220 | (1) |
|
|
221 | (1) |
|
Analyzing the Information and Proposing a Hypothesis |
|
|
222 | (1) |
|
Testing the Hypothesis, and Solving the Problem |
|
|
222 | (2) |
|
|
224 | (1) |
|
Troubleshooting EtherChannel Between ASW4 and ASW3 |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
227 | (1) |
|
|
228 | (1) |
|
Troubleshooting EtherChannel |
|
|
229 | (2) |
|
TINC Garbage Disposal Trouble Ticket 4 |
|
|
231 | (21) |
|
Troubleshooting Inconsistent and Sporadic Internet Connectivity Problem Experienced By Users of PCI and PC2 |
|
|
231 | (1) |
|
Verifying and Defining the Problem |
|
|
232 | (1) |
|
|
233 | (2) |
|
Analyzing Information and Proposing a Hypothesis |
|
|
235 | (1) |
|
|
235 | (4) |
|
|
239 | (2) |
|
|
241 | (1) |
|
Troubleshooting Sporadic Loss of Connectivity on PC4 |
|
|
242 | (1) |
|
Verifying the Problem and Making a Troubleshooting Plan |
|
|
242 | (1) |
|
|
242 | (2) |
|
Analyzing the Information and Gathering Further Information |
|
|
244 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
245 | (1) |
|
|
246 | (2) |
|
The Cisco IOS DHCP Snooping Feature |
|
|
248 | (1) |
|
Cisco Technical Assistance Center |
|
|
248 | (1) |
|
Troubleshooting SSH Connection from PC4 to Router GW2 |
|
|
249 | (1) |
|
Verifying the Problem and Making a Troubleshooting Plan |
|
|
249 | (1) |
|
|
250 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (3) |
|
|
255 | (2) |
|
Chapter 8 Troubleshooting Case Study: PILE Forensic Accounting |
|
|
257 | (76) |
|
PILE Forensic Accounting Trouble Ticket 1 |
|
|
258 | (16) |
|
Troubleshooting PILE's Branch Connectivity to HQ and the Internet |
|
|
258 | (1) |
|
Verifying and Defining the Problem |
|
|
258 | (2) |
|
|
260 | (4) |
|
|
264 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
264 | (1) |
|
|
265 | (1) |
|
Troubleshooting EIGRP Adjacency |
|
|
266 | (1) |
|
Troubleshooting PILE's Secondary Internet Connection Through ISP2 |
|
|
267 | (1) |
|
Verifying and Defining the Problem |
|
|
267 | (1) |
|
|
268 | (2) |
|
Analyzing Information and Proposing a Hypothesis |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
273 | (1) |
|
PILE Forensic Accounting Trouble Ticket 2 |
|
|
274 | (13) |
|
Troubleshooting Telnet Problem: From PC3 to BR |
|
|
274 | (1) |
|
|
275 | (1) |
|
Troubleshooting PILE Network's Internet Access Problem |
|
|
275 | (1) |
|
Verifying and Defining the Problem |
|
|
276 | (1) |
|
|
276 | (2) |
|
Analyzing Information, Eliminating Causes, and Gathering Further Information |
|
|
278 | (2) |
|
Proposing and Testing a Hypothesis |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Troubleshooting PILE Network's NTP Problem |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Analyzing the Gathered Information and Gathering Further Information |
|
|
284 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
PILE Forensic Accounting Trouble Ticket 3 |
|
|
287 | (15) |
|
Troubleshooting PC3's Lack of Internet Connectivity After the Disaster Recovery |
|
|
287 | (1) |
|
|
288 | (1) |
|
Gathering Information (First Run) |
|
|
288 | (1) |
|
Analyzing Information, Proposing, and Testing the First Hypothesis |
|
|
289 | (1) |
|
Proposing and Testing the Second Hypothesis |
|
|
290 | (2) |
|
Gathering Further Information (Second Run) |
|
|
292 | (1) |
|
Proposing and Testing the Third Hypothesis |
|
|
293 | (1) |
|
|
294 | (1) |
|
Disaster Recovery Best Practices |
|
|
294 | (2) |
|
Troubleshooting Inter-VLAN Routing |
|
|
296 | (1) |
|
Troubleshooting PC4's Problem Accessing Cisco.com |
|
|
297 | (1) |
|
Verify the Problem and Select an Approach |
|
|
297 | (1) |
|
Gather Information and Analyze the Information |
|
|
298 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
Remote Device Management Notes |
|
|
301 | (1) |
|
PILE Forensic Accounting Trouble Ticket 4 |
|
|
302 | (11) |
|
Troubleshooting Branch Site Internet Connectivity Problem After EIGRP Reconfiguration |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
Gathering Further Information and Analyzing Information |
|
|
303 | (2) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
305 | (2) |
|
|
307 | (1) |
|
The EIGRP Stub Configuration |
|
|
308 | (1) |
|
The New EIGRP Named Configuration |
|
|
309 | (1) |
|
Troubleshooting Management Access to ASW2 |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
311 | (1) |
|
|
312 | (1) |
|
Providing a Default Route on Layer 2 And Multilayer Devices |
|
|
313 | (1) |
|
PILE Forensic Accounting Trouble Ticket 5 |
|
|
313 | (13) |
|
Troubleshooting the Redundant Internet Access Path Through the New HQ0 Edge Router |
|
|
314 | (1) |
|
Verifying and Defining the Problem |
|
|
314 | (1) |
|
|
315 | (3) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
318 | (1) |
|
|
319 | (2) |
|
Troubleshooting BGP Route Selection |
|
|
321 | (1) |
|
Troubleshooting Unauthorized Telnet Access |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
Gathering Further Information and Analysis Information |
|
|
323 | (1) |
|
Proposing a Hypothesis and Testing the Hypothesis |
|
|
324 | (1) |
|
|
325 | (1) |
|
Securing the Management Plane |
|
|
325 | (1) |
|
|
326 | (3) |
|
|
329 | (4) |
|
Chapter 9 Troubleshooting Case Study: Bank of POLONA |
|
|
333 | (64) |
|
Bank of POLONA Trouble Ticket 1 |
|
|
334 | (15) |
|
Troubleshooting PC3's Lack of Connectivity to SRV2 |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (2) |
|
Analyzing Information and Proposing a Hypothesis, and Testing the Hypothesis |
|
|
338 | (1) |
|
|
339 | (1) |
|
Troubleshooting Redistribution |
|
|
339 | (1) |
|
Troubleshooting VRRP with Interface Tracking |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
Analyzing the Information |
|
|
342 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
Troubleshooting IP SLA Test Not Starting |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Bank of POLONA Trouble Ticket 2 |
|
|
349 | (15) |
|
Troubleshooting Summarization Problem on BR3 |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
351 | (1) |
|
|
352 | (1) |
|
Troubleshooting EIGRP Summarization |
|
|
353 | (1) |
|
Troubleshooting PCO's IPv6 Internet Connectivity |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (2) |
|
|
356 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Troubleshooting Branch 3's IPv6 Internet Connectivity |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (2) |
|
|
361 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
361 | (1) |
|
|
362 | (1) |
|
Troubleshooting Access Control Lists |
|
|
362 | (2) |
|
Bank of POLONA Trouble Ticket 3 |
|
|
364 | (14) |
|
Troubleshooting Branch Ts IP Connectivity to the Headquarters |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
366 | (1) |
|
Gathering Further Information |
|
|
367 | (1) |
|
Proposing and Testing Another Hypothesis |
|
|
367 | (1) |
|
|
368 | (1) |
|
Troubleshooting GRE Tunnels |
|
|
368 | (1) |
|
Troubleshooting Branch 3's Route Summarization |
|
|
369 | (1) |
|
Verifying the Problem and Choosing an Approach |
|
|
369 | (1) |
|
|
370 | (3) |
|
Analyzing the Information and Proposing a Hypothesis |
|
|
373 | (1) |
|
Testing the Hypothesis and Solving the Problem |
|
|
373 | (1) |
|
OSPF Summarization Tips and Commands |
|
|
374 | (1) |
|
Troubleshooting AAA Authentication on the Branch 1 Router |
|
|
375 | (1) |
|
Verifying the Problem and Choosing an Approach |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Testing the Hypothesis and Solving the Problem |
|
|
376 | (1) |
|
|
377 | (1) |
|
Bank of POLONA Trouble Ticket 4 |
|
|
378 | (13) |
|
Troubleshooting PCO's Connectivity to IPv6 Internet |
|
|
378 | (1) |
|
Verifying the Problem and Choosing an Approach |
|
|
378 | (1) |
|
|
379 | (2) |
|
Analyzing the Information and Proposing and Testing a Hypothesis |
|
|
381 | (1) |
|
Gathering Further Information |
|
|
382 | (1) |
|
Analyzing Information and Proposing and Testing Another Hypothesis |
|
|
383 | (1) |
|
|
384 | (1) |
|
Troubleshooting OSPF for IPv6 |
|
|
385 | (1) |
|
Troubleshooting the Dysfunctional Totally Stubby Branch Areas |
|
|
386 | (1) |
|
Verifying the Problem and Choosing an Approach |
|
|
386 | (1) |
|
|
387 | (2) |
|
|
389 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (3) |
|
|
394 | (3) |
|
Chapter 10 Troubleshooting Case Study: RADULKO Transport |
|
|
397 | (54) |
|
RADULKO Transport Trouble Ticket 1 |
|
|
398 | (13) |
|
Mitigating Unauthorized Switches Added by Employees |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Proposing a Hypothesis and Solving the Problem |
|
|
400 | (1) |
|
Troubleshooting Spanning Tree Protocol |
|
|
401 | (2) |
|
Troubleshooting Policy-Based Routing |
|
|
403 | (1) |
|
Verifying and Defining the Problem |
|
|
404 | (1) |
|
|
404 | (1) |
|
Analyzing the Information |
|
|
405 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
Troubleshooting Neighbor Discovery |
|
|
407 | (1) |
|
Verifying and Defining the Problem |
|
|
408 | (1) |
|
|
408 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
409 | (1) |
|
|
409 | (1) |
|
Troubleshooting CDP and LLDP |
|
|
410 | (1) |
|
RADULKO Transport Trouble Ticket 2 |
|
|
411 | (13) |
|
Troubleshooting VLANs and PCs Connectivity Problems |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
Analyzing the Information |
|
|
413 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
Troubleshooting Branch Router's IPv6 Problems |
|
|
416 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
418 | (1) |
|
|
418 | (1) |
|
Troubleshooting EIGRP for IPv6 |
|
|
419 | (1) |
|
Troubleshooting MP-BGP Session Problem |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
Analyzing the Information and Proposing a Hypothesis |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
RADULKO Transport Trouble Ticket 3 |
|
|
424 | (9) |
|
Troubleshooting PCTs Problem Accessing the SRV Server at the Distribution Center |
|
|
424 | (1) |
|
Verifying and Defining the Problem |
|
|
424 | (1) |
|
|
425 | (3) |
|
|
428 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
428 | (1) |
|
|
429 | (1) |
|
Troubleshooting the OSPFv3 Address Families Feature |
|
|
429 | (1) |
|
Troubleshooting OSPFv3 Authentication |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
432 | (1) |
|
|
433 | (1) |
|
RADULKO Transport Trouble Ticket 4 |
|
|
433 | (11) |
|
Troubleshooting Undesired External OSPF Routes in DST's Routing Table |
|
|
434 | (1) |
|
Verifying and Defining the Problem |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
437 | (2) |
|
|
439 | (1) |
|
Troubleshooting PCs IPv6 Internet Access |
|
|
440 | (1) |
|
|
440 | (1) |
|
|
440 | (2) |
|
|
442 | (1) |
|
Proposing and Testing a Hypothesis |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (4) |
|
|
448 | (3) |
|
Appendix A Answers to Review Questions |
|
|
451 | (2) |
Index |
|
453 | |