1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu CCNP Quick Reference doc

376 854 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề CCNP Quick Reference
Tác giả Denise Donohue, Brent Stewart, Jerold Swan
Trường học Cisco Systems, Inc.
Chuyên ngành Networking
Thể loại Tài liệu hướng dẫn nhanh
Năm xuất bản 2008
Thành phố Indianapolis
Định dạng
Số trang 376
Dung lượng 3,21 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

[ vii ]Contents Part I BSCI 1 Chapter 1 The Evolving Network Model 3 Problems with the Hierarchical Design Model 5 Administrative Distance 11Building the Routing Table 12Comparing Routin

Trang 2

Denise Donohue, CCIE No 9566

Brent Stewart Jerold Swan, CCIE No 17783

Trang 3

CCNP Quick Reference

Denise Donohue, Brent Stewart, Jerold Swan

Copyright® 2008 Cisco Systems, Inc

Published by:

Cisco Press

800 East 96th Street

Indianapolis, IN 46240 USA

All rights reserved No part of this book may be reproduced

or transmitted in any form or by any means, electronic or

mechanical, including photocopying, recording, or by any

information storage and retrieval system, without written

permission from the publisher, except for the inclusion of

brief quotations in a review

Printed in the United States of America

First Printing June 2008

Library of Congress Cataloging-in-Publication Date available

upon request

ISBN-13: 978-1-58720-236-0

ISBN-10: 1-58720-236-0

Warning and Disclaimer

This book is designed to provide information about networking Every effort has beenmade to make this book as complete and as accurate as possible, but no warranty orfitness is implied

The information is provided on an “as is” basis The authors, Cisco Press, and CiscoSystems, Inc shall have neither liability nor responsibility to any person or entitywith respect to any loss or damages arising from the information contained in thisbook or from the use of the discs or programs that may accompany it

The opinions expressed in this book belong to the author and are not necessarily those

of Cisco Systems, Inc

Trademark Acknowledgments

All terms mentioned in this book that are known to be trademarks or service markshave been appropriately capitalized Cisco Press or Cisco Systems, Inc., cannot attest

to the accuracy of this information Use of a term in this book should not be regarded

as affecting the validity of any trademark or service mark

Trang 4

Corporate and Government Sales

The publisher offers excellent discounts on this book when ordered in quantity forbulk purchases or special sales, which may include electronic versions and/or

custom covers and content particular to your business, training goals, marketingfocus, and branding interests For more information, please contact:

U.S Corporate and Government Sales 1-800-382-3419

corpsales@pearsontechgroup.com

For sales outside the United States please contact:

International Sales international@pearsoned.com

Readers’ feedback is a natural continuation of this process If you have any

comments regarding how we could improve the quality of this book, or otherwisealter it to better suit your needs, you can contact us through email at

feedback@ciscopress.com Please make sure to include the book title and ISBN inyour message

We greatly appreciate your assistance

[ iii ]

Trang 5

About the Authors

Denise Donohue, CCIE No 9566, is manager of Solutions Engineering for ePlus

Technology in Maryland She is responsible for designing and implementing dataand VoIP networks, supporting companies based in the National Capital region.Prior to this role, she was a systems engineer for the data consulting arm ofSBC/AT&T Denise was a Cisco instructor and course director for Global

Knowledge and did network consulting for many years

Brent Stewart, CCNP, CCDP, CCSI, MCSE, is a network administrator for

CommScope He is responsible for designing and managing a large-scale wide IP network He participated in the development of BSCI with Cisco and haswritten and taught extensively on CCNA and CCNP

world-Jerold Swan, CCIE No 17783, is a senior network engineer for the Southern

Ute Indian Tribe Growth Fund in Ignacio, CO Prior to that he was a Ciscoinstructor and course director for Global Knowledge He has also worked in IT inthe higher education and service provider fields He holds CCNP and CCSPcertifications

About the Technical Editors

Rus Healy, CCIE No 15025, works as a senior engineer for Annese &

Associates, a Cisco partner in upstate New York He also holds CCNP and CCDPcertifications His other interests include bicycling, skiing, and camping with hisfamily, as well as competitive amateur radio events

John Mistichelli, CCIE No 7536, CCSI No 20000, CCNP, CCDP, CCIP, MCSE, CNE, is a self employed Cisco consultant and trainer He provides

network-consulting services for businesses and government organizations out the United States John is also a world-class technical trainer for ConvergentCommunications where he teaches service provider courses for Cisco Advanced

through-Services Education John is a coauthor of the book Cisco Routers 24Seven (ISBN:

0782126464)

Trang 6

Chapter 1 The Evolving Network Model 91

Chapter 2 VLAN Implementation 99

Chapter 3 Spanning Tree 112

Chapter 4 InterVLAN Routing 129

Chapter 5 Layer 3 Redundancy 136

Chapter 6 Using Wireless LANs 141

Chapter 7 VoIP in a Campus Network 152

Chapter 8 Campus Network Security 159

Part III ISCW 171

Chapter 1 Network Conceptual Models 173

Chapter 2 Providing SOHO/Teleworker Connectivity 176

[ v ]

Trang 7

Chapter 3 Frame Mode MPLS 190

Chapter 3 QoS Overview 264

Chapter 4 QoS Details 275

Chapter 5 AutoQoS 303

Chapter 6 Wireless Scalability 308

Index 315

Trang 8

[ vii ]

Contents

Part I BSCI 1

Chapter 1 The Evolving Network Model 3

Problems with the Hierarchical Design Model 5

Administrative Distance 11Building the Routing Table 12Comparing Routing Protocols 12

CHAPTER 2 EIGRP 14

Packet Types 15Neighbor Discovery and Route Exchange 16

EIGRP Metric 16Diffusing Update Algorithm (DUAL) 17Route Selection Example 18

Creating an EIGRP Default Route 20Troubleshooting EIGRP 20

Summarization 21Load Balancing 21WAN Bandwidth 22EIGRP Authentication 24

Trang 9

LSAs 28

LSDB Overload Protection 29LSA Types 29

OSPF Packets 31OSPF Neighbor Relationships 31Establishing Neighbors and Exchanging Routes 32

Router ID 33Troubleshooting OSPF 34

Designated Routers 35Nonbroadcast Multiaccess (NBMA) Networks 36

OSPF Summarization 36Creating a Default Route 37Stub and Not-So-Stubby Areas 38Configuring Virtual Links 39

Chapter 4 IS-IS 41

Types of IS-IS Routers 42NSAP Address Structure 44Adjacency Formation in IS-IS 44IS-IS Network Types 44

Chapter 5 Optimizing Routing 47

Configuring Route Redistribution 47Seed Metric 48

Passive Interface 49Distribute Lists 49

Trang 10

[ ix ]

Route Maps 50Route Map Syntax 50Match and Set Conditions 51Manipulating Administrative Distance 52

Configuring DHCP 55DHCP Relay Agent 56

Multihoming 59BGP Databases 60BGP Message Types 60Internal and External BGP 60BGP Next-Hop Selection 61BGP Next Hop on a Multiaccess Network 62BGP Synchronization Rule 62

Chapter 7 IP Multicast 69

PIM Dense Mode 72PIM Sparse Mode 73

Trang 11

PIM Sparse-Dense Mode 73Configuring Multicast Routing and PIM 73Auto-RP 73

PIM Version 2 74

IGMP Version 1 75IGMP Version 2 75IGMP Version 3 75

IGMP Snooping 75

Chapter 8 IPv6 Introduction 77

Static Routing 82RIPng for IPv6 82EIGRP 83MP-BGP for IPv6 83OSPFv3 84

OSPFv3 LSAs 85 Configuration 85

Troubleshooting 86

NAT-PT, ALG, and BIA/BIS 87

Trang 12

[ xi ]

Chapter 1 The Evolving Network Model 91

Chapter 2 VLAN Implementation 99

Trang 13

Chapter 3 Spanning Tree 112

Root Bridge Election 114Root Port Election 115

Trang 14

[ xiii ]

Chapter 4 InterVLAN Routing 129

Understanding the Switching Process 130Understanding the Switching Table 132Understanding Switch Forwarding Architectures 132

ARP Throttling 134Configuring and Troubleshooting CEF 134

Chapter 5 Layer 3 Redundancy 136

HSRP States 137Configuring HSRP 137

Chapter 6 Using Wireless LANs 141

Characteristics of Wireless LANs 141WLAN Topologies 142

802.11b Standard 143802.11a Standard 143802.11g Standard 144

WPA/WPA2 Authentication 145

Cisco Unified Wireless Network 145Autonomous APs 146

Trang 15

Lightweight Access Points 146Wireless LAN Antennas 147

Gain 148 Directionality 148 Multipath Distortion 148 EIRP 148

Power over Ethernet (PoE) Switches 149

Configuring Autonomous Access Points 149Configuring a WLAN Controller 150

Chapter 7 VoIP in a Campus Network 152

Network and Bandwidth Considerations 153Auxiliary (or Voice) VLANs 154

QoS Actions 154DSCP Values 155Trust Boundaries 156

Manual Configuration 157Using AutoQoS 157

Chapter 8 Campus Network Security 159

Port Security 160Port-Based Authentication 160

Switch Spoofing 161802.1Q Double-Tagging 162VACLs 163

Private VLANs 163

DHCP Spoofing 165ARP Spoofing 165

Trang 16

[ xv ]

BPDU Guard 167BPDU Filtering 167Root Guard 167

Unidirectional Link Detection (UDLD) 168Loop Guard 168

Part III ISCW 171

Chapter 1 Network Conceptual Models 173

Chapter 2 Providing SOHO/Teleworker Connectivity 176

Cable Components 177Cable Standards 178Provisioning the Cable Modem 179

Types of DSL 180ADSL 181

Carrierless Amplitude and Phase Line Coding 182 Discrete Multi-Tone Line Coding 182

Layer 2 over DSL 182

PPPoE 183 PPPoA 184

Configuring PPPoE CPE 184Configuring PPPoA CPE 187Troubleshooting ADSL 188

Troubleshooting ADSL at Layer 1 188 Troubleshooting ADSL at Layer 2 188

Trang 17

Chapter 3 Frame Mode MPLS 190

Handling Customer Routes 197Route Distinguishers 198Route Targets 198

Chapter 4 IPsec 200

Authentication Header 200Encapsulating Security Payload 201

Configuring a Site-to-Site VPN Using Cisco IOS

Configuring an ISAKMP Policy 205

Configuring a Crypto ACL 206Configuring a Crypto Map 207Applying the Crypto Map to an Interface 207Configuring an Optional Interface Access List 207

Trang 18

[ xvii ]

Configuring a GRE Tunnel Using Cisco IOS

Establishing an Easy VPN IPsec Session 214Using SDM to Configure the Easy VPN Server 215

Chapter 5 Cisco Device Hardening 217

Cisco Self-Defending Network 217Types of Network Attacks 217Mitigating Reconnaissance Attacks 218Mitigating Access Attacks 219

Mitigating Denial-of-Service Attacks 219

Disabling Unused Cisco Router Network Services and

Unused Router Interfaces 220Vulnerable Router Services 220Hardening with AutoSecure 221Configuring AutoSecure 222Security Device Manager 222

Securing Cisco Router Installations and Administrative

Password-Creation Rules 222Types of Router Passwords 222Password-Length Enforcement 223Password Encryption 223

Trang 19

Enhanced Username Password Security 223Password Example 224

Securing ROMMON 224Rate-Limiting Authentication Attempts 224Setting Timeouts 225

ACL Review 227Mitigating Spoofed Addresses (Inbound) 227Mitigating Spoofed Addresses (Outbound) 228Mitigating SYN Attacks 228

Using the established Keyword in ACLs 228 Using TCP Intercept 228

ACL Caveats 229

Types of Management Traffic 229Configuring Secure Shell 230Configuring Syslog 231Simple Network Management Protocol 231Network Time Protocol 232

AAA Services 233Router Access Modes 233Configuring AAA 233Configuring CLI Authentication on a Cisco Router 234Configuring Authorization 234

Configuring Accounting 235Troubleshooting AAA 235

Chapter 6 Cisco IOS Threat Defenses 236

Trang 20

[ xix ]

TCP Handling in the Cisco IOS Firewall 237UDP Handling in the Cisco IOS Firewall 237Alerts and Audit Trails 238

Cisco IOS Authentication Proxy 238

Defining External and Internal Interfaces 238Configuring Access Lists on the Interfaces 239Defining Inspection Rules 239

Applying Inspection Rules to Interfaces 240Verifying Inspection 240

Defining IDS/IPS Terms 241Cisco IOS IPS Signatures 242Cisco IOS IPS Alarms 242Configuring Cisco IOS IPS 242

Chapter 1 Network Architecture 247

Hierarchical Design Model 250

Chapter 2 Cisco VoIP 253

Transmission 254

A Worksheet for Calculating VoIP Bandwidth 260

An Example for G.711, No Compression over Ethernet,

20 ms Samples 260

Configuring Cisco Routers to Support VoIP 262

Trang 21

Chapter 3 QoS Overview 264

Bandwidth 264Delay and Jitter 265Packet Loss Issues 266Defining QoS Requirements for Network Traffic 266

Best Effort 267IntServ 267DiffServ 269

Legacy CLI 269MQC 270

MQC Configuration 270 Verifying QoS Configuration 271

AutoQoS 271SDM QoS Wizard 272

Chapter 4 QoS Details 275

Using NBAR for Classifying Traffic 275Marking at Layer 2 278

Marking at Layer 3 279

Default PHB 280 Assured Forwarding and Class Selector PHB 280 DiffServ Expedited Forwarding PHB 281

Classifying and Marking in a VoIP Network 281

Hardware Queue 286Software Queue 287

FIFO Queuing 287Priority Queuing 287Round Robin Queuing 288Weighted Fair Queuing 288

Configuring WFQ 289

Trang 22

[ xxi ]

CBWFQ 290LLQ 291

Traffic Policing 295Traffic Shaping 295

Compression 296Link Fragmentation and Interleave (LFI) 297

GRE Tunnels 298IPsec Tunnels 298

SLA 300Enterprise QoS 300CoPP 302

Chapter 5 AutoQoS 303

AutoQoS Classes 305AutoQoS and Changing Network Conditions 306Manually Tuning AutoQoS Configurations 307

Chapter 6 Wireless Scalability 308

Index 315

Trang 23

Icons Used in This Book

PIX Firewall

VPN

Concentrator

Laptop PC

File Server

Ethernet Connection

Relational

Database

Serial Line Connection

Access Server

Trang 24

[ xxiii ]

Command Syntax Conventions

The conventions used to present command syntax in this book are the same

conventions used in the IOS Command Reference The Command Reference

describes these conventions as follows:

Boldface indicates commands and keywords that are entered literally as

shown In actual configuration examples and output (not general commandsyntax), boldface indicates commands that are manually input by the user

(such as a show command).

Italic indicates arguments for which you supply actual values.

■ Vertical bars (|) separate alternative, mutually exclusive elements

■ Square brackets ([ ]) indicate an optional element

■ Braces ({ }) indicate a required choice

■ Braces within brackets ([{ }]) indicate a required choice within an optionalelement

Trang 28

CHAPTER 1

The Evolving Network Model

The Hierarchical Design Model

Cisco used the three-level Hierarchical Design Model for years This older

model provided a high-level idea of how a reliable network might beconceived, but it was largely conceptual because it didn’t provide specificguidance Figure 1-1 shows the Hierarchical Design Model

This same three-layer hierarchy can be used in the WAN with a central quarters, division headquarters, and units

Trang 29

The layers break a network in the following way:

■ Access layer—End stations attach to the network using low-costdevices

■ Distribution layer—Intermediate devices apply policies

— Route summarization

— Policies applied, such as:

• Route selection

• Access lists

• Quality of Service (QoS)

■ Core layer—The backbone that provides a high-speed path betweendistribution elements

— Distribution devices are interconnected

— High speed (there is a lot of traffic)

— No policies (it is tough enough to keep up)

Later versions of this model include redundant distribution, core devices,and connections, which make the model more fault-tolerant

Trang 30

Problems with the Hierarchical Design Model

This early model was a good starting point, but it failed to address key

issues, such as:

■ Where do wireless devices fit in?

■ How should Internet access and security be provisioned?

■ How do you account for remote access, such as dial-up or VPN?

■ Where should workgroup and enterprise services be located?

Enterprise Composite Network Model

The newer Cisco model—the Enterprise Composite Model—is significantly more

complex and attempts to address the shortcomings of the Hierarchical Design

Model by expanding the older version and making specific recommendations

about how and where certain network functions should be implemented This

model is based on the principles described in the Cisco Architecture for

Voice, Video, and Integrated Data (AVVID)

The Enterprise Composite Model (see Figure 1-3) is broken into three large

sections:

■ Enterprise Campus—Switches that make up a LAN

■ Enterprise Edge—The portion of the enterprise network connected to

the larger world

■ Service Provider Edge—The different public networks that are

attached

The first section, the Enterprise Campus, looks like the old Hierarchical

Design Model with added details It features six sections:

■ Campus Backbone—The core of the LAN

■ Building Distribution—Links subnets/VLANs and applies policy

■ Building Access—Connects users to network

■ Management

■ Edge Distribution—A distribution layer out to the WAN

■ Server Farm—For Enterprise services

Trang 31

Figure 1-3 The Enterprise Composite Model

BUILDING C BUILDING A

Building

Distribution A

Building Distribution B

Building Distribution A

Building Distribution B Distribution ABuilding Building

Distribution B

2nd Floor Access

4th Floor Access 2nd Floor Access 4th Floor Access 2nd Floor Access 4th Floor Access

1st Floor Access 3rd Floor Access 1st Floor Access 3rd Floor Access 1st Floor Access 3rd Floor Access

The Enterprise Edge, shown in Figure 1-4, details the connections from the

campus to the WAN and includes:

Campus Backbone

Edge Distribution

Internal Router

DMZ Firewall Web

Dial - In

Internal Router DMZ Firewall

Public Servers

Internet Router

Firewall

E-Commerce

Internet

Trang 32

The Service Provider Edge is just a list of the public networks that facilitate

wide-area connectivity and include:

■ Internet service provider (ISP)

■ Public switched telephone network (PSTN)

■ Frame Relay, ATM, and PPP

Figure 1-5 puts together the various pieces: Campus, Enterprise Edge, and

Service Provider Edge Security implemented on this model is described in

the Cisco SAFE (Security Architecture for Enterprise) blueprint

Chapter 1: The Evolving Network Model [ 7 ]

SONA and IIN

Modern converged networks include different traffic types, each with unique

requirements for security, QoS, transmission capacity, and delay These

include:

■ Voice signaling and bearer

■ Core application traffic, such as Enterprise Resource Planning (ERP)

or Customer Relationship Management (CRM)

Service Provider Edge Enterprise Edge

Internal Router

DMZ Firewall Web

Database

App Server Internet Router

Corporate Router

Dial-In

Internal Router DMZ Firewall

Public Servers Internet Router

Trang 33

Cisco routers are able to implement filtering, compression, prioritization,and policing Except for filtering, these capabilities are referred to collec-tively as QoS.

IIN describes an evolutionary vision of a network that integrates network andapplication functionality cooperatively and allows the network to be smartabout how it handles traffic to minimize the footprint of applications IIN is built

on top of the Enterprise Composite Model and describes structures overlaid

on to the Composite design as needed in three phases (see Figure 1-6).Phase 1, “Integrated Transport,” describes a converged network, which is builtalong the lines of the Composite model and based on open standards This isthe phase that the industry has been transitioning to recently The CiscoIntegrated Services Routers (ISR) are an example of this trend

Phase 2, “Integrated Services,” attempts to virtualize resources, such asservers, storage, and network access It is a move to an “on-demand” model

By “virtualize,” Cisco means that the services are not associated with a particulardevice or location Instead, many services can reside in one device to easemanagement, or many devices can provide one service that is more reliable

An ISR brings together routing, switching, voice, security, and wireless It is

an example of many services existing on one device A load balancer, whichmakes many servers look like one, is an example of one service residing onmany devices

VRFs are an example of taking one resource and making it look like many Someversions of IOS are capable of having a router present itself as many virtualrouter (VRF) instances, allowing your company to deliver different logicaltopologies on the same physical infrastructure Server virtualization is

Trang 34

another example The classic example of taking one resource and making it

appear to be many resources is the use of a virtual LAN (VLAN) and a

virtual storage area network (VSAN)

Virtualization provides flexibility in configuration and management

Phase 3, “Integrated Applications,” uses application-oriented networking

(AON) to make the network application-aware and to allow the network to

actively participate in service delivery

An example of this Phase 3 IIN systems approach to service delivery is

Network Admission Control (NAC) Before NAC, authentication, VLAN

assign-ment, and anti-virus updates were separately managed With NAC in place,

the network is able to check the policy stance of a client and admit, deny, or

remediate based on policies

IIN allows the network to deconstruct packets, parse fields, and take actions

based on the values it finds An ISR equipped with an AON blade might be

set up to route traffic from a business partner The AON blade can examine

traffic, recognize the application, and rebuild XML files in memory

Corrupted XML fields might represent an attack (called schema poisoning), so

the AON blade can react by blocking that source from further

communica-tion In this example, routing, an awareness of the application data flow, and

security are combined to allow the network to contribute to the success of

the application

Services-Oriented Network Architecture (SONA) applies the IIN ideal to

Enterprise networks SONA breaks down the IIN functions into three layers:

■ Network Infrastructure—Hierarchical converged network and attached

end systems

■ Interactive Services—Resources allocated to applications

■ Applications—Includes business policy and logic

Trang 35

Figure 1-6 IIN and SONA

Phase 1 – Integrated Transport (converged network)

Phase 3 – Integrated Applications

Application Networking Services

Trang 36

Routing protocols are used to pass information about the structure of the

network between routers Cisco routers support the following IP routing

protocols RIP (versions 1 and 2), IGRP, EIGRP, IS-IS, OSPF, and BGP This

section compares routing protocols and calls out key differences between

them

Administrative Distance

Cisco routers are capable of supporting several IP routing protocols

concur-rently When identical prefixes are discovered from two or more separate

sources, Administrative Distance (AD) is used to discriminate between the

paths AD is a poor choice of words; trustworthiness is a better name.

Routers use paths with the lower AD

Table 1-1 lists the default values for various routing protocols Of course,

there are several ways to change AD for a routing protocol or for a specific

Trang 37

Building the Routing Table

The router builds a routing table by ruling out invalid routes and consideringthe remaining advertisements The procedure is:

1. For each route received, verify the next hop If invalid, discard theroute

2. If multiple, valid routes are advertised by a routing protocol, choosethe lowest metric

3. Routes are identical if they advertise the same prefix and mask, so192.168.0.0/16 and 192.168.0.0/24 are separate paths and are eachplaced into the routing table

4. If more than one specific valid route is advertised by different routingprotocols, choose the path with the lowest AD

Comparing Routing Protocols

Two things should always be considered in choosing a routing protocol: fastconvergence speed and support for VLSM EIGRP, OSPF, and IS-IS meetthese criteria Although all three meet the minimum, there are still importantdistinctions, as described below:

■ EIGRP is proprietary, but it is simple to configure and support

■ OSPF is an open standard, but it is difficult to implement and support

■ There are few books on IS-IS and even fewer engineers with

experience who use it IS-IS is therefore uncommon

Table 1-2 compares routing protocols

Trang 38

Table 1-2 Comparison of Routing Protocols

distance

vector

Trang 39

Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietaryclassless routing protocol that uses a complex metric based on bandwidthand delay The following are some features of EIGRP:

■ Fast convergence

■ Support for VLSM

■ Partial updates conserve network bandwidth

■ Support for IP, AppleTalk, and IPX

■ Support for all layer 2 (data link layer) protocols and topologies

■ Sophisticated metric that supports unequal-metric proportional load-balancing

■ Use of multicasts (and unicasts where appropriate) instead of

broadcasts

■ Support for authentication

EIGRP Overview

EIGRP’s function is controlled by four key technologies:

■ Neighbor discovery and maintenance—Uses periodic hello messages

■ The Reliable Transport Protocol (RTP)—Controls sending, tracking,and acknowledging EIGRP messages

■ Diffusing Update Algorithm (DUAL)—Determines the best loop-freeroute

■ Protocol-independent modules (PDM)—Modules are “plug-ins” for IP,IPX, and AppleTalk versions of EIGRP

Trang 40

EIGRP uses three tables:

■ The neighbor table is built from EIGRP hellos and used for reliable

delivery

■ The topology table contains EIGRP routing information for best paths

and loop-free alternatives

■ EIGRP places best routes from its topology table into the common

routing table

EIGRP Messages

EIGRP uses various message types to initiate and maintain neighbor

relation-ships, and to maintain an accurate routing table It is designed to conserve

bandwidth and router resources by sending messages only when needed, and

only to those neighbors that need to receive them

Packet Types

EIGRP uses five packet types:

■ Hello—Identifies neighbors and serves as a keepalive mechanism

■ Update—Reliably sends route information

■ Query—Reliably requests specific route information

■ Reply—Reliably responds to a query

■ ACK—Acknowledgment

EIGRP is reliable, but hellos and ACKs are not acknowledged The

acknowledgement to a query is a reply

If a reliable packet is not acknowledged, EIGRP periodically retransmits the

packet to the nonresponding neighbor as a unicast EIGRP has a window

size of one, so no other traffic is sent to this neighbor until it responds After

16 unacknowledged retransmissions, the neighbor is removed from the

Ngày đăng: 17/01/2014, 06:20

TỪ KHÓA LIÊN QUAN

w