CCNP 1
CCNP 1
Kevin Wallace
CCIE No. 7945
Cisco Press
800 East 96th Street
Indianapolis, IN 46240
10/24/14 3:17 PM
ii CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and retrieval
system, without written permission from the publisher, except for the inclusion of brief quotations in a
review.
ISBN-13: 978-1-58720-559-0
ISBN-10: 1-58720-559-9
The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall
have neither liability nor responsibility to any person or entity with respect to any loss or damages
arising from the information contained in this book or from the use of the discs or programs that may
accompany it.
The opinions expressed in this book belong to the authors and are not necessarily those of Cisco
Systems, Inc.
ROUTE.indb ii
iii
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropri-
ately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information.
Use of a term in this book should not be regarded as affecting the validity of any trademark or service
mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities (which may
include electronic versions; custom cover designs; and content particular to your business, training
goals, marketing focus, or branding interests), please contact our corporate sales department at
corpsales@pearsoned.com or (800) 382-3419.
For questions about sales outside the U.S., please contact international@pearsoned.com.
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book
is crafted with care and precision, undergoing rigorous development that involves the unique expertise
of members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us
through email at feedback@ciscopress.com. Please make sure to include the book title and ISBN in your
message.
10/24/14 3:17 PM
iv CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Currently, Kevin produces video courses and writes books for Cisco Press/Pearson IT
Certification (http://kwtrain.com/books). Also, he owns and operates Kevin Wallace
Training, LLC (http://kwtrain.com), a provider of self-paced training materials that sim-
plify computer networking. Kevin holds a Bachelor of Science degree in electrical engi-
neering from the University of Kentucky, and he lives in central Kentucky with his wife
(Vivian) and two daughters (Sabrina and Stacie).
Blog: http://kwtrain.com
Twitter: http://twitter.com/kwallaceccie
Facebook: http://facebook.com/kwallaceccie
YouTube: http://youtube.com/kwallaceccie
LinkedIn: http://linkedin.com/in/kwallaceccie
Google+: http://google.com/+KevinWallace
v
Michael J. Shannon began his career in IT when he transitioned from a studio recording
engineer to a network technician for a large telecom in the early 1990s. He soon began
to focus on security and was one of the first to attain the Certified HIPAA Security
Specialist (CHSS) certification. He has worked as an employee, contractor, and con-
sultant for a number of large companies including Platinum Technologies, MindSharp,
IBM, State Farm, Fujitsu, Skillsoft, Pearson PLC, and several others. He has attained
the following certifications: CCSI No. 32364, CISSP, CCSP/CCNP Security, ITIL 2011
Intermediate SO/RCV, CWNA, MCSE, Security+, and Network+. He has authored
several books and written several articles concerning HealthCare IT Security. He resides
with his wife in Corpus Christi, Texas.
10/24/14 3:17 PM
vi CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Dedication
For the greatest teachers in my life. Career: my role model, Walter Elias Disney.
Mentally: authors Zig Ziglar and Anthony Robbins. Spiritually: Pastors Dr. Virgil Grant
and Michael Denney. Physically: personal trainers Christopher Poe and Terri Stein (along
with all the trainers at Edge Body Boot Camp). Emotionally: the wisest person I know,
my best friend and wife, Vivian Wallace.
ROUTE.indb vi
vii
Acknowledgments
I am very grateful to executive editor Brett Bartow. Over the years, Brett has given me
many opportunities to reach people in the Cisco community through books and videos.
Also, thanks to the entire team at Cisco Press. Working with each of you is a pleasure.
To my friend Wendell Odom, who made major contributions to this book, thank you
for all you’ve done for the Cisco community. Thanks also go out to technical editors
Michelle Plumb and Michael Shannon. I’ve had the privilege of working with each of
you and respect how deeply you care about your students.
What I do would be impossible without support from my wife, Vivian, and my daugh-
ters, Stacie and Sabrina. Knowing that you are cheering me on means more to me than
you know.
10/24/14 3:17 PM
viii CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Contents at a Glance
Introduction xxix
ROUTE.indb viii
ix
Index 812
Glossary
10/24/14 3:17 PM
Contents
Introduction xxix
Index 812
CD-Only
Glossary
xxviii CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Standing Scroll
Man
■ Boldface indicates commands and keywords that are entered literally as shown. In
actual configuration examples and output (not general command syntax), boldface
indicates commands that are manually input by the user (such as a show command).
■ Braces within brackets ([{ }]) indicate a required choice within an optional element.
ROUTE.indb xxviii
xxix
Introduction
This book focuses on one major goal: to help you prepare to pass the ROUTE exam
(300-101). To help you prepare, this book achieves other useful goals as well: It explains
a wide range of networking topics, shows how to configure those features on Cisco
routers, and explains how to determine whether the feature is working. As a result, you
also can use this book as a general reference for IP routing and IP routing protocols.
However, the motivation for this book, and the reason it sits within the Cisco Press
Official Certification Guide series, is that its primary goal is to help you pass the ROUTE
exam.
The rest of this introduction focuses on two topics: the ROUTE exam and a description
of this book.
Cisco first announced its initial professional-level certifications in 1998 with the CCNP
Routing and Switching certification. CCNP Routing and Switching certification from
its inception has included the same kinds of IP routing topics found in today’s ROUTE
exam, but the exam names changed over the years. The exam names have tracked the
names of the associated Cisco authorized courses for the same topics: Advanced Cisco
Router Configuration (ACRC) in the early days, followed by Building Scalable Cisco
Internetworks (BSCI), and now ROUTE, because the current Cisco-authorized course
also goes by the name ROUTE.
Like its ancestors, the ROUTE exam is a part of the certification requirements for both
of the following Cisco certifications:
You can find the exam topics at Cisco.com. The most memorable way to navigate is to
go to www.cisco.com/go/ccnp and look for the ROUTE exam. Also, you can go to the
Cisco Learning Network website (www.cisco.com/go/learnnetspace)—a less memorable
URL but a great Cisco certification site. The Cisco Learning Network site hosts exam
information, learning tools, and forums in which you can communicate with others and
learn more about this and other Cisco exams.
Interestingly, some of the topics on the ROUTE (300-101) exam are topics that you
covered in your CCNA studies (that is, in the CCENT [ICND1] and ICND2 curriculum).
Also, several topics on the ROUTE exam are not covered in the Cisco official ROUTE
course. A big goal of this book is to make sure that you are prepared for any topic you
might encounter on the ROUTE exam. Therefore, in addition to covering topics in the
official ROUTE course, this book also covers topics not found in the ROUTE course.
Additionally, you might want to review your CCENT (ICND1) and ICND2 materials for
exam topics coming from those courses.
Table I-1 lists the topics on the ROUTE exam blueprint, with a reference to the part
of this book that covers the topic or a reference to the CCNA course (that is, CCENT
[ICND1] or ICND2) that covers the topic.
10/24/14 3:17 PM
xxxii CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
The broader question about the audience might well be why you should take the
ROUTE exam. First, the exam is required for the aforementioned CCNP and CCDP
certifications from Cisco. These certifications exist at the midpoint of the Cisco certifi-
cation hierarchy. These certifications have broader and deeper technology requirements
as compared to the Cisco Certified Entry Network Technician (CCENT) and Cisco
Certified Network Associate (CCNA) certifications.
The real question then about the audience for this book—at least the intended audi-
ence—is whether you have motivation to get one of these professional-level Cisco certi-
fications. CCNP in particular happens to be a popular, well-respected certification. Also,
CCDP has been a solid certification for a long time, particularly for engineers who spend
a lot of time designing networks with customers, rather than troubleshooting.
When you start the exam, you will be asked a series of questions. You answer the ques-
tion and then move on to the next question. The exam engine does not let you go back
and change your answer.
■ Multiple-choice (MC)
■ Testlet
■ Drag-and-drop (DND)
xxxiv CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
■ Simlet
The first three types of questions are relatively common in many testing environments.
The multiple-choice format simply requires that you point and click on a circle (that is, a
radio button) beside the correct answer for a single-answer question or on squares (that
is, check boxes) beside the correct answers for a multi-answer question. Cisco tradition-
ally tells you how many answers you need to choose, and the testing software prevents
you from choosing too many answers. Testlets are questions with one general scenario,
with a collection of multiple-choice questions about the overall scenario. Drag-and-drop
questions require you to left-click and hold a mouse button, move an object (for exam-
ple, a text box) to another area on the screen, and release the mouse button to place the
object somewhere else—typically into a list. For some questions, as an example, to get
the question correct, you might need to put a list of five things into the proper order.
The last two types both use a network simulator to ask questions. Interestingly, the two
types actually allow Cisco to assess two very different skills. First, sim questions gener-
ally describe a problem, and your task is to configure one or more routers and/or switch-
es to fix the problem. The exam then grades the question based on the configuration
that you changed or added. The simlet questions might well be the most difficult style
of question on the exams. Simlet questions also use a network simulator, but instead
of answering the question by changing the configuration, the question includes one or
more MC questions. The questions require that you use the simulator to examine the
current behavior of a network, interpreting the output of any show commands that you
can remember to answer the question. Although sim questions require you to trouble-
shoot problems related to a configuration, simlets require you to both analyze working
networks and networks with problems, correlating show command output with your
knowledge of networking theory and configuration commands.
The book includes many features that provide different ways to study and be ready for
the exam. If you understand a topic when you read it, but do not study it any further,
you will probably not be ready to pass the exam with confidence. The features included
in this book give you tools that help you determine what you know, review what you
know, better learn what you don’t know, and be well prepared for the exam. These tools
include
■ “Do I Know This Already?” Quizzes: Each chapter begins with a quiz that helps
you determine the amount of time that you need to spend studying that chapter.
■ Foundation Topics: These are the core sections of each chapter. They explain the
protocols, concepts, and configurations for the topics in that chapter.
■ Exam Preparation Tasks: The “Exam Preparation Tasks” section lists a series of
study activities that should be done after reading the “Foundation Topics” section.
Each chapter includes the activities that make the most sense for studying the topics
in that chapter. The activities include
10/24/14 3:17 PM
xxxvi CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Book Organization
This book contains 18 chapters, plus appendixes. The topics all focus in some way on IP
routing and IP routing protocols, making the topics somewhat focused, but with deep
coverage on those topics.
The book organizes the topics into six major parts. The following list outlines the major
part organization of this book:
■ Part I: “Fundamental Routing Concepts”: This part includes two chapters that focus
on routing fundamentals within an enterprise network (including connections to
remote offices):
■ Chapter 3: “IPv6 Review and RIPng”: The new version of the ROUTE cur-
riculum dramatically increases the focus on routing IPv6 networks. There-
fore, this chapter begins with a CCNA-level review of IPv6 addressing. Then,
this chapter shows how to configure RIPng, which supports IPv6 routing
(after contrasting RIPng with RIPv2).
■ Chapter 4: “Fundamental EIGRP Concepts”: This chapter reviews the
basics of EIGRP, including EIGRP path selection and neighbor formation.
■ Chapter 5: “Advanced EIGRP Concepts”: This chapter discusses the details
of how EIGRP builds its topology table, how those EIGRP-learned routes
become candidates to be injected into a router’s IP routing table, and options
for optimizing EIGRP convergence. Then, the chapter explores EIGRP route
filtering, route summarization, and the use of default routes with EIGRP.
xxxvii
■ Chapter 6: “EIGRP for IPv6 and Named EIGRP”: This chapter begins by
contrasting EIGRP for IPv4 and EIGRP for IPv6. Then, a hierarchical EIGRP
configuration approach, called Named EIGRP, is demonstrated.
■ Chapter 7: “Fundamental OSPF Concepts”: This chapter reviews the basics
of OSPF, including configuration, verification, and neighbor formation. The
chapter then concludes with a look at virtual links.
■ Chapter 8: “The OSPF Link-State Database”: This chapter explains the
various LSA types that OSPF uses to construct a link-state database. The
process involved in exchanging link-state database routers with neighboring
routers is also discussed.
■ Chapter 9: “Advanced OSPF Concepts”: This chapter discusses OSPF
route filtering, route summarization, sourcing default route information,
and special area types. Then, the chapter concludes with an examination of
OSPFv3 and describes how it can be used to route IPv6 networks.
■ Part III: “Route Redistribution and Selection”: Because many enterprise networks
need to simultaneously support multiple IGPs, this part begins by explaining how
IGPs can coexist and be redistributed into one another. Then, the discussion delves
into how a Cisco router makes its packet-switching decisions and how those deci-
sions can be altered using the Policy-Based Routing (PBR) and IP Service-Level
Agreement (IP SLA) features:
10/24/14 3:17 PM
xxxviii CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
ROUTE.indb xxxviii
xxxix
■ Appendix A , “Answers to the ‘Do I Know This Already?’ Quizzes”: Includes the
answers to all the questions from Chapters 1 through 17.
■ Appendix B, “ROUTE Exam Updates”: Covers a variety of short topics that either
clarify or expand upon topics covered earlier in the book. This appendix is updated
from time to time, and posted at http://kwtrain.com/routebook, with the most
recent version available at the time of printing included here as Appendix B. (The
first page of the appendix includes instructions on how to check to see whether a
later version of Appendix B is available online.)
■ Appendix D, “Memory Tables”: This appendix holds the key tables and lists from
each chapter with some of the content removed. You can print this appendix, and as
a memory exercise, complete the tables and lists. The goal is to help you memorize
facts that can be useful on the exam.
■ Appendix E, “Memory Tables Answer Key”: This appendix contains the answer
key for the exercises in Appendix D.
■ Glossary: The glossary contains definitions for all the terms listed in the “Define
Key Terms” sections at the conclusions of Chapters 1 through 17.
Cisco might make changes that affect the ROUTE exam from time to time. You should
always check www.cisco.com/go/ccnp for the latest details.
This chapter covers the following subjects:
ROUTE.indb 2
CHAPTER 1
The chapter then concludes with a design discussion revolving around how to accommo-
date the inevitable changes your network will undergo. For example, you will be given a
collection of strategies for changing routing protocols in your network or migrating from
IPv4 to IPv6.
Table 1-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
1. Which of the following features prevents a route learned on one interface from being
advertised back out of that interface?
a. Poison Reverse
b. Summarization
c. Split Horizon
d. Convergence
2. Identify the distance-vector routing protocols from the following. (Choose the two
best answers.)
a. IS-IS
b. EIGRP
c. RIP
d. OSPF
e. BGP
3. Select the type of network communication flow that is best described as “one-to-
nearest.”
a. Unicast
b. Multicast
c. Broadcast
d. Anycast
4. An NBMA network has which of the following design issues? (Choose the two best
answers.)
b. Bandwidth issues
a. The total data in a TCP segment, including only the TCP header
b. The total data in a TCP segment, not including any headers
c. The total data in a TCP segment, including only the IP and TCP headers
d. The total data in a TCP segment, including the Layer 2, IP, and TCP headers
ROUTE.indb 4
Chapter 1: Characteristics of Routing Protocols 5
a. 100,000,000 bits
b. 10,000,000 bits
c. 1,000,000 bits
d. 100,000 bits
7. When migrating from a PVST+ to Rapid-PVST+, which PVST+ features can be dis-
abled, because similar features are built into Rapid-PVST+? (Choose the two best
answers.)
a. UplinkFast
b. Loop Guard
c. BackboneFast
d. PortFast
8. Cisco EVN uses what type of trunk to carry traffic for all virtual networks between
two physical routers?
a. VNET
b. ISL
c. dot1Q
d. 802.10
10/24/14 3:17 PM
6 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Foundation Topics
A router could know how to reach a network by simply having one of its interfaces
directly connect that network. Perhaps you statically configured a route, telling a router
exactly how to reach a certain destination network. However, for large enterprises, the
use of static routes does not scale well. Therefore, dynamic routing protocols are typi-
cally seen in larger networks (and many small networks, too). A dynamic routing protocol
allows routers configured for that protocol to exchange route information and update
that information based on changing network conditions.
The first topic in this section explores the role of routing in an enterprise network. Then
some of the characteristics of routing protocols are presented, to help you decide which
routing protocol to use in a specific environment and to help you better understand the
nature of routing protocols you find already deployed in a network.
■ Building Access: This layer is part of the Campus network and is used to provide
user access to the network. Security (especially authentication) is important at this
layer, to verify that a user should have access to the network. Layer 2 switching is
typically used at this layer, in conjunction with VLANs.
■ Building Distribution: This layer is part of the Campus network that aggregates
building access switches. Multilayer switches are often used here.
■ Campus Backbone: This layer is part of the Campus network and is concerned with
the high-speed transfer of data through the network. High-end multilayer switches
are often used here.
■ Edge Distribution: This layer is part of the Campus network and serves as the
ingress and egress point for all traffic into and out of the Campus network. Routers
or multilayer switches are appropriate devices for this layer.
■ Internet Gateways: This layer contains routers that connect the Campus network
out to the Internet. Some enterprise networks have a single connection out to the
Internet, while others have multiple connections out to one or more Internet Service
Providers (ISP).
Chapter 1: Characteristics of Routing Protocols 7
Campus
(RIP, OSPF, EIGRP) Internet Gateways
(BGP)
Edge
Distribution Internet
Campus
Backbone
WAN Aggregation
(RIP, OSPF, EIGRP)
Building Access
Routing protocols used within the Campus network and within the WAN aggregation
layer are often versions of Routing Information Protocol (RIP), Open Shortest Path First
(OSPF), or Enhanced Interior Gateway Routing Protocol (EIGRP). However, when con-
necting out to the Internet, Border Gateway Protocol (BGP) is usually the protocol of
choice for enterprises having more than one Internet connection.
An emerging industry trend is to connect a campus to a remote office over the Internet,
as opposed to using a traditional WAN technology. Of course, the Internet is considered
an untrusted network, and traffic might need to traverse multiple routers on its way from
the campus to a remote office. However, a technology called Virtual Private Networks
(VPN) allows a logical connection to be securely set up across an Internet connection.
Chapter 2, “Remote Site Connectivity,” examines VPNs in more detail.
10/24/14 3:17 PM
8 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
to use in your network. As you learn more about these routing protocols, keeping the fol-
lowing characteristics in mind can help you do a side-by-side comparison of protocols:
■ Scalability
■ Vendor interoperability
■ Speed of convergence
This section of the chapter concludes by taking a closer look at each of these
characteristics.
Scalability
How large is your network now, and how large is it likely to become? The answers to
those questions can help determine which routing protocols not to use in your network.
For example, while you could use statically configured routes in a network with just a
couple of routers, such a routing solution does not scale well to dozens of routers.
While all the previously mentioned dynamic routing protocols are capable of support-
ing most medium-sized enterprise networks, you should be aware of any limitations. For
example, all versions of RIP have a maximum hop count (that is, the maximum number
of routers across which routing information can be exchanged) of 15 routers. BGP, on the
other hand, is massively scalable. In fact, BGP is the primary routing protocol used on the
Internet.
Vendor Interoperability
Will you be using all Cisco routers in your network, or will your Cisco routers need to
interoperate with non-Cisco routers? A few years ago, the answer to this question could
be a deal-breaker for using EIGRP, because EIGRP was a Cisco-proprietary routing
protocol.
However, in early 2013, Cisco announced that it was releasing EIGRP to the Internet
Engineering Task Force (IETF) standards body as an Informational RFC. As a result,
any networking hardware vendor can use EIGRP on its hardware. If you are working in
an environment with routers from multiple vendors, you should ensure that your Cisco
router has an appropriate Cisco IOS feature set to support your desired routing protocol
and that the third-party router(s) also support that routing protocol.
ROUTE.indb 8
Chapter 1: Characteristics of Routing Protocols 9
Speed of Convergence
A benefit of dynamic routing protocols over statically configured routes is the ability of
a dynamic routing protocol to reroute around a network failure. For example, consider
Figure 1-2. Router R1’s routing protocol might have selected the path through Router R3
as the best route to reach the 192.168.1.0 /24 network connected to Router R4. However,
imagine that a link failure occurred on the Fast Ethernet link between Routers R3 and R4.
Router R1’s routing protocol should be able to reroute around the link failure by sending
packets destined for the 192.168.1.0 /24 network through Router R2.
th S1
Pa R2 /1
p /0
c ku S1
Ba
/0 S1
S1 /0
Fa0/0 Fa0/1
Fa
SW1 R1 0/ R4 SW2
1
10.1.1.0/24 Link Failure
0/0 192.168.1.0/24
Fa Fa
0/0 /1
Fa0
R3
Some routing protocols have faster convergence times than others. RIP and BGP, for
example, might take a few minutes to converge, depending on the network topology. By
contrast, OSPF and EIGRP can converge in just a few seconds.
10/24/14 3:17 PM
10 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
10.0.0.0/24
Key 10.0.1.0/24
Topic 10.0.0.0/22
10.0.2.0/24
10.0.3.0/24
R1
Third Octet
Third 128 64 32 16 8 4 2 1
Octet
Value
0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 1
2 0 0 0 0 0 0 1 0
3 0 0 0 0 0 0 1 1
ROUTE.indb 10
Chapter 1: Characteristics of Routing Protocols 11
ISP 1
AS: 65100
Company A ISP 2
AS: 65000 AS: 65200
When selecting a routing protocol, you need to determine where the protocol will run.
Will it run within an autonomous system or between autonomous systems? The answer
to that question determines whether you need an interior gateway protocol (IGP) or an
exterior gateway protocol (EGP):
■ IGP: An IGP exchanges routes between routers in a single AS. Common IGPs include
Key OSPF and EIGRP. Although less popular, RIP and IS-IS are also considered IGPs.
Topic
Also, be aware that BGP is used as an EGP; however, you can use interior BGP
(iBGP) within an AS.
■ EGP: Today, the only EGP in use is BGP. However, from a historical perspective, be
aware that there was once another EGP, which was actually named Exterior Gateway
Protocol (EGP).
Distance-Vector
A distance-vector routing protocol sends a full copy of its routing table to its directly
attached neighbors. This is a periodic advertisement, meaning that even if there have been
no topological changes, a distance-vector routing protocol will, at regular intervals, re-
advertise its full routing table to its neighbors.
Another drawback to distance-vector routing protocols is the time they take to converge,
which is the time required for all routers to update their routing table in response to a
topological change in a network. Hold-down timers can speed the convergence process.
10/24/14 3:17 PM
12 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
After a router makes a change to a route entry, a hold-down timer prevents any subse-
quent updates for a specified period of time. This approach helps stop flapping routes
(which are routes that oscillate between being available and unavailable) from preventing
convergence.
Yet another issue with distance-vector routing protocols is the potential of a routing loop.
To illustrate, consider Figure 1-5. In this topology, the metric being used is hop count,
which is the number of routers that must be crossed to reach a network. As one example,
Router R3’s routing table has a route entry for network 10.1.1.0 /24 available off of Router
R1. For Router R3 to reach that network, two routers must be transited (Routers R2 and
R1). As a result, network 10.1.1.0 /24 appears in Router R3’s routing table with a metric
(hop count) of 2.
10.1.4.0/24
10.1.2.0/24 10.1.3.0/24
Serial 0/0 Serial 0/0
Serial 0/0 Serial 0/1
R1 R2 R3
Continuing with the example, imagine that interface Ethernet 1/0 on Router R3 goes
down. As shown in Figure 1-6, Router R3 loses its directly connected route (with a metric
of 0) to network 10.1.4.0 /24; however, Router R2 had a route to 10.1.4.0 /24 in its routing
table (with a metric of 1), and this route was advertised to Router R3. Router R3 adds this
entry for 10.1.4.0 to its routing table and increments the metric by 1.
10.1.4.0/24
10.1.2.0/24 10.1.3.0/24
Serial 0/0 Serial 0/0
Serial 0/0 Serial 0/1
R1 R2 R3
ROUTE.indb 12
Chapter 1: Characteristics of Routing Protocols 13
The problem with this scenario is that the 10.1.4.0 /24 entry in Router R2’s routing table
was because of an advertisement that Router R2 received from Router R3. Now, Router
R3 is relying on that route, which is no longer valid. The routing loop continues as Router
R3 advertises its newly learned route of 10.1.4.0 /24 with a metric of 2 to its neighbor,
Router R2. Because Router R2 originally learned the 10.1.4.0 /24 network from Router
R3, when it sees Router R3 advertising that same route with a metric of 2, the network
gets updated in Router R2’s routing table to have a metric of 3, as shown in Figure 1-7.
10.1.4.0/24
10.1.2.0/24 10.1.3.0/24
Serial 0/0 Serial 0/0
Serial 0/0 Serial 0/1
R1 R2 R3
Figure 1-7 Routing Loop: Routers R2 and R3 Incrementing the Metric for 10.1.4.0 /24
The metric for the 10.1.4.0 /24 network continues to increment in the routing tables for
both Routers R2 and R3, until the metric reaches a value considered to be an unreachable
value (for example, 16 in the case of RIP). This process is referred to as a routing loop.
Distance-vector routing protocols typically use one of two approaches for preventing
routing loops:
■ Split Horizon: The Split Horizon feature prevents a route learned on one interface
Key from being advertised back out of that same interface.
Topic
■ Poison Reverse: The Poison Reverse feature causes a route received on one interface
to be advertised back out of that same interface with a metric considered to be
infinite.
Having either approach applied to the previous example would have prevented Router
R3 from adding the 10.1.4.0 /24 network into its routing table based on an advertisement
from Router R2.
10/24/14 3:17 PM
14 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
224.0.0.9) to advertise its IP routing table, as opposed to broadcasts. RIP next genera-
tion (RIPng) supports the routing of IPv6 networks, while RIPv1 and RIPv2 support
the routing of IPv4 networks.
By default, EIGRP uses bandwidth and delay in its metric calculation; however, other
parameters can be considered. These optional parameters include reliability, load, and
maximum transmission unit (MTU) size.
The algorithm EIGRP uses for its route selection is not Dijkstra’s Shortest Path First algo-
rithm (as used by OSPF). Instead, EIGRP uses Diffusing Update Algorithm (DUAL).
Link-State
Rather than having neighboring routers exchange their full routing tables with one anoth-
er, a link-state routing protocol allows routers to build a topological map of a network.
Then, similar to a global positioning system (GPS) in a car, a router can execute an algo-
rithm to calculate an optimal path (or paths) to a destination network.
Routers send link-state advertisements (LSA) to advertise the networks they know how to
reach. Routers then use those LSAs to construct the topological map of a network. The
algorithm run against this topological map is Dijkstra’s Shortest Path First algorithm.
■ Open Shortest Path First (OSPF): A link-state routing protocol that uses a metric of
cost, which is based on the link speed between two routers. OSPF is a popular IGP,
because of its scalability, fast convergence, and vendor interoperability.
ROUTE.indb 14
Chapter 1: Characteristics of Routing Protocols 15
Although using IS-IS as an IGP offers the scalability, fast convergence, and vendor
interoperability benefits of OSPF, it has not been as widely deployed as OSPF.
Path-Vector
A path-vector routing protocol includes information about the exact path packets take to
reach a specific destination network. This path information typically consists of a series
of autonomous systems through which packets travel to reach their destination. Border
Gateway Protocol (BGP) is the only path-vector protocol you are likely to encounter in a
modern network.
Also, BGP is the only EGP in widespread use today. In fact, BGP is considered to be the
routing protocol that runs the Internet, which is an interconnection of multiple autono-
mous systems.
BGP’s path selection is not solely based on AS hops, however. BGP has a variety of other
parameters that it can consider. Interestingly, none of those parameters are based on
link speed. Also, although BGP is incredibly scalable, it does not quickly converge in
the event of a topological change. The current version of BGP is BGP version 4 (BGP-4).
However, an enhancement to BGP-4, called Multiprotocol BGP (MP-BGP), supports the
routing of multiple routed protocols, such as IPv4 and IPv6.
Summary of Categories
As a reference, Table 1-2 categorizes the previously listed routing protocols, based on
their type and whether they are primarily an IGP or an EGP.
Note that a network can simultaneously support more than one routing protocol through
the process of route redistribution. For example, a router could have one of its inter-
faces participating in an OSPF area of the network and have another interface participat-
ing in an EIGRP area of the network. This router could then take routes learned through
OSPF and inject those routes into the EIGRP routing process. Similarly, EIGRP-learned
routes could be redistributed into the OSPF routing process.
10/24/14 3:17 PM
16 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Older routing protocols, such as RIPv1 and IGRP (the now-antiquated predecessor to
EIGRP), used broadcasts to advertise routing information; however, most modern IGPs
use multicasts for their route advertisements.
Note BGP establishes a TCP session between peers. Therefore, unicast transmissions are
used for BGP route advertisement.
Unicast
Most network traffic is unicast in nature, meaning that traffic travels from a single source
device to a single destination device. Figure 1-8 illustrates an example of a unicast trans-
mission. In IPv4 networks, unicast addresses are made up of Class A, B, and C addresses.
IPv6 networks instead use global unicast addresses, which begin with the 2000::/3 prefix.
Receiver
10.1.1.1
Receiver
10.1.1.2
Destination Destination
Address: Address: Non-Receiver
Video Server 10.1.1.1 10.1.1.2 10.1.1.3
Broadcast
Broadcast traffic travels from a single source to all destinations in a subnet (that is, a
broadcast domain). A broadcast address of 255.255.255.255 might seem that it would
reach all hosts on an interconnected network. However, 255.255.255.255 targets all
Chapter 1: Characteristics of Routing Protocols 17
devices on a single network, specifically the network local to the device sending a packet
destined for 255.255.255.255. Another type of broadcast address is a directed broad-
cast address, which targets all devices in a remote network. For example, the address
172.16.255.255 /16 is a directed broadcast targeting all devices in the 172.16.0.0 /16 net-
work. Figure 1-9 illustrates an example of a broadcast transmission.
Note Broadcasts are used in IPv4 networks, but not in IPv6 networks.
Receiver
10.1.1.1
Receiver
10.1.1.2
Destination
Address: Non-Receiver
Video Server 255.255.255.255 10.1.1.3
Multicast
Multicast technology provides an efficient mechanism for a single host to send traffic
to multiple, yet specific, destinations. For example, imagine a network with 100 users.
Twenty of those users want to receive a video stream from a video server. With a unicast
solution, the video server would have to send 20 individual streams, one stream for each
recipient. Such a solution could consume a significant amount of network bandwidth and
put a heavy processor burden on the video server.
With a broadcast solution, the video server would only have to send the video stream
once; however, the stream would be received by every device on the local subnet, even
devices not wanting to receive it. Even though those devices do not want to receive the
video stream, they still have to pause what they are doing and take time to check each of
these unwanted packets.
As shown in Figure 1-10, multicast offers a compromise, allowing the video server to send
the video stream only once, and only sending the video stream to devices on the network
that want to receive the stream.
What makes this possible in IPv4 networks is the use of a Class D address. A Class D
address, such as 239.1.2.3, represents the address of a multicast group. The video server
could, in this example, send a single copy of each video stream packet destined for
239.1.2.3. Devices wanting to receive the video stream can join the multicast group. Based
on the device request, switches and routers in the topology can then dynamically deter-
mine out of which ports the video stream should be forwarded.
10/24/14 3:17 PM
18 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Receiver
10.1.1.1
Receiver
10.1.1.2
Destination
Address: 239.1.2.3
Video Server
Non-Receiver
10.1.1.3
Anycast
With anycast, a single IPv6 address is assigned to multiple devices, as depicted in Figure
1-11. The communication flow is one-to-nearest (from the perspective of a router’s rout-
ing table).
2200::1
Server A
R2
R1
Destination Address:
2200::1
R3
2100::1 Server B
2200::1
ROUTE.indb 18
Chapter 1: Characteristics of Routing Protocols 19
In Figure 1-11, a client with an IPv6 address of 2100::1 wants to send traffic to a desti-
nation IPv6 address of 2200::1. Notice that two servers (Server A and Server B) have an
IPv6 address of 2200::1. In the figure, the traffic destined for 2200::1 is sent to Server A
through Router R2, because the network on which Server A resides appears to be closer
than the network on which Server B resides, from the perspective of Router R1’s IPv6
routing table.
Note Anycast is an IPv6 concept and is not found in IPv4 networks. Also, note that IPv6
anycast addresses are not unique from IPv6 unicast addresses.
Point-to-Point Network
A very basic network architecture type is a point-to-point network. As seen in Figure
1-12, a point-to-point network segment consists of a single network link interconnecting
two routers. This network type is commonly found on serial links.
R1 R2
Broadcast Network
A broadcast network segment uses an architecture in which a broadcast sent from one of
the routers on the network segment is propagated to all other routers on that segment.
An Ethernet network, as illustrated in Figure 1-13, is a common example of a broadcast
network.
10/24/14 3:17 PM
20 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
R1
Broadcast
SW1
R2 R3
NBMA
As its name suggests, a nonbroadcast multiaccess (NBMA) network does not support
broadcasts. As a result, if an interface on a router connects to two other routers, as depict-
ed in Figure 1-14, individual messages must be sent to each router.
01
I=2
DLC
Frame Relay Switch BR1
2 S1/0: 10.1.1.2/24
DLCI = 10
HQ
DLCI = 10
3
S1/0: 10.1.1.1/24
DLC
I=3 BR2
01
S1/0: 10.1.1.3/24
The absence of broadcast support also implies an absence of multicast support. This
can lead to an issue with dynamic routing protocols (such as OSPF and EIGRP) that
dynamically form neighborships with neighboring routers discovered through multicasts.
Because neighbors cannot be dynamically discovered, neighboring IP addresses must be
statically configured. Examples of NBMA networks include ATM and Frame Relay.
The requirement for static neighbor configuration is not the only routing protocol issue
stemming from an NBMA network. Consider the following:
ROUTE.indb 20
Chapter 1: Characteristics of Routing Protocols 21
■ Split Horizon issues: Distance-vector routing protocols (RIP and EIGRP, for exam-
Key ple) can use the previously mentioned Split Horizon rule, which prevents routes
Topic
learned on one interface from being advertised back out of that same interface.
Consider Figure 1-14 again. Imagine that Router BR2 advertised a route to Router
HQ, and Router HQ had Split Horizon enabled for its S 1/0 interface. That condi-
tion would prevent Router HQ from advertising that newly learned route to Router
BR1, because it would be advertising that route out the same interface on which it
was learned. Fortunately, in situations like this, you can administratively disable Split
Horizon.
■ Designated router issues: Recall from your CCNA studies that a broadcast net-
work (for example, an Ethernet network) OSPF elects a designated router (DR), with
which all other routers on a network segment form an adjacency. Interestingly, OSPF
attempts to elect a DR on an NMBA network, by default. Once again considering
Figure 1-14, notice that only Router HQ has a direct connection to the other rout-
ers; therefore, Router HQ should be the DR. This election might not happen without
administrative intervention, however. Specifically, in such a topology, you would
need to set the OSPF Priority to 0 on both Routers BR1 and BR2, which prevents
them from participating in a DR election.
TCP/IP Fundamentals
Recall from your CCNA studies that the Internet layer of the TCP/IP stack maps to Layer
3 (that is, the network layer) of the Open Systems Interconnection (OSI) model. While
multiple routed protocols (for example, IP, IPX, and AppleTalk) reside at the OSI model’s
network layer, Internet Protocol (IP) has become the de-facto standard for network
communication.
Sitting just above IP, at the transport layer (of both the TCP/IP and OSI models) is
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). This sec-
tion reviews the basic operation of the TCP/IP suite of protocols, as their behavior is the
foundation of the routing topics in the remainder of this book.
IP Characteristics
Figure 1-15 shows the IP version 4 packet header format.
22 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Header
Version Type of Service Total Length
Length
Source Address
Destination Address
■ Version field: The Version field indicates IPv4 (with a value of 0100).
■ Header Length field: The Header Length field (commonly referred to as the Internet
Header Length (IHL) field) is a 4-bit field indicating the number of 4-byte words in
the IPv4 header.
■ Type of Service field: The Type of Service (ToS) field (commonly referred to as
the ToS Byte or DHCP field) has 8 bits used to set quality of service (QoS) mark-
ings. Specifically, the 6 leftmost bits are used for the Differentiated Service Code
Point (DSCP) marking, and the 2 rightmost bits are used for Explicit Congestion
Notification (an extension of Weighted Random Early Detection (WRED), used for
flow control).
■ Total Length field: The Total Length field is a 16-bit value indicating the size of the
packet (in bytes).
■ Identification field: The Identification field is a 16-bit value used to mark fragments
that came from the same packet.
■ IP Flags field: The IP Flags field is a 3-bit field, where the first bit is always set to a
0. The second bit (the Don’t Fragment [DF] bit) indicates that a packet should not
be fragmented. The third bit (the More Fragments [MF] bit) is set on all of a pack-
et’s fragments, except the last fragment.
■ Fragment Offset field: The Fragment Offset field is a 13-bit field that specifies the
offset of a fragment from the beginning of the first fragment in a packet, in 8-byte
units.
■ Time to Live (TTL) field: The Time to Live (TTL) field is an 8-bit field that is dec-
remented by 1 every time the packet is routed from one IP network to another (that
ROUTE.indb 22
Chapter 1: Characteristics of Routing Protocols 23
is, passes through a router). If the TTL value ever reaches 0, the packet is discarded
from the network. This behavior helps prevent routing loops.
■ Protocol field: The Protocol field is an 8-bit field that specifies the type of data
encapsulated in the packet. TCP and UDP are common protocols identified by this
field.
■ Header Checksum field: The Header Checksum field is a 16-bit field that performs
error checking for a packet’s header. Interestingly, this error checking is performed
for UDP segments, in addition to TCP segments, even though UDP is itself an “unre-
liable” protocol.
■ Source Address field: The 32-bit Source Address field indicates the source of an
IPv4 packet.
■ Destination Address field: The 32-bit Destination Address field indicates the desti-
nation of an IPv4 packet.
■ IP Option field: The IP Option field is a seldom-used field that can specify a variety
of nondefault packet options. If the IP Option field is used, its length varies based on
the options specified.
An IPv6 packet header, as seen in Figure 1-16, is simpler in structure than the IPv4 packet
header.
Source Address
Destination Address
■ Version field: Like an IPv4 header, an IPv6 header has a Version field, indicating
IPv6 (with a value of 0110).
■ Traffic Class field: The Traffic Class field is the same size, performs the same func-
tions, and takes on the same values as the Type of Service field in an IPv4 header.
■ Flow Label field: The 20-bit Flow Label field can be used to instruct a router to use
a specific outbound connection for a traffic flow (if a router has multiple outbound
connections). By having all packets in the same flow use the same connection, the
probability of packets arriving at their destination out of order is reduced.
10/24/14 3:17 PM
24 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
■ Payload Length field: The Payload Length field is a 16-bit field indicating the size
(in bytes) of the payload being carried by an IPv6 packet.
■ Next Header field: The Next Header field, similar to the Protocol field in an IPv4
header, indicates the type of header encapsulated in the IPv6 header. Typically, this
8-bit header indicates a specific transport layer protocol.
■ Hop Limit field: The 8-bit Hop Limit field replaces, and performs the same function
as, the IPv4 header’s TTL field. Specifically, it is decremented at each router hop until
it reaches 0, at which point the packet is discarded.
■ Source Address field: Similar to the IPv4 header’s 32-bit Source Address field, the
IPv6 Source Address field is 128 bits in size and indicates the source of an IPv6
packet.
■ Destination Address field: Similar to the IPv4 header’s 32-bit Destination Address
field, the IPv6 Destination Address field is 128 bits in size and indicates the destina-
tion of an IPv6 packet.
Routing Review
As a review from your CCNA studies, recall how the fields in an IP header are used to
route a packet from one network to another. While the process is similar for IPv6, the fol-
lowing example considers IPv4.
In the topology shown in Figure 1-17, PC1 needs to send traffic to Server1. Notice that
these devices are on different networks. So, the question becomes, “How does a packet
from a source IP address of 192.168.1.2 get forwarded to a destination IP address of
192.168.3.2?”
PC1
Server1
S1/1
SW1 Fa0/0 R1 192.168.2.1/30 S1/1 R2 Fa0/0 SW2
192.168.1.1/24 192.168.2.2/30 192.168.3.1/24
AAAA.AAAA.AAAA BBBB.BBBB.BBBB
Step 1. PC1 compares its IP address and subnet mask of 192.168.1.2 /24 with the des-
tination IP address and subnet mask of 192.168.3.2 /24. PC1 concludes that
the destination IP address resides on a remote subnet. Therefore, PC1 needs to
ROUTE.indb 24
Chapter 1: Characteristics of Routing Protocols 25
send the packet to its default gateway, which could have been manually con-
figured on PC1 or dynamically learned through Dynamic Host Configuration
Protocol (DHCP). In this example, PC1 has a default gateway of 192.168.1.1
(Router R1). However, to construct a Layer 2 frame, PC1 also needs the MAC
address of its default gateway. PC1 sends an Address Resolution Protocol
(ARP) request for Router R1’s MAC address. After PC1 receives an ARP reply
from Router R1, PC1 adds Router R1’s MAC address to its ARP cache. PC1
now sends its data in a frame destined for Server1, as shown in Figure 1-18.
Note ARP uses broadcasts, which are not supported by IPv6. Therefore, IPv6 exchanges
Neighbor Discovery messages with adjacent devices to perform functions similar to ARP.
ARP Request
ARP Reply
S1/1
SW1 Fa0/0 R1 192.168.2.1/30 S1/1 R2 Fa0/0 SW2
192.168.1.1/24 192.168.2.2/30 192.168.3.1/24
AAAA.AAAA.AAAA BBBB.BBBB.BBBB
Data Frame
Step 2. Router R1 receives the frame sent from PC1 and interrogates the IP header.
An IP header contains a Time to Live (TTL) field, which is decremented once
for each router hop. Therefore, Router R1 decrements the packet’s TTL field.
If the value in the TTL field is reduced to 0, the router discards the frame and
sends a time exceeded Internet Control Message Protocol (ICMP) message
back to the source. Assuming that the TTL is not decremented to 0, Router
R1 checks its routing table to determine the best path to reach network
192.168.3.0 /24. In this example, Router R1’s routing table has an entry stating
that network 192.168.3.0 /24 is accessible through interface Serial 1/1. Note
that ARPs are not required for serial interfaces, because these interface types
do not have MAC addresses. Router R1, therefore, forwards the frame out of
its Serial 1/1 interface, as shown in Figure 1-19.
10/24/14 3:17 PM
26 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
PC1
Data Frame
S1/1
SW1 Fa0/0 R1 192.168.2.1/30 S1/1 R2 Fa0/0 SW2
192.168.1.1/24 192.168.2.2/30 192.168.3.1/24
AAAA.AAAA.AAAA BBBB.BBBB.BBBB
Step 3. When Router R2 receives the frame, it decrements the TTL in the IP header,
just as Router R1 did. Again, assuming that the TTL did not get decremented
to 0, Router R2 interrogates the IP header to determine the destination net-
work. In this case, the destination network of 192.168.3.0 /24 is directly
attached to Router R2’s Fast Ethernet 0/0 interface. Similar to how PC1 sent
out an ARP request to determine the MAC address of its default gateway,
Router R2 sends an ARP request to determine the MAC address of Server1.
After an ARP Reply is received from Server1, Router R2 forwards the frame
out of its Fast Ethernet 0/0 interface to Server1, as illustrated in Figure 1-20.
PC1
Server1
S1/1
SW1 Fa0/0 R1 192.168.2.1/30 S1/1 R2 Fa0/0 SW2
192.168.1.1/24 192.168.2.2/30 192.168.3.1/24
AAAA.AAAA.AAAA BBBB.BBBB.BBBB
Data Frame
ROUTE.indb 26
Chapter 1: Characteristics of Routing Protocols 27
Asymmetric Routing
Many times, routing operations are impacted by Layer 2 switching in a network. As an
example, consider a situation, as depicted in Figure 1-21, where a VLAN is spread across
multiple access layer switches, and a First-Hop Redundancy Protocol (FHRP) (for exam-
ple, HSRP, VRRP, or GLBP) is being used on multilayer switches at the distribution layer.
Internet
Core
CSW1 Layer
Distribution
DSW1 DSW2 Layer
In the figure, notice that VLAN 100 (that is, 10.1.1.0 /24) exists on both switches ASW1
and ASW2 at the access layer. Also, notice that there are two multilayer switches (that
is, DSW1 and DSW2) at the distribution layer with an HSRP configuration to provide
default gateway redundancy to hosts in VLAN 100. The multilayer switch in the core
layer (that is, CSW1) supports equal-cost load balancing between DSW1 and DSW2.
10/24/14 3:17 PM
28 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Focusing on the HSRP configuration, imagine that DSW1 is the active HSRP “router”
and DSW2 is the standby HSRP “router.” Next, imagine that PC1 sends traffic out to the
Internet. The traffic flows through ASW1, DSW1 (the active HSRP router), and CSW1, as
shown in Figure 1-22.
Internet
Core
Outbound Traffic CSW1 Layer
Flow
Distribution
DSW1 DSW2 Layer
A challenge with this common scenario can occur with the return traffic, as illustrated in
Figure 1-23. The return traffic flows from the Internet and into CSW1, which then load-
balances between DSW1 and DSW2. When the path through DSW1 is used, the MAC
address of PC1 is known to DSW1’s ARP cache (because it just saw PC1’s MAC address
being used as the source MAC address in a packet going out to the Internet). However,
when the path through DSW2 is used, DSW2 might not have PC1’s MAC address in its
ARP cache (because PC1 isn’t normally using DSW2 as its default gateway). As a result,
DSW2 floods this unknown unicast traffic out all its other ports. This issue is known as
ROUTE.indb 28
Chapter 1: Characteristics of Routing Protocols 29
asymmetric routing, because traffic might leave through one path (for example, through
DSW1) and return through a different path (for example, through DSW2). Another name
given to this issue is unicast flooding, because of the potential for a backup FHRP rout-
er or multilayer switch to flood unknown unicast traffic for returning traffic.
Key
Topic Internet
Core
Inbound Traffic Flow
CSW1 Layer
from Internet to CSW1
One Possible Load
Balancing Path from
CSW1 to DSW1
Another Possible Load
Balancing Path from Active HSRP Standby HSRP
CSW1 to DSW2 Router Router
Distribution
DSW1 DSW2 Layer
Cisco recommends that you do not span a VLAN across more than one access layer
switch to avoid such an issue. However, if a particular design requires the spanning of
a VLAN across multiple access layer switches, the best-practice recommendation from
Cisco is that you adjust the FHRP device’s ARP timer to be equal to or less than the
Content Addressable Memory (CAM) aging time. Otherwise, the CAM table entry for
the end station will time out before the ARP entry times out, meaning that the FHRP
device knows (from its ARP cache) the MAC address corresponding to the destination IP
address, and therefore does not need to ARP for the MAC address. However, if the CAM
10/24/14 3:17 PM
30 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
entry has timed out, the FHRP device needs to flood the traffic to make sure that it gets
to the intended destination. With an ARP timer equal to or less than the CAM aging
time, there will never be an ARP entry for a MAC address not also stored in the CAM
table. As a result, if the FHRP device’s ARP entry has timed out, it will use ARP to get
the MAC address of the destination IP address, thus causing the CAM table to learn the
appropriate egress port.
Note Latency is the time required for a packet to travel from its source to destination.
Some applications, such as Voice over IP (VoIP), are latency sensitive, meaning that they do
not perform satisfactorily if the latency of their packets is too high. For example, the G.114
recommendation states that the one-way latency for VoIP traffic should not exceed 150
ms.Latency is a factor in the calculation of the bandwidth-delay product. Specifically, the
bandwidth-delay product is a measurement of the maximum number of bits that can be on
a network segment at any one time, and it is calculated by multiplying the segment’s band-
width (in bits/sec) by the latency packets experience as they cross the segment (in sec).
For example, a network segment with a bandwidth of 768 kbps and an end-to-end latency
of 100 ms would have a bandwidth-delay product of 76,800 bits (that is 768,000 * 0.1 =
76,800).
ICMP Messages
Another protocol residing alongside IP at Layer 3 of the OSI model is Internet Control
Message Protocol (ICMP). ICMP is most often associated with the Ping utility, used
to check connectivity with a remote network address (using ICMP Echo Request and
ICMP Echo Reply messages).
Note There is some debate in the industry about where ICMP fits into the OSI model.
Although it is generally considered to be a Layer 3 protocol, be aware that ICMP is encap-
sulated inside of an IP packet, and some of its messages are based on Layer 4 events.
ROUTE.indb 30
Chapter 1: Characteristics of Routing Protocols 31
ICMP does have other roles beyond Ping. By using a variety of message types, ICMP can
be used by network devices (for example, routers) to provide information to one another.
Figure 1-24 shows the structure of an ICMP packet header.
Rest of Header
The purposes of the fields found in an ICMP packet header are as follows:
■ Type: The 1-byte Type field contains a number indicating the specific type of ICMP
message. Here are a few examples: A Type 0 is an Echo Reply message, a Type 3 is a
Destination Unreachable message, a Type 5 is a Redirect message, and a Type 8 is
an ICMP Echo Request message.
■ Code: The 1-byte Code field further defines the ICMP type. For example, there are
16 codes for Destination Unreachable ICMP messages. Here are a couple of exam-
ples: A code of 0 means that the destination network is unreachable, while a code of
1 means that the destination host is unreachable.
■ Rest of Header: The 4-byte Rest of Header field is 4 bytes in length, and its con-
tents are dependent on the specific ICMP type.
While ICMP has multiple messages types and codes, for purposes of the ROUTE exam,
you should primarily be familiar with the two following ICMP message types:
■ Destination Unreachable: If a packet enters a router destined for an address that the
Key router does not know how to reach, the router can let the sender know by sending a
Topic
Destination Unreachable ICMP message back to the sender.
■ Redirect: A host might have routing information indicating that to reach a particu-
lar destination network, packets should be sent to a certain next-hop IP address.
However, if network conditions change and a different next-hop IP address should
be used, the original next-hop router can let the host know to use a different path by
sending the host a Redirect ICMP message.
TCP Characteristics
TCP is commonly touted as being a reliable transport mechanism, as compared to its
unreliable counterpart, UDP. Examination of the TCP segment header format, as shown in
Figure 1-25, provides valuable insight into how this reliability happens.
10/24/14 3:17 PM
32 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Sequence Number
Acknowledgment Number
The purposes of the fields found in a TCP segment header are as follows:
■ Source Port field: The Source Port field is a 16-bit field indicating the sending port
number.
■ Destination Port field: The Destination Port field is a 16-bit field indicating the
receiving port number.
■ Sequence Number field: The Sequence Number field is a 32-bit field indicting the
amount of data sent during a TCP session. The sending party can be assured that
the receiving party really received the data, because the receiving party uses the
sequence number as the basis for the acknowledgment number in the next seg-
ment it sends back to the sender. Specifically, the acknowledgment number in that
segment equals the received sequence number plus 1. Interestingly, at the begin-
ning of a TCP session, the initial sequence number can be any number in the range
0–4,294,967,295 (that is, the range of numbers that can be represented by 32 bits).
However, when you are doing troubleshooting and performing a packet capture of
a TCP session, the initial sequence number might appear to be a relative sequence
number of 0. The use of a relative sequence number can often make data easier to
interpret while troubleshooting.
■ Offset field: The Offset field is a 4-bit field that specifies the offset between the
data in a TCP segment and the start of the segment, in units of 4-byte words.
ROUTE.indb 32
Chapter 1: Characteristics of Routing Protocols 33
■ Reserved field: The 3-bit Reserved field is not used, and each of the 3 bits are set to
a value of 0.
■ TCP Flags field: The TCP Flags field is comprised of 9 flag bits (also known as con-
trol bits), which indicate a variety of segment parameters.
■ Window field: The 16-bit Window field specifies the number of bytes a sender is
willing to transmit before receiving an acknowledgment from the receiver.
■ Checksum field: The Checksum field is a 16-bit field that performs error checking
for a segment.
■ Urgent Pointer field: The 16-bit Urgent Pointer field indicates that last byte of a
segment’s data that was considered urgent. The field specifies the number of bytes
between the current sequence number and that urgent data byte.
■ TCP Options field: The optional TCP Options field can range in size from 0 to 320
bits (as long as the number of bits is evenly divisible by 32), and the field can contain
a variety of TCP segment parameters.
Three-Way Handshake
The process of setting up a TCP session involves a three-way handshake, as listed in the
following steps and as illustrated in Figure 1-26.
Step 1. The session initiator sends a Synchronization (SYN) message to the target
Key host.
Topic
Step 2. The target host acknowledges receipt of the SYN message with an
Acknowledgment (ACK) message and also sends a SYN message of its own.
Step 3. The session initiator receives the SYN messages from the target host and
acknowledges receipt by sending an ACK message.
1 SYN
SYN + ACK 2
3 ACK
10/24/14 3:17 PM
34 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
with a single acknowledgment. In some cases, as illustrated in Figure 1-27, TCP uses a
sliding window, where the window size begins with one segment. If there is a successful
acknowledgment of that one segment (that is, the receiver sends an ACK asking for the
next segment), the window size doubles to two segments. Upon successful receipt of
those two segments, the next window contains four segments. This exponential increase
in window size continues until the receiver does not acknowledge successful receipt of
all segments within a certain time period (known as the round-trip time [RTT], which
is sometimes called real transfer time), or until a configured maximum window size is
reached.
Window Size 1
Key
Topic Segment 1
ACK 2
Window Size 2
Sender Segment 2 Receiver
Segment 3
ACK 4
Window Size 4
Segment 4
Segment 5
Segment 6
Segment 7
ACK 8
The TCP Maximum Segment Size (MSS) is the amount of data that can be contained in
a single TCP segment. The value is dependent on the current TCP window size.
Note The term Maximum Segment Size (MSS) seems to imply the size of the entire
Layer 4 segment (that is, including Layer 2, Layer 3, and Layer 4 headers). However, MSS
only refers to the amount of data in a segment.
If a single TCP flow drops a packet, that flow might experience TCP slow start, mean-
ing that the window size is reduced to one segment. The window size then grows expo-
nentially until it reaches one-half of its congestion window size (that is, the window size
when congestion was previously experienced). At that point, the window size begins to
grow linearly instead of exponentially.
If a router interface’s output queue fills to capacity, all TCP flows can simultaneously
start to drop packets, causing all TCP flows to experience slow start. This condition,
called global synchronization or TCP synchronization, results in a very inefficient
ROUTE.indb 34
Chapter 1: Characteristics of Routing Protocols 35
use of bandwidth, because of all TCP flows having reduced window sizes and therefore
spending more time waiting for acknowledgments.
Note To prevent global synchronization, Cisco IOS supports a feature called Weighted
Random Early Detection (WRED), which can pseudo-randomly drop packets from flows
based on the number of packets currently in a queue and the quality of service (QoS)
markings on the packets. By dropping packets before the queue fills to capacity, the global
synchronization issue is avoided.
Out-of-Order Delivery
In many routed environments, a router has more than one egress interface that can reach
a destination IP address. If load balancing is enabled in such a scenario, some packets
in a traffic flow might go out one interface, while other packets go out of another inter-
face. With traffic flowing out of multiple interfaces, there is a chance that the packets
will arrive out of order. Fortunately, TCP can help prevent out-of-order packets by either
sequencing them in the correct order or by requesting the retransmission of out-of-order
packets.
UDP Characteristics
Figure 1-28 presents the structure of a UDP segment header. Because UDP is considered
to be a connectionless, unreliable protocol, it lacks the sequence numbering, window
size, and acknowledgment numbering present in the header of a TCP segment. Rather
the UDP segment’s header contains only source and destination port numbers, a UDP
checksum (which is an optional field used to detect transmission errors), and the segment
length (measured in bytes).
Because a UDP segment header is so much smaller than a TCP segment header, UDP
becomes a good candidate for the transport layer protocol serving applications that need
to maximize bandwidth and do not require acknowledgments (for example, audio or
video streams). In fact, the primary protocol used to carry voice and video traffic, Real-
time Transport Protocol (RTP), is a Layer 4 protocol that is encapsulated inside of UDP.
If RTP is carrying interactive voice or video streams, the latency between the participants
in a voice and/or video call should ideally be no greater than 150 ms. To help ensure that
RTP experiences minimal latency, even during times of congestion, Cisco recommends a
queuing technology called Low Latency Queuing (LLQ). LLQ allows one or more traffic
10/24/14 3:17 PM
36 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
types to be buffered in a priority queue, which is serviced first (up to a maximum band-
width limit) during times of congestion. Metaphorically, LLQ works much like a carpool
lane found in highway systems in larger cities. With a carpool lane, if you are a special
type of traffic (for example, a vehicle with two or more passengers), you get to drive in
a separate lane with less congestion. However, the carpool lane is not the autobahn (a
German highway without a speed limit). You are still restricted as to how fast you can go.
With LLQ, you can treat special traffic types (for example, voice and video using RTP)
in a special way, by placing them in a priority queue. Traffic in the priority queue (much
like a carpool lane) gets to go ahead of nonpriority traffic; however, there is a bandwidth
limit (much like a speed limit) that traffic in the priority queue cannot exceed. Therefore,
priority traffic does not starve out nonpriority traffic.
As one example, in Chapter 4, “Fundamental EIGRP Concepts,” you will read about
EIGRP K-values and how they must match between EIGRP neighbors. Therefore, if you
make a K-value change on one router, that change needs to be reflected on neighboring
routers.
■ Using Administrative Distance (AD): When migrating from one routing protocol
Key to another, one approach is to configure both routing protocols on all your routers,
Topic
allowing them to run concurrently. However, when you do your configuration of the
new routing protocol, you should make sure that it has a higher AD than the existing
routing protocol. This approach allows you to make sure that the new routing proto-
col has successfully learned all the routes it needs to learn and has appropriate next
hops for its route entries. After you are convinced that the new routing protocol is
configured appropriately, you can adjust the AD on either the old or the new routing
protocol such that the new routing protocol is preferred.
a time, and mutually redistribute routes between portions of your network using
the old routing protocol and portions using the new routing protocol. This approach
allows you to, at your own pace, roll out and test the new routing protocol in your
network locations.
IPv6 Migration
You could argue that there are two kinds of IP networks: those that have already migrat-
ed to IPv6 and those that will migrate to IPv6. With the depletion of the IPv4 address
space, the adoption of IPv6 for most every IP-based network is an eventuality. Following
are a few strategies to consider when migrating your network, or your customers’ net-
works, from IPv4 to IPv6:
■ Check equipment for IPv6 compatibility: Before rolling out IPv6, you should check
Key your existing network devices (for example, switches, routers, and firewalls) for IPv6
Topic
compatibility. In some cases, you might be able to upgrade the Cisco IOS on your
existing gear to add IPv6 support for those devices.
■ Run IPv4 and IPv6 concurrently: Most network devices (including end-user com-
puters) that support IPv6 also support IPv4 and can run both at the same time. This
type of configuration is called a dual-stack configuration. A dual-stack approach
allows you to gradually add IPv6 support to your devices and then cut over to just
IPv6 after all devices have their IPv6 configuration in place.
■ Check the ISP’s IPv6 support: Many Internet Service Providers (ISP) allow you to
connect with them using IPv6. The connection could be a default static route, or you
might be running Multiprotocol BGP (MP-BGP) to peer with multiple ISPs. These
options are discussed in Chapter 15, “IPv6 Internet Connectivity.”
■ Configure NAT64: During the transition from a network running IPv4 to a network
running IPv6, you might have an IPv6 host that needs to communicate with an IPv4
host. One approach to allow this is to use NAT64. You probably recall from your
CCNA studies that Network Address Translation (NAT) in IPv4 networks is often
used to translate private IP addresses used inside of a network (referred to as inside
local addresses) into publicly routable IP addresses for use on the Internet (referred
to as inside global addresses). However, NAT64 allows IPv6 addresses to be trans-
lated into corresponding IPv4 addresses, thus permitting communication between an
IPv4 host and an IPv6 host.
A router configured for NAT64 maintains a mapping table that specifies which
IPv4 address corresponds to an IPv6 address. This mapping table can be manually
configured, which is called stateless translation. Unfortunately, such a manual con-
figuration is not very scalable. However, a stateless translation can be useful when
you have a relatively small number of IPv4 hosts (for example, servers) that need to
be reached by IPv6 clients. For more scalability, stateful translation can be used.
A router configured for stateful translation allows a dynamic IPv6-to-IPv4 address
binding to be created.
10/24/14 3:17 PM
38 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
■ Use NPTv6: Another type of translation that can benefit IPv6 networks is Network
Prefix Translation version 6 (NPTv6). NPTv6 is sometimes referred to as IPv6-to-
IPv6 Network Prefix Translation. Unlike NAT, NPTv6 cannot do any sort of NAT
address overloading. Instead it simply translates one IPv6 prefix to another. For
example, a router configured for NPTv6 might translate a prefix from 2001:1::/64 to
2001:2::/64.
Many IPv6 networks will have no need for NPTv6. However, as an example of where
it can be particularly beneficial, consider a situation where an IPv6 host has more
than one global unicast address assigned to a network interface card. Perhaps one
of the global unicast addresses has permission (based on network filters in place) to
reach a specific destination, while the other global unicast address would be dropped
if it attempted to reach that destination. Because the host might not know from
which of these IPv6 addresses to source a packet, it might use a source address that
gets dropped by the network filter. However, a router configured for NPTv6 can
translate the host’s unpermitted global unicast IPv6 address into a global unicast
IPv6 address that is permitted.
■ Send IPv6 traffic over an IPv6-over-IPv4 tunnel: Yet another approach to having
IPv6 addressing and IPv4 addressing peacefully coexist on the same network is to
have an IPv4 tunnel that spans an IPv4-only portion of the network. Routers at each
end of this tunnel can run both IPv4 and IPv6 and can encapsulate IPv6 traffic inside
of the IPv4 tunnel packets, thus allowing IPv6 traffic to traverse an IPv4-only por-
tion of the network. This type of tunnel is called an IPv6-over-IPv4 tunnel.
Typically, the optimal type of STP to run on today’s Cisco Catalyst switches is Rapid
Per-VLAN Spanning Tree Protocol Plus (Rapid-PVST+). Rapid-PVST+ allows for much
faster convergence (commonly, less than one second) as compared to the relatively slow
convergence (up to 50 seconds) of IEEE 802.1D (the first industry-standard version of
STP). Another benefit of running Rapid-PVST+ is that it allows each VLAN to run its
own instance of STP, as opposed to all VLANs using the same spanning-tree topology
(which could lead to suboptimal paths for some VLANs).
When converting a Cisco Catalyst switch to Rapid-PVST+, you can remove the following
features, because similar features are built into Rapid-PVST+:
■ UplinkFast
■ BackboneFast
ROUTE.indb 38
Chapter 1: Characteristics of Routing Protocols 39
However, the following features still function with Rapid-PVST+ and do not need to be
removed from a Cisco Catalyst switch being migrated to Rapid-PVST+:
■ PortFast
■ BPDU Guard
■ BPDU Filter
■ Root Guard
■ Loop Guard
VRF is therefore able to segment networks and isolate paths as needed. The capability
to completely isolate one network from another (even though the networks use the same
infrastructure devices) has obvious security benefits.
Additionally, VRF helps network architects meet various industry regulations. For
example, the Sarbanes-Oxley Act and the HIPAA Privacy Rule require privacy for cus-
tomer and patient information. Also, the Payment Card Industry regulations require path
segmentation for credit card transactions. Other scenarios for multitenant networks (for
example, universities and airports) also have frequent network segmentation and path iso-
lation design requirements.
A traditional way to configure VRF on Cisco routers was to use an approach called VRF-
Lite. A newer approach to virtualized network configuration, called Cisco Easy Virtual
Network (EVN), dramatically simplifies the relatively complex configuration required by
VRF-Lite.
An EVN uses a Virtual Network Trunk (VNET Trunk) to carry traffic for each virtual
network, and eliminates the need to manually configure a subinterface for each virtual
network on all routers (which was a requirement with VRF-Lite). Traffic flowing over a
VNET Trunk is tagged with a VNET tag, identifying the virtual network to which the
traffic belongs. An EVN router connects to a Cisco Catalyst switch through an 802.1Q
trunk, with the different VLANs on the 802.1Q trunk carrying traffic for the different
virtual networks.
10/24/14 3:17 PM
40 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Note Even though VRF is the underlying technology being used, a common practice is
to refer to a virtual network as a VRF. For example, an EVN might have three separate vir-
tual networks that you might call VRF A, VRF B, and VRF C.
VRFs
Key Traffic for VRF A (172.16.0.0/16)
Topic Traffic for VRF B (172.17.0.0/16)
Traffic for VRF C (172.18.0.0/16)
172.16.0.100/24 172.16.1.100/24
VNET Trunk
172.17.0.100/24 172.17.1.100/24
A A
B B
C C
172.18.0.100/24 172.18.1.100/24
R1 R2
802.1Q Trunk
Even though an EVN allows a network architect to isolate one virtual network from
another (as if they were physically separate networks), there is an occasional need for
one of the virtual networks to be accessible by other virtual networks. For example, one
virtual network might contain corporate DNS, DHCP, and email servers, which need to
be accessed by all the other virtual networks. Cisco EVN makes this possible through
a service called route replication. The route replication service allows IP routes known
to one virtual network to be known to other virtual networks. As an example, consider
Figure 1-30.
In Figure 1-30, the 172.16.0.0 /16 virtual network (VRF A) and the 172.17.0.0 /16 virtual
network (VRF B) are isolated from one another. However, the 192.168.0.0 /24 network
(VRF C) contains servers (for example, DHCP, DNS, and email servers) that need to be
accessed by both VRF A and VRF B. Route replication allows networks in VRF C to be
added to the routing tables of VRF A and VRF B, while still keeping VRF A and VRF B
separate from one another. Also, notice that the routing table for VRF C knows about
routes in the other two VRFs.
Note Even though different IP address spaces were used in this example for VRF A and
VRF B, in the real world, you could have overlapping address spaces in different VRFs.
ROUTE.indb 40
Chapter 1: Characteristics of Routing Protocols 41
VRFs
Traffic for VRF A (172.16.0.0/16)
Traffic for VRF B (172.17.0.0/16)
172.16.0.100/24 Traffic for VRF C (192.168.0.0/24)
802.1Q Trunk
DHCP Server
192.168.0.1/28
172.17.0.100/24
A
B DNS Server
C 192.168.0.2/28
Gig 0/0/1 Gig 0/0/2
R1
Routing Table for VRF A
Email Server
172.16.0.0/16 => Gig 0/0/1.A 192.168.0.3/28
192.168.0.0/24 => Gig 0/0/2.C
10/24/14 3:17 PM
42 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Planning Practice
The CCNP ROUTE exam expects test takers to review design documents, create imple-
mentation plans, and create verification plans. This section provides some exercises that
can help you to take a step back from the minute details of the topics in this chapter so
that you can think about the same technical topics from the planning perspective.
For each planning practice table, simply complete the table. Note that any numbers in
parentheses represent the number of options listed for each item in the solutions in
Appendix F, “Completed Planning Practice Tables.”
Table 1-4 Notable Questions from This Chapter to Consider During an Implementation
Plan Peer Review
Question Answers
The plan requires that Split Horizon be
disabled for the hub router in a hub-and-
spoke topology. Describe the purpose of
Split Horizon.
The plan requires the use of EIGRP as the
routing protocol. Provide a brief description
of EIGRP.
The plan calls for the use of both IPv4 and
IPv6. What network traffic types do IPv4
and IPv6 have in common, and what traffic
types are different?
The plan calls for the use of Hot Standby
Router Protocol (HSRP). What can you do to
prevent an asymmetric routing issue, where
traffic is forwarded from a subnet using the
active HSRP router, and some of the return
traffic returns using the standby HSRP router
(because of load balancing)?
10/24/14 3:17 PM
44 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Question Answers
The design calls for the transmission of
interactive voice and video over a network.
What Layer 4 protocols are typically used to
transmit voice and data media? (2)
The plan requires that a network migrate
from IPv4 to IPv6. Identify three strategies
of a successful IPv6 migration. (3)
The plan calls for the use of Virtual Routing
and Forwarding (VRF). Identify two
approaches to configuring VRF. (2)
ROUTE.indb 46
CHAPTER 2
However, with the current state of the Internet, high-speed connections are widely acces-
sible. For example, a remote sales office might purchase a DSL or cable modem con-
nection to the Internet, at a relatively low cost as compared to traditional leased lines
or frame/cell switching technologies. Over that Internet connection, a virtual private
network (VPN) could create a logical path between the sales office and the headquarters
location.
The theory and configuration of VPNs goes well beyond what is covered in this chapter;
however, the ROUTE exam blueprint only requires configuration knowledge for Generic
Routing Encapsulation (GRE) tunnels. Therefore, this chapter will help you understand
the theory of multiple VPN technologies, while showing the configuration and verifica-
tion of GRE.
Table 2-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
c. You might need to decrease the MTU size for frames on an interface.
d. You might need to increase the MTU size for frames on an interface.
b. A CE at a remote location.
3. You want to interconnect two remote sites with a VPN tunnel. The tunnel needs
to support IP unicast, multicast, and broadcast traffic. Additionally, you need to
encrypt traffic being sent over the tunnel. Which of the following VPN solutions
meets the design requirements?
a. NHRP
b. IPsec
c. MPLS
d. mGRE
ROUTE.indb 48
Chapter 2: Remote Site Connectivity 49
a. The hub router is configured with the IP addresses of the spoke routers.
b. The spoke routers are configured with the IP address of the hub router.
c. Spoke routers query the hub router asking what tunnel interface IP address cor-
responds to a known physical interface IP address.
d. Spoke routers query the hub router asking what physical interface IP address
corresponds to a known tunnel interface IP address.
a. Integrity
b. Confidentiality
c. Antireplay
d. Authentication
10/24/14 3:17 PM
50 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Foundation Topics
This section categorizes various VPN technologies. Then, the remainder of this chapter
examines these technologies in a bit more detail.
These two approaches are discussed further in the section “MPLS VPN,” later in this
chapter.
Multiple VPN technologies make use of virtual tunnels. A few examples discussed in this
chapter include
■ Multipoint GRE
■ IPsec
You could meet the requirements of such a design by having a Layer 3 MPLS VPN set up
over a DMVPN. The DMVPN technology carrying the Layer 3 MPLS VPN traffic allows
you to efficiently set up direct links between corporate locations, and it also allows you
to use IPsec, which can encrypt the traffic flowing through the service provider’s cloud.
MPLS VPN
MPLS VPNs extend the capabilities of MPLS, supporting VPNs created across an MPLS
network. These VPNs, most commonly found in service provider or large enterprise net-
works, can be categorized as either Layer 2 MPLS VPNs or Layer 3 MPLS VPNs.
Key
Topic
CE
Neighborship CE
LSR
Location A
Location B
PE
LSR LSR (ELSR)
PE
(ELSR)
LSR
Service Provider’s
MPLS Cloud CE
CE
Location C Location D
Key
Topic
CE CE
ip
LSR
Ne
rsh
ig
bo
hb
Location A Location B
igh
or
sh
LSR LSR
Ne
ip
PE PE
(ELSR) (ELSR)
Neig
ip
rsh
hbo
bo
igh
rshi
LSR
Ne
Service Provider’s
MPLS Cloud CE
CE
Location C Location D
ROUTE.indb 52
Chapter 2: Remote Site Connectivity 53
GRE
As its name suggests, a Generic Routing Encapsulation (GRE) tunnel can encapsulate
nearly every type of data that you could send out of a physical router interface. In fact,
GRE can encapsulate any Layer 3 protocol, which makes it very flexible.
GRE by itself does not provide any security for the data it transmits; however, a GRE
packet can be sent over an IPsec VPN, causing the GRE packet (and therefore its con-
tents) to be protected. Such a configuration is commonly used, because IPsec can only
protect unicast IP packets. This limitation causes issues for routing protocols that use IP
multicasts. Fortunately, a GRE tunnel can encapsulate IP multicast packets. The resulting
GRE packet is an IP unicast packet, which can then be protected by an IPsec tunnel.
As an example, consider Figure 2-3. Routers R1 and R2 need to form an Open Shortest
Path First (OSPF) neighborship across the service provider’s cloud. Additionally, traffic
between these two routers needs to be protected. While IPsec can protect unicast IP traf-
fic, OSPF communicates through IP multicasts. Therefore, all traffic between Routers R1
and R2 (including the OSPF multicasts) is encapsulated inside of a GRE tunnel. Those
GRE packets, which are unicast IP packets, are then sent across, and protected by, an
IPsec tunnel.
R1 R2
Service Provider’s
Cloud
Note For exam purposes, the only type of tunnel you need to know how to configure,
based on the objectives listed in the ROUTE exam blueprint, is a GRE tunnel. Therefore,
this chapter only provides a configuration example for a GRE tunnel.
Step 1. Create a virtual tunnel interface in global configuration mode with the inter-
Key face tunnel id command.
Topic
Step 2. In interface configuration mode for the tunnel interface, add an IP address
with the ip address ip_address subnet_mask command.
Step 3. Specify the source of the tunnel with the tunnel source {interface_id | ip_
address} command.
54 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Step 4. Specify the destination of the tunnel with the tunnel destination ip_address
command.
Step 5. Repeat the previous steps on the router at the far side of the tunnel.
To illustrate this configuration procedure, consider Example 2-1 and the topology shown
in Figure 2-4.
Tunnel 1 Tunnel 1
192.168.0.1/30 192.168.0.2/30
!ROUTER R4
interface Tunnel1
ip address 192.168.0.2 255.255.255.252
tunnel source Loopback0
tunnel destination 1.1.1.1
In Example 2-1, a virtual tunnel interface is created on Router R1 with the interface
Tunnel 1 command. An IP address is then assigned with the ip address 192.168.0.1
255.255.255.252 command. Next, the tunnel source Loopback0 command is used to
specify Router R1’s Lo 0 interface (and therefore its IP address of 1.1.1.1) as one end of
the GRE tunnel. The tunnel destination 4.4.4.4 command is then used to specify the Lo
0 interface on Router R4 as the other end of the tunnel. A mirrored configuration of the
tunnel interface is then entered on Router R4.
Example 2-2 shows verification of the GRE tunnel. In the output of the show interfaces
tunnel 1 command, notice that the interface is up at Layer 1 and Layer 2. Also, note that
the encapsulation type is TUNNEL. Also, the output of the traceroute 192.168.0.2 com-
mand shows that the IP address of 192.168.0.2 is logically a single hop away from Router
R1, even though it is physically three hops away.
ROUTE.indb 54
Chapter 2: Remote Site Connectivity 55
10/24/14 3:17 PM
56 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
DMVPN
Consider a hub-and-spoke VPN topology in which multiple remote sites have a site-
to-site VPN connection to a headquarters location. In such a topology, if one remote
site wanted to communicate securely with another remote site, the traffic would travel
between the sites through the headquarters location, rather than directly between the
sites. One fix for this suboptimal pathing issue would be to create a full mesh of IPsec
site-to-site VPN connections, which would provide a direct IPsec VPN connection
between any two remote sites. Such a solution, however, could be complex and expensive
to configure and maintain.
Branch A
Branch B
Headquarters
Dynamic Multipoint
VPN Tunnel
Branch C
Note Multipoint GRE, Next Hop Resolution Protocol (NHRP), and IPsec are required to
support a DMVPN topology. Each of these technologies is discussed in the remainder of
this chapter.
Multipoint GRE
The scalability offered by DMVPN is made possible, in part, by multipoint GRE
(mGRE), which allows a router to support multiple GRE tunnels on a single GRE
interface.
■ Like traditional GRE, mGRE can transport a wide variety of protocols (for example,
IP unicast, multicast, and broadcast).
■ In a hub-and-spoke topology, a hub router can have a single mGRE interface, and
multiple tunnels can use that single interface.
Figure 2-7 shows a spoke-to-spoke mGRE topology. With a spoke-to-spoke mGRE topol-
ogy, each router has an mGRE interface, which allows the sites in the network to inter-
connect using a partial mesh or a full mesh collection of tunnels.
58 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Branch A
Spoke
Spoke
Hub
Headquarters
Spoke
Branch C
mGRE Interface
Spoke
mGRE Interface Branch B
Spoke
Hub
mGRE Interface
Headquarters
Spoke
mGRE Interface
Branch C
ROUTE.indb 58
Chapter 2: Remote Site Connectivity 59
NHRP
DMVPNs require that routers run Next Hop Resolution Protocol (NHRP), which uses
a client-server model. A router designated as a hub router acts as a server. The remaining
routers, designated as spokes, act as clients. NHRP spokes are configured with the IP
address of the NHRP hub, and when a spoke comes online, it informs the hub of both a
physical IP address (assigned to its physical interface) and a logical IP address (assigned
to its virtual tunnel interface) that are going to be used for its tunnels.
Branch A
10.0.0.1 at 192.0.2.1
192.0.2.1
Headquarters Spoke 10.0.0.2 at 203.0.113.1
Branch B
Spoke
Hub
203.0.113.1
10.0.0.3 at 198.51.100.1
Branch C
In Figure 2-8, the Headquarters router is acting as the hub, and the Branch A, Branch
B, and Branch C routers are acting as spokes. When the spokes come online, they each
advertise the IP address of their physical interface that is going to be used for tunnel for-
mation, along with the IP address of the virtual tunnel interface. For example, the Branch
A router informs the Headquarters router that the IP address of its virtual tunnel interface
is 10.0.0.1, and it is available at a physical interface’s IP address of 192.0.2.1. The Branch B
and Branch C routers send similar advertisements to the Headquarters router. As a result,
the Headquarters router populates its NHRP database.
60 CCNP Routing and Switching ROUTE 300-101 Official Cert Guide
Note The prior description of NHRP used the term physical interface to distinguish
a nontunnel interface from a tunnel interface. Realize, however, that an interface being
referred to here as a physical interface could actually be a loopback interface.
With the hub’s database populated, a spoke can query the hub to find out the IP address
of a physical interface that corresponds to a specific tunnel interface’s IP address. As an
example, notice in Figure 2-9 how NHRP helps the Branch C router set up a GRE tunnel
with the Branch B router.
Branch A
NHRP Database
Tunnel Interface Physical Interface
IP IP
10.0.0.1 192.0.2.1
10.0.0.2 203.0.113.1
10.0.0.3 198.51.100.1
Headquarters 192.0.2.1
Spoke
Branch B
Spoke
(2) 10.0.0.2 is at 203.0.113.1.
Hub NH
RP 203.0.113.1
NH
RP Re
pl (3) Dynamic GRE tunnel formation.
Qu y
er
y
Spoke
(1) What physical interface’s IP address is
associated with a tunnel interface’s
IP address of 10.0.0.2? 198.51.100.1
Branch C
In Figure 2-9, the Branch C router needs to dynamically form a GRE tunnel with the
Branch B router. The Branch C router knows that the other end of the tunnel it wants to
form has an IP address of 10.0.0.2. However, the Branch C router does not know the IP
address of the physical interface on the Branch B router that corresponds to the virtual
tunnel’s IP address. The process of discovering the remote physical IP address and the
formation of the tunnel is as follows:
Step 1. The Branch C router sends an NHRP query to the hub router asking what
Key physical interface’s IP address is associated with a tunnel interface’s IP address
Topic
of 10.0.0.2.
ROUTE.indb 60
Chapter 2: Remote Site Connectivity 61
Step 2. The hub router (that is, the Headquarters router) checks its NHRP database
and responds to the query, telling the Branch C router that the physical inter-
face’s IP address corresponding to the tunnel interface IP address of 10.0.0.2 is
203.0.113.1, which is the IP address of the Branch B router.
Step 3. Having dynamically learned the IP address of the physical interface in the Branch
B router, the Branch C router sets up a GRE tunnel with the Branch B router.
While the configuration of NHRP is beyond the scope of the ROUTE curriculum, you
should be familiar with the output of the show ip nhrp verification command. Example
2-3 shows sample output from this command.
The output in Example 2-3 shows the IP addresses (and corresponding subnet masks) in
the IP-to-NBMA address cache. Note that the subnet mask for an IP address is always a
/32 mask, because the Cisco implementation of NHRP does not support the aggrega-
tion of nonbroadcast multiaccess (NBMA) information. The output also shows the tunnel
interface name and how long it has been since the tunnel was created. Finally, notice the
authoritative flag. This flag indicates that a next-hop server (or router) provided the NHRP
information.
IPsec
Security in a DMVPN is provided by IPsec. The following four security features are
offered by IPsec:
■ Antireplay: IPsec uses antireplay protection to ensure that packets being sent are not
duplicate packets. For example, an attacker might capture packets that make up a valid
login to a host and attempt to play those packets back, so that he can gain access to
the host. However, IPsec uses sequence numbers to determine whether a packet is to
be considered a duplicate packet, and any duplicate packets are not transmitted.