5- en_ROUTE_v7_Ch05.pdf

December 4, 2016 | Author: mariana | Category: N/A
Share Embed Donate


Short Description

Download 5- en_ROUTE_v7_Ch05.pdf...

Description

Implementing Cisco IP Routing (ROUTE)

Chapter 5: Implementing Path Control

Elaborated by: Ing. Ariel Germán For: ITLA Based on: Foundation Learning Guide CCNP ROUTE 300-101 Diane Teare, Bob Vachon, Rick Graziani 2015 ROUTE v6 Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

1

Chapter 5 Topics  Using Cisco Express Forwarding Switching  Understanding Path Control  Summary

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

2

Using Cisco Express Forwarding Switching

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

3

 Upon completing this section, you will be able to do the following: • Describe the different switching mechanisms that a Cisco router uses • Describe how Cisco Express Forwarding (CEF) works

• Describe how to verify that CEF is working • Describe how to verify the content of the CEF tables • Describe how to enable and disable CEF by interface and globally

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

4

Control and Data Plane  The exchange of routing protocol information is performed in the control plane by the route processor.  Data packets are forwarded in the data plane by an interface microcoded processor.  Control plane and data plane are relatively independent.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

5

Cisco Switching Mechanisms

 Process switching

Chapter 5

• Is the slowest method. • Every packet is examined by the CPU in the control plane and all forwarding decisions are made in software. • It greatly degrades performance and is generally used only as a last resort or during troubleshooting. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

6

Cisco Switching Mechanisms

 Fast switching • Is faster than process switching. • The first packet is process switched, subsequent frames in the flow arrive, the destination is found in the hardware fast-switching cache and the frames are then forwarded without interrupting the CPU. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

7

Cisco Switching Mechanisms

 Cisco Express Forwarding • Is the fastest method. • Two tables are created beforehand: Forwarding Information Base (FIB) and adjacency table. • The contain all the information the router need to consider when forwarding the packet. 8

Chapter 5

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

Process and Fast Switching  An EIGRP update containing a new route to 10.0.0.0/8 is added to the EIGRP topology table.

 Process switching might trigger an ARP request or find the Layer 2 address in the ARP cache.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

9

Cisco Express Forwarding  It caches the information that is generated by the Layer 3 routing engine even before the router encounters any data flows.  The control plane is responsible for building the FIB table and adjacency tables in software.  The data plane is responsible for forwarding IP unicast traffic using hardware.  The FIB is arranged for maximum lookup speed (most specific entry first).

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Cisco Express Forwarding

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

11

Analyzing Cisco Express Forwarding

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

12

Analyzing Cisco Express Forwarding

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Analyzing Cisco Express Forwarding

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

14

Enable and Disable CEF by Interface and Globally

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

15

Understanding Path Control

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

16

 Upon completing this section, you will be able to do the following: • Identify the need for path control. • Describe how to use policy-based routing (PBR) to control path selection. • Describe how to use IP service-level agreement (IP SLA) to control path selection.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

17

The Need for Path Control  Path control is required to avoid performance issues and to optimize paths.

 Path control tools can be used to change the default destination forwarding and optimize the path of the packets for some specific application.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Implementing Path Control Using Policy-Based Routing  PBR enables the administrator to define a routing policy other than basic destination-based routing using the routing table.  With PBR, route maps can be used to match source and destination addresses, protocol types, and end-user applications.  When a match occurs, a set command can be used to define items, such as the interface or next-hop address to which the packet should be sent.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

19

PBR Features  PBR adds flexibility in a difficult-to-manage environment by providing the ability to route traffic that is based on network needs.

 Benefits of implementing PBR in a network include the following: • • • •

Source-based transit-provider selection QoS Cost savings Load sharing

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Steps for Configuring PBR 1. Enable PBR by configuring a route map using the route-map global configuration command. 2. Implement the traffic-matching configuration, specifying which traffic will be manipulated. This is done using the match commands. 3. Define the action for the matched traffic. This is done using the set commands. 4. Optionally, fast-switched PBR or CEF-switched PBR can be enabled. 5. Apply the route map to incoming traffic or to traffic locally generated on the router.

6. Verify PBR configuration with basic connectivity and path verification commands

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

21

Configuring PBR  The route-map map-tag [permit | deny] [sequencenumber] global configuration command is used to create a route map. • If the statement is marked as permit, packets that meet all the match criteria are policy-based routed. • If the statement is marked as deny, packet meeting the match criteria is not policy-based routed. Instead, it is sent through the normal forwarding channels and destination-based routing. • If no match is found in the route map, the packet is not dropped. It is forwarded through the normal routing channel • Note: To drop a packet, forward it to the interface null 0. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

22

PBR match Commands  The match condition route map configuration commands are used to define the conditions to be checked. • match ip address {access-list-number | name} [...access-list-number | name] | prefix-list prefix-list-name [..prefix-list-name] • match length min max Matches based

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

23

PBR set Commands  If the match statements are satisfied, you can use the set ip next-hop or set interface commands. • set ip next-hop ip-address [...ip-address] • set interface type number [...type number]

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Configuring PBR on an Interface  To identify a route map to use for policy routing on an interface, use the ip policy route-map map-tag interface configuration command.  Remember that policy-based routing is configured on the interface that receives the packets, not on the interface from which the packets are forwarded.

 Packets originating on the router are not normally policy routed.  To identify a route map to use for local policy routing, use the ip local policy route-map map-tag global configuration command. • This command applies the specified route map to packets originating on the router. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

25

Verifying PBR  To display the route maps used for policy routing on the router’s interfaces, use the show ip policy EXEC command.

 To display configured route maps, use the show route-map [map-name] EXEC command.  Use the debug ip policy EXEC command to display IP policy routing packet activity.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

26

Configuring PBR Example

 In the example, you will: • Verify normal traffic paths as selected by the traditional destinationbased routing. • Configure PBR to alter the traffic flow for one client station. • Verify both the PBR configuration and the new traffic path Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

27

Verify Normal Traffic Paths

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

28

Configure PBR to Alter the Traffic Flow from the Notebook

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

29

Verify the PBR Configuration and Traffic Path

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

30

Verify the PBR Configuration and Traffic Path

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

31

Verify the PBR Configuration and Traffic Path

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

32

Verify the PBR Configuration and Traffic Path

Notebook

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

33

Implementing Path Control Using Cisco IOS IP SLAs  PBR is a static path control mechanism.  It cannot respond dynamically to changes in network health.

 If a policy states that when packet loss on primary exceeds 5%, backup should be used, It can´t be done with PBR alone. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

34

IP SLA Features  Cisco IOS IP SLAs perform network performance measurement within Cisco devices.  Cisco IOS IP SLAs actively send simulated data across the network to measure performance between multiple network locations or across multiple network paths.  The information collected includes data about: • • • • • • • •

Response time One-way latency Jitter Packet loss Voice-quality scoring Network resource availability Application performance Server response time.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

35

Cisco IOS IP SLA Sources and Targets  All the IP SLA measurement probe operations are configured on the IP SLAs source, such as a Cisco IOS router.

 If the target is another Cisco IOS device, the target can be configured as an IP SLA responder. A responder can provide accurate measurements without the need for dedicated probes or any complex or per-operation configuration.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

36

Cisco IOS IP SLA Operations  An IP SLA operation is a measurement that includes protocol, frequency, traps, and thresholds.  This operation can be used with both types of target devices (source and responder).  When the operation is finished and the response has been received, the results are stored in the IP SLA MIB on the source.  These results can be retrieved and viewed using command line interface (CLI) commands or using Simple Network Management Protocol (SNMP). Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

37

Cisco IOS IP SLA Operation with Responders  Using an IP SLA responder provides enhanced measurement accuracy and additional statistics that are not otherwise available via standard ICMP-based measurement.  When a network manager configures an IP SLA operation on the IP SLA source, reaction conditions can also be defined.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

38

Steps for Configuring IP SLAs  The following steps are required to configure Cisco IOS IP SLAs functionality: 1. Define one or more IP SLA operations (or probes). 2. Define one or more tracking objects to track the state of IOS IP SLA operations. 3. Define the action associated with the tracking object.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

39

Step 1: Configuring Cisco IOS IP SLA Operations  Use the ip sla operation-number global configuration command to begin configuring a Cisco IOS IP SLA operation and to enter IP SLA configuration mode.  The operation-number is the identification number of the IP SLA operation to be configured.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

40

IP SLA Configuration Mode Commands

 The focus of this section is on the icmp-echo command  The complete command syntax is: • icmp-echo {destination-ip-address | destination-hostname} [sourceip {ip-address | hostname} | source-interface interface-name]. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

41

IP SLA ICMP Echo Configuration Mode Commands

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

42

Schedule the IP SLA Operation  Once a Cisco IP SLA operation is configured, it needs to be scheduled using the ip sla schedule global configuration command.

 The complete command syntax is • ip sla schedule operation-number [life {forever | seconds}] [starttime {hh:mm [:ss] [month day | day month] | pending | now | after hh:mm:ss}] [ageout seconds] [recurring]

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

43

Step 2: Configuring Cisco IOS IP SLA Tracking Objects  Use the global configuration command: • track object-number ip sla operation-number {state | reachability}

 Use this optional command to specify the period of time to delay communicating states changes: • delay {up seconds [down seconds] | [up seconds] down seconds}

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

44

Step 3: Defining an Action Associated with a Tracking Object  Many types of actions can be associated with a tracked object.  A simple path control action is to use the global configuration command: • ip route prefix mask {ip-address | interface-type interface-number [ipaddress]} [track number]

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

45

Configuring IP SLA Example

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

46

Configuring an IP SLA Operation with the ISP 1 DNS Server

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

47

Defining a Tracking Object and Assigning an Action

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

48

Configuring an IP SLA Operation with the ISP 2 DNS Server

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

49

Configuring an IP SLA Operation with the ISP 2 DNS Server

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

50

Configuring PBR and IP SLA Example

-Web traffic to the HQ site should be redirected over the serial link. -All other traffic from Notebook should go via BR2 but only if BR2 is reachable. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

51

Redirecting Web Traffic from BR1 to HQ Using PBR

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

52

Redirecting Web Traffic from BR1 to HQ Using PBR

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

53

Ensuring That BR2 Is Reachable Using IP SLA

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

54

Redirect Traffic from Notebook to BR2 If Reachable

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

55

Verifications

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

56

Verifications

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

57

Verifications

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

58

Summary

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

59

Summary  Packet-switching mechanisms on a Cisco IOS platform, including process switching, fast switching, and CEF switching.  Overview of path control tools, including PBR and Cisco IOS IP SLAs.  Using PBR to control path selection, providing benefits including source-based transit provider selection, QoS, cost savings, and load sharing.  PBR is applied to incoming packets; enabling PBR causes the router to evaluate all packets incoming on the interface using a route map configured for that purpose. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

60

Summary  Configuring and verifying PBR, including the following steps: • Choose the path control tool to use; for PBR, route-map commands are used • Implement the traffic-matching configuration, specifying which traffic will be manipulated; match commands are used within route maps • Define the action for the matched traffic, using set commands within route maps • Apply the route map to incoming traffic or to traffic locally generated on the router • Verify path control results, using show commands

 Cisco IOS IP SLAs, which use active traffic monitoring, generating traffic in a continuous, reliable, and predictable manner, to measure network performance. Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

61

Summary  Cisco IOS IP SLA terminology, including the following: • All the Cisco IOS IP SLA measurement probe operations are configured on the IP SLA source. • There are two types of IP SLA operations: those in which the target device is running the IP SLA responder component. • An IP SLA operation is a measurement that includes protocol, frequency, traps, and thresholds.

 Configuring and verifying IOS IP SLAs.

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

62

Chapter 5 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

63

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF