Professional Documents
Culture Documents
CCNP Route - CH01
CCNP Route - CH01
IP Routing (ROUTE)
Foundation Learning Guide
CCNP ROUTE 300-101
Enterprise Campus provides access to the network communications services and resources to end users
and devices. Single geographic location, designed using a hierarchical model: Access, Distribution and
Core layers
Enterprise edge provides remote sites with access to the same network services as users at the main site,
aggregates private WAN links, VPN connections & Internet connectivity
Figure 1-2 Role of Dynamic Routing Protocols
The basic objective of routing protocols is to exchange network reachability
information between routers and dynamically adapt to network changes.
Figure 1-3 IGP versus EGP
Interior Gateway Protocols (IGP): used within the organization, and they exchange the routes within an AS
Exterior Gateway Protocols (EGP): exchanging routes between different autonomous systems. Border
Gateway Protocol (BGP)
Routing protocols can be divided into the following groups:
• Distance vector protocols Determines the:
• Direction (vector, Next hop or Exit interface)
• Distance (such as link cost or number of hops) to any link in
the network.
• Distance vector protocols use routers as signposts along
the path to the final destination. Uses Bellman-Ford algorithm
• Link-state protocols: The link-state approach uses the Shortest
Path First (SPF) algorithm to create an abstract of the exact
topology of the entire network or at least within its area.
A link-state routing protocol is like having a complete map of the
network topology.
Convergence describes the process of when routers notice change
in the network, exchange the information about the change, and
perform necessary calculations to reevaluate the best routes.
OSPF supports the use of hierarchical areas that divide one large
network into several subdomains.
EIGRP supports the configuration of stub routers to optimize
information exchange process and improve scalability.
Understanding Network Technologies
You can establish routing protocols over a variety of different network
technologies.
It is important to consider the limitations of a specific solution and how it
affects routing protocol deployments and operation.
Subnet
Global Routing Prefix ID Interface ID
Registry
ISP Prefix
Site Prefix
Subnet Prefix
Network Types
Not all Layer 2 network topologies support all traffic types. Because unsupported
traffic types influence the operation of routing protocols, it is important to be
aware of the limitations of specific network topologies.
Point-to-point network: A network that
connects a single pair of routers.
A serial link is an example of a point-to-
point connection.
Using Frame Relay Mesh, a network designer can build multiple connections
simply by configuring additional VCs on each existing physical link.
This software upgrade grows the star topology to a full mesh topology without
the expense of additional hardware or dedicated lines.
NBMA Networks
If you use a single Frame Relay, multipoint interface to interconnect multiple sites,
reachability issues may be a problem because of the NBMA nature of Frame Relay.
The Frame Relay NBMA topology can cause the following issues:
Split horizon: For distance vector routing protocols, the split-horizon rule
reduces routing loops. As illustrated in Figure 1-9, it prevents a routing update
that is received on an interface from being forwarded out of the same interface.
The hub router receives the update on its physical interface but cannot
forward it through the same interface to other spoke routers.
Split horizon is not a problem if there is a single PVC on a physical interface
because this type of connection would be point-to-point.
Neighbor discovery:
OSPF over NBMA networks works in a nonbroadcast network mode
by default, and neighbors are not automatically discovered. You can
statically configure neighbors, but an additional configuration is
required to manually configure the hub as a Designated Router (DR).
192.168.1.101 255.255.255.0
• NHRP is a client-server protocol, the hub acts as the server, and the spokes are clients.
• NHRP is used by routers to determine the IP address of the next hop in IP tunneling networks.
• NHRP creates a mapping for a tunnel IP address to the physical interface IP address for each
spoke at the hub.
Secure VPN
Authentication
• Ensures that a message:
• Comes from an authentic source and
• Goes to an authentic destination
Data confidentiality
• Protecting data from eavesdroppers (encryption)
• Aims at protecting the message contents from being intercepted by unauthenticated or
unauthorized sources.
Data integrity
• Across the Internet, there is always the possibility that the data has been modified.
Antireplay protection:
• Antireplay protection verifies that each packet is unique and not duplicated.
• R1 examines its routing table and determines the next hop as router R2, on the same
Ethernet segment as PCA.
• R1 forwards the packet out the same interface used to receive the packet from PCA.
• R1 also sends an ICMP Redirect message informing PCA of a better route to PCX by
way of R2.
The ICMPv6 Redirect message functions the same way as the Redirect message for
ICMPv4, with one additional feature. PCA can now send IPv6 packets directly to PCB even
though it is on a different IPv6 network.
Implementing RIPng
• RIP is an IGP that is used in smaller networks.
• A distance vector routing protocol that uses hop count (15 Max) as a
routing metric.
• There are three versions of RIP: RIPv1 & RIPv2 (IPv4) ,and RIPng (IPv6).
There are two ways of sharing information about default routes through RIPng:
• The first way is specified through the originate keyword. In this case, R1 shares
the default route information alongside the information about every other route.
• The second way of sharing default route information is to use the only keyword.
With only , R1 will only share the default route with R2.
The show ipv6 rip database output:
• The RIP process
• The route prefix.
• The route metric
• Installed and expired, the keyword “installed”
means the route is in the routing table.
• Expires in, in which if the countdown timer
reaches 0, the route is removed from the
routing table and marked expired