CCNP ROUTE portable command guide all the ROUTE 642-902 commands in one compact, portable resource
CCNP ROUTE Portable Command Guide All the ROUTE 642-902 Commands in One Compact, Portable Resource Scott Empson Hans Roth Preparing for the CCNP ® exam? Working as a network professional? Here are all the CCNP-level commands for the Implementing Cisco IP Routing (ROUTE) exam you need in one handy re...
Autores principales: | , |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Cisco Press
c2010
|
Edición: | 1st edition |
Colección: | Portable Command Guide
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629140806719 |
Tabla de Contenidos:
- Cover
- Contents
- Introduction
- Chapter 1 Network Design Requirements
- Cisco Hierarchical Model of Network Design
- Cisco Enterprise Composite Network Model
- Cisco Service-Oriented Network Architecture
- Routing Protocol Comparison
- Where to Implement Routing Protocols
- The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Network Lifecycle
- Chapter 2 Implementing an EIGRP-based Solution
- Configuring EIGRP
- EIGRP Auto-Summarization
- Passive EIGRP Interfaces
- "Pseudo" Passive EIGRP Interfaces
- Injecting a Default Route into EIGRP: Redistribution of a Static Route
- Injecting a Default Route into EIGRP: IP Default Network
- Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0
- Accepting Exterior Routing Information: defaultinformation
- Load Balancing: Maximum Paths
- Load Balancing: Variance
- Bandwidth Use
- Authentication
- Stub Networks
- EIGRP Unicast Neighbors
- EIGRP over Frame Relay: Dynamic Mappings
- EIGRP over Frame Relay: Static Mappings
- EIGRP over Frame Relay: EIGRP over Multipoint Subinterfaces
- EIGRP over Frame Relay: EIGRP over Point-to-Point Subinterfaces
- EIGRP over MPLS: Layer 2 VPN
- EIGRP over MPLS: Layer 3 VPN
- Verifying EIGRP
- Troubleshooting EIGRP
- Configuration Example: EIGRP
- Chapter 3 Implementing a Scalable Multiarea Network OSPF-based Solution
- Configuring OSPF
- Using Wildcard Masks with OSPF Areas
- Configuring Multiarea OSPF
- Loopback Interfaces
- Router ID
- DR/BDR Elections
- Passive Interfaces
- Modifying Cost Metrics
- OSPF LSDB Overload Protection
- OSPF auto-cost reference-bandwidth
- Authentication: Simple
- Authentication: Using MD5 Encryption
- Timers
- Propagating a Default Route
- OSPF Special Area Types
- Stub Areas
- Totally Stubby Areas
- Not-So-Stubby Areas (NSSA) Stub Area
- NSSA Totally Stubby Areas.
- Route Summarization
- Inter-Area Route Summarization
- External Route Summarization
- Configuration Example: Virtual Links
- OSPF and NBMA Networks
- Full-Mesh Frame Relay: NBMA on Physical Interfaces
- Full-Mesh Frame Relay: Broadcast on Physical Interfaces
- Full-Mesh Frame Relay: Point-to-Multipoint Networks
- Full-Mesh Frame Relay: Point-to-Point Networks with Subinterfaces
- OSPF over NBMA Topology Summary
- Verifying OSPF Configuration
- Troubleshooting OSPF
- Configuration Example: Single-Area OSPF
- Configuration Example: Multiarea OSPF
- Configuration Example: OSPF and NBMA Networks
- Configuration Example: OSPF and Broadcast Networks
- Configuration Example: OSPF and Point-to-Multipoint Networks
- Configuration Example: OSPF and Point-to-Point Networks Using Subinterfaces
- Chapter 4 Implementing an IPv4-based Redistribution Solution
- Route Filtering Using the distribute-list Command
- Verifying Route Filters
- Configuration Example: Outbound Route Filters
- Configuration Example: Inbound Route Filters
- Using a Distribute List that References a Prefix List
- Using a Distribute List that References a Route Map
- Route Filtering Using Prefix Lists
- Policy Routing Using Route Maps
- Configuration Example: Route Maps
- Passive Interfaces
- Route Redistribution
- Assigning Metrics
- Redistributing Subnets
- Assigning E1 or E2 Routes in OSPF
- Defining Seed Metrics
- Redistributing Static Routes
- Redistributing OSPF Internal and External Routes
- Using Route Maps with Route Redistribution and Route Tags to Prevent Routing Loops
- Verifying Route Redistribution
- Administrative Distances
- Static Routes: permanent Keyword
- Floating Static Routes
- Static Routes and Recursive Lookups
- Chapter 5 Implementing Path Control
- Offset Lists
- Cisco IOS IP Service Level Agreements.
- Step 1: Define One (or More) Probes
- Step 2: Define One (or More) Tracking Objects
- Step 3: Define the Action on the Tracking Object(s)
- Step 4: Verify IP SLA Operations
- Policy Routing Using Route Maps
- Configuration Example: Route Maps
- Chapter 6 Enterprise to ISP Connectivity
- Configuring BGP
- BGP and Loopback Addresses
- eBGP Multihop
- Verifying BGP Connections
- Troubleshooting BGP Connections
- Autonomous System Synchronization
- Default Routes
- Load Balancing
- Authentication
- Attributes
- Route Selection Decision Process
- Origin
- Next-Hop
- Autonomous System Path: Remove Private Autonomous System
- Autonomous System Path: Prepend
- Weight: The Weight Attribute
- Weight: Access Lists
- Weight: Route Maps
- Local Preference: bgp default local-preference Command
- Local Preference: Route Maps
- Multi-Exit Discriminator (MED)
- Atomic Aggregate
- Regular Expressions
- Regular Expressions: Example One
- Regular Expressions: Example Two
- BGP Route Filtering Using Access Lists
- BGP Route Filtering Using Prefix Lists
- Configuration Example: BGP
- Chapter 7 Implementing IPv6
- Assigning IPv6 Addresses to Interfaces
- IPv6 on NBMA Networks
- Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6
- IPv6 and RIPng
- Configuration Example: IPv6 RIP
- IPv6 and OSPFv3
- Enabling OSPF for IPv6 on an Interface
- OSPFv3 and Stub/NSSA Areas
- Enabling an OSPF for IPv6 Area Range
- Enabling an IPv4 Router ID for OSPFv3
- Forcing an SPF Calculation
- Configuration Example: OSPFv3
- IPv6 and EIGRP
- Enabling EIGRP for IPv6 on an Interface
- Configuring the Percentage of Link Bandwidth Used by EIGRP
- Configuring Summary Addresses
- Configuring EIGRP Route Authentication
- Configuring EIGRP Timers
- Configuring EIGRP Stub Routing
- Logging EIGRP Neighbor Adjacency Changes.
- Adjusting the EIGRP for IPv6 Metric Weights
- Route Redistribution
- IPv6 Transition Techniques
- Configuring Manual IPv6 Tunnels
- Configuring Generic Routing Encapsulation IPv6 Tunnels
- Configuring Automatic 6to4 Tunnels
- Configuring IPv4-Compatible IPv6 Tunnels
- Configuring ISATAP Tunnels
- Verifying IPv6 Tunnel Configuration and Operation
- Implementing NAT-PT for IPv6
- Configuring Basic IPv6 to IPv4 Connectivity for NAT-PT for IPv6
- Configuring IPv4-Mapped NAT-PT Connectivity
- Configuring Mappings for IPv6 Hosts Accessing IPv4 Hosts
- Configuring IPv6 Access Control Lists
- Configuring Mappings for IPv4 Hosts Accessing IPv6 Hosts
- Configuring Port Address Translation for IPv6 to IPv4 Address Mappings
- Verifying NAT-PT Configuration and Operation
- Static Routes in IPv6
- Floating Static Routes in IPv6
- Verifying and Troubleshooting IPv6
- IPv6 Ping
- Chapter 8 Routing for Branch Offices and Mobile Workers
- Verifying Existing Services
- Network Address Translation
- Dynamic Host Control Protocol
- Access Control Lists and Firewalls
- Policy-Based Routing and Web Cache Communication Protocol
- Hot Standby Router Protocol
- Configuration Example: DSL Using PPPoE
- Step 1: Configure PPPoE (External Modem)
- Step 2: Configure the Dialer Interface
- Step 3: Define Interesting Traffic and Specify Default Routing
- Step 4a: Configure NAT Using an ACL
- Step 4b: Configure NAT Using a Route Map
- Step 5: Configure DHCP Service
- Step 6: Apply NAT Programming
- Step 7: Verify a PPPoE Connection
- Configuring PPPoA
- Step 1: Configure PPPoA on the WAN Interface (Using Subinterfaces)
- Step 2: Configure the Dialer Interface
- Step 3: Verify a PPPoA Connection
- Configuring a Teleworker to a Branch Office VPN Using CLI
- Step 1: Configure the ISAKMP Policy (IKE Phase 1).
- Step 2: Configure Policies for the Client Group(s)
- Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination)
- Step 4: Configure Router AAA and Add VPN Client Users
- Step 5: Create VPN Client Policy for Security Association Negotiation
- Step 6: Configure the Crypto Map (IKE Phase 2)
- Step 7: Apply the Crypto Map to the Interface
- Step 8: Verify the VPN Service
- Configuring IPsec Site-to-Site VPNs Using CLI
- Step 1: Configure the ISAKMP Policy (IKE Phase 1)
- Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination)
- Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer)
- Step 4: Configure the Crypto Map (IKE Phase 2)
- Step 5: Apply the Crypto Map to the Interface (IKE Phase 2)
- Step 6: Configure the Firewall Interface ACL
- Step 7: Verify the VPN Service
- Configuring GRE Tunnels over IPsec
- Step 1: Create the GRE Tunnel
- Step 2: Specify the IPsec VPN Authentication Method
- Step 3: Specify the IPsec VPN IKE Proposals
- Step 4: Specify the IPsec VPN Transform Sets
- Step 5a: Specify Static Routing for the GRE over IPsec Tunnel
- Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel
- Step 6: Enable the Crypto Programming at the Interfaces
- Appendix: Create Your Own Journal Here.