PART 1 OVERVIEW OF SCALABLE INTERNETWORKS 3
Chapter 1 Overview of Scalable Internetworks 3
Scaling Large Internetworks 3
Defining the Router s Role in a Hierarchy 5
Key Characteristics of Scalable Internetworks 7
Making the Network Reliable and Available 7
Making the Network Responsive 9
Making the Network Efficient 11
Making the Network Adaptable 14
Making the Network Accessible but Secure 15
Summary 18
PART 2 INTRODUCTION TO MANAGING TRAFFIC AND ACCESS 23
Chapter 2 Introduction to Managing Traffic and Congestion 23
Congestion Overview 23
Traffic in an IP Network 24
Traffic in an IPX Network 25
Other Traffic in a Multiprotocol Network 26
Managing Traffic Congestion 26
Adjusting Timers on Periodic Announcements 27
Providing Static Entries in Tables 27
Filtering Broadcast Traffic 27
Filtering User and Application Traffic 27
Prioritizing Traffic 28
Summary 28
Chapter 3 Managing IP Traffic 31
Traffic Management Techniques 32
IP Access Lists 32
Helper Addressing 34
Configuring IP Standard Access Lists 34
Inbound Access List Processing 35
Outbound Access List Processing 36
IP Addressing Review 37
Access Lists Use Wildcard Mask 39
Access List Configuration Tasks 40
Standard Access List Commands 40
Implicit Masks 42
Configuring Principles for Access Lists 43
Standard Access List Example 45
Location of Standard Access Lists 46
Restricting Virtual Terminal Access 47
How to Control vty Access 47
Virtual Terminal Line Commands 48
Virtual Terminal Access Example 49
Configuring Extended Access Lists 49
Extended Access List Processing 50
Extended IP Access List Command 51
Extended Access List Examples 60
Configuring Named Access Lists 61
Implementation Considerations 62
Named Access List Example 63
Location of Extended Access Lists 64
Verifying Access List Configurations 64
Using an Alternative to Access Lists 65
Configuring Null Interface 66
Null Interface Command 66
Using Helper Addresses 68
Server Location 69
IP Helper Address Commands 70
Helper Address Examples 72
Summary 75
Chapter 4 Managing Novell IPX/SPX Traffic 83
Novell IPX/SPX Overview 83
IPX Addressing 85
Managing IPX/SPX Traffic 86
IPX Traffic Filtering 88
IPX Traffic Filtering Overview 88
IPX Access List Commands 89
IPX SAP Overview 92
SAP Operation 94
SAP Filters 95
SAP Filter Configuration 95
SAP Filtering Examples 97
Filtering RIP Traffic 101
SAP/GNS Operation 102
Connecting IPX Networks Using IP Tunnels 108
Configuring and IP Tunnel Interface 108
IP Tunnel Configuration Example 110
Verifying IPX Traffic Operation 111
Summary 112
Chapter 5 Configuring Queuing to Manage Traffic 117
Queuing Overview 117
Traffic Prioritization 118
Establishing a Queuing Policy 119
Choosing a Cisco IOS Queuing Option 120
Primary Differences Between the Queuing Options 122
Weighted Fair Queuing Overview 123
Weighted Fair Queuing Operation 124
Weighted Fair Queue Example 125
Priority Queuing Overview 126
Priority Queuing Operation 127
Priority Queuing Configuration Tasks 129
Priority List Configuration Commands 130
Priority Queuing Example 133
Custom Queuing Overview 135
Custom Queuing Operation 137
Custom Queuing Configuration Tasks 138
Custom Queue Configuration Commands 139
Custom Queuing Examples 143
Verifying Queuing Operation 145
Summary 146
What Is Routing? 151
Chapter 6 Routing Protocol Overview 151
PART 3 CONFIGURING SCALABLE ROUTING PROTOCOLS 151
Comparing Routing Protocols 152
Using Convergence 153
Discovering Routes 154
Selecting a Route 156
Maintaining Routing Information 157
Summary 158
Chapter 7 Extending IP Addresses Using VLSMs (Variable-Length Subnet Masks) 161
IP Address Issues and Solutions 161
Using Addressing Hierarchies 162
Slowing IP Address Depletion 163
Variable-Length Subnet Masks 164
Variable-Length Subnet Mask Overview 165
Classless and Classful Updates 165
Calculating VLSMs 167
VLSM Example 170
Route Summarization Overview 171
What Is Route Summarization? 171
Summarizing Within an Octer 172
Summarizing Addresses in a VLSM-Designed Network 173
Route Summarization Implementation Considerations 174
Using Private Addressing 177
Other Addressing Considerations 177
Translating Inside Local Addresses 179
Summary 181
Chapter 8 Configuring OSPF in a Single Area 185
OSPF Overview 185
Steps to OSPF Operation 188
Step 1:Establishing Router Adjacencies 188
Step 2: Electing the DR and BDR 192
Step 3:Discovering Routes 194
Step 4:Choosing Routes 195
Step 5:Maintaining Routing Information 197
Configuring OSPF on Routers Within a Single Area 199
Basic Configuration Steps 200
Optional Configuration Commands 201
Verifying OSPF Operation 203
Summary 205
Chapter 9 Interconnecting Multiple OSPF Areas 209
Creating Multiple OSPF Areas 209
OSPF Hierarchical Routing 210
OSPF Multi-Area Components 211
Configuring OSPF Operation Across Multiple Areas 216
Forwarding Packets in a Multi-Area Network 218
Flooding LSUs to Multiple Areas 219
Updating the Routing Table 220
Using and Configuring OSPF Multi-Area Components 221
Configuring OSPF ABRs 221
Using Route Summarization 222
Configuring Route Summarization 224
Using Stub and Totally Stubby Areas 226
Meeting the Backbone Area Requirements 232
Creating a Virtual Link 232
Configuring Virtual Links 234
OSPF Virtual Link Configuration Example 235
Verifying OSPF Operation 236
Summary 237
Enhanced IGRP Overview 241
Chapter 10 Configuring Enhanced IGRP 241
EIGRP Support for Novell IPX RIP and SAP 242
EIGRP Support for AppleTalk 243
EIGRP Terminology 244
Enhanced IGRP Operation 244
Building the Neighbor Table 245
Discovering Routes 246
Choosing Routes 247
Maintaining Routes 250
Configuring EIGRP for IP 253
Configuring EIGRP 253
Configuring EIGRP Support for IPX 255
Summarizing EIGRP Routes for IP 258
Verifying Enhanced IGRP Operation 259
Summary 261
Chapter 11 Optimizing Routing Update Operation 263
Controlling Routing Update Traffic 263
Using and Configuring the passive-interface Command 265
Using and Configuring Default Routes 265
Using and Configuring Static Routes 267
Using and Configuring Route Filters 270
IPX Route Filtering Configuration Example 272
Using Multiple Routing Protocols 273
What Is Redistribution? 274
Redistribution Implementation Considerations 275
Selecting the Best Path 276
What Protocol to Believe? 276
Redistribution Guidelines 278
Redistribution and EIGRP 280
Using and Configuring Redistribution 280
Modifying Administrative Distance (Optional) 284
IP Route Filtering Configuration Example 285
IP Static Route Filtering Configuration Example 286
Redistribution Example Using ip default-network 287
Redistribution Example Using distance 290
Verifying Redistribution Operation 297
Summary 297
Chapter 12 Connecting Enterprises to an Internet Service Provider 301
BGP and ISP Connectivity Basics 301
When Not to Use BGP 302
Policy Drives BGP Requirements 303
BGP Sessions 304
Static Route Command Review 305
Connecting to an ISP Using BGP and Alternatives 305
BGP Operation 305
RIP Static Route Example 306
OSPF Example 307
BGP Configuration Commands 307
BGP Configuration Example 309
Verifying BGP Operation With the Show Commands 310
Summary 310
Integrated Services Digital Network (ISDN) BRI 311
PART 4 CONFIGURING DIALUP CONNECTIVITY 315
Chapter 13 WAN Connectivity Overview 315
WAN Connectivity Options 315
Dedicated Connectivity 316
Asynchronous Dial-In Connectivity 317
Dial-on-Demand Routing 318
Packet-Switched Services 320
WAN Encapsulation Protocols 324
Connection Considerations 326
Summary 327
Chapter 14 Configuring Dial-on-Demand Routing 331
ISDN Standards 332
ISDN Access Options 333
ISDN Encapsulation Options 334
ISDN Functions 335
Selecting a Cisco Router: Considerations 338
ISDN Switch Types 339
Configuring ISDN BRI 340
Dial-on-Demand Routing 341
Generic DDR Operation 343
Selecting a DDR Implementation 344
Legacy DDR 346
Configuring Legacy DDR 346
Task 1: Specifying Interesting Traffic (What Enables the Connection?) 346
Task 2: Defining Static Routes (Route to Destination) 348
Task 3: Configuring the Dialer Information 350
Legacy DDR Configuration Tasks Summarized 352
Legacy DDR Optional Commands 353
Legacy DDR Using ACLs Configuration Example 355
Verifying and Troubleshooting Legacy DDR Operation 356
Dialer Profiles Overview 357
Configuring Dialer Profiles 360
Dialer Profiles Configuration Tasks Summarized 365
Dialer Profiles Configuration Example 367
Verifying Dialer Profiles Operation 370
DDR Using Rotary Group Overview 370
Configuring Dialer Rotary Groups 371
Dialer Rotary Group Configuration Example 374
PPP Authentication Overview 377
Selecting a PPP Authentication Protocol 378
Configuring PPP Authentication 381
Optional PPP Authentication Commands 382
Summary 383
Chapter 15 Customizing DDR Operation 387
Dial Backup for Dedicated Connections 387
Configuring Dial Backup for Primary Links 388
Configuring Dial Backup for Excessive Traffic Load 390
MultiLink PPP Operation 392
MultiLink PPP Overview 392
Configuring MultiLink PPP 394
MultiLink PPP Configuration Example 394
Verifying MultiLink PPP Operation 398
Disabling Overhead Traffic 399
Snapshot Routing 400
IPX Spoofing 408
Summary 411
PART 5 INTEGRATING NONROUTED SERVICES 417
Chapter 16 Bridging Overview 417
Introduction to Bridging 417
Nonrouted Protocol Support 418
Routing Versus Bridging 419
Basic Router/Bridge Operation 420
Cisco-Supported Bridging Types 420
Transparent Bridging 421
Encapsulated Bridging 421
Integrated Routing and Bridging 422
Source-Route Bridging 422
Source-Route Transparent Bridging 423
Source-Route Translational Bridging 424
Summary 425
Transparent Bridging Operation 429
Transparent Bridging 429
Chapter 17 Configuring Transparent Bridging and Integrated Routing and Bridging 429
Transparent Bridging Configuration Tasks 435
Verifying Transparent Bridging 439
Verifying Spanning Tree Operation 440
Integrated Routing and Bridging 441
IRB Operation 443
BVI Addressing 444
Making Bridging or Routing Decisions 444
IRB Configuration Tasks 446
Configuration Example: IRB and the BVI 447
Enabling Routing on a Bridge Group 448
IRB Configuration Considerations 449
Verifying IRB Operation 450
Summary 452
Chapter 18 Configuring Source-Route Bridging 455
Source-Router Bridging (SRB) Overview 455
Source-Route Bridging Operation 457
Routing Information Indicator 459
Source-Router Bridging Configuration 460
SRB Manual Spanning-Tree Configuration Example 462
SRB Automatic Spanning-Tree Configuration Example 463
Multiport Configuration 464
Proxy Explorer Configuration 466
Multiring Configuration 466
Multiring Configuration Example 468
Source-Route Transparent Bridging (SRT) Overview 468
SRT Operation 469
SRT Configuration Example 470
Source-Route Translational Bridging (SR/TLB) Overview 470
SR/TLB Configuration Example 472
Verifying Source-Route Bridging Operation 474
SR/TLB Configuration 477
Summary 478
Appendix A Chapter Test Answer Key 485
Appendixes 485
Appendix B Managing AppleTalk Traffic 499
AppleTalk Traffic Overview 499
AppleTalk Protocol Stack 500
AppleTalk Services 500
Nonextended/Extended Networks 501
Extended AppleTalk Internetwork 502
AppleTalk Zones 503
AppleTalk Filtering Options 503
GetZoneList Filtering 505
ZIP Reply Filtering 509
RTMP Filtering 513
NBP Filtering 518
Summary 522
Appendix C Configuring NetWare Link Services Protocol 523
Configuring NLSP 523
NLSP Operation 524
NLSP Configuration Commands 527
NLSP Configuration Example 530
Verifying NLSP Operation 531
Summary 533
Configuring T1 and E1 535
Appendix D Configuring T1/E1 and ISDN PRI Options 535
Channelized T1/E1 Configuration Commands 538
Channelized T1 Configuration Example 540
Channelized E1 Configuration 542
Channelized E1 Configuration Example 542
Configuring Primary Rate Interface 544
ISDN PRI Configuration Commands 545
T1/E1 Controller Options for PRI 546
ISDN PRI Configuration 547
PRI Configuration Example 548
Summary 549
Overview of Switched Multimegabit Data Service (SMDS) 551
Appendix E Configuring SMDS 551
SMDS Configuration Tasks 553
SMDS Configuration Commands 554
SMDS Configuration Example 555
Summary 556
Appendix F Password Recovery 557
Theory of Password Recovery 557
Password Recovery Technique #1 558
Password Recovery Technique #2 561
Summary 563
Appendix G Glossary 565
Index 613