1- en_ROUTE_v7_Ch01.pdf

December 4, 2016 | Author: mariana | Category: N/A
Share Embed Donate


Short Description

Download 1- en_ROUTE_v7_Ch01.pdf...

Description

Implementing Cisco IP Routing (ROUTE)

Chapter 1: Basic Network and Routing Concepts

Elaborated by: Ing. Ariel Germán For: ITLA Based on: Foundation Learning Guide CCNP ROUTE 300-101 Diane Teare, Bob Vachon, Rick Graziani 2015 ROUTE v6 Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

1

Chapter 1 Topics      

Differentiating Routing Protocols Understanding Network Technologies Connecting Remote Locations with Headquarter Routing and TCP/IP operations Implementing RIPng Summary

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

2

Differentiating Routing Protocols

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

3

Enterprise Network Infrastructure  Enterprise Campus  Enterprise Edge

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

4

Role of Dynamic Routing Protocols

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

5

Choosing a Dynamic Routing Protocol  Input requirements: • Size of the network • Multivendor support • Knowledge level of specific protocol

 Protocol characteristics: • Type of routing algorithm • Speed of convergence • Scalability

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

6

IGP versus EGP  (Autonomous system (AS) represents a collection of network devices under a common administration).  Interior Gateway Protocols (IGPs): • Are used within the organization, and exchange routes within an AS. • Fast convergence, not complex to configure. • RIP, EIGRP, OSPF, IS-IS

 Exterior Gateway Protocols (EGPs): • Exchange routes between different ASs. • Border Gateway Protocol (BGP) is the only EGP used today. • BGP is the routing protocol of the Internet.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

7

Types of Routing Protocol 1/2  Distance vector protocols: • Determines the direction (vector) and distance (link cost or number of hops) to any link in the network. • Router only knows the distance or metric and the interface to get there. • RIPv1 and IGRP used only the periodic exchange of routing information for a topology change • EIGRP and RIPv2, used triggered updates.

 Link-state protocols: • Use the Shortest Path First (SPF) to create an abstract of the topology of the entire network or a area. • All link-state routers have an identical “map” of the topology. • OPF and IS-IS are examples.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

8

Types of Routing Protocol 2/2  Path Vector Protocols: • Exchange information about destination networks, and the path on how to reach them. • Don’t have an abstract of the network topology. • BGP is the only path vector protocol widely used.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

9

Convergence  Process of when routers notice a change in the network, exchange information and recalculate the best routes.  Converged network: All routers have the same view on the network topology.  Convergence time can be influenced: • Fine-tuning routing protocols timers (increases traffic, overhead, CPU utilization in routers). • Route summarization (less networks to update).

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Route Summarization  Group several subnets into one aggregate entry that describes all of them.  Reduce overhead and improve stability and scalability by reducing amount of routing information exchanged.  Distance vector protocols support summarization in any interface, but link states support it only at area boundaries.  IP addressing must be hierarchically assigned in contiguous blocks across the network.

What is the summarized network? Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

11

Routing Protocol Scalability  Scalability describes the ability of a routing protocol to support further network growth.  Scalability factors: • • • • • •

Number of routes Number of adjacent neighbors Number of routers in the network Network design Frequency changes Available resources (CPU and memory)

 Hierarchical addressing, structured address assignment, and route summarization improves the overall scalability.  Routing protocols have their own mechanisms: • OSPF: hierarchical areas • EIGRP: stubs routers

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

12

Understanding Network Technologies

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Traffic Types 1/2  Unicast: • Exchanged only between one sender and one receiver. • Most used traffic type

 Multicast: • Traffic sent to a multicast address is sent to multiple destinations at the same time. • An interface my belong to any number of multicast groups • IPv4: 224.0.0.0 – 239.255.255.255 • IPv6: FF00::/8

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

14

Traffic Types 2/2  Anycast: • Traffic sent to anycast address is routed to the nearest interface that has this particular address. • Nearest interface is found according the measure of distance of the routing protocol used. • Example: DNS

 Broadcast: • • • •

Only used in IPv4 Information is transmitted from one sender to all connected receivers. Local broadcast address: 255.255.255.255 Directed broadcast: last IPv4 address in each subnet.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

15

IPv6 Address Types 1/2

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

16

IPv6 Address Types 2/2  Global Unicast: equivalent to public IP address in IPv4.  Link Local: automatically or manually configured. Not routable.  Assigned Multicast: Similar to well-known multicast addresses in IPv4.  Solicited node Multicast: Used by ICMPv6 Neighbor Discovery. Similar to ARP for IPv4.  Loopback: Used for testing.  Unspecified: Used as source IPv6 address indicating absence of Global Unicast address.  Unique Local: equivalent to private IP address un IPv4  Embedded IPv4: Used to represent the IPv6 equivalent of a IPv4 address. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

17

ICMPv6 Neighbor Discovery  ICMPv6 is similar to ICMPv4  ICMPv6 provides automatic address allocation, address resolution, and duplicate address detection.  ICMPv6 Neighbor Discovery includes five messages: • Router Solicitation (RS): Multicast sent to all IPv6 routers requesting a Router Advertisement message. • Router Advertisement (RA): Response to a RS Indicating prefix, prefix-length and default gateway address. • Neighbor Solicitation (NS): Similar to ARP for IPv4. • Neighbor Advertisement (NA): Response of a NS message. • Redirect: Sent by a router to inform a better next-hop router on the link.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Network Types 1/2  Point-to-point network: • Connects a single pair of routers • Example: A serial link

 Broadcast network: • Connects many routers • All are reachable through one single address • Example: Ethernet

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

19

Network Types 2/2  Nonbroadcast Multiaccess (NBMA) networks: • Support many routers. • Does not have broadcast capabilities. • Sender needs to create an individual copy of the same packet for each router. • Introduce several challenges. • Examples: Frame Relay and Asynchronous Transfer Mode (ATM).

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

20

NBMA Networks 1/3  Can use a variety of topologies. Hub-and-spoke or partial mesh is the most common.  Frame Relay is the most common example of NBMA technology.  If multipoint interface is used to connect multiple sites, some issues arise: • Split Horizon: In distance vector protocols, the hub receives the update in its physical interface but cannot forward it through the same interface to the other spokes.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

21

NBMA Networks 2/3 • Neighbor discovery: OSPF over NBMA does not discover neighbors by default. You have to configure them and manually establish the hub as the Designated Router (DR).

• Broadcast replication: The hub router must replicate broadcast packets on each PVC to the remote routes.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

22

NBMA Networks 3/3  Subinterfaces overcome these limitations. There are two types: • Point-to-point subinterfaces: Each subinterface provides connectivity between two routers, using its own subnet.

• Point-to-multipoint subinterfaces: One single subnet is used. EIGRP and OSPF need additional configuration. Point-to-point are preferred. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

23

Routing over the Internet  IGP are not used to establish connections over the Internet for the following reasons: • All IGPs need to establish adjacencies with directly connected neighbors. • Organizations typically use private IP addressing. • Internet is insecure by nature.

 To overcome these limitations, tunneling techniques can be used. They´re generally named Virtual Private Networks (VPNs).  Most VPN technologies support routing protocols.  Adjacencies can be established using tunnel interfaces.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Connecting Remote Locations with Headquarters

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

25

 To connect remote locations, leased lines and Frame Relay are not longer needed.  Multiprotocol Label Switching (MPLS) VPNs and Dynamic Multipoint Virtual Private Network (DMVPN) are widespread.  MPLS and DMVPN offer greater flexibility at a lower cost.  Routing protocols considerations needs to be taken.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

26

Principles of Static Routing 1/2  A static route can be used when: • • • •

Routing updates are undesirables, such as in dialup link. Administrator needs total control over the routes. Backup to a dynamically recognized route. Is necessary to reach a network accessible by only one path (stub network).

• Router connects to a ISP and needs to have only a default route pointing to it. • Router has few resources (CPU and memory).

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

27

Principles of Static Routing 2/2  What are the drawbacks of static routing?

 Configuring IPv4 Static Route: • ip route prefix mask {address | interface [address]} [dhcp] [distance] [name next-hop-name] [permanent| track number] [tag tag] • Prior to IOS 12.0 it was more efficient to use the exit interface. • After IOS 12.0 (with the implementation of CEF)is now recommended to use the next-hop IP address.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

28

Configuring a Static Default Route

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

29

Basic PPP Overview  PPP has some advantages over its predecessor HLDC (default encapsulation method in serial interfaces of Cisco routers).  PPP is configured on a interface  Additional options can be used after it´s activated

R1# configure terminal R1(config)# interface serial 0/0/0

R1(config-if)# encapsulation ppp

hostname R1 !

interface Serial 0/0/0 ip address 10.0.1.1 255.255.255.252 ipv6 address 2001:db8:cafe:1::1/64 encapsulation ppp Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

30

PPP Authentication Overview 1/3     

Authentication is optional. PPP can use PAP and CHAP. PAP is very basic two-way process with no encryption. CHAP involve a three-way exchange of a shared secret. You can configure either PAP, or CHAP or both: • Router(config-if)# ppp authentication {chap | chap pap | pap chap | pap} [if-needed] [list-name | default] [callin]

 PAP authentication requires the remote device to send a name and password to be checked against its user database (or TACACS/TACACS+).

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

31

PPP Authentication Overview 2/3  The hostname on one router must match the username the other router has configured for PPP.  Password must also match. hostname R1

hostname R2

username R2 password sameone

username R1 password sameone

!

!

interface Serial 0/0/0

interface Serial 0/0/0

ip address 10.0.1.1 255.255.255.252

ip address 10.0.1.1 255.255.255.252

ipv6 address 2001:db8:cafe:1::1/64

ipv6 address 2001:db8:cafe:1::2/64

encapsulation ppp

encapsulation ppp

ppp authentication pap

ppp authentication pap

ppp pap sent-username R1 password sameone

ppp pap sent-username R2 password sameone

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

32

PPP Authentication Overview 3/3  In CHAP, the local device sends a challenge to the remote.  The remote encrypts the challenge and its name, and return it.  Local router uses the configured name of the remote, encrypt it with the challenge, and verify if the calculated and received values match.  Unlike PAP, CHAP authenticates periodically. hostname R1

hostname R2

username R2 password sameone

username R1 password sameone

!

!

interface Serial 0/0/0

interface Serial 0/0/0

ip address 10.0.1.1 255.255.255.252

ip address 10.0.1.2 255.255.255.252

ipv6 address 2001:db8:cafe:1::1/64

ipv6 address 2001:db8:cafe:1::2/64

encapsulation ppp

encapsulation ppp

ppp authentication chap

ppp authentication chap

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

33

PPPoE 1/2  ISPs value PPP because of the authentication, accounting and link management features.  Ethernet links does not support PPP, that´s why PPPoE was created.  PPPoE creates a PPP tunnel over the Ethernet connection.  The modem convers the Ethernet frames to PPP frames by stripping the Ethernet headers.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

34

PPPoE 2/2  Configuration: • Create a dialer interface (which is virtual). • Configure the dialer interface encapsulation PPP and IP address by DHCP • Enable PPPoE in the ethernet interface that faces the client. • Link the dialer interface to the ethernet • Set the MTU to 1492

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

35

Basic Frame Relay Overview  Frame Relay is a high-performance WAN protocol that operates at the physical and data link layer of OSI model.  One single physical connection is needed.  SP creates virtual circuits (VC), which are normally PVC, identified by a DLCI.  DLCI are locally significant.  A mapping between IP address and DLCI must be established.  By default, Frame Relay is NBMA. But subinterfaces are normally used.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

36

VPN Connectivity Overview  Frame Relay is being considered deprecated, for the following factors: • Cost • Deployed services • Scalability

 Next generation of VPNs support quick and easy provisioning of full mesh topologies without compromising security and scalability.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

37

MPLS-based VPN  MPLS is used to build tunnels through the service provider core network.  Traffic forwarding through the MPLS backbone is based o labels assigned by the SP.  Layer 3 MPLS: • SP participates in customer routing. • Customer routes are redistributed into MP-BGP • On the other end, are redistributed back from MP-BGP to the routing protocol used. • Routing protocols on the local and remote sites, may be different

 Layer 2 MPLS: • Interconnects PE and CE at layer 2 using a pseudowire • Two types: • Virtual Private Wire Service (VPWS): Emulates a point-to-ponit L2 connection • Virtual Private LAN Service (VPLS): emulates Ethernet multiaccess network. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

38

Tunneling VPNs  GRE • Tunneling protocol developed by Cisco • Enables encapsulation of L3 protocols inside point-to-point, tunnelover-IP network. • Traffic is not encrypted.

 IPsec • Framework that uses a set of cryptographic protocols to secure L3 traffic . • Works with any application that uses IP as a transport protocol.

 DMVPN • Used to scale IPsec hub-to-spoke and spoke-to-spoke designs in large networks. • Supports routing protocols, and multicast. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

39

Hybrid VPNs  MPLS-based VPNs and tunnel VPNs are not mutually exclusive.  Is possible to combine them and encrypt (or tunnel) the data across the service provider network. (Tunnel over a tunnel).  Examples: • Layer 3 MPLS VPN over GRE • Layer 3 MPLS over DMVPN (over IPsec).

 Provides a greater level of security.  Several layers of encapsulation increase latency and complexity.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

40

Routing Across MPLS VPNs 1/2  Depends on whether it´s L2 MPLS VPN or L3 MPLS VPN  L2 MPLS VPN: • Customer selects the routing protocol. • Customer routers (CE) establish adjacencies. • Same IP subnet is used

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

41

Routing Across MPLS VPNs 2/2  L3 MPLS VPN: • Customer and SP must agreed routing protocol(s). • Each customer router establish adjacency with a SP router (PE). • A different subnet must be used in each pair of CE-PE.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

42

Routing Over a GRE Tunnel 1/2  A tunnel is a logical interface that provides a way to encapsulate passenger packets inside a transport protocol.  A tunnel have three main parts: • A passenger protocol, that is being encapsulated. • A carrier protocol. (GRE in for GRE tunnels). • A transport protocol, that carries the encapsulated protocol.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

43

Routing Over a GRE Tunnel 2/2  GRE tunnels offer the possibility to connect branch offices across Internet or WAN.  Its main benefit: support multicast, and therefore is appropriate for routing protocols.  Does not encrypt the traffic.  IPsec can be used, creating a GRE-over-IPsec tunnel.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

44

Dynamic Multipoint Virtual Private Network  Statics tunnels may be and appropriate solution for small networks, but it´s not scalable.  The Cisco DMVPN feature enables better scaling for large (and small) IPsec VPNs.  DMVPN combines multipoint GRE (mGRE), IPsec encryption and Next Hop Resolution Protocol (NHRP).  Benefits: • Not reconfiguration needed in the hub router when a new spoke is added. • IPsec is immediately triggered to create the point-to-point tunnel with no peering configuration needed. • Support for dynamically addressed spoke routers.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

45

Multipoint GRE  mGRE enables a single GRE interface to support multiple GRE tunnels and simplifies the complexity of the configuration.  Only one tunnel interface needs to be configured on a router to support multiple remote GRE peers.  Devices using mGRE require NHRP to build dynamic GRE tunnels.  mGRE also support unicast, multicast and broadcast.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

46

NHRP  NHRP is used by routers to determine the IP address of the next hop in IP tunneling networks.  When a spoke initially connects to a DMVPN network, it registers its inner (tunnel) and outer (physical interface) address with the hub router.  This registration enables the mGRE interface on the hub router to build a dynamic GRE tunnel back to the registering spoke.  NHRP creates a mapping for a tunnel IP address to the physical interface IP address for each spoke at the hub.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

47

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

48

IPsec  Is a framework of open standards that define how to provide secure communications.  Provides four security services: • Confidentiality (encryption): The sender can encrypt the packets before transmitting them across a network. • Data Integrity: The receiver can verify that the data was not altered or changed during the transmission. Checksum is used. • Authentication: Ensures the communication is made with the desired partner. Devices and users are authenticated, by using Internet Key Exchange (IKE). IKE uses username/password, OTP, biometrics, PSK and digital certificates. • Antireplay protection: Verifies each packet is unique and not duplicated, by comparing the sequence number of the received packet. Late and duplicate packets are dropped. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

49

Routing and TCP/IP Operations

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

50

MSS, Fragmentation and PMTUD 1/3  An IPv4 packet has a maximum size of 65,535 bytes, whereas an IPv6 packet can support up to 4,294,967,295 bytes.  Most transmission links enforces a smaller Maximum Transmission Unit (MTU).  When a router receives an IPv4 larger the MTU of the interface, it must fragment the packet, unless the DF (Don´t Fragment) bit is set.  Fragmentation cause several issues: • • • •

CPU and memory overhead in the origin. CPU and memory overhead in the destination, due to reassembly. Retransmission of the entire packet if one fragment is dropped. Firewalls doing L4 – L7 filtering may have trouble processing fragments.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

51

MSS, Fragmentation and PMTUD 2/3  To avoid fragmentation, the TCP Maximum Segment Size (MSS) defines the largest amount of data the receiving device is able to accept in a single TCP segment.  The sending device is required to send segments equal to or less than the reported MSS.  TCP MSS should be the minimum buffer size, minus 40 bytes (20 bytes TCP header, 20 bytes of IP header). • Example, Ethernet MTU is 1500 bytes. MSS should be 1460.

 TCP MSS just works at the two ends of the TCP connection.  To avoid fragmentation due to smaller MTU on a link along the path, PMTUD is used. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

52

MSS, Fragmentation and PMTUD 3/3  Path MTU Discovery (PMTUD) was developed to determine the lowest MTU along a path.  Is performed by a host using MSS and setting the TCP DF bit.

 If a router along the path needs to fragment the segment (due to smaller MTU size), it will drop the packet and send an ICMP Destination Unreachable message with the code indicating “fragmentation needed and DF set” and the MTU for the interface that caused the drop.  Source receives the ICMP message and reduce the MSS to be within the MTU and retransmit the message.  If the ICMP unreachable message is blocked, issues may occur. Be sure to allow them in routers and firewalls along the patch. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

53

IPv6 Fragmentation and PMTUD  IPv6 routers don´t fragment a packet unless it is the source of the packet.  If an IPv6 router receives a packet larger the MTU of the outgoing interface, it will drop the packet and send an ICMPv6 Packet Too Big message back to the source, including the smaller MTU.  PMTUD operation for IPv6 are similar to the PMTUD for IPv4.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

54

Bandwidth Delay Product  TCP can experience bottlenecks on paths with high bandwidth and long round-trip delays. • These are known as LFN, long fat networks.

 Bandwidth Delay product (BDP) is the product of the bandwidth (bps) times the round-trip delay (RTT in seconds).  BDP is the amount of unacknowledged data that TCP must handle to keep the connection full.  BDP is used to optimize the TCP Windows size to fully utilize the link.  The result is the maximum of data can be transmitted on the link at any given time. Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

55

TCP Starvation  TCP have mechanism for reliability, flow control and congestion avoidance, whereas UDP doesn’t have these features.  When TCP and UDP flows are mixed during a period of congestion, TCP cooperate by backing off on bandwidth. However, UDP doesn’t even notice the congestion and keep using the available bandwidth given up by TCP.

 This is known as TCP starvation/UDP dominance.  Is not always possible to separate TCP / UDP based flows, but should be kept in mind this behavior when mixing applications.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

56

Latency  Latency is the amount of time for a message to go from ne point to another.  Can be caused by several factors: propagation delay, serialization, data protocols, routing, switching, queuing, and buffering.  TCP requires a established virtual connection and bidirectional communication ACKs, windows size, congestion control and so on, which has a effect on latency.  UDP does not include reliability, and is used for streaming media that requires minimum delay.  UDP has very low latency, better than most TCP connections.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

57

ICMP Redirects 1/2  These messages are used by routers to notify the sender of a packet that there is a better route available for a particular destination.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

58

ICMP Redirects 2/2  ICMPv6 Redirect message works the same way as the Redirect message for ICMpv4, with one additional feature: • If PCA wants to communicate with PCB (same segment, different networks), it will use its default gateway, R1. • R1 will send a redirect message. • PCA will forward packets directly to PCB.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

59

Implementing RIPng

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

60

RIP overview       

One of the oldest routing protocol. Standard IGP, works in mixed-vendor router environment. Easy to configure. Good choice for small networks Distance vector protocol, uses hop count as the metric. Maximum hops: 15 If a network is 16 hops or more, the router consider it unreachable.  Implements split horizon with poison reverse. Prefers a notification rather than just ignoring.  Support load balancing over equal-cost paths.  Exits three versions: RIPv1, RIPv2 and RIPng

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

61

RIPv2 Overview 1/2  Classless routing protocol

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

62

RIPv2 Overview 2/2  By default RIPv2 automatically summarizes at major network boundaries. Summarizing routes to the classful network address.

 If discontinuous subnets are used, automatic summarization must be disabled. • Router(config-router)# no auto-summary

 The ip summary-address rip ip-address network-mask interface command is used to manually summarize. • Router(config-if)# ip summary-address rip 10.2.0.0 255.255.0.0 Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

63

Configuring RIPng  RIPng is already preconfigured in R1.  There is a static default route pointing to internet in R1.  R1 will be configured to share this default route with R2 using RIPng.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

64

Basic RIPng Configuration 1/8  Enable IPv6 routing using ipv6 unicast-routing command on R2.

 Enable RIPng using ipv router rip name command.Set the process name to CCNP_RIP

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

65

Basic RIPng Configuration 2/8  On R2, enable IPv6 in interface configuration mode: • ipv6 address ipv6_address/prefix or • ipv6 enable

 Use show ipv6 interface brief to validate interfaces are up and correctly configured.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

66

Basic RIPng Configuration 3/8  On R2, enable RIPng on interface Ethernet 0/1 (connects to R1) and Loopback0 (simulates LAN).

• If you forgot to create the RIP process name, the router will automatically create one.

 Use the show ipv6 protocols to validate RIPng is correctly configured.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

67

Basic RIPng Configuration 4/8  Inspect the routing table on R2. Notice two IPv6 routes learned from R1.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

68

Basic RIPng Configuration 5/8

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

69

Basic RIPng Configuration 6/8  In RIPng, the sending router consider itself to be one hop away. Therefore, R2 considers the R1 LAN to be two hops away.  The concept of classful network doesn´t exist in IPv6, so there isn´t any automatic route summarization in RIPng. It must be done manually.  Summarize LAN addresses on R1:

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

70

Basic RIPng Configuration 7/8  Propagate the default route of R1 to R2

 On R2, verify R1 has shared its default IPv6 route

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

71

Basic RIPng Configuration 8/8  Another option is using the keyword only instead of originate.

 Check the difference in the routing table of R2

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

72

Investigating the RIPng Database 1/3  show ipv6 rip • • • •

RIP process (es) Port number Hello and dead timer Interfaces configured

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

73

Investigating the RIPng Database 2/3  show ipv6 rip database • • • •

RIP process (es) Route prefix and metric “Installed” (in the routing table) and “expired” (unavailable). “Expires in” (dead timer countdown typically three times the hello timer)

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

74

Investigating the RIPng Database 3/3  show ipv6 next-hops • • • •

RIP process (es) Next hop router IP address. Interface in which it´s connected. Number of path (routes) in the IPv6 RIP routing table using that next hop

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

75

Summary • The role of static routes and dynamic routing protocols in enterprise networks. • The differences between IGP and EGP routing protocols. • The three types of routing protocols: distance vector, link-state and path vector.

• The importance of convergence time and how route summarization reduced convergence time and improves scalability. • The four traffic types: unicast, multicast, anycast, and broadcast. • The differences between point-to-point, broadcast, and NBMA networks. • How point-to-point subinterfaces are used to overcome the limitations of NBMA networks. • How VPNs are used to provide security of a public Internet. • Common types of VPNs: MPLS-based VPNs, GRE+IPsec, and DMVPN. • How a customer establishes connectivity with a service provider using a routing protocol and a layer 3 MPLS VPN.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

76

• How static GRE tunnels can establish virtual point-to-point links and support dynamic routing protocols. • Using DMVPN to provide fully meshed VPN connectivity with a simple hub-and spoke configuration.

• How DMVPN relies on NHRP, mGRE, and IPsec. • The differences and similarities between RIPv2 and RIPng. • How to configure RIPng. • How to propagate a default route in RIPng. • Some key points in this chapter are that convergence time, support for summarization, and ability to scale impact selection of a suitable routing protocol. It is recommended that you use point-to-point subinterfaces when establishing routing protocols over NBMA networks. DMVPN can be used as a scalable solution. RIPng is asimple IGP protocol that supports IPv6.

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

77

Chapter 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

78

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF