Implementing Cisco IP Routing (ROUTE)
Chapter 1:
Basic Network and
Routing Concepts
Elaborated by: Ing. Ariel Germn
For: ITLA
Based on: Foundation Learning Guide
CCNP ROUTE 300-101
Diane Teare, Bob Vachon, Rick Graziani
2015
ROUTE v6 Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Chapter 1 Topics
Differentiating Routing Protocols
Understanding Network Technologies
Connecting Remote Locations with Headquarter
Routing and TCP/IP operations
Implementing RIPng
Summary
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Differentiating
Routing
Protocols
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Enterprise Network Infrastructure
Enterprise Campus
Enterprise Edge
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Role of Dynamic Routing Protocols
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Choosing a Dynamic Routing Protocol
Input requirements:
Size of the network
Multivendor support
Knowledge level of specific protocol
Protocol characteristics:
Type of routing algorithm
Speed of convergence
Scalability
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
IGP versus EGP
(Autonomous system (AS) represents a collection of
network devices under a common administration).
Interior Gateway Protocols (IGPs):
Are used within the organization, and exchange routes within an AS.
Fast convergence, not complex to configure.
RIP, EIGRP, OSPF, IS-IS
Exterior Gateway Protocols (EGPs):
Exchange routes between different ASs.
Border Gateway Protocol (BGP) is the only EGP used today.
BGP is the routing protocol of the Internet.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Types of Routing Protocol 1/2
Distance vector protocols:
Determines the direction (vector) and distance (link cost or number of
hops) to any link in the network.
Router only knows the distance or metric and the interface to get
there.
RIPv1 and IGRP used only the periodic exchange of routing
information for a topology change
EIGRP and RIPv2, used triggered updates.
Link-state protocols:
Use the Shortest Path First (SPF) to create an abstract of the topology
of the entire network or a area.
All link-state routers have an identical map of the topology.
OPF and IS-IS are examples.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Types of Routing Protocol 2/2
Path Vector Protocols:
Exchange information about destination networks, and the path on
how to reach them.
Dont have an abstract of the network topology.
BGP is the only path vector protocol widely used.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Convergence
Process of when routers notice a change in the network,
exchange information and recalculate the best routes.
Converged network: All routers have the same view on the
network topology.
Convergence time can be influenced:
Fine-tuning routing protocols timers (increases traffic, overhead, CPU
utilization in routers).
Route summarization (less networks to update).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
10
Route Summarization
Group several subnets into one aggregate entry that
describes all of them.
Reduce overhead and improve stability and scalability by
reducing amount of routing information exchanged.
Distance vector protocols support summarization in any
interface, but link states support it only at area boundaries.
IP addressing must be hierarchically assigned in contiguous
blocks across the network.
What is the
summarized
network?
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
11
Routing Protocol Scalability
Scalability describes the ability of a routing protocol to support
further network growth.
Scalability factors:
Number of routes
Number of adjacent neighbors
Number of routers in the network
Network design
Frequency changes
Available resources (CPU and memory)
Hierarchical addressing, structured address assignment, and
route summarization improves the overall scalability.
Routing protocols have their own mechanisms:
OSPF: hierarchical areas
EIGRP: stubs routers
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
12
Understanding
Network Technologies
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
13
Traffic Types 1/2
Unicast:
Exchanged only between one sender and one receiver.
Most used traffic type
Multicast:
Traffic sent to a multicast address is sent to multiple destinations at
the same time.
An interface my belong to any number of multicast groups
IPv4: 224.0.0.0 239.255.255.255
IPv6: FF00::/8
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
14
Traffic Types 2/2
Anycast:
Traffic sent to anycast address is routed to the nearest interface that
has this particular address.
Nearest interface is found according the measure of distance of the
routing protocol used.
Example: DNS
Broadcast:
Only used in IPv4
Information is transmitted from one sender to all connected receivers.
Local broadcast address: 255.255.255.255
Directed broadcast: last IPv4 address in each subnet.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
15
IPv6 Address Types 1/2
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
16
IPv6 Address Types 2/2
Global Unicast: equivalent to public IP address in IPv4.
Link Local: automatically or manually configured. Not
routable.
Assigned Multicast: Similar to well-known multicast
addresses in IPv4.
Solicited node Multicast: Used by ICMPv6 Neighbor
Discovery. Similar to ARP for IPv4.
Loopback: Used for testing.
Unspecified: Used as source IPv6 address indicating
absence of Global Unicast address.
Unique Local: equivalent to private IP address un IPv4
Embedded IPv4: Used to represent the IPv6 equivalent of
a IPv4 address.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
17
ICMPv6 Neighbor Discovery
ICMPv6 is similar to ICMPv4
ICMPv6 provides automatic address allocation, address
resolution, and duplicate address detection.
ICMPv6 Neighbor Discovery includes five messages:
Router Solicitation (RS): Multicast sent to all IPv6 routers requesting
a Router Advertisement message.
Router Advertisement (RA): Response to a RS Indicating prefix,
prefix-length and default gateway address.
Neighbor Solicitation (NS): Similar to ARP for IPv4.
Neighbor Advertisement (NA): Response of a NS message.
Redirect: Sent by a router to inform a better next-hop router on the
link.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
18
Network Types 1/2
Point-to-point network:
Connects a single pair of routers
Example: A serial link
Broadcast network:
Connects many routers
All are reachable through one single address
Example: Ethernet
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
19
Network Types 2/2
Nonbroadcast Multiaccess (NBMA) networks:
Support many routers.
Does not have broadcast capabilities.
Sender needs to create an individual copy of the same packet for
each router.
Introduce several challenges.
Examples: Frame Relay and Asynchronous Transfer Mode (ATM).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
20
NBMA Networks 1/3
Can use a variety of topologies. Hub-and-spoke or partial
mesh is the most common.
Frame Relay is the most common example of NBMA
technology.
If multipoint interface is used to connect multiple sites, some
issues arise:
Split Horizon: In distance vector protocols, the hub receives the
update in its physical interface but cannot forward it through the same
interface to the other spokes.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
21
NBMA Networks 2/3
Neighbor discovery: OSPF over NBMA does not discover neighbors
by default. You have to configure them and manually establish the
hub as the Designated Router (DR).
Broadcast replication: The hub router must replicate broadcast
packets on each PVC to the remote routes.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
22
NBMA Networks 3/3
Subinterfaces overcome these limitations. There are two
types:
Point-to-point subinterfaces: Each subinterface provides connectivity
between two routers, using its own subnet.
Point-to-multipoint subinterfaces: One single subnet is used. EIGRP
and OSPF need additional configuration. Point-to-point are preferred.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
23
Routing over the Internet
IGP are not used to establish connections over the Internet
for the following reasons:
All IGPs need to establish adjacencies with directly connected
neighbors.
Organizations typically use private IP addressing.
Internet is insecure by nature.
To overcome these limitations, tunneling techniques can be
used. Theyre generally named Virtual Private Networks
(VPNs).
Most VPN technologies support routing protocols.
Adjacencies can be established using tunnel interfaces.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
24
Connecting
Remote Locations
with Headquarters
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
25
To connect remote locations, leased lines and Frame Relay
are not longer needed.
Multiprotocol Label Switching (MPLS) VPNs and Dynamic
Multipoint Virtual Private Network (DMVPN) are
widespread.
MPLS and DMVPN offer greater flexibility at a lower cost.
Routing protocols considerations needs to be taken.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
26
Principles of Static Routing 1/2
A static route can be used when:
Routing updates are undesirables, such as in dialup link.
Administrator needs total control over the routes.
Backup to a dynamically recognized route.
Is necessary to reach a network accessible by only one path (stub
network).
Router connects to a ISP and needs to have only a default route
pointing to it.
Router has few resources (CPU and memory).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
27
Principles of Static Routing 2/2
What are the drawbacks of static routing?
Configuring IPv4 Static Route:
ip route prefix mask {address | interface [address]} [dhcp] [distance]
[name next-hop-name] [permanent| track number] [tag tag]
Prior to IOS 12.0 it was more efficient to use the exit interface.
After IOS 12.0 (with the implementation of CEF)is now recommended
to use the next-hop IP address.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
28
Configuring a Static Default Route
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
29
Basic PPP Overview
PPP has some advantages over its predecessor HLDC (default
encapsulation method in serial interfaces of Cisco routers).
PPP is configured on a interface
Additional options can be used after its activated
R1# configure terminal
R1(config)# interface serial 0/0/0
R1(config-if)# encapsulation ppp
hostname R1
!
interface Serial 0/0/0
ip address 10.0.1.1 255.255.255.252
ipv6 address 2001:db8:cafe:1::1/64
encapsulation ppp
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
30
PPP Authentication Overview 1/3
Authentication is optional.
PPP can use PAP and CHAP.
PAP is very basic two-way process with no encryption.
CHAP involve a three-way exchange of a shared secret.
You can configure either PAP, or CHAP or both:
Router(config-if)# ppp authentication {chap | chap pap | pap chap |
pap} [if-needed] [list-name | default] [callin]
PAP authentication requires the remote device to send a
name and password to be checked against its user
database (or TACACS/TACACS+).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
31
PPP Authentication Overview 2/3
The hostname on one router must match the username the
other router has configured for PPP.
Password must also match.
hostname R1
hostname R2
username R2 password sameone
username R1 password sameone
interface Serial 0/0/0
interface Serial 0/0/0
ip address 10.0.1.1 255.255.255.252
ip address 10.0.1.1 255.255.255.252
ipv6 address 2001:db8:cafe:1::1/64
ipv6 address 2001:db8:cafe:1::2/64
encapsulation ppp
encapsulation ppp
ppp authentication pap
ppp authentication pap
ppp pap sent-username R1 password sameone
ppp pap sent-username R2 password sameone
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
32
PPP Authentication Overview 3/3
In CHAP, the local device sends a challenge to the remote.
The remote encrypts the challenge and its name, and return it.
Local router uses the configured name of the remote, encrypt it
with the challenge, and verify if the calculated and received
values match.
Unlike PAP, CHAP authenticates periodically.
hostname R1
hostname R2
username R2 password sameone
username R1 password sameone
interface Serial 0/0/0
interface Serial 0/0/0
ip address 10.0.1.1 255.255.255.252
ip address 10.0.1.2 255.255.255.252
ipv6 address 2001:db8:cafe:1::1/64
ipv6 address 2001:db8:cafe:1::2/64
encapsulation ppp
encapsulation ppp
ppp authentication chap
ppp authentication chap
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
33
PPPoE 1/2
ISPs value PPP because of the authentication, accounting
and link management features.
Ethernet links does not support PPP, thats why PPPoE
was created.
PPPoE creates a PPP tunnel over the Ethernet connection.
The modem convers the Ethernet frames to PPP frames by
stripping the Ethernet headers.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
34
PPPoE 2/2
Configuration:
Create a dialer interface (which is virtual).
Configure the dialer interface encapsulation PPP and IP address by
DHCP
Enable PPPoE in the ethernet interface that faces the client.
Link the dialer interface to the ethernet
Set the MTU to 1492
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
35
Basic Frame Relay Overview
Frame Relay is a high-performance WAN protocol that
operates at the physical and data link layer of OSI model.
One single physical connection is needed.
SP creates virtual circuits (VC), which are normally PVC,
identified by a DLCI.
DLCI are locally significant.
A mapping between IP address and DLCI must be
established.
By default, Frame Relay is NBMA. But subinterfaces are
normally used.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
36
VPN Connectivity Overview
Frame Relay is being considered deprecated, for the
following factors:
Cost
Deployed services
Scalability
Next generation of VPNs support quick and easy
provisioning of full mesh topologies without compromising
security and scalability.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
37
MPLS-based VPN
MPLS is used to build tunnels through the service provider core
network.
Traffic forwarding through the MPLS backbone is based o labels
assigned by the SP.
Layer 3 MPLS:
SP participates in customer routing.
Customer routes are redistributed into MP-BGP
On the other end, are redistributed back from MP-BGP to the routing
protocol used.
Routing protocols on the local and remote sites, may be different
Layer 2 MPLS:
Interconnects PE and CE at layer 2 using a pseudowire
Two types:
Virtual Private Wire Service (VPWS): Emulates a point-to-ponit L2 connection
Virtual Private LAN Service (VPLS): emulates Ethernet multiaccess network.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
38
Tunneling VPNs
GRE
Tunneling protocol developed by Cisco
Enables encapsulation of L3 protocols inside point-to-point, tunnelover-IP network.
Traffic is not encrypted.
IPsec
Framework that uses a set of cryptographic protocols to secure L3
traffic .
Works with any application that uses IP as a transport protocol.
DMVPN
Used to scale IPsec hub-to-spoke and spoke-to-spoke designs in
large networks.
Supports routing protocols, and multicast.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
39
Hybrid VPNs
MPLS-based VPNs and tunnel VPNs are not mutually
exclusive.
Is possible to combine them and encrypt (or tunnel) the data
across the service provider network. (Tunnel over a tunnel).
Examples:
Layer 3 MPLS VPN over GRE
Layer 3 MPLS over DMVPN (over IPsec).
Provides a greater level of security.
Several layers of encapsulation increase latency and
complexity.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
40
Routing Across MPLS VPNs 1/2
Depends on whether its L2 MPLS VPN or L3 MPLS VPN
L2 MPLS VPN:
Customer selects the routing protocol.
Customer routers (CE) establish adjacencies.
Same IP subnet is used
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
41
Routing Across MPLS VPNs 2/2
L3 MPLS VPN:
Customer and SP must agreed routing protocol(s).
Each customer router establish adjacency with a SP router (PE).
A different subnet must be used in each pair of CE-PE.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
42
Routing Over a GRE Tunnel 1/2
A tunnel is a logical interface that provides a way to
encapsulate passenger packets inside a transport protocol.
A tunnel have three main parts:
A passenger protocol, that is being encapsulated.
A carrier protocol. (GRE in for GRE tunnels).
A transport protocol, that carries the encapsulated protocol.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
43
Routing Over a GRE Tunnel 2/2
GRE tunnels offer the possibility to connect branch offices
across Internet or WAN.
Its main benefit: support multicast, and therefore is
appropriate for routing protocols.
Does not encrypt the traffic.
IPsec can be used, creating a GRE-over-IPsec tunnel.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
44
Dynamic Multipoint Virtual Private Network
Statics tunnels may be and appropriate solution for small
networks, but its not scalable.
The Cisco DMVPN feature enables better scaling for large
(and small) IPsec VPNs.
DMVPN combines multipoint GRE (mGRE), IPsec
encryption and Next Hop Resolution Protocol (NHRP).
Benefits:
Not reconfiguration needed in the hub router when a new spoke is
added.
IPsec is immediately triggered to create the point-to-point tunnel with
no peering configuration needed.
Support for dynamically addressed spoke routers.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
45
Multipoint GRE
mGRE enables a single GRE interface to support multiple GRE
tunnels and simplifies the complexity of the configuration.
Only one tunnel interface needs to be configured on a router to
support multiple remote GRE peers.
Devices using mGRE require NHRP to build dynamic GRE
tunnels.
mGRE also support unicast, multicast and broadcast.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
46
NHRP
NHRP is used by routers to determine the IP address of the
next hop in IP tunneling networks.
When a spoke initially connects to a DMVPN network, it
registers its inner (tunnel) and outer (physical interface)
address with the hub router.
This registration enables the mGRE interface on the hub
router to build a dynamic GRE tunnel back to the registering
spoke.
NHRP creates a mapping for a tunnel IP address to the
physical interface IP address for each spoke at the hub.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
47
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
48
IPsec
Is a framework of open standards that define how to provide
secure communications.
Provides four security services:
Confidentiality (encryption): The sender can encrypt the packets
before transmitting them across a network.
Data Integrity: The receiver can verify that the data was not altered
or changed during the transmission. Checksum is used.
Authentication: Ensures the communication is made with the desired
partner. Devices and users are authenticated, by using Internet Key
Exchange (IKE). IKE uses username/password, OTP, biometrics,
PSK and digital certificates.
Antireplay protection: Verifies each packet is unique and not
duplicated, by comparing the sequence number of the received
packet. Late and duplicate packets are dropped.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
49
Routing and
TCP/IP
Operations
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
50
MSS, Fragmentation and PMTUD 1/3
An IPv4 packet has a maximum size of 65,535 bytes, whereas an
IPv6 packet can support up to 4,294,967,295 bytes.
Most transmission links enforces a smaller Maximum
Transmission Unit (MTU).
When a router receives an IPv4 larger the MTU of the interface, it
must fragment the packet, unless the DF (Dont Fragment) bit is
set.
Fragmentation cause several issues:
CPU and memory overhead in the origin.
CPU and memory overhead in the destination, due to reassembly.
Retransmission of the entire packet if one fragment is dropped.
Firewalls doing L4 L7 filtering may have trouble processing fragments.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
51
MSS, Fragmentation and PMTUD 2/3
To avoid fragmentation, the TCP Maximum Segment Size (MSS)
defines the largest amount of data the receiving device is able to
accept in a single TCP segment.
The sending device is required to send segments equal to or less
than the reported MSS.
TCP MSS should be the minimum buffer size, minus 40 bytes (20
bytes TCP header, 20 bytes of IP header).
Example, Ethernet MTU is 1500 bytes. MSS should be 1460.
TCP MSS just works at the two ends of the TCP connection.
To avoid fragmentation due to smaller MTU on a link along the
path, PMTUD is used.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
52
MSS, Fragmentation and PMTUD 3/3
Path MTU Discovery (PMTUD) was developed to determine the
lowest MTU along a path.
Is performed by a host using MSS and setting the TCP DF bit.
If a router along the path needs to fragment the segment (due to
smaller MTU size), it will drop the packet and send an ICMP
Destination Unreachable message with the code indicating
fragmentation needed and DF set and the MTU for the interface
that caused the drop.
Source receives the ICMP message and reduce the MSS to be
within the MTU and retransmit the message.
If the ICMP unreachable message is blocked, issues may occur.
Be sure to allow them in routers and firewalls along the patch.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
53
IPv6 Fragmentation and PMTUD
IPv6 routers dont fragment a packet unless it is the source
of the packet.
If an IPv6 router receives a packet larger the MTU of the
outgoing interface, it will drop the packet and send an
ICMPv6 Packet Too Big message back to the source,
including the smaller MTU.
PMTUD operation for IPv6 are similar to the PMTUD for
IPv4.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
54
Bandwidth Delay Product
TCP can experience bottlenecks on paths with high bandwidth
and long round-trip delays.
These are known as LFN, long fat networks.
Bandwidth Delay product (BDP) is the product of the bandwidth
(bps) times the round-trip delay (RTT in seconds).
BDP is the amount of unacknowledged data that TCP must
handle to keep the connection full.
BDP is used to optimize the TCP Windows size to fully utilize the
link.
The result is the maximum of data can be transmitted on the link
at any given time.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
55
TCP Starvation
TCP have mechanism for reliability, flow control and congestion
avoidance, whereas UDP doesnt have these features.
When TCP and UDP flows are mixed during a period of
congestion, TCP cooperate by backing off on bandwidth.
However, UDP doesnt even notice the congestion and keep
using the available bandwidth given up by TCP.
This is known as TCP starvation/UDP dominance.
Is not always possible to separate TCP / UDP based flows, but
should be kept in mind this behavior when mixing applications.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
56
Latency
Latency is the amount of time for a message to go from ne point
to another.
Can be caused by several factors: propagation delay,
serialization, data protocols, routing, switching, queuing, and
buffering.
TCP requires a established virtual connection and bidirectional
communication ACKs, windows size, congestion control and so
on, which has a effect on latency.
UDP does not include reliability, and is used for streaming media
that requires minimum delay.
UDP has very low latency, better than most TCP connections.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
57
ICMP Redirects 1/2
These messages are used by routers to notify the sender of
a packet that there is a better route available for a particular
destination.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
58
ICMP Redirects 2/2
ICMPv6 Redirect message works the same way as the
Redirect message for ICMpv4, with one additional feature:
If PCA wants to communicate with PCB (same segment, different
networks), it will use its default gateway, R1.
R1 will send a redirect message.
PCA will forward packets directly to PCB.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
59
Implementing RIPng
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
60
RIP overview
One of the oldest routing protocol.
Standard IGP, works in mixed-vendor router environment.
Easy to configure.
Good choice for small networks
Distance vector protocol, uses hop count as the metric.
Maximum hops: 15
If a network is 16 hops or more, the router consider it
unreachable.
Implements split horizon with poison reverse. Prefers a
notification rather than just ignoring.
Support load balancing over equal-cost paths.
Exits three versions: RIPv1, RIPv2 and RIPng
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
61
RIPv2 Overview 1/2
Classless routing protocol
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
62
RIPv2 Overview 2/2
By default RIPv2 automatically summarizes at major
network boundaries. Summarizing routes to the classful
network address.
If discontinuous subnets are used, automatic summarization
must be disabled.
Router(config-router)# no auto-summary
The ip summary-address rip ip-address network-mask
interface command is used to manually summarize.
Router(config-if)# ip summary-address rip 10.2.0.0 255.255.0.0
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
63
Configuring RIPng
RIPng is already preconfigured in R1.
There is a static default route pointing to internet in R1.
R1 will be configured to share this default route with R2
using RIPng.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
64
Basic RIPng Configuration 1/8
Enable IPv6 routing using ipv6 unicast-routing command
on R2.
Enable RIPng using ipv router rip name command.Set the
process name to CCNP_RIP
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
65
Basic RIPng Configuration 2/8
On R2, enable IPv6 in interface configuration mode:
ipv6 address ipv6_address/prefix or
ipv6 enable
Use show ipv6 interface brief to validate interfaces are up
and correctly configured.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
66
Basic RIPng Configuration 3/8
On R2, enable RIPng on interface Ethernet 0/1 (connects to
R1) and Loopback0 (simulates LAN).
If you forgot to create the RIP process name, the router will
automatically create one.
Use the show ipv6 protocols to validate RIPng is correctly
configured.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
67
Basic RIPng Configuration 4/8
Inspect the routing table on R2. Notice two IPv6 routes
learned from R1.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
68
Basic RIPng Configuration 5/8
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
69
Basic RIPng Configuration 6/8
In RIPng, the sending router consider itself to be one hop
away. Therefore, R2 considers the R1 LAN to be two hops
away.
The concept of classful network doesnt exist in IPv6, so
there isnt any automatic route summarization in RIPng. It
must be done manually.
Summarize LAN addresses on R1:
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
70
Basic RIPng Configuration 7/8
Propagate the default route of R1 to R2
On R2, verify R1 has shared its default IPv6 route
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
71
Basic RIPng Configuration 8/8
Another option is using the keyword only instead of
originate.
Check the difference in the routing table of R2
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
72
Investigating the RIPng Database 1/3
show ipv6 rip
RIP process (es)
Port number
Hello and dead timer
Interfaces configured
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
73
Investigating the RIPng Database 2/3
show ipv6 rip database
RIP process (es)
Route prefix and metric
Installed (in the routing table) and expired (unavailable).
Expires in (dead timer countdown typically three times the hello
timer)
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
74
Investigating the RIPng Database 3/3
show ipv6 next-hops
RIP process (es)
Next hop router IP address.
Interface in which its connected.
Number of path (routes) in the IPv6 RIP routing table using that next
hop
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
75
Summary
The role of static routes and dynamic routing protocols in enterprise networks.
The differences between IGP and EGP routing protocols.
The three types of routing protocols: distance vector, link-state and path vector.
The importance of convergence time and how route summarization reduced convergence time and improves scalability.
The four traffic types: unicast, multicast, anycast, and broadcast.
The differences between point-to-point, broadcast, and NBMA networks.
How point-to-point subinterfaces are used to overcome the limitations of NBMA
networks.
How VPNs are used to provide security of a public Internet.
Common types of VPNs: MPLS-based VPNs, GRE+IPsec, and DMVPN.
How a customer establishes connectivity with a service provider using a routing protocol and a layer 3 MPLS VPN.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
76
How static GRE tunnels can establish virtual point-to-point links and support dynamic
routing protocols.
Using DMVPN to provide fully meshed VPN connectivity with a simple hub-and spoke
configuration.
How DMVPN relies on NHRP, mGRE, and IPsec.
The differences and similarities between RIPv2 and RIPng.
How to configure RIPng.
How to propagate a default route in RIPng.
Some key points in this chapter are that convergence time, support for
summarization, and ability to scale impact selection of a suitable routing protocol. It is
recommended that you use point-to-point subinterfaces when establishing routing
protocols over NBMA networks. DMVPN can be used as a scalable solution. RIPng is
asimple IGP protocol that supports IPv6.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
77
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
78