You are previewing Authorized Self-Study Guide Building Scalable Cisco Internetworks (BSCI), Third Edition.
O'Reilly logo
Authorized Self-Study Guide Building Scalable Cisco Internetworks (BSCI), Third Edition

Book Description

Learn intermediate and advanced routing techniques with the only Cisco-authorized self-study book for CCNP routing foundation learning

  • Learn intermediate and advance routing techniques from the newest edition of the best-selling CCNP BSCI foundational learning book

  •  Rely on learning from the only Cisco-authorized book publisher

  •  Master your learning with tools like self-assessment review questions, configuration exercises, chapter objectives and summaries, key term definitions, job aids and command summaries

  • CCNP Self-Study: Building Scalable Cisco Internetworks (BSCI) , Third Edition is a Cisco authorized, self-paced learning tool for CCNP preparation. This book teaches readers to design, configure, maintain, and scale routed networks that are growing in size and complexity. The book covers routing principles of both distance vector and link-state routing protocols; IP addressing techniques; the theory behind the IGP and EGP routing protocols; and configuration and troubleshooting information for each protocol. Upon completion readers will be able to select and implement the appropriate Cisco IOS Software services required to build scalable, routed networks.


    The book provides early and comprehensive foundation learning for the CCNP BSCI exam. This revision to the popular second edition is updated to include complete coverage of all important routing topics, including advanced IP addressing, routing principles, manipulating routing updates, and EIGRP, OSPF, IS-IS, and BGP configuration. Chapters open with a list of objectives to focus the reader's study. Configuration exercises at the end of each chapter and a master lab exercise that ties all the topics together in the last chapter help illuminate theoretical concepts. Key terms are highlighted and defined, and each chapter concludes with a summary to help review key concepts.

    What's new in the book? The book matches changes to the CCNP course and exam as per Cisco Systems.

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Authors
    3. About the Technical Reviewers
    4. Acknowledgments
      1. Icons Used in This Book
      2. Command Syntax Conventions
    5. Foreword
    6. Introduction
      1. Who Should Read This Book
      2. What’s New in This Edition
      3. Objectives of This Book
      4. Summary of Contents
        1. Online Material
      5. Configuration Exercises and Review Questions
      6. Author’s Notes, Key Points, Sidebars, and Cautions
    7. I. Network Architecture and Design
      1. 1. Network Architecture Framework and Design Models
        1. Converged Networks
        2. Cisco Intelligent Information Network
        3. Cisco Service-Oriented Network Architecture Framework
        4. Cisco Enterprise Architecture
        5. Cisco Hierarchical Network Model
        6. Cisco Enterprise Composite Network Model
        7. Routing and Routing Protocols Within the Enterprise Composite Network Model
        8. Summary
        9. Review Questions
    8. II. IP Routing Protocols
      1. 2. Routing Principles
        1. IP Routing Overview
          1. Principles of Static Routing
            1. Configuring a Static Route
            2. Configuring a Static Default Route
          2. Principles of Dynamic Routing
          3. Principles of On-Demand Routing
            1. Configuring ODR
        2. Characteristics of Routing Protocols
          1. Distance Vector, Link-State, and Hybrid Routing Protocols
          2. Classful Routing Protocol Concepts
            1. Classful Routing Protocol Behavior
            2. Summarizing Routes in a Discontiguous Network
            3. The ip classless Command
          3. Classless Routing Protocol Concepts
            1. RIPv2 and EIGRP Automatic Network-Boundary Summarization
        3. RIP
          1. Characteristics of RIPv1
          2. Characteristics of RIPv2
          3. RIP Configuration Commands
        4. IP Routing Protocol Comparisons
          1. Administrative Distance
          2. Floating Static Routes
          3. Criteria for Inserting Routes in the IP Routing Table
          4. Comparing Routing Protocols
        5. Summary
        6. Configuration Exercise: Basic Configuration and Migrating to a Classless Routing Protocol
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Setting Up the Edge Routers
          5. Task 2: Setting Up the Internal Routers
          6. Task 3: Exploring Classful Routing
          7. Task 4: Exploring Classless Forwarding
          8. Task 5: Optimizing Classless Routes for Scalability
          9. Exercise Verification
        7. Review Questions
      2. 3. Configuring the Enhanced Interior Gateway Routing Protocol
        1. EIGRP Overview
          1. EIGRP Capabilities and Attributes
          2. Underlying Processes and Technologies
        2. EIGRP Terminology and Operation
          1. EIGRP Terminology
          2. Populating EIGRP Tables
          3. EIGRP Packets
            1. EIGRP Hello Packets
          4. EIGRP Neighbors
            1. Neighbor Table
            2. EIGRP Reliability
          5. Initial Route Discovery
          6. Route Selection
            1. EIGRP Metric Calculation
            2. EIGRP Metric Calculation Example
          7. Routing Table and EIGRP DUAL
            1. Advertised Distance and Feasible Distance
            2. Successor and Feasible Successor
          8. DUAL Example
        3. Configuring and Verifying EIGRP
          1. Basic EIGRP Configuration
            1. Basic EIGRP Configuration Example
            2. EIGRP Configuration Example Using the Wildcard Mask
          2. Configuring the ip default-network Command for EIGRP
          3. Route Summarization
            1. Configuring Manual Route Summarization
          4. EIGRP Load Balancing
          5. EIGRP and WAN Links
            1. EIGRP Link Utilization
            2. Examples of EIGRP on WANs
        4. Configuring EIGRP Authentication
          1. Router Authentication
          2. EIGRP MD5 Authentication
            1. Configuring MD5 Authentication
            2. MD5 Authentication Configuration Example
            3. Verifying MD5 Authentication
            4. Troubleshooting MD5 Authentication
              1. Example of Successful MD5 Authentication
              2. Example of Troubleshooting MD5 Authentication Problems
        5. Using EIGRP in an Enterprise Network
          1. EIGRP Scalability
          2. EIGRP Route Summarization
          3. EIGRP Queries and Stuck-in-Active
          4. Preventing SIA Connections
          5. EIGRP Query Range
          6. Limiting the EIGRP Query Range
            1. Limiting Query Range with Summarization
            2. Limiting Query Range Using a Stub
          7. Graceful Shutdown
        6. Verifying EIGRP Operation
          1. show ip route and show ip route eigrp for EIGRP Examples
          2. show ip protocols Example
          3. show ip eigrp interfaces Example
          4. show ip eigrp topology Example
          5. show ip eigrp traffic Example
          6. debug eigrp packets Examples
          7. debug ip eigrp Examples
        7. Summary
        8. References
        9. Configuration Exercise: Configuring and Tuning EIGRP
          1. Exercise Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Configuring Basic EIGRP
          5. Task 2: Configuring EIGRP Summarization
          6. Task 3: Configuring the EIGRP Stub
          7. Task 4: Configuring an EIGRP Default Route
          8. Exercise Verification
        10. Review Questions
      3. 4. Configuring the Open Shortest Path First Protocol
        1. OSPF Protocol Overview
          1. Link-State Routing Protocols
          2. OSPF Area Structure
            1. OSPF Areas
            2. Area Terminology
          3. OSPF Adjacencies
          4. OSPF Metric Calculation
          5. Link-State Data Structures
        2. OSPF Packets
          1. Establishing OSPF Neighbor Adjacencies: Hello
          2. Exchange Process and OSPF Neighbor Adjacency States
            1. Maintaining Routing Information
          3. OSPF Link-State Sequence Numbers
        3. Configuring Basic OSPF Routing
          1. Single-Area OSPF Configuration Example
          2. Multiarea OSPF Configuration Example
          3. Verifying OSPF Operations
            1. The show ip route ospf Command
            2. The show ip ospf interface Command
            3. The show ip ospf neighbor Command
            4. The debug ip ospf events Command
          4. OSPF Router ID
            1. Loopback Interfaces
            2. OSPF router-id Command
            3. Verifying the OSPF Router ID
        4. OSPF Network Types
          1. Types of OSPF Networks
          2. Adjacency Behavior for a Point-to-Point Link
          3. Adjacency Behavior for a Broadcast Network
            1. Electing a DR and BDR
            2. Setting Priority for the DR Election
          4. Adjacency Behavior for a Nonbroadcast Multiaccess Network
            1. DR Election in an NBMA Topology
          5. OSPF over Frame Relay Configuration Options
          6. OSPF over NBMA Topology Modes of Operation
          7. Selecting the OSPF Network Type for NBMA Networks
          8. OSPF Broadcast Mode Configuration
          9. OSPF Nonbroadcast Mode Configuration
          10. OSPF Configuration in Point-to-Multipoint Mode
          11. Cisco Point-to-Multipoint Nonbroadcast Mode
          12. Using Subinterfaces in OSPF over Frame Relay Configuration
            1. Point-to-Point Subinterfaces
            2. Multipoint Subinterfaces
          13. OSPF Mode Summary
          14. Displaying OSPF Adjacency Activity
        5. Summary
        6. References
        7. Configuration Exercise: Configuring and Examining OSPF in a Single Area
          1. Exercise Objective
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Configuring Single-Area OSPF Within Your Pod
          6. Task 3: Configuring a Stable OSPF Router ID
          7. Task 4: Observing the OSPF Process
          8. Task 5: Observing OSPF DR and BDR Elections
          9. Exercise Verification
        8. Review Questions
      4. 5. Advanced Open Shortest Path First Protocol Configuration
        1. Types of OSPF Routers and LSAs
          1. Types of OSPF Routers
          2. OSPF LSA Types
            1. LSA Type 1: Router LSA
            2. LSA Type 2: Network LSA
            3. LSA Type 3: Summary LSA
            4. LSA Type 4: Summary LSA
            5. LSA Type 5: External LSA
        2. Interpreting the OSPF LSDB and Routing Table
          1. OSPF LSDB
          2. OSPF Routing Table and Types of Routes
            1. Calculating the Costs of E1 and E2 Routes
          3. Configuring OSPF LSDB Overload Protection
          4. Changing the Cost Metric
        3. OSPF Route Summarization
          1. Configuring OSPF Route Summarization on an ABR
          2. Configuring OSPF Route Summarization on an ASBR
          3. Route Summarization Configuration Example at an ABR
          4. Route Summarization Configuration Example at an ASBR
        4. Creating a Default Route in OSPF
          1. The default-information originate Command
        5. OSPF Special Area Types
          1. Configuring Stub Areas
          2. Configuring Totally Stubby Areas
          3. Interpreting Routing Tables in Different Types of OSPF Areas
          4. Configuring NSSAs
          5. Verifying All Area Types
        6. OSPF Virtual Links
          1. Configuring OSPF Virtual Links
          2. Verifying OSPF Virtual Link Operation
        7. Configuring OSPF Authentication
          1. Types of Authentication
          2. Configuring Simple Password Authentication
            1. Simple Password Authentication Example
          3. Verifying Simple Password Authentication
          4. Troubleshooting Simple Password Authentication
            1. Successful Simple Password Authentication Example
            2. Example: Troubleshooting Simple Password Authentication Problems
          5. Configuring MD5 Authentication
            1. MD5 Authentication Example
          6. Verifying MD5 Authentication
          7. Troubleshooting MD5 Authentication
            1. Successful MD5 Authentication Example
            2. Example: Troubleshooting MD5 Authentication Problems
        8. Summary
        9. References
        10. Configuration Exercise 5-1: Configuring OSPF for Multiple Areas and Frame Relay Nonbroadcast
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task: Using the Nonbroadcast Network Type over Frame Relay
          5. Exercise Verification
        11. Configuration Exercise 5-2: Configuring OSPF for Multiple Areas and Frame Relay Point to Multipoint and Point to Point
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Configuring OSPF over Frame Relay Using the Point-to-Multipoint OSPF Network Type
          6. Task 3: Configuring OSPF over Frame Relay Using the Point-to-Point OSPF Network Type
          7. Exercise Verification
        12. Configuration Exercise 5-3: Tuning OSPF
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Examining the OSPF Database
          5. Task 2: Configure OSPF Route Summarization
          6. Task 3: Configure an OSPF Stub Area
          7. Exercise Verification
        13. Review Questions
      5. 6. Configuring the Integrated Intermediate System-to-Intermediate System Protocol
        1. Introducing IS-IS and Integrated IS-IS Routing
          1. IS-IS Routing
            1. IS-IS Routing Levels
            2. IS-IS Routers
          2. Integrated IS-IS Routing
          3. Integrated IS-IS Design Principles
          4. Issues with Integrated IS-IS
          5. The ES-IS Protocol
          6. OSI Routing Levels
            1. Level 0 (L0) Routing
            2. IS-IS L1 Routing
            3. IS-IS L2 Routing
            4. Level 3 (L3) Routing
          7. Comparing IS-IS to OSPF
            1. IS-IS History
            2. Similarities Between IS-IS and OSPF
            3. Differences Between Integrated IS-IS and OSPF
              1. Area Design
              2. Advantages of Integrated IS-IS
              3. Advantages of OSPF
              4. Summary of Differences Between OSPF and Integrated IS-IS
        2. IS-IS Routing Operation
          1. NSAP Addresses
            1. Integrated IS-IS NSAP Address Structure
            2. IS-IS Area Addresses
            3. IS-IS System ID
            4. NET Addresses
          2. IS-IS Router Operation
            1. Intra-Area and Interarea Addressing and Routing
            2. IS-IS Routing Examples
            3. Route Leaking
          3. OSI and IS-IS PDUs
            1. OSI PDUs
            2. IS-IS PDUs
            3. IS-IS LSPs
              1. LSP Sequence Number
              2. LSP Remaining Lifetime
              3. LSP TLVs
          4. Implementing IS-IS in Different Network Types
            1. Implementing IS-IS in Nonbroadcast Multiaccess (NBMA) Networks
            2. Implementing IS-IS in Broadcast Networks
              1. Pseudonode and DIS
            3. LSPs and IIHs
              1. L1 and L2 LSPs
              2. L1 and L2 IIHs
            4. Summary of Differences Between Broadcast and Point-to-Point Modes
          5. Link-State Database Synchronization
            1. LSP Flooding
            2. LSDB Synchronization
              1. LSDB Synchronization on a LAN Example
              2. LSDB Synchronization on Point-to-Point Links Example
            3. LAN Adjacencies
            4. WAN Adjacencies
        3. Configuring Integrated IS-IS
          1. Integrated IS-IS in a CLNS Environment
            1. Building an OSI Routing Table
            2. Building an IP Routing Table
          2. Integrated IS-IS Configuration
            1. Step 1: Define the Area and Addressing
            2. Step 2: Enable IS-IS on the Router
            3. Step 3: Configure the NET
            4. Step 4: Enable Integrated IS-IS on Interfaces
            5. Simple Integrated IS-IS Example
          3. Optimizing IS-IS
            1. Changing the IS-IS Router Level
            2. Changing the IS-IS Interface Level
            3. Changing the IS-IS Metric
            4. Tuning IS-IS Example
          4. Configuring IP Route Summarization in IS-IS
        4. Verifying IS-IS Configuration and Structures
          1. Verifying IS-IS Configuration
          2. Verifying CLNS IS-IS Structures
            1. Troubleshooting Commands: CLNS
            2. Troubleshooting Commands: CLNS and IS-IS
            3. OSI Intra-Area and Interarea Routing Example
              1. Level 1 and Level 2 Topology Table
              2. The CLNS Protocol
              3. CLNS Neighbors
              4. CLNS Interface
        5. Summary
        6. Configuration Exercise: Configuring Integrated IS-IS in Multiple Areas
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up and Preparing
          5. Task 2: Configuring Integrated IS-IS in Multiple Areas
          6. Exercise Verification
        7. Review Questions
      6. 7. Manipulating Routing Updates
        1. Using Multiple IP Routing Protocols
          1. Considerations When Migrating to Another Routing Protocol
          2. Planning and Implementing a New IP Address Allocation
            1. Configuring a Secondary IP Address
          3. Migrating to a New Routing Protocol
          4. Redistribution Overview
          5. Redistribution Implementation Considerations
            1. Selecting the Best Route
            2. Administrative Distance
            3. Seed Metrics
            4. Default Seed Metrics
            5. Redistribution Techniques
          6. Configuring Redistribution
            1. The redistribute Command for RIP
            2. The redistribute Command for OSPF
            3. The redistribute Command for EIGRP
            4. The redistribute Command for IS-IS
            5. The default-metric Command
            6. The passive-interface Command
            7. Route Redistribution Example
        2. Controlling Routing Update Traffic
          1. Static and Default Routes
          2. Using Distribute Lists to Control Routing Updates
            1. Distribute List Processing
            2. Configuring Distribute Lists
            3. IP Route Filtering with Distribution List Configuration Example
            4. Controlling Redistribution with Distribute Lists
          3. Using Route Maps to Control Routing Updates
            1. Route Map Applications
            2. Understanding Route Maps
            3. Configuring Route Maps
            4. Using Route Maps with Redistribution
            5. Route Maps to Avoid Route Feedback
          4. Using Administrative Distance to Influence the Route-Selection Process
            1. Selecting Routes with Administrative Distance
            2. Modifying Administrative Distance
            3. An Example of Redistribution Using Administrative Distance
          5. Verifying Redistribution Operation
        3. Configuring DHCP
          1. DHCP Overview
            1. DHCP Operation
            2. DHCP Bindings
            3. Attribute Inheritance
            4. DHCP Options and Suboptions
          2. Configuring a DHCP Server
            1. Preparing for DHCP Configuration
            2. DHCP Server Configuration Tasks
            3. DHCP Server Configuration Commands
            4. DHCP Server Example
            5. DHCP Server Options Import Example
          3. Configuring a DHCP Relay Agent
            1. IP Helper Addresses
            2. DHCP Relay Agent Configuration Tasks
            3. DHCP Relay Agent Configuration Commands
          4. Configuring a DHCP Client
          5. Verifying DHCP
        4. Summary
        5. Configuration Exercise 7-1: Configuring Basic Redistribution
          1. Exercise Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Setting Up the Routing Protocols
          6. Task 3: Configuring Basic Redistribution
          7. Task 4: Filtering Routing Updates
          8. Exercise Verification
        6. Configuration Exercise 7-2: Tuning Basic Redistribution
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Tuning Basic Redistribution with Route Maps
          5. Task 2: Filtering Routing Updates
          6. Exercise Verification
        7. Review Questions
      7. 8. Configuring the Border Gateway Protocol
        1. BGP Terminology, Concepts, and Operation
          1. Autonomous Systems
          2. BGP Use Between Autonomous Systems
          3. Comparison with Other Scalable Routing Protocols
          4. Using BGP in an Enterprise Network
          5. BGP Multihoming Options
            1. Multihoming with Default Routes from All Providers
            2. Multihoming with Default Routes and Partial Table from All Providers
            3. Multihoming with Full Routes from All Providers
          6. BGP Path Vector Characteristics
          7. When to Use BGP
          8. When Not to Use BGP
          9. BGP Characteristics
          10. BGP Neighbor Relationships
            1. External BGP Neighbors
            2. Internal BGP Neighbors
          11. IBGP on All Routers in a Transit Path
            1. IBGP in a Transit AS
            2. IBGP in a Nontransit AS
            3. BGP Partial-Mesh and Full-Mesh Examples
            4. TCP and Full Mesh
            5. Routing Issues if BGP Not on in All Routers in a Transit Path
          12. BGP Synchronization
          13. BGP Tables
          14. BGP Message Types
          15. BGP Attributes
            1. Well-Known Attributes
            2. Optional Attributes
            3. Defined BGP Attributes
            4. The AS-Path Attribute
            5. The Next-Hop Attribute
            6. The Origin Attribute
            7. The Local Preference Attribute
            8. The Community Attribute
            9. The MED Attribute
            10. The Weight Attribute (Cisco Only)
          16. The Route Selection Decision Process
        2. Configuring BGP
          1. Peer Groups
          2. Entering BGP Configuration Mode
          3. Defining BGP Neighbors and Activating BGP Sessions
          4. Shutting Down a BGP Neighbor
          5. Defining the Source IP Address
          6. EBGP Multihop
          7. Changing the Next-Hop Attribute
          8. Defining the Networks That BGP Advertises
          9. BGP Neighbor Authentication
          10. Configuring BGP Synchronization
          11. Resetting BGP Sessions
            1. Hard Reset of BGP Sessions
            2. Soft Reset of BGP Sessions Outbound
            3. Soft Reset of BGP Sessions Inbound
              1. Inbound Soft Reset Using Stored Information
              2. Route Refresh: Dynamic Inbound Soft Reset
          12. BGP Configuration Examples
            1. Basic BGP Example
            2. Peer Group Example
            3. IBGP and EBGP Example
        3. Verifying and Troubleshooting BGP
          1. show ip bgp Command Output Example
          2. show ip bgp rib-failure Command Output Example
          3. show ip bgp summary Command Output Example
          4. debug ip bgp updates Command Output Example
          5. Understanding and Troubleshooting BGP Neighbor States
            1. Idle State Troubleshooting
            2. Active State Troubleshooting
            3. Established State
        4. Basic BGP Path Manipulation Using Route Maps
          1. BGP Path Manipulation
            1. The Path-Selection Decision Process with a Multihomed Connection
          2. Setting Local Preference
            1. Changing Local Preference for All Routes
            2. Local Preference Example
            3. Changing Local Preference Using Route Maps
          3. Setting the MED with Route Maps
            1. Changing the MED for All Routes
            2. Changing the MED Using Route Maps
          4. Configuring Weight
          5. Implementing BGP in an Enterprise Network
        5. Summary
        6. References
        7. Configuration Exercise 8-1: Configuring Multihome BGP
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Configuring BGP
          6. Exercise Verification
        8. Configuration Exercise 8-2: Configuring Full-Mesh IBGP
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task: Configuring Full-Mesh IBGP
          5. Exercise Verification
        9. Configuration Exercise 8-3: BGP Path Manipulation Using MED and Local Preference with Route Maps
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task: Using MED and Local Preference with Route Maps for BGP Path Manipulation
          5. Exercise Verification
        10. Review Questions
    9. III. IP Multicast
      1. 9. Implementing IP Multicast
        1. Introduction to Multicast
          1. Multicast Versus Unicast
          2. Multicast Applications
          3. Advantages of Multicast
          4. Disadvantages of Multicast
          5. Multicast IP Addresses
          6. Layer 2 Multicast Addresses
          7. Learning About Multicast Sessions
        2. IGMP and CGMP
          1. IGMP Version 1 (IGMPv1)
          2. IGMP Version 2 (IGMPv2)
            1. IGMPv2: Joining a Group
            2. IGMPv2: Leaving a Group
          3. IGMP Version 3 (IGMPv3)
            1. IGMPv3: Joining a Group
            2. IGMPv3: Operation
          4. Determining Which IGMP Version Is Running
          5. Multicast with Layer 2 Switches
            1. CGMP
            2. IGMP Snooping
        3. PIM Routing Protocol
          1. PIM Terminology
            1. Distribution Trees
            2. Reverse Path Forwarding
            3. PIM Modes
          2. Multicast Distribution Trees
            1. Source Distribution Trees
            2. Shared Distribution Trees
            3. Multicast Distribution Tree Notation
          3. PIM-DM
          4. PIM-SM
          5. PIM Sparse-Dense Mode
        4. IP Multicast Configuration and Verification
          1. Configuring PIM-SM and PIM Sparse-Dense Mode
          2. Configuring a Router to Be a Member of a Group or a Statically Connected Member
          3. Verifying IP Multicast
            1. Inspecting the IP Multicast Routing Table
            2. PIM Interfaces and Neighbors
            3. Checking RP Information
          4. Verifying IGMP Groups
          5. Verifying IGMP Snooping
        5. Summary
        6. References
        7. Configuration Exercise: Configuring Multicast Routing
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Enable IP Multicast Routing
          6. Task 3: Configure PIM Sparse-Dense Mode on All Interfaces
          7. Exercise Verification
        8. Review Questions
    10. IV. IP Version 6
      1. 10. Implementing IPv6
        1. Introducing IPv6
          1. Features of IPv6
          2. IPv6 Address Space
          3. The Need for Larger Address Space
        2. IPv6 Addressing
          1. IPv6 Packet Header
            1. Extension Headers
            2. MTU Discovery
          2. IPv6 Address Representation
          3. IPv6 Address Types
          4. Interface Identifiers in IPv6 Addresses
          5. IPv6 Global Unicast Addresses
          6. IPv6 Link-Local Unicast Addresses
          7. IPv6 Anycast Addresses
          8. IPv6 Multicast Addresses
          9. Stateless Autoconfiguration
          10. IPv6 Mobility
        3. IPv6 Configuration and Using OSPF and Other Routing Protocols for IPv6
          1. IPv6 Routing Protocols
            1. Static Routing
            2. RIPng
            3. OSPFv3
            4. IS-IS for IPv6
            5. EIGRP for IPv6
            6. MP-BGP4
          2. OSPFv3 Compared to OSPFv2
            1. Similarities Between OSPFv2 and OSPFv3
            2. Differences Between OSPFv2 and OSPFv3
          3. OSPF LSA Types for IPv6
          4. IPv6 Configuration
          5. OSPFv3 Configuration
          6. Verifying IPv6 and OSPFv3
            1. clear ipv6 ospf Command
            2. show ipv6 route Command
            3. show ipv6 interface Command
            4. show ipv6 ospf interface Command
            5. show ipv6 ospf Command
            6. show ipv6 ospf neighbor Command
            7. show ipv6 ospf database Command
        4. Transitioning IPv4 to IPv6
          1. Dual Stack
          2. Tunneling
            1. Manually Configured Tunnels
            2. Other Tunneling Mechanisms
            3. 6-to-4 Tunneling
          3. Translation Mechanisms
        5. Summary
        6. References
        7. Configuration Exercise 10-1: Configuring IPv6 Addresses and OSPF for IPv6 Routing
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task 1: Cleaning Up
          5. Task 2: Configuring IPv6
          6. Task 3: Enable IPv6 OSPF
          7. Exercise Verification
        8. Configuration Exercise 10-2: Configuring an IPv6 Tunnel
          1. Objectives
          2. Visual Objective
          3. Command List
          4. Task: Configuring the Tunnel Interface
          5. Exercise Verification
        9. Review Questions
    11. V. Appendixes
      1. Acronyms and Abbreviations
      2. A. Answers to Review Questions
        1. Chapter 1
        2. Chapter 2
        3. Chapter 3
        4. Chapter 4
        5. Chapter 5
        6. Chapter 6
        7. Chapter 7
        8. Chapter 8
        9. Chapter 9
        10. Chapter 10
      3. B. Configuration Exercise Equipment Requirements and Backbone Configurations
        1. Configuration Exercise Equipment Requirements
        2. TFTP Server Setup
        3. Multicast Traffic Generator
        4. Configuration Exercise Setup Diagram
        5. Configuration Exercise Equipment Wiring
        6. Backbone Router Configurations
          1. BBR1 Configuration
          2. BBR2 Configuration
          3. Frame_Switch Configuration
      4. C. IPv4 Supplement
        1. IPv4 Addresses and Subnetting Job Aid
        2. Decimal-to-Binary Conversion Chart
        3. IPv4 Addressing Review
          1. Converting IP Addresses Between Decimal and Binary
          2. Determining an IP Address Class
          3. Private Addresses
          4. Extending an IP Classful Address Using Subnet Masks
          5. Calculating a Subnet Mask
          6. Calculating the Networks for a Subnet Mask
          7. Using Prefixes to Represent a Subnet Mask
        4. IPv4 Access Lists
          1. IP Access List Overview
          2. IP Standard Access Lists
            1. Wildcard Masks
            2. Access List Configuration Tasks
            3. IP Standard Access List Configuration
            4. Implicit Wildcard Masks
            5. Configuration Principles
            6. Standard Access List Example
            7. Location of Standard Access Lists
          3. IP Extended Access Lists
            1. Extended Access List Processing
            2. Extended IP Access List Configuration
            3. Extended Access List Examples
            4. Location of Extended Access Lists
          4. Restricting Virtual Terminal Access
            1. How to Control vty Access
            2. Virtual Terminal Line Access Configuration
          5. Verifying Access List Configuration
        5. IP Address Planning
          1. Benefits of an Optimized IP Addressing Plan
          2. Scalable Network Addressing Example
          3. Nonscalable Network Addressing
            1. Update Size
            2. Unsummarized Internetwork Topology Changes
            3. Summarized Network Topology Changes
        6. Hierarchical Addressing Using Variable-Length Subnet Masks
          1. Network Mask
            1. Use of the Network Mask
            2. Network Mask Example
          2. Implementing VLSM in a Scalable Network
          3. VLSM Calculation Example
            1. LAN Addresses
            2. Serial Line Addresses
            3. Summary of Addresses Used in the VLSM Example
          4. Another VLSM Example
        7. Route Summarization
          1. Route Summarization Overview
          2. Route Summarization Calculation Example
          3. Summarizing Addresses in a VLSM-Designed Network
          4. Route Summarization Implementation
          5. Route Summarization Operation in Cisco Routers
          6. Route Summarization in IP Routing Protocols
        8. Classless Interdomain Routing
          1. CIDR Example
      5. D. Manipulating Routing Updates Supplement
        1. Introduction to Policy-Based Routing
        2. Configuring Policy-Based Routing
          1. Policy-Based Routing match Commands
          2. Policy-Based Routing set Commands
          3. Configuring Policy-Based Routing on an Interface
        3. Verifying Policy-Based Routing
        4. Policy-Based Routing Examples
          1. Using Policy-Based Routing When Connecting Two ISPs
          2. Using Policy-Based Routing Based on Source Address
      6. E. BGP Supplement
        1. BGP Route Summarization
          1. CIDR and Aggregate Addresses
          2. Network Boundary Summarization
          3. BGP Route Summarization Using the network Command
            1. Cautions When Using the network Command for Summarization
          4. Creating a Summary Address in the BGP Table Using the aggregate-address Command
        2. Redistribution with IGPs
          1. Advertising Networks into BGP
          2. Advertising from BGP into an IGP
            1. ISP: No Redistribution from BGP into IGP Is Required
            2. Non-ISP: Redistribution from BGP into IGP Might Be Required
        3. Policy Control and Prefix Lists
          1. Prefix List Characteristics
          2. Filtering with Prefix Lists
          3. Configuring Prefix Lists
          4. Prefix List Sequence Numbers
          5. Prefix List Example
          6. Verifying Prefix Lists
          7. Verifying Prefix Lists Example
        4. Communities
          1. Community Attribute
          2. Setting and Sending the Communities Configuration
          3. Using the Communities Configuration
        5. Route Reflectors
          1. Route Reflector Benefits
          2. Route Reflector Terminology
          3. Route Reflector Design
          4. Route Reflector Design Example
          5. Route Reflector Operation
          6. Route Reflector Migration Tips
          7. Route Reflector Configuration
          8. Route Reflector Example
          9. Verifying Route Reflectors
      7. F. Summary of BSCI Router Commands
        1. General Commands
        2. Comparison of Configuration File Commands
        3. General Configuration Commands
        4. General Interface Configuration Commands
        5. General IP Commands
        6. IP Configuration Commands
        7. WAN Configuration Commands
        8. CLNS Configuration Commands
      8. G. Open System Interconnection (OSI) Reference Model
        1. Characteristics of the OSI Layers
        2. Protocols
        3. OSI Model and Communication Between Systems
          1. Interaction Between OSI Model Layers
          2. OSI Layer Services
          3. OSI Model Layers and Information Exchange
          4. Information Exchange Process
        4. OSI Model’s Physical Layer
        5. OSI Model’s Data Link Layer
        6. OSI Model’s Network Layer
        7. OSI Model’s Transport Layer
        8. OSI Model’s Session Layer
        9. OSI Model’s Presentation Layer
        10. OSI Model’s Application Layer
        11. Information Formats