SlideShare a Scribd company logo
1 of 81
Download to read offline
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
TOPICS COVERED:
IP ROUTING ESSENTIALS
- ROUTING PROTOCOL OVERVIEW
- PATH SELECTION
- STATIC ROUTING
- EIGRP
- OSPF
- ADVANCE OSPF
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
ROUTING PROTOCOL OVERVIEW
A router’s primary function is to move an IP packet from one network to a different network. A
router learns about non-attached networks through configuration of static routes or through
dynamic IP routing protocols.
Dynamic IP routing protocols distribute network topology information between routers and provide
updates without intervention when a topology change in the network occurs.
Design requirements or hardware limitations may restrict IP routing to static routes, which do not
accommodate topology changes very well and can burden network engineers, depending on the size
of the network. With dynamic routing protocols, routers try to select the best loop-free path on
which to forward a packet to its destination IP address.
The common dynamic routing protocols found on most routing platforms today are as follows:
• Routing Information Protocol Version 2 (RIPv2)
• Enhanced Interior Gateway Routing (EIGRP)
• Open Shortest Path First (OSPF)
• Intermediate System-to-Intermediate System (IS-IS)
• Border Gateway Protocol (BGP)
With the exception of BGP, the protocols in this list are designed and optimized for routing within an
autonomous system and are known as Interior Gateway Protocols (IGPs).
Exterior Gateway Protocols (EGPs) route between autonomous systems.
BGP is an EGP protocol but can also be used within an autonomous system. If BGP exchanges routes
within an autonomous system, it is known as an interior BGP (iBGP) session. If it
exchanges routes between different autonomous systems, it is known as an exterior BGP (eBGP)
session.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Distance Vector Algorithms
Distance vector routing protocols, such as RIP {Routing Information Protocol}, advertise routes as
vectors, where distance is a metric (or cost) such as hop count, and vector is the next-hop router’s IP
used to reach the destination:
• Distance: The distance is the route metric to reach the network.
• Vector: The vector is the interface or direction to reach the network.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
When a router receives routing information from a neighbor, it stores it in a local routing database
as it is received, and the distance vector algorithm (such as the Bellman-Ford and Ford-Fulkerson
algorithms) is used to determine which paths are the best loop-free paths to each reachable
destination. When the best paths are determined, they are installed into the routing table and are
advertised to each neighbor router.
Routers running distance vector protocols advertise the routing information to their neighbors from
their own perspective, modified from the original route received.
Therefore, a distance vector protocol does not have a complete map of the whole network; instead,
its database reflects that a neighbor router knows how to reach the destination network and how
far the neighbor router is from the destination network.
The advantage of distance vector protocols is that they require less CPU and memory and can run on
low-end routers.
A distance vector protocol selects paths purely based on distance. It does not account for link speeds
or other factors.
The link between R1 and R7 is a serial link with only 64 Kbps of bandwidth, and all of the other links
are 1 Gbps Ethernet links. RIP does not take this into consideration and forwards traffic across this
link, which will result in packet loss when that link is oversubscribed.
Enhanced Distance Vector Algorithms
The diffusing update algorithm (DUAL) is an enhanced distance vector algorithm that EIGRP uses to
calculate the shortest path to a destination within a network.
EIGRP advertises network information to its neighbors as other distance vector protocols do, but it
has some enhancements, as its name suggests. The following are some of the enhancements
introduced into this algorithm compared to other distance vector algorithms:
• It offers rapid convergence time for changes in the network topology.
• It sends updates only when there is a change in the network. It does not send full routing
table updates in a periodic fashion, as distance vector protocols do.
• It uses hellos and forms neighbor relationships just as link-state protocols do.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
• It uses bandwidth, delay, reliability, load, and maximum transmission unit (MTU) size instead
of hop count for path calculations.
• It has the option to load balance traffic across equal- or unequal-cost paths.
EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics of both
distance vector and link-state protocols.
R3 is trying to forward packets to the 192.168.1.0/24 network. If the routing domain used a distance
vector routing protocol, it would take the R3→R1→R7 path, which is only two hops away, rather
than the path R3→R1→R2→R7 path, which is three hops away. But the R3→R1→R7 path cannot
support traffic over 64 kbps. While the R3→R1→R2→R7 path is longer, it provides more bandwidth
and does not have as much delay (because of the serialization process on lower-speed interfaces)
and is the path selected by EIGRP.
Link-State Algorithms
A link-state dynamic IP routing protocol advertises the link state and link metric for each of its
connected links and directly connected routers to every router in the network.
OSPF and IS-IS are two link-state routing protocols commonly used in enterprise and service provider
networks. OSPF advertisements are called link-state advertisements (LSAs), and IS-IS uses link-state
packets (LSPs) for its advertisements.
As a router receives an advertisement from a neighbor, it stores the information in a local database
called the link-state database (LSDB) and advertises the link-state information on to each of its
neighbor routers exactly as it was received. The link-state information is essentially flooded
throughout the network, unchanged, from router to router, just as the originating router advertised
it. This allows all the routers in the network to have a synchronized and identical map of the
network.
Using the complete map of the network, every router in the network then runs the Dijkstra shortest
path first (SPF) algorithm to calculate the best shortest loop-free paths. The link-state algorithm then
populates the routing table with this information.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Due to having the complete map of the network, link-state protocols usually require more CPU and
memory than distance vector protocols, but they are less prone to routing loops and make better
path decisions.
Path Vector Algorithm
A path vector protocol such as BGP is similar to a distance vector protocol; the difference is that
instead of looking at the distance to determine the best loop-free path, it looks at various BGP path
attributes.
BGP path attributes include autonomous system path (AS_Path), multi-exit discriminator (MED),
origin, next hop, local preference, atomic aggregate, and aggregator.
A path vector protocol guarantees loop-free paths by keeping a record of each autonomous system
that the routing advertisement traverses.
Any time a router receives an advertisement in which it is already part of the AS_Path, the
advertisement is rejected because accepting the AS_Path would effectively result in a routing loop.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
1. R1 (AS 1) advertises the 10.1.1.0/24 network to R2 (AS 2). R1 adds the AS 1 to theAS_Path during the
network advertisement to R2.
2. R2 advertises the 10.1.1.0/24 network to R4 and adds AS 2 to the AS_Path during the network
advertisement to R4.
3. R4 advertises the 10.1.1.0/24 network to R3 and adds AS 4 to the AS_Path during the network
advertisement to R3.
4. R3 advertises the 10.1.1.0/24 network back to R1 and R2 after adding AS 3 to the AS_Path during the
network advertisement.
5. As R1 receives the 10.1.1.0/24 network advertisement from R3, it discards the route advertisement
because R1 detects its AS (AS 1) in the AS_Path “3 4 2 1” and considers the advertisement as a loop.
R2 discards the 10.1.1.0/24 network advertisement from R3 as it detects its AS (AS 2) in the AS_Path
“3 4 2 1” and considers it a loop, too.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
PATH SELECTION
A router identifies the path a packet should take by evaluating the prefix length that is programmed
in the Forwarding Information Base (FIB).
The FIB is programmed through the routing table, which is also known as the Routing Information
Base (RIB).
The RIB is composed of routes presented from the routing protocol processes. Path selection has
three main components:
1. Longest Match: The prefix length represents the number of leading binary bits in the subnet
mask that are in the on position.
2. Administrative distance: Administrative distance (AD) is a rating of the trustworthiness of a
routing information source. If a router learns about a route to a destination from more than
one routing protocol, and all the routes have the same prefix length, then the AD is
compared.
3. Metrics: A metric is a unit of measure used by a routing protocol in the best-path
calculation. The metrics vary from one routing protocol to another.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
1. Longest match
In the figure, a packet is destined for 172.16.0.10. The router has three possible routes that
match this packet: 172.16.0.0/12, 172.16.0.0/18, and 172.16.0.0/26.
Of the three routes, 172.16.0.0/26 has the longest match and is therefore chosen to forward the
packet.
Remember, for any of these routes to be considered a match there must be at least the number
of matching bits indicated by the subnet mask of the route.
2. Administrative distance
Administrative distance is what is used to select the best path when a router has two different paths
to the same destination via two different routing protocols.
Most routing protocols are not compatible with other protocols.
In a network with multiple routing protocols, being able to select the best path between multiple
protocols is critical.
Administrative distance defines the reliability of a routing protocol.
Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an
administrative distance value.
IPv6 uses the same distances as IPv4.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Default Administrative Distances:
Routing Protocol Default Administrative Distance
Connected 0
Static 1
EIGRP summary route 5
External BGP (eBGP) 20
EIGRP (internal) 90
OSPF 110
IS-IS 115
RIP 120
EIGRP (external) 170
Internal BGP (iBGP) 200
3. Metric
The metric is a value produced by the routing protocol's algorithm. The metric value determines the
best path to a destination network within a routing protocol.
To determine the metric:
• RIP uses hop count
• EIGRP uses 256*(Bandwidth + Delay) for calculating cost(metric)
• OSPF uses {Reference bandwidth/Interface BW}
Reference BW=100Mbps
Metric is used to compare routes to a destination by the same routing protocol.
Lower values indicate preferred routes.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Equal-Cost Multipathing
If a routing protocol identifies multiple paths as a best path and supports multiple path entries, the
router installs the maximum number of paths allowed per destination. This is known as equal-cost
multipathing (ECMP) and provides load sharing across all links. RIP, EIGRP, OSPF, and IS-IS all support
ECMP. ECMP provides a mechanism to increase bandwidth across multiple paths by splitting traffic
equally across the links.
R1# show ip route
! Output omitted for brevity
O 10.3.3.0/24 [110/30] via 10.12.1.2, 00:49:12, GigabitEthernet0/2
[110/30] via 10.14.1.4, 00:49:51, GigabitEthernet0/4
Unequal-Cost Load Balancing
By default, routing protocols install only routes with the lowest path metric. However, EIGRP can be
configured (not enabled by default) to install multiple routes with different path metrics. This allows
for unequal-cost load balancing across multiple paths. Traffic is transmitted out the router’s
interfaces based on that path’s metrics in ratio to other the interface’s metrics.
OSPF
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
R1# show ip route eigrp
! Output omitted for brevity
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 7 subnets, 2 masks
D 10.3.3.0/24 [90/3328] via 10.14.1.4, 00:00:02, GigabitEthernet0/4
[90/5632] via 10.12.1.2, 00:00:02, GigabitEthernet0/2
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
STATIC ROUTING
Static routes provide precise control over routing but may create an administrative burden as the
number of routers and network segments grow.
Using static routing requires zero network bandwidth because implementing manual route entries
does not require communication with other routers.
Unfortunately, because the routers are not communicating, there is no network intelligence. If a link
goes down, other routers will not be aware that the network path is no longer valid. Static routes are
useful when
• Dynamic routing protocols cannot be used on a router because of limited router CPU or
memory
• Routes learned from dynamic routing protocols need to be superseded
Static Route Types
Static routes can be classified as one of the following:
1. Directly attached static routes
2. Recursive static route
3. Fully specified static route
1. Directly Attached Static Routes
Point-to-point interfaces do not have to worry about maintaining an adjacency table and do not use
Address Resolution Protocol (ARP), so static routes can directly reference the outbound interface of
a router.
A static route that uses only the outbound next-hop interface is known as a directly attached static
route, and it requires that the outbound interface be in an up state for the route to be installed into
the RIB.
R1# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# ip route 10.22.22.0 255.255.255.0 Serial 1/0
R2# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)# ip route 10.11.11.0 255.255.255.0 Serial 1/0
R1# show ip route
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
! Output omitted for brevity
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
C 10.11.11.0/24 is directly connected, GigabitEthernet0/1
C 10.12.2.0/24 is directly connected, Serial1/0
S 10.22.22.0/24 is directly connected, Serial1/0
R2# show ip route
! Output omitted for brevity
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
S 10.11.11.0/24 is directly connected, Serial1/0
C 10.12.2.0/24 is directly connected, Serial1/0
C 10.22.22.0/24 is directly connected, GigabitEthernet0/1
R1 indicates that the 10.22.22.0/24 network is reachable via the S1/0 interface, and R2 indicates that
the 10.11.11.0/24 network is reachable via the S1/0 interface.
2. Recursive Static Routes
The forwarding engine on Cisco devices needs to know which interface an outbound packet should
use.
A recursive static route specifies the IP address of the next-hop address.
The recursive lookup occurs when the router queries the RIB to locate the route toward the next-
hop IP address (connected, static, or dynamic) and then cross-references the adjacency table.
Recursive static routes are configured with the command ip route network subnet-mask next-hop-ip.
Recursive static routes require the route’s next-hop address to exist in the routing table to install the
static route into the RIB.
R1# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# ip route 10.22.22.0 255.255.255.0 10.12.1.2
R2# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)# ip route 10.11.11.0 255.255.255.0 10.12.1.
R1# show ip route
! Output omitted for brevity
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
C 10.11.11.0/24 is directly connected, GigabitEthernet0/1
C 10.12.1.0/24 is directly connected, GigabitEthernet0/0
S 10.22.22.0/24 [1/0] via 10.12.1.2
Advantage:
Static route recursion can simplify topologies if a link fails because it may allow the static route to
stay installed while it changes to a different outbound interface in the same direction as the
destination.
Disadvantage:
However, problems arise if the recursive lookup resolves to a different interface pointed in the
opposite direction.
3. Fully Specified Static Routes
To correct this issue, the static route configuration should use the outbound interface and the next-
hop IP address. A static route with both an interface and a next-hop IP address is known as a fully
specified static route.
If the interface listed is not in an up state, the router removes the static route from the RIB.
Specifying the next-hop address along with the physical interface removes the recursive lookup and
does not involve the ARP processing problems that occur when using only the outbound interface.
Fully specified static routes are configured with the command ip route network subnet-mask
interface-id next-hop-ip.
R1# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# ip route 10.22.22.0 255.255.255.0 GigabitEthernet0/0 10.12.1.2
R2# configure term
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)# ip route 10.11.11.0 255.255.255.0 GigabitEthernet0/0 10.12.1.
R1# show ip route
! Output omitted for brevity
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
C 10.11.11.0/24 is directly connected, GigabitEthernet0/1
C 10.12.1.0/24 is directly connected, GigabitEthernet0/0
S 10.22.22.0/24 [1/0] via 10.12.1.2, GigabitEthernet0/0
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Floating Static Routing
The default AD on a static route is 1, but a static route can be configured with an AD value of 1 to
255 for a specific route.
The AD is set on a static route by appending the AD as part of the command structure.
Using a floating static route is a common technique for providing backup connectivity for prefixes
learned via dynamic routing protocols.
A floating static route is configured with an AD higher than that of the primary route. Because the
AD is higher than that of the primary route, it is installed in the RIB only when the primary route is
withdrawn.
R1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# ip route 10.22.22.0 255.255.255.0 10.12.1.2 10
R1(config)# ip route 10.22.22.0 255.255.255.0 Serial 1/0 210
R1# show ip route
! Output omitted for brevity
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
C 10.11.11.0/24 is directly connected, GigabitEthernet0/1
C 10.12.1.0/24 is directly connected, GigabitEthernet0/0
C 10.12.2.0/24 is directly connected, Serial1/0
S 10.22.22.0/24 [10/0] via 10.12.1.2
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Static Null Routes
The null interface is a virtual interface that is always in an up state. Null interfaces do not forward or
receive network traffic and drop all traffic destined toward them without adding overhead to a
router’s CPU.
Configuring a static route to a null interface provides a method of dropping network traffic without
requiring the configuration of an access list.
Creating a static route to the Null0 interface is a common technique to prevent routing loops.
The static route to the Null0 interface uses a summarized network range, and routes that are more
specific point toward the actual destination.
1. For example, a computer on the Internet sends a packet to 172.16.5.5, and the
172.16.5.0/24 network is not allocated on R1 or R2.
2. The ISP sends the packet to R1 because of the 172.16.0.0/20 static route; R1 looks into
the RIB, and the longest match for that prefix is the default route back to the ISP, so R1
sends the packet back to the ISP, creating the routing loop.
3. The service provider places a static route for the 172.16.0.0/20 network to R1’s interface
(192.168.1.1). R1 uses a static default route pointed toward the service provider
(192.168.1.2) and a static route to the 172.16.3.0/24 network via R2 (172.16.1.2).
Because R2 accesses all other networks through R1, a static default route points toward
R1’s interface (172.16.1.1).
R2# trace 172.16.5.5 source GigabitEthernet 0/2
Type escape sequence to abort.
Tracing the route to 172.16.5.5
1 172.16.1.1 0 msec 0 msec 0 msec
2 192.168.1.1 0 msec 0 msec 0 msec
3 192.168.1.2 0 msec 4 msec 0 msec
4 192.168.1.1 0 msec 0 msec 0 msec
5 192.168.1.2 0 msec 0 msec 0 msec
! Output omitted for brevity
To prevent the routing loop, a static route is added for 172.16.0.0/20, pointed to the Null0 interface
on R1.
Any packets matching the 172.16.0.0/20 network range that do not have a longer match in R1’s RIB
are dropped.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
R1
ip route 0.0.0.0 0.0.0.0 Gi0/0 192.168.1.2
ip route 172.16.3.0 255.255.255.0 Gi0/2 172.16.1.2
ip route 172.16.0.0 255.255.240.0 Null0
R2# trace 172.16.5.5 source GigabitEthernet 0/2
Type escape sequence to abort.
Tracing the route to 172.16.5.5
1 172.16.1.1 * * *
2 172.16.1.1 * * *
! Output omitted for brevity
QUIZ
1. Which of the following routing protocols is classified as an EGP?
1. RIP
2. EIGRP
3. OSPF
4. IS-IS
5. BGP
2. Which of the following routing protocols are classified as IGPs? (Choose all that apply.)
1. RIP
2. EIGRP
3. OSPF
4. IS-IS
5. BGP
3. A path vector routing protocol finds the best loop-free path by using ______.
1. hop count
2. bandwidth
3. delay
4. interface cost
5. path attributes
4. A distance vector routing protocol finds the best loop-free path by using ______.
1. hop count
2. bandwidth
3. delay
4. interface cost
5. path attributes
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
5. A link-state routing protocol finds the best loop free path by using ______.
1. hop count
2. bandwidth
3. delay
4. interface cost
5. path attributes
6. A router uses _________ as the first criterion for forwarding packets.
1. path metric
2. administrative distance
3. longest match
4. hop count
7. A router uses _________ as the second criterion for forwarding packets.
1. path metric
2. administrative distance
3. longest match
4. hop count
8. The ability to install multiple paths from the same routing protocol with the same path metric into
the RIB is known as ______.
1. per-packet load balancing
2. round-robin load balancing
3. equal-cost multipathing
4. parallel link forwarding
9. Which static route should be used to avoid unintentional forwarding paths with an Ethernet link
failure?
1. A directly attached static route
2. A recursive static route
3. A fully specified static route
4. A static null route
10. Virtual routing and forwarding (VRF) is useful with _____ addresses.
1. MAC
2. IPv4
3. IPv6
4. IPv4 and IPv6
Answers to the “Do I Know This Already?” quiz:
1 E
2 A, B, C, D
3 E
4 A
5 E
6 C
7 B
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
8 C
9 C
10 D
EIGRP (ENHANCED INTERIOR GATEWAY ROUTING
PROTOCOL)
EIGRP Theory of Operation
o EIGRP stands for Enhanced Interior Gateway Routing Protocol.
o EIGRP is a Cisco Proprietary routing protocol however open in 2013.
o It is hybrid routing protocol sometime called Advanced Distance Vector.
o It has characteristics of both distance vector and link state protocols.
o It uses DUAL (Diffusing Update Algorithm) algorithm to select best path.
o EIGRP supports Both Internet Protocol V4 and IPV6 routed protocols.
o EIGRP protocol supports VLSM, CIDR also supports trigger updates.
o It sends partial or full update only when something is change in network.
o The Default Internal Administrative Distance of EIGRP protocol is 90.
o The Default External Administrative Distance of EIGRP protocol is 170.
o The EIGRP default hope count support is 100 but it can be tune to 255.
o EIGRP protocol support Equal cost Load and Unequal Cost load balancing.
o EIGRP take load balancing by default up-to 4 paths can configure up to 32.
o Hello time of EIGRP protocol is 5 seconds and the dead time is 15 seconds.
o EIGRP updates are sent to 224.0.0.10 on Multicast Internet Protocol address.
o EIGRP Support MD5 Authentication & by default, Auto Summarization is enable.
Some of the many advantages of EIGRP are:
• very low usage of network resources during normal operation; only hello packets are
transmitted on a stable network
• when a change occurs, only routing table changes are propagated, not the entire routing
table; this reduces the load the routing protocol itself places on the network
• rapid convergence times for changes in the network topology (in some situations
convergence can be almost instantaneous)
EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm (DUAL) to
calculate the shortest path to a destination within a network.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Major Revisions of the Protocol
There are two major revisions of EIGRP, versions 0 and 1. Cisco IOS versions earlier than 10.3(11),
11.0(8), and 11.1(3) run the earlier version of EIGRP; some explanations in this paper may not apply
to that earlier version. We highly recommend using the later version of EIGRP, as it includes many
performance and stability enhancements.
Basic Theory
R2 → R1 → Network A (better path as per Distance vector) (called successor in EIGRP)
R2 → R3 → R4 → Network A (second best path in EIGRP called as feasible successor)
- Since the path through Router Three is three hops, and the path through Router One is two
hops, Router Two chooses the path through One and discards the information it learned
through Three.
- In case of R1 failure, it will take between 90 and 120 seconds for Router Two to switch the
path from Router One to Router Three.
- EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table
from each of its neighbor's advertisements (rather than discarding the data), and converges
by either looking for a likely loop-free route in the topology table, or, if it knows of no other
route, by querying its neighbors.
- Router Two saves the information it received from both Routers One and Three.
- It chooses the path through One as its best path (the successor) and the path through Three
as a loop-free path (a feasible successor).
- When the path through Router One becomes unavailable, Router Two examines its topology
table and, finding a feasible successor, begins using the path through Three immediately.
EIGRP FACTS:
- The rate at which EIGRP sends hello packets is called the hello interval, and you can adjust it
per interface with the ip hello-interval eigrp command.
- The hold time is the amount of time that a router will consider a neighbor alive without
receiving a hello packet.
- The hold time is typically three times the hello interval, by default, 15 seconds (5-second
hello) and 180 seconds (60-second hello). You can adjust the hold time with the ip hold-time
eigrp command.
- Note that if you change the hello interval, the hold time is not automatically adjusted to
account for this change - you must manually adjust the hold time to reflect the configured
hello interval.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
- It is possible for two routers to become EIGRP neighbors even though the hello and hold
timers do not match.
- The hold time is included in the hello packets so each neighbor should stay alive even
though the hello interval and hold timers do not match.
- While there is no direct way of determining what the hello interval is on a router, you can
infer it from the output of the show ip eigrp neighbors command on the neighboring router.
router# show ip eigrp neighbors
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq Type
(sec) (ms) Cnt Num
1 10.1.1.2 Et1 13 12:00:53 12 300 0 620
0 10.1.2.2 S0 174 12:00:56 17 200 0 645
- EIGRP does not build peer relationships over secondary addresses. All EIGRP traffic is
sourced from the primary address of the interface.
There are no limitations on the number of neighbors that EIGRP can support. The actual number of
supported neighbors depends on the capability of the device, such as:
1. memory capacity
2. processing power
3. amount of exchanged information, such as the number of routes sent
4. topology complexity
5. network stability
THREE EIGRP STATES:
Neighbor Discovery:
To distribute routing information throughout a network, EIGRP uses non-periodic incremental
routing updates. That is, EIGRP only sends routing updates about paths that have changed when
those paths change.
The basic problem with sending only routing updates is that you may not know when a path through
a neighboring router is no longer available. You can not time out routes, expecting to receive a new
routing table from your neighbors. EIGRP relies on neighbor relationships to reliably propagate
routing table changes throughout the network; two routers become neighbors when they see each
other's hello packets on a common network.
Topology Table:
EIGRP, unlike RIP and IGRP, does not rely on the routing (or forwarding) table in the router to hold
all of the information it needs to operate. Instead, it builds a second table, the topology table, from
which it installs routes in the routing table.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
To see the basic format of the topology table on a router running EIGRP, issue the show ip eigrp
topology command. The topology table contains the information needed to build a set of distances
and vectors to each reachable network, including:
• lowest bandwidth on the path to this destination as reported by the upstream neighbor
• total delay
• path reliability
• path loading
• minimum path maximum transmission unit (MTU)
• feasible distance
• reported distance
• route source (external routes are marked)
EIGRP Metrics:
EIGRP uses the minimum bandwidth on the path to a destination network and the total delay to
compute routing metrics.
Although you can configure other metrics, we do not recommend it, as it can cause routing loops in
your network.
The bandwidth and delay metrics are determined from values configured on the interfaces of
routers in the path to the destination network.
It starts with the two advertisements for this network: one through Router Four, with a minimum
bandwidth of 56 and a total delay of 2200; and the other through Router Three, with a minimum
bandwidth of 128 and a delay of 1200. Router One chooses the path with the lowest metric.
Let us compute the metrics. EIGRP calculates the total metric by scaling the bandwidth and delay
metrics. EIGRP uses the following formula to scale the bandwidth:
• bandwidth = (10000000/bandwidth(i)) * 256
where bandwidth(i) is the least bandwidth of all outgoing interfaces on the route to the
destination network represented in kilobits.
EIGRP uses the following formula to scale the delay:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
• delay = delay(i) * 256
where delay(i) is the sum of the delays configured on the interfaces, on the route to the
destination network, in tens of microseconds. The delay as shown in the show ip eigrp
topology or show interface commands is in microseconds, so you must divide by 10 before
you use it in this formula. Throughout this paper, we use delay as it is configured and shown
on the interface.
EIGRP uses these scaled values to determine the total metric to the network:
• metric = ([K1 * bandwidth + (K2 * bandwidth) / (256 - load) + K3 * delay] * [K5 / (reliability +
K4)]) * 256
Note: These K values should be used after careful planning. Mismatched K values prevent a neighbor
relationship from being built, which can cause your network to fail to converge.
Note: If K5 = 0, the formula reduces to Metric = ([k1 * bandwidth + (k2 * bandwidth)/(256 - load) +
k3 * delay]) * 256.
The default values for K are:
• K1 = 1
• K2 = 0
• K3 = 1
• K4 = 0
• K5 = 0
For default behavior, you can simplify the formula as follows:
metric = bandwidth + delay
In this example, the total cost through Router Four is:
minimum bandwidth = 56k
total delay = 100 + 100 + 2000 = 2200
[(10000000/56) + 2200] x 256 = (178571 + 2200) x 256 = 180771 x 256 = 46277376
And the total cost through Router Three is:
minimum bandwidth = 128k
total delay = 100 + 100 + 1000 = 1200
[(10000000/128) + 1200] x 256 = (78125 + 1200) x 256 = 79325 x 256 = 20307200
So, to reach Network A, Router One chooses the route through Router Three.
EIGRP Tables:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
EIGRP maintains three tables. 1) Neighbor Table, 2) Topology Table and 3) Routing Table.
Neighbor Table:
Neighbor table includes all neighbors that is directly connected to router using EIGRP. In simple
words, next hop router and the interfaces.
Topology Table:
EIGRP uses this table to store all routes, which it learned from neighbors. It contains a list of all
destinations and routes advertised by neighboring routers. The EIGRP Topology table contains
everything that EIGRP has learned.
Routing Table:
EIGRP stores single best (Successor) route for each destination in this table. Router uses this table to
forward the packet. There is a separate routing table for each routed protocol.
EIGRP Neighbor Table Explanation:
H (Handle) Lists the neighbors in the order this router was learned
Address The IP address of the neighbors
Interface The interface of the local router on which this Hello packet was received
Hold The amount of time left before neighbor is considered in “down” status
Uptime How long the neighbor has been up
SRTT (Smooth Round Trip Time): The number of milliseconds it takes to send an EIGRP
packet to neighbor and receive an acknowledgment packet back
RTO (Retransmission Timeout): if a multicast has failed, then a unicast is sent to that
particular router, the RTO is the time in milliseconds that the router waits for an
acknowledgement of that unicast.
Q Cnt (Q Count): Shows the number of queued EIGRP packets. It is usually 0
Seq Num The sequence number of the last update EIGRP packet received
EIGRP Topology Table Explanation:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
AS Autonomous System number 1
Codes Passive is good and Active is bad
Sia Status (Stuck in
Active)
EIGRP has not received a reply to a query packet from one of the neighbors
within the allowed time about 3 minutes.
1 Successors The best path In this case only one way to get to the destination
FD is 2816 Feasible Distance: Total distance to get to the destination
28416/28160 First, one is Feasible Distance. The second Value is Advertised Distance
EIGRP Routing Table Explanation:
D Shows this is an EIGRP learnt route
192.168.3.0/24 Destination learn network and 24 is subnet mask.
90 90, is the Administrative Distance of EIGRP.
3072 This is the metric, Total distance to get to the destination
192.168.2.3 The neighbor that advertised the route.
00:49:16 Time since the route was learnt.
GigabitE1/0 The outbound interface going towards the destination.
EIGRP Metric:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
EIGRP uses metric to select the best route from all available routes for destination. Metric has five
components.1.Bandwidth, 2.Load, 3.Delay, 4.Reliability and 5.MTU. From these only bandwidth and
delay are by default enabled.
K Value Component Description
K1 Bandwidth Lowest bandwidth of route
K2 Load Worst load on route based on packet rate
K3 Delay Cumulative interface delay of route
K4 Reliability Worst reliability of route based on keep alive
K5 MTU Smallest MTU in path [Not used in route calculation]
Path Metric Calculation:
EIGRP Metric = 256*((10^7 / min. BW) + Delay)
=256*((10000000/Minimum BW) + Sum of Interface Delays/10)
Where Bandwidth = 10000000/bandwidth (i), where bandwidth (i) is the least bandwidth of all
outgoing interfaces on the route to the destination network represented in kilobits. Delay = delay (i)
where delay (i) is the sum of the delays configured on the interfaces, on the route to the destination
network, in tens of microseconds.
EIGRP Metric = 256*((10000000/Minimum BW) + Sum of Interface Delays/10)
EIGRP Metric = 256*(10000000/100000) + 100+5000/10)
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
EIGRP Metric = 256*(100) +5100/10)
EIGRP Metric = 256*(100) +510)
EIGRP Metric = 256*610
EIGRP Metric = 156160
Path Selection Optimization:
Change EIGRP metrics by manipulating the bandwidth and/or delay values. Changing the bandwidth
value is not recommended because that value is used for many other reasons and features in the
router. Also, configure the K-Values to influence the EIGRP metric calculation.
Commands Description
R6#show ip route eigrp
D 7.7.7.7 [90/156160] via 192.168.76.7, F0/1
[90/156160] via 192.168.67.7, F0/0
First verify both routes in routing table
Equal path load balancing
R6(config)#interface FastEthernet 0/0
R6(config-if)# bandwidth 10000
Enter interface mode
Decrease the bandwidth to 10000
R6#show ip route eigrp Verify again only one path now
R6(config)#interface FastEthernet 0/0
R6(config-if)#no bandwidth 10000
Enter interface mode
Make the default bandwidth again
R6#show ip route eigrp Check again both path back
R6(config)#interface FastEthernet 0/0
R6(config-if)#delay 200
Enter interface mode
Increase the delay this time
R6#show ip route eigrp Verify again only one path now
R6(config)#interface FastEthernet 0/0
R6(config-if)#no delay 200
Enter interface mode
Make the default delay again
R6#show ip route eigrp
D 7.7.7.7 [90/156160] via 192.168.76.7, F0/1
[90/156160] via 192.168.67.7, F0/0
First verify both routes in routing table
Equal path load balancing
R6(config)#router eigrp 1
R6(config-router)#metric weights 0 1 1 1 1 1
Enter EIGRP mode
Change k Values
R7(config)#router eigrp 1
R7(config-router)#metric weights 0 1 1 1 1 1
Enter EIGRP mode
Change K values
R6#show ip route eigrp
D 7.7.7.7 [90/610]
Verify the eigrp routes different FD
R6(config)#interface FastEthernet 0/0
R6(config-if)# bandwidth 10000
R6(config-if)#delay 200
Enter interface mode
Decrease the bandwidth to 10000
Increase the delay Change metric
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
EIGRP Packet Types:
EIGRP uses five packet types in communication with its neighbors. The packet types are below.
Packet Description
Hello Used to identify neighbors. They are sent as periodic multicasts.
Update Used to advertise routes, only sent as multicasts when something is changed.
Ack Acknowledges receipt of an update.
Query Used to find alternate paths when all paths to a destination have failed.
Reply Used to response to query packets about routing information.
Hello:
Hello packets are used for neighbor discovery. As soon as the hello packets send and receive EIGRP
routers will try to form the neighbor adjacency. They are multicast to 224.0.0.10. By default, EIGRP
sends hello packets every 5 seconds.
Update:
Update packets contain routing information for destinations. EIGRP unicasts update packets to
newly discovered neighbors; otherwise, it multicasts update packets to 224.0.0.10 when a link or
metric changes. Update packets are acknowledged to ensure reliable transmission.
Query:
EIGRP sends query packets used to find alternate paths when all paths to a destination have failed.
Query packets are always multicast.
Reply:
EIGRP sends reply packets to respond to query packets. Reply packets provide a feasible successor to
the sender of the query. Reply packets are unicast to the sender of the query packet.
ACK:
ACK packets are used to acknowledge the receipt of update, query and replay packets. ACK packets
are sent by using unicast.
EIGRP Terminologies:
Advertised Distance (AD)/Reported Distance (RD): The cost from the neighbor to the destination.
Feasible Distance (FD): The total cost to reach a destination network.
Successor: The primary route used to reach a destination. The successor route is kept in the routing
table. Notice that successor is the best route to that destination.
Feasible Successor: The backup route. To be a feasible successor, the route must have an AD less
than the FD of the current successor route.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Feasible Distance, Reported Distance, and Feasible Successor
Feasible distance is the best metric along a path to a destination network, including the metric to the
neighbor advertising that path.
Reported distance is the total metric along a path to a destination network as advertised by an
upstream neighbor.
A feasible successor is a path whose reported distance is less than the feasible distance (current best
path).
Router One sees that it has two routes to Network A: one through Router Three and another
through Router Four.
• The route through Router Four has a cost of 46277376 and a reported distance of 307200.
• The route through Router Three has a cost of 20307200 and a reported distance of 307200.
EIGRP Summarization:
Auto-Summarization:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Auto Summarization is a feature, which allows Routing Protocols to summarize its routes to their
classful networks automatically. By default, EIGRP has auto summary feature enabled. Because of
this, routes are summarized to classful address at network boundaries in the routing updates. The
Auto-Summarization can be disabled with a command of no auto-summary from the router prompt.
Commands Description
R1(config)#router eigrp 1
R1(config-router)#network 0.0.0.0
R1(config-router)#no auto-summary
Enter EIGRP mode
Advertise all networks
Disable auto summary feature
R2(config)#router eigrp 1
R2(config-router)#network 0.0.0.0
R2(config-router)#no auto-summary
Enter EIGRP mode
Advertise all network
Disable auto summary feature
R1#show ip route eigrp View routing table for EIGRP all four networks of
172 present in table
R2(config)#router eigrp 1
R2(config-router)#auto-summary
Enter EIGRP mode
Enable auto summary feature
R1#show ip route eigrp Again, view routing table for EIGRP
Only summary route 172.16.0.0/16
Manual Summarization:
The manual summarization is a process of creating a summary route that will be used to represent
multiple routes and can be used to reduce the sizes of routing tables in a network. Manual
summarization is configured differently on different protocols.
Advantages of Summarization:
Saves Memory Routing tables will be smaller which reduces memory requirements.
Saves Bandwidth There are less routes to advertise so we save some bandwidth.
Saves CPU Cycles Less packets to process and smaller routing tables to work on.
Stability Prevents routing table instability due to flapping networks.
EIGRP Summarization:
By default, EIGRP has auto summary feature enabled. Because of this, EIGRP automatically
summarizes networks at the classful boundary. One of the advantages of EIGRP over other routing
protocol like, OSPF is that manual summarization can be done on any router within a network. A
single route can be used to represent multiple routes, which reduces the size of routing tables in a
network. Manual summarization is configured on a per-interface basis on EIGRP. The syntax of the
command is (config-if) ip summary-address eigrp ASN SUMMARY_ADDRESS SUBNET_MASK
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Commands Description
R1(config)#router eigrp 1
R1(config-router)#network 0.0.0.0
R1(config-router)#no auto-summary
Enter EIGRP mode
Advertise all networks
Disable auto summary feature
R2(config)#router eigrp 1
R2(config-router)#network 1.0.0.0
R2(config-router)#no auto-summary
Enter EIGRP mode
Advertise only 1 network
Disable auto summary feature
R2#show ip route eigrp View routing table for EIGRP all four networks of
192.168. present
R1(config)#interface f0/0
R1(config-if)#ip summary-address eigrp 1
192.168.0.0 255.255.248.0
Enter interface mode facing R2
Enter summary route to send
R2#show ip route eigrp Check again routing table only summary route
192.168.0.0/21 only
R1#show ip route eigrp Checking summary route in R1
192.168.0.0/21 is a summary, Null0
R1(config)#interface f0/0
R1(config-if)#no ip summary-address eigrp 1
192.168.0.0 255.255.248.0 255
R1(config-if)#ip summary-address eigrp 1
192.168.0.0 255.255.248.0 255
Enter interface mode of R1
Remove the summary route configure before
Set summary route again with AD 255 to remove
Null0 in R1 table
EIGRP Load Balancing:
Load balancing is a router's capability to distribute traffic over all of its network ports that are the
same metric from the destination address. By default, the Cisco IOS balances between a maximum
of four equal-cost paths for IP.
EIGRP Equal Cost:
By default, EIGRP supports equal-cost load balancing over four links. Equal-cost means that multiple
routes must have the same metric to reach a destination, so that router can choose to load balance
across equal cost links. Using maximum-path router configuration command, to request up to 16
equally good routes to be kept in the routing table. Set maximum-path to 1 to disable load
balancing.
Commands Description
(config)#router eigrp 1
(config-router)#no auto-summary
(config-router)#network 0.0.0.0
Apply this on both R6 and R7
Disable auto summary
Enable EIGRP for all networks
R6#show ip route eigrp Check routing table for EIGRP equal 2 paths
R6#show ip eigrp topology Check EIGRP topology table for all paths
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
R6(config)#router eigrp 1
R6(config‐router)# maximum-paths 1
Enters EIGRP routing mode
To disable equal cost load balancing set 1
R6#show ip route eigrp Check routing table for EIGRP now 1 path
R6(config)#router eigrp 1
R6(config‐router)# maximum-paths 4
Enters EIGRP routing mode
Enable back equal cost load balancing
EIGRP Unequal Cost:
EIGRP can also balance traffic across multiple routes that have different metrics; this is called
Unequal-Cost Load Balancing. The degree to which EIGRP performs load balancing is controlled by
the variance multiplier router configuration command. The multiplier is a variance value, between 1
and 128, used for load balancing. The default is 1, which means equal-cost load balancing. The
multiplier defines the range of metric values that are accepted for load balancing.
Commands Description
(config)#router eigrp 1
(config-router)#no auto-summary
(config-router)#network 0.0.0.0
Apply this on all R1,R2,R3,R4 & R5
Disable auto summary
Enable EIGRP for all networks
R1#show ip route eigrp Check routing table for EIGRP one path only
R1#show ip eigrp topology Check EIGRP topology table for all paths
412160 / 158720 = 2.6 Need variance 3 to install Ethernet1/0 path
R1(config)#router eigrp 1
R1(config‐router)#variance 3
Enters EIGRP routing mode
Set variance 3 to install other route
R1#show ip route eigrp Check routing table for EIGRP two path now
2300416 /158720 = 14.5 Need variance 15 to install S2/0 path
R1(config)#router eigrp 1
R1(config‐router)#variance 15
Enters EIGRP routing mode
Set variance 15 to install other route
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
R1#show ip route eigrp Check routing table for EIGRP three path now
R1#show ip route 5.5.5.5 EIGRP is sharing traffic f0/1 240, S2/0 17 and E1/0 92
proportion
R1#traceroute 5.5.5.5 Apply many time to check path changing
EIGRP Basic Configuration:
Let us do basic configuration of EIGRP protocols on cisco routers. Wildcard mask is 32 bits long. It is
inverted subnet masks, with the zero bits indicating that the corresponding bit position must match
the same bit position in the IP address. The one bits indicate that the corresponding bit position
does not have to match the bit position in the IP address.
To form a neighborship, EIGRP has these requirements: 1) Interface’s primary IP addresses must be
on the same subnet.2) Connected interface must not be passive.3) Routers must use the same AS
number.4) Must pass authentication. 5) K-values must match.
Commands Description
R1(config)#router eigrp 1
R1(config-router)#network 192.168.12.0
R1(config-router)#network 1.1.1.0
Enter EIGRP mode
Advertise 192.168.12.0 network
Advertise 1.1.1.0 network
R1#show run | sec eigrp
router eigrp 1
network 1.0.0.0
network 192.168.12.0
To verify by running configuration
EIGRP with AS 1
Its convert 1.1.1.0 network class A
R1(config)#router eigrp 1
R1(config-router)#no network 1.1.1.0
R1(config-router)#network 1.1.1.0 0.0.0.255
Enter EIGRP mode
Remove network
Advertise again with wild card
R1#show run | sec eigrp
router eigrp 1
network 1.1.1.0 0.0.0.255
Verify by running configuration
EIGRP with AS 1
This time it’s not converted
R1(config)#router eigrp 1
R1(config-router)#no network 1.1.1.0 0.0.0.255
R1(config-router)#network 1.1.1.0 255.255.255.0
Enter EIGRP mode
Remove network
With subnetmask not with wildcard
R1#show run | sec eigrp
router eigrp 1
network 1.1.1.0 0.0.0.255
Verify by running configuration
EIGRP with AS 1
IOS converted subnetmask to wildcard
R1(config)#router eigrp 1
R1(config-router)#network 0.0.0.0
Enter EIGRP mode with AS 1
Advertise all networks
R2(config)#router eigrp 100
R2(config-router)#network 0.0.0.0
Enter EIGRP mode with AS 100
Advertise all networks, no neighbor
adjacency because of different AS
R1(config)#router eigrp 1
R1(config-router)#network 0.0.0.0
Enter EIGRP mode with AS 1
Advertise all networks
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
R1(config-router)# metric weights tos 1 1 1 1 1 Changing Metric Weights Again no neighbor
adjacency, K value mismatch
R2(config)#router eigrp 1
R2(config-router)#network 0.0.0.0
Enter EIGRP mode with AS 1
Advertise all networks
EIGRP Commands:
Commands Description
R1(config-router)#auto-summary Enable auto summarization feature
R1(config-router)#no auto-summary Disable auto summarization feature
R1(config-router)# metric weights tos k1 k2 k3
k4 k5
Adjusting the EIGRP Metric Weights
R1(config-router)# metric maximum-hops <1-
255>
Advertise greater than hops
R1(config-router)#maximum-paths <1-32> Set the maximum equal paths
R1(config-router)#variance <1-128> Control unequal load balancing
R1(config-if)# ip hello-interval eigrp <asn>
<interval>
Changing EIGRP hello interval
R1(config-if)# ip hold-time eigrp <asn>
<interval>
Changing EIGRP hold time interval
R1#show ip eigrp neighbors Display the neighbor table in brief
R1#show ip eigrp neighbors detail Display the neighbor table in detail. To verify the
neighbor is configured as stub router
R1#show ip eigrp interfaces Display info about all EIGRP interfaces
R1#show ip eigrp interfaces s0/0 Display info EIGRP interface
R1#show ip eigrp interfaces 20 Display info EIGRP interfaces AS 20
R1#show ip eigrp topology Displays the topology table
R1#show ip eigrp traffic Displays EIGEP different packets
R1#show ip route eigrp Display EIGRP route from routing table
R1#debug eigrp fsm Displays the events related to FSM
R1#debug eigrp packet Displays EIGRP event packets
R1#no debug eigrp fsm Turn off FSM debug
R1#no debug eigrp packet Turn off EIGRP packets debug
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
OSPF (OPEN SHORTEST PATH FIRST)
▪ No hop-count limitation
▪ Rapid convergence
▪ Classless (allows the use of VLSM)
▪ Password authentication
▪ Advanced path selection capabilities
▪ Tagging of external routes
▪ Better use of bandwidth via multicasts and periodic routing updates
▪ Allows networks to be divided into smaller logical areas for efficiency
▪ Uses multicast addresses for efficient and reliable routing update process
▪ Uses equal-cost load balancing over multiple paths for efficient bandwidth usage
▪ Supports MD5 authentication for secure route exchange
▪ No split horizon issues
▪ OSPF protocols is the Link-State dynamic routing protocol.
▪ OSPF protocols uses the Shortest Path First (SPF) algorithm.
▪ OSPF protocols uses IP protocol type 89 (not TCP or UDP).
▪ OSPF External and Internal Administrative Distance is 110.
▪ OSPF is a classless Routing protocol and OSPF metric is Cost.
▪ OSPF use multicast address 224.0.0.5 to send the hello packet.
▪ OSPF use multicast address 224.0.0.6 for all designated routers.
▪ OSPF default Hello time is 10 seconds and dead time is 40 seconds.
▪ OSPF protocols supports both the VLSM and route summarization.
▪ OSPF use wildcard mask, which is the reciprocal of subnet mask.
▪ OSPF protocols supports both MD5 and clear text authentication.
▪ OSPF protocols supports the summarization at ABRs router only.
▪ OSPF are requires more memory and CPU processing to run.
▪ OSPF work on area, Area 0 is the backbone of OSPF technology.
▪ OSPF have Neighbor table, Topology table and Routing table.
▪ OSPF packets are only sends to the neighbor of own Area.
▪ OSPF protocols supports both IPv4 and IPv6 routed protocols.
▪ OSPF load balancing with equal cost routes for same destination.
▪ OSPF protocols supports trigger updates for fast convergence.
▪ OSPF sends update with a sequence number of 0x80000001.
▪ The sequence number ends with 0x7FFFFFFF and start again.
▪ The sequence number will increment by one in every updates.
▪ OSPF protocol is more complex to setup and hard to troubleshoot.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
OSPF PACKET TYPES
Type Packet Name Functional Overview
1 Hello
These packets are for discovering and maintaining neighbors. Packets are
sent out periodically on all OSPF interfaces to discover new neighbors
while ensuring that other adjacent neighbors are still online.
2
Database
description (DBD)
or (DDP)
These packets are for summarizing database contents. Packets are
exchanged when an OSPF adjacency is first being formed. These packets
are used to describe the contents of the LSDB.
3
Link-state request
(LSR)
These packets are for database downloads. When a router thinks that part
of its LSDB is stale, it may request a portion of a neighbor’s database by
using this packet type.
4
Link-state update
(LSU)
These packets are for database updates. This is an explicit LSA for a
specific network link and normally is sent in direct response to an LSR.
5 Link-state ack
These packets are for flooding acknowledgments. These packets are sent
in response to the flooding of LSAs, thus making flooding a reliable
transport feature.
OSPF HELLO PACKET COMPONENTS
OSPF hello packets are responsible for discovering and maintaining neighbors.
In most instances, a router sends hello packets to the AllSPFRouters address (224.0.0.5).
Data Field Description
Router ID (RID) A unique 32-bit ID within an OSPF domain.
Authentication options
A field that allows secure communication between OSPF routers to
prevent malicious activity. Options are none, clear text, or Message
Digest 5 (MD5) authentication.
Area ID
The OSPF area that the OSPF interface belongs to. It is a 32-bit number
that can be written in dotted-decimal format (0.0.1.0) or decimal (256).
Interface address mask
The network mask for the primary IP address for the interface out
which the hello is sent.
Interface priority The router interface priority for DR elections.
Hello interval
The time span, in seconds, that a router sends out hello packets on the
interface.
Dead interval
The time span, in seconds, that a router waits to hear a hello from a
neighbor router before it declares that router down.
Designated router and
backup designated router
The IP address of the DR and backup DR (BDR) for the network link.
Active neighbor
A list of OSPF neighbors seen on the network segment. A router must
have received a hello from the neighbor within the dead interval.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
ROUTER ID
The OSPF router ID (RID) is a 32-bit number that uniquely identifies an OSPF router.
In some OSPF output commands, neighbor ID refers to the RID; the terms are synonymous.
The RID must be unique for each OSPF process in an OSPF domain and must be unique between
OSPF processes on a router.
3-Ways to Configure Router-ID:
1. Manually Set. Example CLI command: router-id router-id
2. Highest ‘up’ Loopback interface IP address
3. Highest ‘up’ Physical Interface IP address
The command clear ip ospf process restarts the OSPF process on a router so that OSPF can use the
new RID.
OSPF SEVEN STATES NEIGHBORSHIP
An OSPF neighbor is a router that shares a common OSPF-enabled network link.
OSPF routers discover other neighbors via the OSPF hello packets.
An adjacent OSPF neighbor is an OSPF neighbor that shares a synchronized OSPF database between
the two neighbors.
Each OSPF process maintains a table for adjacent OSPF neighbors and the state of each router.
OSPF Neighbor States
State Description
1) Down
This is the initial state of a neighbor relationship. It indicates that the router has not
received any OSPF hello packets.
2) Init
This state indicates that a hello packet has been received from another router, but
bidirectional communication has not been established.
3) 2-Way
Bidirectional communication has been established. If a DR or BDR is needed, the
election occurs during this state.
4) ExStart
This is the first state in forming an adjacency. Routers identify which router will be
the master or slave for the LSDB synchronization.
5) Exchange During this state, routers are exchanging link states by using DBD packets.
6) Loading
LSR packets are sent to the neighbor, asking for the more recent LSAs that have
been discovered (but not received) in the Exchange state.
7) Full Neighboring routers are fully adjacent.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DESIGNATED ROUTER AND BACKUP DESIGNATED ROUTER
Multi-access networks such as Ethernet (LANs) and Frame Relay allow more than two routers to
exist on a network segment.
Such a setup could cause scalability problems with OSPF as the number of routers on a segment
increases.
Additional routers flood more LSAs on the segment, and OSPF traffic becomes excessive as OSPF
neighbor adjacencies increase.
If four routers share the same multi-access network, six OSPF adjacencies form, along with six
occurrences of database flooding on a network.
The number of edges formula, n(n – 1) / 2, where n represents the number of routers, is used to
identify the number of sessions in a full mesh topology.
If 5 routers were present on a segment, 5(5 – 1) / 2 = 10, then 10 OSPF adjacencies would exist for
that segment.
Continuing the logic, adding 1 additional router would makes 15 OSPF adjacencies on a network
segment.
Having so many adjacencies per segment consumes more bandwidth, more CPU processing, and
more memory to maintain each of the neighbor states.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DESINGATED ROUTER:
OSPF overcomes this inefficiency by creating a pseudonode (virtual router) to manage the adjacency
state with all the other routers on that broadcast network segment.
A router on the broadcast segment, known as the designated router (DR), assumes the role of the
pseudonode.
The DR reduces the number of OSPF adjacencies on a multi-access network segment because
routers only form a full OSPF adjacency with the DR and not each other.
The DR is responsible for flooding updates to all OSPF routers on that segment as the updates occur.
BACKUP DESGINATED ROUTER:
If the DR were to fail, OSPF would need to form new adjacencies, invoking all new LSAs, and could
potentially cause a temporary loss of routes. In the event of DR failure, a backup designated router
(BDR) becomes the new DR; then an election occurs to replace the BDR. To minimize transition time,
the BDR also forms full OSPF adjacencies with all OSPF routers on that segment.
The DR/BDR process distributes LSAs in the following manner:
1. All OSPF routers (DR, BDR, and DROTHER) on a segment form full OSPF adjacencies with the
DR and BDR.
2. As an OSPF router learns of a new route, it sends the updated LSA to the AllDRouters
(224.0.0.6) address, which only the DR and BDR receive and process, as illustrated in step 1.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
The DR sends a unicast acknowledgment to the router that sent the initial LSA update, as
illustrated in step 2.
The DR floods the LSA to all the routers on the segment via the AllSPFRouters (224.0.0.5) address,
as shown in step 3.
OSPF CONFIGURATION
The configuration process for OSPF resides mostly under the OSPF process, but some OSPF options
go directly on the interface configuration submode. The command router ospf process-id defines
and initializes the OSPF process. The OSPF process ID is locally significant but is generally kept the
same for operational consistency. OSPF is enabled on an interface using two methods:
• An OSPF network statement
• Interface-specific configuration
OSPF Network Statement
The OSPF network statement identifies the interfaces that the OSPF process will use and the area
that those interfaces participate in. The network statements match against the primary IPv4 address
and netmask associated with an interface.
A common misconception is that the network statement advertises the networks into OSPF; in
reality, though, the network statement is selecting and enabling OSPF on the interface. The
interface is then advertised in OSPF through the LSA. The network statement uses a wildcard
mask, which allows the configuration to be as specific or vague as necessary. The selection of
interfaces within the OSPF process is accomplished by using the command network ip-address
wildcard-mask area area-id.
The concept is similar to the configuration of Enhanced Interior Gateway Routing Protocol (EIGRP),
except that the OSPF area is specified. If the IP address for an interface matches two network
statements with different areas, the most explicit network statement (that is, the longest match)
preempts the other network statements for area allocation.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
The connected network for the OSPF-enabled interface is added to the OSPF LSDB under the
corresponding OSPF area in which the interface participates. Secondary connected networks are
added to the LSDB only if the secondary IP address matches a network statement associated with
the same area.
router ospf 1
network 10.0.0.10 0.0.0.0 area 0
network 10.0.10.10 0.0.0.0 area 0
network 192.0.0.10 0.0.0.0 area 0
network 192.10.0.10 0.0.0.0 area 0
Interface-Specific Configuration
The second method for enabling OSPF on an interface for IOS is to configure it specifically on an
interface with the command ip ospf process-id area area-id [secondaries none]. This method also
adds secondary connected networks to the LSDB unless the secondaries none option is used.
This method provides explicit control for enabling OSPF; however, the configuration is not
centralized and increases in complexity as the number of interfaces on the routers increases. If a
hybrid configuration exists on a router, interface-specific settings take precedence over the network
statement with the assignment of the areas.
interface GigabitEthernet 0/0
ip address 10.0.0.1 255.255.255.0
ip ospf 1 area
PASSIVE INTERFACES
Enabling an interface with OSPF is the quickest way to advertise a network segment to other OSPF
routers.
However, it might be easy for someone to plug in an unauthorized OSPF router on an OSPF-enabled
network segment and introduce false routes, thus causing havoc in the network.
Making the network interface passive still adds the network segment into the LSDB but prohibits the
interface from forming OSPF adjacencies.
A passive interface does not send out OSPF hellos and does not process any received OSPF packets.
The command passive interface-id under the OSPF process makes the interface passive, and the
command passive interface default makes all interfaces passive. To allow for an interface to process
OSPF packets, the command no passive interface-id is used.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
REQUIREMENTS FOR NEIGHBOR ADJACENCY
The following list of requirements must be met for an OSPF neighborship to be formed:
• RIDs must be unique between the two devices. They should be unique for the entire OSPF
routing domain to prevent errors.
• The interfaces must share a common subnet. OSPF uses the interface’s primary IP address
when sending out OSPF hellos. The network mask (netmask) in the hello packet is used to
extract the network ID of the hello packet.
• The MTUs (maximum transmission units) on the interfaces must match. The OSPF protocol
does not support fragmentation, so the MTUs on the interfaces should match.
• The area ID must match for the segment.
• The DR enablement must match for the segment.
• OSPF hello and dead timers must match for the segment.
• Authentication type and credentials (if any) must match for the segment.
• Area type flags must match for the segment (for example, Stub, NSSA). (These are not
discussed in this book.)
Example: Configuring OSPF
! OSPF is enabled with a single command, and the passive interface is
! set individually
R1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# interface Loopback0
R1(config-if)# ip address 192.168.1.1 255.255.255.255
R1(config-if)# interface GigabitEthernet0/1
R1(config-if)# ip address 10.123.4.1 255.255.255.0
R1(config-if)# interface GigabitEthernet0/2
R1(config-if)# ip address 10.1.1.1 255.255.255.0
R1(config-if)#
R1(config-if)# router ospf 1
R1(config-router)# router-id 192.168.1.1
R1(config-router)# passive-interface GigabitEthernet0/2
R1(config-router)# network 0.0.0.0 255.255.255.255 area 0
A. Confirmation of Interfaces
It is a good practice to verify that the correct interfaces are running OSPF after making changes to
the OSPF configuration. The command show ip ospf interface [brief | interface-id] displays the
OSPF-enabled interfaces.
R1# show ip ospf interface
! Output omitted for brevity
Loopback0 is up, line protocol is up
Internet Address 192.168.1.1/32, Area 0, Attached via Network Statement
Process ID 1, Router ID 192.168.1.1, Network Type LOOPBACK, Cost: 1
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Topology-MTID Cost Disabled Shutdown Topology Name
0 1 no no Base
Loopback interface is treated as a stub Host
GigabitEthernet0/1 is up, line protocol is up
Internet Address 10.123.4.1/24, Area 0, Attached via Network Statement
Process ID 1, Router ID 192.168.1.1, Network Type BROADCAST, Cost: 1
Topology-MTID Cost Disabled Shutdown Topology Name
0 1 no no Bas
Transmit Delay is 1 sec, State DROTHER, Priority 1
Designated Router (ID) 192.168.4.4, Interface address 10.123.4.4
Backup Designated router (ID) 192.168.3.3, Interface address 10.123.4.3
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
..
Neighbor Count is 3, Adjacent neighbor count is 2
Adjacent with neighbor 192.168.3.3 (Backup Designated Router)
Adjacent with neighbor 192.168.4.4 (Designated Router)
Suppress hello for 0 neighbor(s)
R1# show ip ospf interface brief
Interface PID Area IP Address/Mask Cost State Nbrs F/C
Lo0 1 0 192.168.1.1/32 1 LOOP 0/0
Gi0/2 1 0 10.1.1.1/24 1 DR 0/0
Gi0/1 1 0 10.123.4.1/24 1 DROTH 2/3
OSPF Interface Columns
Field Description
Interface Interfaces with OSPF enabled
PID The OSPF process ID associated with this interface
Area The area that this interface is associated with
IP
Address/Mask
The IP address and subnet mask for the interface
Cost The cost metric assigned to an interface that is used to calculate a path metric
State The current interface state, which could be DR, BDR, DROTHER, LOOP, or Down
Nbrs F The number of neighbor OSPF routers for a segment that are fully adjacent
Nbrs C
The number of neighbor OSPF routers for a segment that have been detected and
are in a 2-Way state
The DROTHER is a router on the DR-enabled segment that is not the DR or the BDR; it is simply the
other router. DROTHERs do not establish full adjacency with other DROTHERs.
B. Verification of OSPF Neighbor Adjacencies
The command show ip ospf neighbor [detail] provides the OSPF neighbor table.
R1# show ip ospf neighbor
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Neighbor ID Pri State Dead Time Address Interface
192.168.2.2 1 2WAY/DROTHER 00:00:37 10.123.4.2 GigabitEthernet0/1
192.168.3.3 1 FULL/BDR 00:00:35 10.123.4.3 GigabitEthernet0/1
192.168.4.4 1 FULL/DR 00:00:33 10.123.4.4 GigabitEthernet0/1
OSPF Neighbor State Fields
Field Description
Neighbor
ID
The router ID (RID) of the neighboring router.
PRI The priority for the neighbor’s interface, which is used for DR/BDR elections.
State
The second field is the DR, BDR, or DROTHER role if the interface requires a DR. For non-
DR network links, the second field shows just a hyphen (-).
Dead Time The time left until the router is declared unreachable.
Address The primary IP address for the OSPF neighbor.
Interface The local interface to which the OSPF neighbor is attached.
C. Verification of OSPF Routes
The next step is to verify the OSPF routes installed in the IP routing table. OSPF routes that install
into the Routing Information Base (RIB) are shown with the command show ip route ospf.
R1# show ip route ospf
! Output omitted for brevity
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 7 subnets, 2 masks
O 10.2.2.0/24 [110/2] via 10.123.4.2, 00:35:03, GigabitEthernet0/1
O 10.3.3.0/24 [110/2] via 10.123.4.3, 00:35:03, GigabitEthernet0/1
O 10.4.4.0/24 [110/2] via 10.123.4.4, 00:35:03, GigabitEthernet0/1
192.168.2.0/32 is subnetted, 1 subnets
O 192.168.2.2 [110/2] via 10.123.4.2, 00:35:03, GigabitEthernet0/1
192.168.3.0/32 is subnetted, 1 subnets
O 192.168.3.3 [110/2] via 10.123.4.3, 00:35:03, GigabitEthernet0/1
192.168.4.0/32 is subnetted, 1 subnets
O 192.168.4.4 [110/2] via 10.123.4.4, 00:35:03, GigabitEthernet0/1
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DAY#3 OSPF
ADVANCE OSPF
OSPF Networks Types
1. Broadcast
- This type of Network is by default enabled on every Ethernet interfaces
- Elects DR/BDR
- Uses Multicast 224.0.0.5
- Allows more than 2 routers on a link
- Timers: Hello = 10sec, Dead = 40sec
2. Point-to-Point
- Default for Serial and Tunnel interfaces
- Do not Elects DR/BDR
- Uses Multicast 224.0.0.5
- Only 2 routers allowed on a link
- Timers: Hello = 10sec, Dead = 40sec
3. Point-to-Multipoint Broadcast
- Do not Elects DR/BDR
- Multicast 224.0.0.5
- Allows more than 2 routers on a link
- Timers: Hello = 30sec, Dead = 120sec
- Automatic neighbor discovery so no need to configure OSPF neighbors yourself.
- No DR/BDR election since OSPF sees the network as a collection of point-to-point
links.
- Only a single IP subnet is used in the topology below.
- Make sure your frame-relay network is configured with the broadcast keyword.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
4. Point-to-Multipoint Non-Broadcast
- Do not Elects DR/BDR
- Uses Unicast (neighbor statements)
- Allows more than 2 routers on a link
- Timers: Hello = 30sec, Dead = 120sec
- No Automatic neighbor discovery so you need to configure OSPF neighbors yourself!
- No DR/BDR election since OSPF sees the network as a collection of point-to-point
links.
- Only a single IP subnet is used in the topology above.
5. Non-Broadcast
- DR/BDR
- Timers: Hello = 30sec, Dead = 120sec
- Non-broadcast network type assume you are running a multi-access network.
- Couple of key things to remember here:
• Multi-access means we have to select a DR and BDR.
• Non-broadcast means that OSPF expects us to configure neighbors ourselves
6. Loopback
- Default enabled for loopback interfaces
- When used in OSPF, /32 is considered always
- To override this limitation, set network type to “point-to-point”
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Types of OSPF LSAs
Router LSA (Type 1)
Originated from each router
Flooded within same area
Tells the area about all links participating in the OSPF process within that area
Network LSA (Type 2)
Originated by the DR
If there is no DR, the Type 2 LSA wouldn’t be seen
Network Summary LSA (Type 3)
Originated by ABR router
Carry the destination network prefixes from one area into another
ASBR Summary (Type 4)
Originated by an ASBR router
Tells all the other areas about the ASBR
Tell all the other areas “to get to this Router-ID(ASBR) go through Me(ABR)”
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
External LSA (Type 5)
Originated by an ASBR
Flooded throughout OSPF domain, except Stubby areas
Consist of Network prefix/subnet-mask of external network (ex. RIP, EIGRP..)
NSSA External LSA (Type 7)
Originated by an ASBR
Exist only in Not-So-Stubby-Area (NSSA)
Are Not flooded outside the area they were originated
Example: Allows LSA Types: 1, 2, 3, 7 ( No External Type-5’s )
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
OSPF AREAS TYPES
❖ Backbone area (area 0)
❖ Standard area (area 1 to area 255.255.255.255)
❖ Stub area (LSA TYPE 5) -
- A stub area is an area in which you do not allow advertisements of external routes,
reducing the size of the database.
- Allows LSA Types: 1, 2, 3 & Summary default route (No External Type-5’s)
- A default summary LSA, with a prefix of 0.0.0.0/0 is originated into the stub area by an
ABR, so that devices in the area can forward all traffic for which a specific route is not
known, via ABR.
- A stub area disables advertisements of external routes.
- Stub Configuration:
router ospf 1
area 100 stub
❖ Totally stubby area:
- Allows LSA Types: 1, 2, 7 & Summary Default Route
- {No Type 5 and Type 3 LSA’s, NO ASBR}
- Configurations:
router ospf 1
area 100 stub no-summary
❖ Not-so-stubby area (NSSA) : The motivation behind NSSA is to allow OSPF Stub areas to
carry External routes (routes learned using other routing protocols like RIP, EIGRP, BGP, etc).
Stub areas are defined as areas that are not capable of importing routes external to OSPF.
Allows LSA Types: 1, 2, 3, 7 (No External Type-5’s, ASBR
allowed)
- NSSA Configuration:
router ospf 1
area 100 nssa
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
NSSA {N-bit and E-bit}
- Together, the N-bit (NSSA supported bit) and E-bit (External Routing Capability of the area)
reflect an interface's external LSA flooding capability
- When the peers exchange Hello messages, they check for the N-bit (should be set to 1) and
E-bit (should be set to 0), along with Area ID. A mismatch in the Options field could result in
failed adjacency.
- The NSSA ABR (the routers connecting NSSA to backbone area 0) translates Type 7 LSA into
Type 5 LSA, and flooded into the OSPF topology.
NSSA Type 7/5 {P-bit}
- Bit P—This bit is used in order to tell the NSSA ABR whether to translate type 7 into type 5.
- No Type 7/5 translation means bit P = 0.
- Type 7/5 translation means bit P = 1.
- If bit P = 0, then the NSSA ABR must not translate this LSA into Type 5. This happens when
NSSA ASBR is also an NSSA ABR.
- If bit P = 1, then the NSSA ABR must translate this type 7 LSA into a type 5 LSA. If there are
multiple NSSA ABRs, the one with highest router ID.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Area Restriction
Normal None
Stub No Type 5 AS-external LSA allowed
Totally Stub No Type 3, 4 or 5 LSAs allowed except the default summary route
NSSA
No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR
can traverse
NSSA Totally
Stub
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type
5 at the NSSA ABR are allowed
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DAY#4 OSPF
OSPF PATH SELECTION:
1. Intra-area
2. Interarea
3. External routes (which involves additional logic not covered in CCNP)
1. Intra-area
Routes advertised via a type 1 LSA for an area are always preferred over type 3 LSAs.
If multiple intra-area routes exist, the path with the lowest total path metric is installed in the OSPF
Routing Information Base (RIB), which is then presented to the router’s global RIB.
If there is a tie in metric, both routes install into the OSPF RIB.
In below diagram,
Best Route: R1–R3–R4
Not preferred: R1–R2–R4 (inter-area)
MUMBAIR1#sh ip rout 3.3.3.3
Routing entry for 3.3.3.3/32
Known via "ospf 100", distance 110, metric 11, type intra area
Last update from 192.168.23.12 on Ethernet0/0, 00:16:34 ago
Routing Descriptor Blocks:
* 192.168.23.12, from 3.3.3.3, 00:16:34 ago, via Ethernet0/0
Route metric is 11, traffic share count is 1
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
2. Inter-area
The next priority for selecting a path to a network is selection of the path with the lowest total path
metric to the destination.
If there is a tie in metric, both routes install into the OSPF RIB.
All interarea paths for a route must go through Area 0 to be considered.
In below diagram:
R1 uses the path R1–R3–R5–R6 because its total path metric is 35
R1–R2–R4–R6 path NOT preferred, with a metric of 40
MUMBAIR1#sh ip rout 6.6.6.6
Routing entry for 6.6.6.6/32
Known via "ospf 100", distance 110, metric 21, type inter area
Last update from 192.168.23.14 on Ethernet0/0, 00:15:23 ago
Routing Descriptor Blocks:
* 192.168.23.14, from 4.4.4.4, 00:15:23 ago, via Ethernet0/0
Route metric is 21, traffic share count is 1
Equal-Cost Multipathing
If OSPF identifies multiple paths in the path selection algorithms, those routes are installed into the
routing table as equal-cost multipathing (ECMP) routes.
The default maximum number of ECMP paths is four paths.
The default ECMP setting can be overwritten with the command maximum-paths maximum-paths
under the OSPF process to modify the default setting.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
METRIC: (COST)
Default cost of essential interfaces:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Solution: AUTO-COST REFERENCE-BANDWIDTH
>router(config)#
router ospf 1
auto-cost reference-bandwidth 1000 (equals to 1000 Mbps)
New Reference BW = 10^8 X 10^2 = 10^10
OSPF METRIC (cost) = (New Reference BW / Interface BW)
Example:
ROUTER4(config)#int e0/1
ROUTER4(config-if)#ip ospf cost 1
AUTO-COST REFERENCE BANDWITH (Reference 10^10)
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Summarization of Routes:
Route scalability is a large factor for the IGP routing protocols used by service providers because
there can be thousands of routers running in a network.
Before Summarization:
MUMBAIR6(config-if)#do sh ip rout | i 192.
O IA 192.168.23.0/24 [110/20] via 10.100.100.1, 00:00:17, Ethernet0/0
192.168.24.0/32 is subnetted, 1 subnets
O IA 192.168.24.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0
192.168.25.0/32 is subnetted, 1 subnets
O IA 192.168.25.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0
192.168.26.0/32 is subnetted, 1 subnets
O IA 192.168.26.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0
CONFIG:
MUMBAIR2(config)#
interface Loopback24
ip address 192.168.24.1 255.255.255.0
end
interface Loopback25
ip address 192.168.25.1 255.255.255.0
end
interface Loopback26
ip address 192.168.26.1 255.255.255.0
end
MUMBAIR2(config)#
router ospf 100
network 192.168.24.0 0.0.0.255 area 0
network 192.168.25.0 0.0.0.255 area 0
network 192.168.26.0 0.0.0.255 area 0
Summarization is enabled always on ABR only
MUMBAIR4(config)#
router ospf 1
area 0 range 192.168.0.0 255.255.0.0 cost 11
After Summarization:
MUMBAIR6(config-if)#do sh ip rout | begin 192.
O IA 192.168.0.0/16 [110/21] via 10.100.100.1, 00:01:14, Ethernet0/0
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DAY#5 OSPF
ROUTE FILTERING:
Route filtering is a method for selectively identifying routes that are advertised or received from
neighbor routers.
Route filtering may be used to manipulate traffic flows, reduce memory utilization, or improve
security.
Filtering with Summarization
One of the easiest methodologies for filtering routes is to use the not-advertise keyword during
prefix summarization.
Using this keyword prevents creation of any type 3 LSAs for any networks in that range, thus making
the subordinate routes visible only within the area where the route originates.
MUMBAIR4# configure terminal
MUMBAIR4(config-router)# area 0 range 192.168.0.0 255.255.0.0 not-advertise
RESULTS:
MUMBAIR6#show ip route | i 192.
No 192.x.x.x routes found
Area Filtering
Although filtering via summarization is very easy, it is limited in its ability.
if the 172.16.1.0/24 network needs to be present in Area 0 but removed in Area 34, it is not possible
to filter the route using summarization.
R2
ip prefix-list PREFIX-FILTER seq 5 deny 172.16.1.0/24
ip prefix-list PREFIX-FILTER seq 10 permit 0.0.0.0/0 le 32
!
router ospf 1
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
router-id 192.168.2.2
network 10.12.1.0 0.0.0.255 area 12
network 10.23.1.0 0.0.0.255 area 0
area 0 filter-list prefix PREFIX-FILTER in
RESULT:
R3# show ip route ospf | begin Gateway
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks
O IA 10.12.1.0/24 [110/2] via 10.23.1.2, 00:17:39, GigabitEthernet0/1
172.16.0.0/24 is subnetted, 2 subnets
O IA 172.16.2.0 [110/3] via 10.23.1.2, 00:16:30, GigabitEthernet0/1
O IA 172.16.3.0 [110/3] via 10.23.1.2, 00:16:30, GigabitEthernet0/1
MUMBAIR4(config)#
ip prefix-list PREFIX-FILTER seq 5 deny 192.168.24.1/32
ip prefix-list PREFIX-FILTER seq 10 permit 192.168.0.0/16
router ospf 1
area 40 filter-list prefix PREFIX-FILTER in
MUMBAIR6# sh ip rout | i 192.168.24.
MUMBAIR6# -> NO ROUTES FOUND FOR 192.168.24.
Local OSPF Filtering
In some scenarios, routes need to be removed only on specific routers in an area.
OSPF is a link-state protocol that requires all routers in the same area to maintain an identical copy
of the LSDB for that area.
A route can exist in the OSPF LSDB, but it could be prevented from being installed in the local RIB.
This is accomplished by using a Distribute List.
MUMBAIR4(config)#
MUMBAIR4(config)#ip access-list standard ACL-OSPF
MUMBAIR4(config-std-nacl)#10 deny 192.168.24.0 0.0.0.255
MUMBAIR4(config-std-nacl)#20 permit any
router ospf 1
distribute-list ACL-OSPF in
MUMBAIR6# sh ip rout | i 192.168.24
192.168.24.0/32 is subnetted, 1 subnets
O IA 192.168.24.1 [110/21] via 10.100.100.1, 00:09:02, Ethernet0/0
MUMBAIR6#
Route will be present but no reachability
MUMBAIR6#ping 192.168.24.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.24.1, timeout is 2 seconds:
UUUUU
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
DEFAULT ROUTE ORIGINATE:
A common situation is where you have some internet-facing routers running BGP with some ISP,
probably receiving full routes, and you want to send a default route to the internal routers, so they
will use the "nearest" router (in terms of metric) to send traffic destined outside the AS.
To generate a default external route into an Open Shortest Path First (OSPF) routing domain. The
topology is something like this:
R1(config)#router ospf 1
R1(config-router)#default-information originate ?
If you use the default-information originate you can advertise a default route in OSPF. OSPF won’t
advertise a default route if you don’t already have it in your routing table.
If you add the always keyword it will advertise the default route even if you don’t have it in the
routing table. Once you have advertised the default route it will look like this on other routers:
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
MUMBAIR6#show ip ospf database | begin Type-5
Type-5 AS External Link States
Link ID ADV Router Age Seq# Checksum Tag
0.0.0.0 172.16.3.1 59 0x80000001 0x008D64 1
MUMBAIR6#show ip route ospf
O*E2 0.0.0.0/0 [110/1] via 192.168.12.1, 00:00:24, FastEthernet0/0
EXAMPLE:
MUMBAIR6
hostname MUMBAIR6
!
interface FastEthernet0/1
ip address 192.168.12.1 255.255.255.0
!
router ospf 1
network 192.168.12.0
default-information originate always
!
end
VIRTUAL LINKS:
All areas in an Open Shortest Path First (OSPF) autonomous system must be physically
connected to the backbone area (Area 0). In some cases, where this is not possible, you can
use a virtual link to connect to the backbone through a non-backbone area.
You can also use virtual links to connect two parts of a partitioned backbone through a non-
backbone area.
The area through which you configure the virtual link, known as a transit area, must have
full routing information.
The transit area cannot be a stub area.
router ospf 1
area 1 virtual-link 3.3.3.3
router ospf 1
area 1 virtual-link 1.1.1.1
show ip ospf virtual-links
Router3.3.3.3#show ip ospf neighbor
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Neighbor ID Pri State Dead Time Address
Interface
2.2.2.2 1 FULL/ - 00:00:38 6.0.0.2
ATM2/0.20
Router3.3.3.3#show ip ospf virtual-links
Virtual Link OSPF_VL3 to router 1.1.1.1 is up
Run as demand circuit
DoNotAge LSA allowed.
Transit area 1, via interface ATM2/0.20, Cost of using 65
Transmit Delay is 1 sec, State POINT_TO_POINT,
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:01
Adjacency State FULL (Hello suppressed)
Index 1/2, retransmission queue length 0, number of retransmission
0
First 0x0(0)/0x0(0) Next 0x0(0)/0x0(0)
Last retransmission scan length is 0, maximum is 0
Last retransmission scan time is 0 msec, maximum is 0 msec
Notice that adjacencies over virtual links are not displayed in the show ip ospf neighbor
command output. The only way to see them is to look at the router LSA and observe debug
commands as the adjacency comes up, or issue the show ip ospf virtual-links command.
======OSPF TOPIC ENDS HERE========
OSPF QUIZ#
1. OSPF uses the protocol number ___________ for its inter-router communication.
87
88
89
90
2. OSPF uses ___________ packet types for inter-router communication.
three
four
five
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
six
seven
3. What destination addresses does OSPF use, when feasible? (Choose two.)
IP address 224.0.0.5
IP address 224.0.0.10
IP address 224.0.0.8
MAC address 01:00:5E:00:00:05
MAC address 01:00:5E:00:00:0A
4. True or false: OSPF is only enabled on a router interface by using the command network ip-
address wildcard-mask area area-id under the OSPF router process.
True
False
5. True or false: The OSPF process ID must match for routers to establish a neighbor adjacency.
True
False
6. True or false: A default route advertised with the command default information-originate in OSPF
will always appear as an OSPF inter-area route.
True
False
7. True or false: The router with the highest IP address is the designated router when using a serial
point-to-point link.
True
False
8. OSPF automatically assigns a link cost to an interface based on a reference bandwidth of
___________.
100 Mbps
1 Gbps
10 Gbps
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
40 Gbps
9. What command is configured to prevent a router from becoming the designated router for a
network segment?
The interface command ip ospf priority 0
The interface command ip ospf priority 255
The command dr-disable interface-id under the OSPF process
The command passive interface interface-id under the OSPF process
The command dr-priority interface-id 255 under the OSPF process
10. What is the advertised network for the loopback interface with IP address 10.123.4.1/30?
10.123.4.1/24
10.123.4.0/30
10.123.4.1/32
10.123.4.0/24
Answers to the “Do I Know This Already?” quiz:
1 C
2 C
3 A, D
4 B
5 B
6 B
7 B
8 A
9 A
10 C
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
BGP (BORDER GATEWAY PROTOCOL)
RFC (REQUEST FOR COMMENT) 1654 defines Border Gateway Protocol (BGP) as an EGP standardized
path vector routing protocol that provides scalability, flexibility, and network stability.
When BGP was created, the primary design consideration was for IPv4 inter-organization
connectivity on public networks like the Internet and on private dedicated networks.
BGP is the only protocol used to exchange networks on the Internet, which has more than 780,000
IPv4 routes and continues to grow.
Due to the large size of the BGP tables, BGP does not advertise incremental updates or refresh
network advertisements as OSPF and IS-IS do.
BGP Key Points
• BGP stand for Border Gateway Protocol.
• BGP is also a Dynamic Routing Protocol.
• BGP is Exterior Gateway Protocol (EGP).
• BGP is the only EGP use now a days.
• BGP is called Protocol of the Internet.
• BGP is called an application layer protocol.
• BGP is also called Policy-based routing protocol.
• BGP is an AS-by-AS dynamic routing protocol.
• BGP is a Path-Vector Routing protocol.
• Path-Vector means list of AS on path to destination.
• BGP Protocols uses TCP Port Number 179.
• BGP is open standard routing protocol.
• BGP is mainly used for Scalability and Reliability.
• BGP is mainly used for control but not for speed.
• BGP prevents loop using the AS Numbers.
• BGP is classless supports FLSM, VLSM, and CIDR.
• BGP support auto and manual summarization.
• BGP Updates are incremental and triggered.
• BGP Updates are sent as unicast to manually defined neighbors.
• BGP Administrative Distance is 20 for External Updates
• BGP Administrative Distance is 200 for Internal Updates.
• BGP does not use load balancing, uses only one path per network.
• BGP Protocols has two flavors eBGP and iBGP.
• If peers are in the same AS called internal BGP (iBGP).
• If peers are in a different AS called external BGP (eBGP).
• Neighbor relationships for eBGP and iBGP are slightly different.
TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN
CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
• IBPG the neighbors no need to be connected directly.
• EBGP the neighbors need to be connected directly.
• BGP guarantees loop-free routing information.
• BGP has no auto discovery mechanism peers to be set manually.
• BGP Protocol is used to exchange Internet routes.
• BGP is a Layer 4 protocol that sits on top of TCP.
BGP itself is an application (layer 7).
BGP’s purpose is for routing (layer 3); exchanging layer 3 information. It’s a routing protocol.
BGP uses TCP port 179 (layer 4: transport), but the application is what does the processing of the
logic (routing policy).
Autonomous System Numbers
An organization requiring connectivity to the Internet must obtain an autonomous system number
(ASN).
ASNs were originally 2 bytes (16-bit range), which made 65,535 ASNs possible.
Due to exhaustion, RFC 4893 expanded the ASN field to accommodate 4 bytes (32-bit range).
This allows for 4,294,967,295 unique ASNs, providing quite an increase from the original 65,535
ASNs.
An autonomous system (AS) is a group of IP networks operated by one or more network
operator(s) that has a single and clearly defined external routing policy.
Exterior routing protocols are used to exchange routing information between Autonomous
Systems.
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b
3 ip routing part b

More Related Content

What's hot

Implementing Internet and MPLS BGP
Implementing Internet and MPLS BGPImplementing Internet and MPLS BGP
Implementing Internet and MPLS BGPPrivate
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network OperatorsAPNIC
 
3 ip routing vrf lite - v2
3 ip routing   vrf lite - v23 ip routing   vrf lite - v2
3 ip routing vrf lite - v2SagarR24
 
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr WojciechowskiPLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr WojciechowskiPROIDEA
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLNutan Singh
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGPAPNIC
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)NetProtocol Xpert
 
Equinix IP Address Renumbering in Singapore and Sydney
Equinix IP Address Renumbering in Singapore and SydneyEquinix IP Address Renumbering in Singapore and Sydney
Equinix IP Address Renumbering in Singapore and SydneyAPNIC
 
Stp. cli command reference, quiz
Stp. cli command reference, quizStp. cli command reference, quiz
Stp. cli command reference, quizSagarR24
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideAbel Saduwa
 
8 wireless parta v1
8 wireless parta v18 wireless parta v1
8 wireless parta v1SagarR24
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)Netwax Lab
 

What's hot (20)

Implementing Internet and MPLS BGP
Implementing Internet and MPLS BGPImplementing Internet and MPLS BGP
Implementing Internet and MPLS BGP
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network Operators
 
3 ip routing vrf lite - v2
3 ip routing   vrf lite - v23 ip routing   vrf lite - v2
3 ip routing vrf lite - v2
 
BGP
BGPBGP
BGP
 
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr WojciechowskiPLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
 
Juniper Bgp
Juniper BgpJuniper Bgp
Juniper Bgp
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Equinix IP Address Renumbering in Singapore and Sydney
Equinix IP Address Renumbering in Singapore and SydneyEquinix IP Address Renumbering in Singapore and Sydney
Equinix IP Address Renumbering in Singapore and Sydney
 
Bgp
BgpBgp
Bgp
 
Stp. cli command reference, quiz
Stp. cli command reference, quizStp. cli command reference, quiz
Stp. cli command reference, quiz
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
 
8 wireless parta v1
8 wireless parta v18 wireless parta v1
8 wireless parta v1
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 

Similar to 3 ip routing part b

3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Dân Chơi
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Dân Chơi
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configurationSourabh Badve
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 

Similar to 3 ip routing part b (20)

3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
Group 1
Group 1Group 1
Group 1
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 

More from SagarR24

Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigthSagarR24
 
Ccnp enterprise workbook v1.0 eigrp
Ccnp enterprise workbook v1.0 eigrpCcnp enterprise workbook v1.0 eigrp
Ccnp enterprise workbook v1.0 eigrpSagarR24
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualizationSagarR24
 
8 wireless part b
8 wireless part b8 wireless part b
8 wireless part bSagarR24
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbpSagarR24
 
Ccnp enterprise workbook hsrp vrrp glbp
Ccnp enterprise workbook   hsrp vrrp glbpCcnp enterprise workbook   hsrp vrrp glbp
Ccnp enterprise workbook hsrp vrrp glbpSagarR24
 
5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec greSagarR24
 
7 network programmability concepts python-ansible
7 network programmability concepts python-ansible7 network programmability concepts python-ansible
7 network programmability concepts python-ansibleSagarR24
 
7 network programmability concepts api
7 network programmability concepts api7 network programmability concepts api
7 network programmability concepts apiSagarR24
 
7 network programmability concepts api
7 network programmability concepts api7 network programmability concepts api
7 network programmability concepts apiSagarR24
 
4 ip services span,rspan
4 ip services span,rspan4 ip services span,rspan
4 ip services span,rspanSagarR24
 
4 ip services nat
4 ip services nat4 ip services nat
4 ip services natSagarR24
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mppSagarR24
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace securitySagarR24
 
0.2 vt pv2 and v3
0.2 vt pv2 and v30.2 vt pv2 and v3
0.2 vt pv2 and v3SagarR24
 
5 ip security urpf
5 ip security urpf5 ip security urpf
5 ip security urpfSagarR24
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partbSagarR24
 
5 ip security aaa and acl
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and aclSagarR24
 
5 ip security aaa
5 ip security aaa5 ip security aaa
5 ip security aaaSagarR24
 
4 ip services dhcp-part b
4 ip services dhcp-part b4 ip services dhcp-part b
4 ip services dhcp-part bSagarR24
 

More from SagarR24 (20)

Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigth
 
Ccnp enterprise workbook v1.0 eigrp
Ccnp enterprise workbook v1.0 eigrpCcnp enterprise workbook v1.0 eigrp
Ccnp enterprise workbook v1.0 eigrp
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualization
 
8 wireless part b
8 wireless part b8 wireless part b
8 wireless part b
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
 
Ccnp enterprise workbook hsrp vrrp glbp
Ccnp enterprise workbook   hsrp vrrp glbpCcnp enterprise workbook   hsrp vrrp glbp
Ccnp enterprise workbook hsrp vrrp glbp
 
5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec gre
 
7 network programmability concepts python-ansible
7 network programmability concepts python-ansible7 network programmability concepts python-ansible
7 network programmability concepts python-ansible
 
7 network programmability concepts api
7 network programmability concepts api7 network programmability concepts api
7 network programmability concepts api
 
7 network programmability concepts api
7 network programmability concepts api7 network programmability concepts api
7 network programmability concepts api
 
4 ip services span,rspan
4 ip services span,rspan4 ip services span,rspan
4 ip services span,rspan
 
4 ip services nat
4 ip services nat4 ip services nat
4 ip services nat
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mpp
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
 
0.2 vt pv2 and v3
0.2 vt pv2 and v30.2 vt pv2 and v3
0.2 vt pv2 and v3
 
5 ip security urpf
5 ip security urpf5 ip security urpf
5 ip security urpf
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
 
5 ip security aaa and acl
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and acl
 
5 ip security aaa
5 ip security aaa5 ip security aaa
5 ip security aaa
 
4 ip services dhcp-part b
4 ip services dhcp-part b4 ip services dhcp-part b
4 ip services dhcp-part b
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

3 ip routing part b

  • 1. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY TOPICS COVERED: IP ROUTING ESSENTIALS - ROUTING PROTOCOL OVERVIEW - PATH SELECTION - STATIC ROUTING - EIGRP - OSPF - ADVANCE OSPF
  • 2. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY ROUTING PROTOCOL OVERVIEW A router’s primary function is to move an IP packet from one network to a different network. A router learns about non-attached networks through configuration of static routes or through dynamic IP routing protocols. Dynamic IP routing protocols distribute network topology information between routers and provide updates without intervention when a topology change in the network occurs. Design requirements or hardware limitations may restrict IP routing to static routes, which do not accommodate topology changes very well and can burden network engineers, depending on the size of the network. With dynamic routing protocols, routers try to select the best loop-free path on which to forward a packet to its destination IP address. The common dynamic routing protocols found on most routing platforms today are as follows: • Routing Information Protocol Version 2 (RIPv2) • Enhanced Interior Gateway Routing (EIGRP) • Open Shortest Path First (OSPF) • Intermediate System-to-Intermediate System (IS-IS) • Border Gateway Protocol (BGP) With the exception of BGP, the protocols in this list are designed and optimized for routing within an autonomous system and are known as Interior Gateway Protocols (IGPs). Exterior Gateway Protocols (EGPs) route between autonomous systems. BGP is an EGP protocol but can also be used within an autonomous system. If BGP exchanges routes within an autonomous system, it is known as an interior BGP (iBGP) session. If it exchanges routes between different autonomous systems, it is known as an exterior BGP (eBGP) session.
  • 3. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Distance Vector Algorithms Distance vector routing protocols, such as RIP {Routing Information Protocol}, advertise routes as vectors, where distance is a metric (or cost) such as hop count, and vector is the next-hop router’s IP used to reach the destination: • Distance: The distance is the route metric to reach the network. • Vector: The vector is the interface or direction to reach the network.
  • 4. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY When a router receives routing information from a neighbor, it stores it in a local routing database as it is received, and the distance vector algorithm (such as the Bellman-Ford and Ford-Fulkerson algorithms) is used to determine which paths are the best loop-free paths to each reachable destination. When the best paths are determined, they are installed into the routing table and are advertised to each neighbor router. Routers running distance vector protocols advertise the routing information to their neighbors from their own perspective, modified from the original route received. Therefore, a distance vector protocol does not have a complete map of the whole network; instead, its database reflects that a neighbor router knows how to reach the destination network and how far the neighbor router is from the destination network. The advantage of distance vector protocols is that they require less CPU and memory and can run on low-end routers. A distance vector protocol selects paths purely based on distance. It does not account for link speeds or other factors. The link between R1 and R7 is a serial link with only 64 Kbps of bandwidth, and all of the other links are 1 Gbps Ethernet links. RIP does not take this into consideration and forwards traffic across this link, which will result in packet loss when that link is oversubscribed. Enhanced Distance Vector Algorithms The diffusing update algorithm (DUAL) is an enhanced distance vector algorithm that EIGRP uses to calculate the shortest path to a destination within a network. EIGRP advertises network information to its neighbors as other distance vector protocols do, but it has some enhancements, as its name suggests. The following are some of the enhancements introduced into this algorithm compared to other distance vector algorithms: • It offers rapid convergence time for changes in the network topology. • It sends updates only when there is a change in the network. It does not send full routing table updates in a periodic fashion, as distance vector protocols do. • It uses hellos and forms neighbor relationships just as link-state protocols do.
  • 5. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY • It uses bandwidth, delay, reliability, load, and maximum transmission unit (MTU) size instead of hop count for path calculations. • It has the option to load balance traffic across equal- or unequal-cost paths. EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics of both distance vector and link-state protocols. R3 is trying to forward packets to the 192.168.1.0/24 network. If the routing domain used a distance vector routing protocol, it would take the R3→R1→R7 path, which is only two hops away, rather than the path R3→R1→R2→R7 path, which is three hops away. But the R3→R1→R7 path cannot support traffic over 64 kbps. While the R3→R1→R2→R7 path is longer, it provides more bandwidth and does not have as much delay (because of the serialization process on lower-speed interfaces) and is the path selected by EIGRP. Link-State Algorithms A link-state dynamic IP routing protocol advertises the link state and link metric for each of its connected links and directly connected routers to every router in the network. OSPF and IS-IS are two link-state routing protocols commonly used in enterprise and service provider networks. OSPF advertisements are called link-state advertisements (LSAs), and IS-IS uses link-state packets (LSPs) for its advertisements. As a router receives an advertisement from a neighbor, it stores the information in a local database called the link-state database (LSDB) and advertises the link-state information on to each of its neighbor routers exactly as it was received. The link-state information is essentially flooded throughout the network, unchanged, from router to router, just as the originating router advertised it. This allows all the routers in the network to have a synchronized and identical map of the network. Using the complete map of the network, every router in the network then runs the Dijkstra shortest path first (SPF) algorithm to calculate the best shortest loop-free paths. The link-state algorithm then populates the routing table with this information.
  • 6. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Due to having the complete map of the network, link-state protocols usually require more CPU and memory than distance vector protocols, but they are less prone to routing loops and make better path decisions. Path Vector Algorithm A path vector protocol such as BGP is similar to a distance vector protocol; the difference is that instead of looking at the distance to determine the best loop-free path, it looks at various BGP path attributes. BGP path attributes include autonomous system path (AS_Path), multi-exit discriminator (MED), origin, next hop, local preference, atomic aggregate, and aggregator. A path vector protocol guarantees loop-free paths by keeping a record of each autonomous system that the routing advertisement traverses. Any time a router receives an advertisement in which it is already part of the AS_Path, the advertisement is rejected because accepting the AS_Path would effectively result in a routing loop.
  • 7. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 1. R1 (AS 1) advertises the 10.1.1.0/24 network to R2 (AS 2). R1 adds the AS 1 to theAS_Path during the network advertisement to R2. 2. R2 advertises the 10.1.1.0/24 network to R4 and adds AS 2 to the AS_Path during the network advertisement to R4. 3. R4 advertises the 10.1.1.0/24 network to R3 and adds AS 4 to the AS_Path during the network advertisement to R3. 4. R3 advertises the 10.1.1.0/24 network back to R1 and R2 after adding AS 3 to the AS_Path during the network advertisement. 5. As R1 receives the 10.1.1.0/24 network advertisement from R3, it discards the route advertisement because R1 detects its AS (AS 1) in the AS_Path “3 4 2 1” and considers the advertisement as a loop. R2 discards the 10.1.1.0/24 network advertisement from R3 as it detects its AS (AS 2) in the AS_Path “3 4 2 1” and considers it a loop, too.
  • 8. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY PATH SELECTION A router identifies the path a packet should take by evaluating the prefix length that is programmed in the Forwarding Information Base (FIB). The FIB is programmed through the routing table, which is also known as the Routing Information Base (RIB). The RIB is composed of routes presented from the routing protocol processes. Path selection has three main components: 1. Longest Match: The prefix length represents the number of leading binary bits in the subnet mask that are in the on position. 2. Administrative distance: Administrative distance (AD) is a rating of the trustworthiness of a routing information source. If a router learns about a route to a destination from more than one routing protocol, and all the routes have the same prefix length, then the AD is compared. 3. Metrics: A metric is a unit of measure used by a routing protocol in the best-path calculation. The metrics vary from one routing protocol to another.
  • 9. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 1. Longest match In the figure, a packet is destined for 172.16.0.10. The router has three possible routes that match this packet: 172.16.0.0/12, 172.16.0.0/18, and 172.16.0.0/26. Of the three routes, 172.16.0.0/26 has the longest match and is therefore chosen to forward the packet. Remember, for any of these routes to be considered a match there must be at least the number of matching bits indicated by the subnet mask of the route. 2. Administrative distance Administrative distance is what is used to select the best path when a router has two different paths to the same destination via two different routing protocols. Most routing protocols are not compatible with other protocols. In a network with multiple routing protocols, being able to select the best path between multiple protocols is critical. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. IPv6 uses the same distances as IPv4.
  • 10. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Default Administrative Distances: Routing Protocol Default Administrative Distance Connected 0 Static 1 EIGRP summary route 5 External BGP (eBGP) 20 EIGRP (internal) 90 OSPF 110 IS-IS 115 RIP 120 EIGRP (external) 170 Internal BGP (iBGP) 200 3. Metric The metric is a value produced by the routing protocol's algorithm. The metric value determines the best path to a destination network within a routing protocol. To determine the metric: • RIP uses hop count • EIGRP uses 256*(Bandwidth + Delay) for calculating cost(metric) • OSPF uses {Reference bandwidth/Interface BW} Reference BW=100Mbps Metric is used to compare routes to a destination by the same routing protocol. Lower values indicate preferred routes.
  • 11. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Equal-Cost Multipathing If a routing protocol identifies multiple paths as a best path and supports multiple path entries, the router installs the maximum number of paths allowed per destination. This is known as equal-cost multipathing (ECMP) and provides load sharing across all links. RIP, EIGRP, OSPF, and IS-IS all support ECMP. ECMP provides a mechanism to increase bandwidth across multiple paths by splitting traffic equally across the links. R1# show ip route ! Output omitted for brevity O 10.3.3.0/24 [110/30] via 10.12.1.2, 00:49:12, GigabitEthernet0/2 [110/30] via 10.14.1.4, 00:49:51, GigabitEthernet0/4 Unequal-Cost Load Balancing By default, routing protocols install only routes with the lowest path metric. However, EIGRP can be configured (not enabled by default) to install multiple routes with different path metrics. This allows for unequal-cost load balancing across multiple paths. Traffic is transmitted out the router’s interfaces based on that path’s metrics in ratio to other the interface’s metrics. OSPF
  • 12. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY R1# show ip route eigrp ! Output omitted for brevity Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 7 subnets, 2 masks D 10.3.3.0/24 [90/3328] via 10.14.1.4, 00:00:02, GigabitEthernet0/4 [90/5632] via 10.12.1.2, 00:00:02, GigabitEthernet0/2
  • 13. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY STATIC ROUTING Static routes provide precise control over routing but may create an administrative burden as the number of routers and network segments grow. Using static routing requires zero network bandwidth because implementing manual route entries does not require communication with other routers. Unfortunately, because the routers are not communicating, there is no network intelligence. If a link goes down, other routers will not be aware that the network path is no longer valid. Static routes are useful when • Dynamic routing protocols cannot be used on a router because of limited router CPU or memory • Routes learned from dynamic routing protocols need to be superseded Static Route Types Static routes can be classified as one of the following: 1. Directly attached static routes 2. Recursive static route 3. Fully specified static route 1. Directly Attached Static Routes Point-to-point interfaces do not have to worry about maintaining an adjacency table and do not use Address Resolution Protocol (ARP), so static routes can directly reference the outbound interface of a router. A static route that uses only the outbound next-hop interface is known as a directly attached static route, and it requires that the outbound interface be in an up state for the route to be installed into the RIB. R1# configure term Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip route 10.22.22.0 255.255.255.0 Serial 1/0 R2# configure term Enter configuration commands, one per line. End with CNTL/Z. R2(config)# ip route 10.11.11.0 255.255.255.0 Serial 1/0 R1# show ip route
  • 14. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY ! Output omitted for brevity Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks C 10.11.11.0/24 is directly connected, GigabitEthernet0/1 C 10.12.2.0/24 is directly connected, Serial1/0 S 10.22.22.0/24 is directly connected, Serial1/0 R2# show ip route ! Output omitted for brevity Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks S 10.11.11.0/24 is directly connected, Serial1/0 C 10.12.2.0/24 is directly connected, Serial1/0 C 10.22.22.0/24 is directly connected, GigabitEthernet0/1 R1 indicates that the 10.22.22.0/24 network is reachable via the S1/0 interface, and R2 indicates that the 10.11.11.0/24 network is reachable via the S1/0 interface. 2. Recursive Static Routes The forwarding engine on Cisco devices needs to know which interface an outbound packet should use. A recursive static route specifies the IP address of the next-hop address. The recursive lookup occurs when the router queries the RIB to locate the route toward the next- hop IP address (connected, static, or dynamic) and then cross-references the adjacency table. Recursive static routes are configured with the command ip route network subnet-mask next-hop-ip. Recursive static routes require the route’s next-hop address to exist in the routing table to install the static route into the RIB. R1# configure term Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip route 10.22.22.0 255.255.255.0 10.12.1.2 R2# configure term Enter configuration commands, one per line. End with CNTL/Z. R2(config)# ip route 10.11.11.0 255.255.255.0 10.12.1. R1# show ip route ! Output omitted for brevity
  • 15. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks C 10.11.11.0/24 is directly connected, GigabitEthernet0/1 C 10.12.1.0/24 is directly connected, GigabitEthernet0/0 S 10.22.22.0/24 [1/0] via 10.12.1.2 Advantage: Static route recursion can simplify topologies if a link fails because it may allow the static route to stay installed while it changes to a different outbound interface in the same direction as the destination. Disadvantage: However, problems arise if the recursive lookup resolves to a different interface pointed in the opposite direction. 3. Fully Specified Static Routes To correct this issue, the static route configuration should use the outbound interface and the next- hop IP address. A static route with both an interface and a next-hop IP address is known as a fully specified static route. If the interface listed is not in an up state, the router removes the static route from the RIB. Specifying the next-hop address along with the physical interface removes the recursive lookup and does not involve the ARP processing problems that occur when using only the outbound interface. Fully specified static routes are configured with the command ip route network subnet-mask interface-id next-hop-ip. R1# configure term Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip route 10.22.22.0 255.255.255.0 GigabitEthernet0/0 10.12.1.2 R2# configure term Enter configuration commands, one per line. End with CNTL/Z. R2(config)# ip route 10.11.11.0 255.255.255.0 GigabitEthernet0/0 10.12.1. R1# show ip route ! Output omitted for brevity 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks C 10.11.11.0/24 is directly connected, GigabitEthernet0/1 C 10.12.1.0/24 is directly connected, GigabitEthernet0/0 S 10.22.22.0/24 [1/0] via 10.12.1.2, GigabitEthernet0/0
  • 16. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Floating Static Routing The default AD on a static route is 1, but a static route can be configured with an AD value of 1 to 255 for a specific route. The AD is set on a static route by appending the AD as part of the command structure. Using a floating static route is a common technique for providing backup connectivity for prefixes learned via dynamic routing protocols. A floating static route is configured with an AD higher than that of the primary route. Because the AD is higher than that of the primary route, it is installed in the RIB only when the primary route is withdrawn. R1# configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip route 10.22.22.0 255.255.255.0 10.12.1.2 10 R1(config)# ip route 10.22.22.0 255.255.255.0 Serial 1/0 210 R1# show ip route ! Output omitted for brevity Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks C 10.11.11.0/24 is directly connected, GigabitEthernet0/1 C 10.12.1.0/24 is directly connected, GigabitEthernet0/0 C 10.12.2.0/24 is directly connected, Serial1/0 S 10.22.22.0/24 [10/0] via 10.12.1.2
  • 17. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Static Null Routes The null interface is a virtual interface that is always in an up state. Null interfaces do not forward or receive network traffic and drop all traffic destined toward them without adding overhead to a router’s CPU. Configuring a static route to a null interface provides a method of dropping network traffic without requiring the configuration of an access list. Creating a static route to the Null0 interface is a common technique to prevent routing loops. The static route to the Null0 interface uses a summarized network range, and routes that are more specific point toward the actual destination. 1. For example, a computer on the Internet sends a packet to 172.16.5.5, and the 172.16.5.0/24 network is not allocated on R1 or R2. 2. The ISP sends the packet to R1 because of the 172.16.0.0/20 static route; R1 looks into the RIB, and the longest match for that prefix is the default route back to the ISP, so R1 sends the packet back to the ISP, creating the routing loop. 3. The service provider places a static route for the 172.16.0.0/20 network to R1’s interface (192.168.1.1). R1 uses a static default route pointed toward the service provider (192.168.1.2) and a static route to the 172.16.3.0/24 network via R2 (172.16.1.2). Because R2 accesses all other networks through R1, a static default route points toward R1’s interface (172.16.1.1). R2# trace 172.16.5.5 source GigabitEthernet 0/2 Type escape sequence to abort. Tracing the route to 172.16.5.5 1 172.16.1.1 0 msec 0 msec 0 msec 2 192.168.1.1 0 msec 0 msec 0 msec 3 192.168.1.2 0 msec 4 msec 0 msec 4 192.168.1.1 0 msec 0 msec 0 msec 5 192.168.1.2 0 msec 0 msec 0 msec ! Output omitted for brevity To prevent the routing loop, a static route is added for 172.16.0.0/20, pointed to the Null0 interface on R1. Any packets matching the 172.16.0.0/20 network range that do not have a longer match in R1’s RIB are dropped.
  • 18. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY R1 ip route 0.0.0.0 0.0.0.0 Gi0/0 192.168.1.2 ip route 172.16.3.0 255.255.255.0 Gi0/2 172.16.1.2 ip route 172.16.0.0 255.255.240.0 Null0 R2# trace 172.16.5.5 source GigabitEthernet 0/2 Type escape sequence to abort. Tracing the route to 172.16.5.5 1 172.16.1.1 * * * 2 172.16.1.1 * * * ! Output omitted for brevity QUIZ 1. Which of the following routing protocols is classified as an EGP? 1. RIP 2. EIGRP 3. OSPF 4. IS-IS 5. BGP 2. Which of the following routing protocols are classified as IGPs? (Choose all that apply.) 1. RIP 2. EIGRP 3. OSPF 4. IS-IS 5. BGP 3. A path vector routing protocol finds the best loop-free path by using ______. 1. hop count 2. bandwidth 3. delay 4. interface cost 5. path attributes 4. A distance vector routing protocol finds the best loop-free path by using ______. 1. hop count 2. bandwidth 3. delay 4. interface cost 5. path attributes
  • 19. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 5. A link-state routing protocol finds the best loop free path by using ______. 1. hop count 2. bandwidth 3. delay 4. interface cost 5. path attributes 6. A router uses _________ as the first criterion for forwarding packets. 1. path metric 2. administrative distance 3. longest match 4. hop count 7. A router uses _________ as the second criterion for forwarding packets. 1. path metric 2. administrative distance 3. longest match 4. hop count 8. The ability to install multiple paths from the same routing protocol with the same path metric into the RIB is known as ______. 1. per-packet load balancing 2. round-robin load balancing 3. equal-cost multipathing 4. parallel link forwarding 9. Which static route should be used to avoid unintentional forwarding paths with an Ethernet link failure? 1. A directly attached static route 2. A recursive static route 3. A fully specified static route 4. A static null route 10. Virtual routing and forwarding (VRF) is useful with _____ addresses. 1. MAC 2. IPv4 3. IPv6 4. IPv4 and IPv6 Answers to the “Do I Know This Already?” quiz: 1 E 2 A, B, C, D 3 E 4 A 5 E 6 C 7 B
  • 20. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 8 C 9 C 10 D EIGRP (ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL) EIGRP Theory of Operation o EIGRP stands for Enhanced Interior Gateway Routing Protocol. o EIGRP is a Cisco Proprietary routing protocol however open in 2013. o It is hybrid routing protocol sometime called Advanced Distance Vector. o It has characteristics of both distance vector and link state protocols. o It uses DUAL (Diffusing Update Algorithm) algorithm to select best path. o EIGRP supports Both Internet Protocol V4 and IPV6 routed protocols. o EIGRP protocol supports VLSM, CIDR also supports trigger updates. o It sends partial or full update only when something is change in network. o The Default Internal Administrative Distance of EIGRP protocol is 90. o The Default External Administrative Distance of EIGRP protocol is 170. o The EIGRP default hope count support is 100 but it can be tune to 255. o EIGRP protocol support Equal cost Load and Unequal Cost load balancing. o EIGRP take load balancing by default up-to 4 paths can configure up to 32. o Hello time of EIGRP protocol is 5 seconds and the dead time is 15 seconds. o EIGRP updates are sent to 224.0.0.10 on Multicast Internet Protocol address. o EIGRP Support MD5 Authentication & by default, Auto Summarization is enable. Some of the many advantages of EIGRP are: • very low usage of network resources during normal operation; only hello packets are transmitted on a stable network • when a change occurs, only routing table changes are propagated, not the entire routing table; this reduces the load the routing protocol itself places on the network • rapid convergence times for changes in the network topology (in some situations convergence can be almost instantaneous) EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a network.
  • 21. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Major Revisions of the Protocol There are two major revisions of EIGRP, versions 0 and 1. Cisco IOS versions earlier than 10.3(11), 11.0(8), and 11.1(3) run the earlier version of EIGRP; some explanations in this paper may not apply to that earlier version. We highly recommend using the later version of EIGRP, as it includes many performance and stability enhancements. Basic Theory R2 → R1 → Network A (better path as per Distance vector) (called successor in EIGRP) R2 → R3 → R4 → Network A (second best path in EIGRP called as feasible successor) - Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the information it learned through Three. - In case of R1 failure, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three. - EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. - Router Two saves the information it received from both Routers One and Three. - It chooses the path through One as its best path (the successor) and the path through Three as a loop-free path (a feasible successor). - When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible successor, begins using the path through Three immediately. EIGRP FACTS: - The rate at which EIGRP sends hello packets is called the hello interval, and you can adjust it per interface with the ip hello-interval eigrp command. - The hold time is the amount of time that a router will consider a neighbor alive without receiving a hello packet. - The hold time is typically three times the hello interval, by default, 15 seconds (5-second hello) and 180 seconds (60-second hello). You can adjust the hold time with the ip hold-time eigrp command. - Note that if you change the hello interval, the hold time is not automatically adjusted to account for this change - you must manually adjust the hold time to reflect the configured hello interval.
  • 22. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY - It is possible for two routers to become EIGRP neighbors even though the hello and hold timers do not match. - The hold time is included in the hello packets so each neighbor should stay alive even though the hello interval and hold timers do not match. - While there is no direct way of determining what the hello interval is on a router, you can infer it from the output of the show ip eigrp neighbors command on the neighboring router. router# show ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface Hold Uptime SRTT RTO Q Seq Type (sec) (ms) Cnt Num 1 10.1.1.2 Et1 13 12:00:53 12 300 0 620 0 10.1.2.2 S0 174 12:00:56 17 200 0 645 - EIGRP does not build peer relationships over secondary addresses. All EIGRP traffic is sourced from the primary address of the interface. There are no limitations on the number of neighbors that EIGRP can support. The actual number of supported neighbors depends on the capability of the device, such as: 1. memory capacity 2. processing power 3. amount of exchanged information, such as the number of routes sent 4. topology complexity 5. network stability THREE EIGRP STATES: Neighbor Discovery: To distribute routing information throughout a network, EIGRP uses non-periodic incremental routing updates. That is, EIGRP only sends routing updates about paths that have changed when those paths change. The basic problem with sending only routing updates is that you may not know when a path through a neighboring router is no longer available. You can not time out routes, expecting to receive a new routing table from your neighbors. EIGRP relies on neighbor relationships to reliably propagate routing table changes throughout the network; two routers become neighbors when they see each other's hello packets on a common network. Topology Table: EIGRP, unlike RIP and IGRP, does not rely on the routing (or forwarding) table in the router to hold all of the information it needs to operate. Instead, it builds a second table, the topology table, from which it installs routes in the routing table.
  • 23. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY To see the basic format of the topology table on a router running EIGRP, issue the show ip eigrp topology command. The topology table contains the information needed to build a set of distances and vectors to each reachable network, including: • lowest bandwidth on the path to this destination as reported by the upstream neighbor • total delay • path reliability • path loading • minimum path maximum transmission unit (MTU) • feasible distance • reported distance • route source (external routes are marked) EIGRP Metrics: EIGRP uses the minimum bandwidth on the path to a destination network and the total delay to compute routing metrics. Although you can configure other metrics, we do not recommend it, as it can cause routing loops in your network. The bandwidth and delay metrics are determined from values configured on the interfaces of routers in the path to the destination network. It starts with the two advertisements for this network: one through Router Four, with a minimum bandwidth of 56 and a total delay of 2200; and the other through Router Three, with a minimum bandwidth of 128 and a delay of 1200. Router One chooses the path with the lowest metric. Let us compute the metrics. EIGRP calculates the total metric by scaling the bandwidth and delay metrics. EIGRP uses the following formula to scale the bandwidth: • bandwidth = (10000000/bandwidth(i)) * 256 where bandwidth(i) is the least bandwidth of all outgoing interfaces on the route to the destination network represented in kilobits. EIGRP uses the following formula to scale the delay:
  • 24. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY • delay = delay(i) * 256 where delay(i) is the sum of the delays configured on the interfaces, on the route to the destination network, in tens of microseconds. The delay as shown in the show ip eigrp topology or show interface commands is in microseconds, so you must divide by 10 before you use it in this formula. Throughout this paper, we use delay as it is configured and shown on the interface. EIGRP uses these scaled values to determine the total metric to the network: • metric = ([K1 * bandwidth + (K2 * bandwidth) / (256 - load) + K3 * delay] * [K5 / (reliability + K4)]) * 256 Note: These K values should be used after careful planning. Mismatched K values prevent a neighbor relationship from being built, which can cause your network to fail to converge. Note: If K5 = 0, the formula reduces to Metric = ([k1 * bandwidth + (k2 * bandwidth)/(256 - load) + k3 * delay]) * 256. The default values for K are: • K1 = 1 • K2 = 0 • K3 = 1 • K4 = 0 • K5 = 0 For default behavior, you can simplify the formula as follows: metric = bandwidth + delay In this example, the total cost through Router Four is: minimum bandwidth = 56k total delay = 100 + 100 + 2000 = 2200 [(10000000/56) + 2200] x 256 = (178571 + 2200) x 256 = 180771 x 256 = 46277376 And the total cost through Router Three is: minimum bandwidth = 128k total delay = 100 + 100 + 1000 = 1200 [(10000000/128) + 1200] x 256 = (78125 + 1200) x 256 = 79325 x 256 = 20307200 So, to reach Network A, Router One chooses the route through Router Three. EIGRP Tables:
  • 25. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY EIGRP maintains three tables. 1) Neighbor Table, 2) Topology Table and 3) Routing Table. Neighbor Table: Neighbor table includes all neighbors that is directly connected to router using EIGRP. In simple words, next hop router and the interfaces. Topology Table: EIGRP uses this table to store all routes, which it learned from neighbors. It contains a list of all destinations and routes advertised by neighboring routers. The EIGRP Topology table contains everything that EIGRP has learned. Routing Table: EIGRP stores single best (Successor) route for each destination in this table. Router uses this table to forward the packet. There is a separate routing table for each routed protocol. EIGRP Neighbor Table Explanation: H (Handle) Lists the neighbors in the order this router was learned Address The IP address of the neighbors Interface The interface of the local router on which this Hello packet was received Hold The amount of time left before neighbor is considered in “down” status Uptime How long the neighbor has been up SRTT (Smooth Round Trip Time): The number of milliseconds it takes to send an EIGRP packet to neighbor and receive an acknowledgment packet back RTO (Retransmission Timeout): if a multicast has failed, then a unicast is sent to that particular router, the RTO is the time in milliseconds that the router waits for an acknowledgement of that unicast. Q Cnt (Q Count): Shows the number of queued EIGRP packets. It is usually 0 Seq Num The sequence number of the last update EIGRP packet received EIGRP Topology Table Explanation:
  • 26. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY AS Autonomous System number 1 Codes Passive is good and Active is bad Sia Status (Stuck in Active) EIGRP has not received a reply to a query packet from one of the neighbors within the allowed time about 3 minutes. 1 Successors The best path In this case only one way to get to the destination FD is 2816 Feasible Distance: Total distance to get to the destination 28416/28160 First, one is Feasible Distance. The second Value is Advertised Distance EIGRP Routing Table Explanation: D Shows this is an EIGRP learnt route 192.168.3.0/24 Destination learn network and 24 is subnet mask. 90 90, is the Administrative Distance of EIGRP. 3072 This is the metric, Total distance to get to the destination 192.168.2.3 The neighbor that advertised the route. 00:49:16 Time since the route was learnt. GigabitE1/0 The outbound interface going towards the destination. EIGRP Metric:
  • 27. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY EIGRP uses metric to select the best route from all available routes for destination. Metric has five components.1.Bandwidth, 2.Load, 3.Delay, 4.Reliability and 5.MTU. From these only bandwidth and delay are by default enabled. K Value Component Description K1 Bandwidth Lowest bandwidth of route K2 Load Worst load on route based on packet rate K3 Delay Cumulative interface delay of route K4 Reliability Worst reliability of route based on keep alive K5 MTU Smallest MTU in path [Not used in route calculation] Path Metric Calculation: EIGRP Metric = 256*((10^7 / min. BW) + Delay) =256*((10000000/Minimum BW) + Sum of Interface Delays/10) Where Bandwidth = 10000000/bandwidth (i), where bandwidth (i) is the least bandwidth of all outgoing interfaces on the route to the destination network represented in kilobits. Delay = delay (i) where delay (i) is the sum of the delays configured on the interfaces, on the route to the destination network, in tens of microseconds. EIGRP Metric = 256*((10000000/Minimum BW) + Sum of Interface Delays/10) EIGRP Metric = 256*(10000000/100000) + 100+5000/10)
  • 28. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY EIGRP Metric = 256*(100) +5100/10) EIGRP Metric = 256*(100) +510) EIGRP Metric = 256*610 EIGRP Metric = 156160 Path Selection Optimization: Change EIGRP metrics by manipulating the bandwidth and/or delay values. Changing the bandwidth value is not recommended because that value is used for many other reasons and features in the router. Also, configure the K-Values to influence the EIGRP metric calculation. Commands Description R6#show ip route eigrp D 7.7.7.7 [90/156160] via 192.168.76.7, F0/1 [90/156160] via 192.168.67.7, F0/0 First verify both routes in routing table Equal path load balancing R6(config)#interface FastEthernet 0/0 R6(config-if)# bandwidth 10000 Enter interface mode Decrease the bandwidth to 10000 R6#show ip route eigrp Verify again only one path now R6(config)#interface FastEthernet 0/0 R6(config-if)#no bandwidth 10000 Enter interface mode Make the default bandwidth again R6#show ip route eigrp Check again both path back R6(config)#interface FastEthernet 0/0 R6(config-if)#delay 200 Enter interface mode Increase the delay this time R6#show ip route eigrp Verify again only one path now R6(config)#interface FastEthernet 0/0 R6(config-if)#no delay 200 Enter interface mode Make the default delay again R6#show ip route eigrp D 7.7.7.7 [90/156160] via 192.168.76.7, F0/1 [90/156160] via 192.168.67.7, F0/0 First verify both routes in routing table Equal path load balancing R6(config)#router eigrp 1 R6(config-router)#metric weights 0 1 1 1 1 1 Enter EIGRP mode Change k Values R7(config)#router eigrp 1 R7(config-router)#metric weights 0 1 1 1 1 1 Enter EIGRP mode Change K values R6#show ip route eigrp D 7.7.7.7 [90/610] Verify the eigrp routes different FD R6(config)#interface FastEthernet 0/0 R6(config-if)# bandwidth 10000 R6(config-if)#delay 200 Enter interface mode Decrease the bandwidth to 10000 Increase the delay Change metric
  • 29. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY EIGRP Packet Types: EIGRP uses five packet types in communication with its neighbors. The packet types are below. Packet Description Hello Used to identify neighbors. They are sent as periodic multicasts. Update Used to advertise routes, only sent as multicasts when something is changed. Ack Acknowledges receipt of an update. Query Used to find alternate paths when all paths to a destination have failed. Reply Used to response to query packets about routing information. Hello: Hello packets are used for neighbor discovery. As soon as the hello packets send and receive EIGRP routers will try to form the neighbor adjacency. They are multicast to 224.0.0.10. By default, EIGRP sends hello packets every 5 seconds. Update: Update packets contain routing information for destinations. EIGRP unicasts update packets to newly discovered neighbors; otherwise, it multicasts update packets to 224.0.0.10 when a link or metric changes. Update packets are acknowledged to ensure reliable transmission. Query: EIGRP sends query packets used to find alternate paths when all paths to a destination have failed. Query packets are always multicast. Reply: EIGRP sends reply packets to respond to query packets. Reply packets provide a feasible successor to the sender of the query. Reply packets are unicast to the sender of the query packet. ACK: ACK packets are used to acknowledge the receipt of update, query and replay packets. ACK packets are sent by using unicast. EIGRP Terminologies: Advertised Distance (AD)/Reported Distance (RD): The cost from the neighbor to the destination. Feasible Distance (FD): The total cost to reach a destination network. Successor: The primary route used to reach a destination. The successor route is kept in the routing table. Notice that successor is the best route to that destination. Feasible Successor: The backup route. To be a feasible successor, the route must have an AD less than the FD of the current successor route.
  • 30. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Feasible Distance, Reported Distance, and Feasible Successor Feasible distance is the best metric along a path to a destination network, including the metric to the neighbor advertising that path. Reported distance is the total metric along a path to a destination network as advertised by an upstream neighbor. A feasible successor is a path whose reported distance is less than the feasible distance (current best path). Router One sees that it has two routes to Network A: one through Router Three and another through Router Four. • The route through Router Four has a cost of 46277376 and a reported distance of 307200. • The route through Router Three has a cost of 20307200 and a reported distance of 307200. EIGRP Summarization: Auto-Summarization:
  • 31. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Auto Summarization is a feature, which allows Routing Protocols to summarize its routes to their classful networks automatically. By default, EIGRP has auto summary feature enabled. Because of this, routes are summarized to classful address at network boundaries in the routing updates. The Auto-Summarization can be disabled with a command of no auto-summary from the router prompt. Commands Description R1(config)#router eigrp 1 R1(config-router)#network 0.0.0.0 R1(config-router)#no auto-summary Enter EIGRP mode Advertise all networks Disable auto summary feature R2(config)#router eigrp 1 R2(config-router)#network 0.0.0.0 R2(config-router)#no auto-summary Enter EIGRP mode Advertise all network Disable auto summary feature R1#show ip route eigrp View routing table for EIGRP all four networks of 172 present in table R2(config)#router eigrp 1 R2(config-router)#auto-summary Enter EIGRP mode Enable auto summary feature R1#show ip route eigrp Again, view routing table for EIGRP Only summary route 172.16.0.0/16 Manual Summarization: The manual summarization is a process of creating a summary route that will be used to represent multiple routes and can be used to reduce the sizes of routing tables in a network. Manual summarization is configured differently on different protocols. Advantages of Summarization: Saves Memory Routing tables will be smaller which reduces memory requirements. Saves Bandwidth There are less routes to advertise so we save some bandwidth. Saves CPU Cycles Less packets to process and smaller routing tables to work on. Stability Prevents routing table instability due to flapping networks. EIGRP Summarization: By default, EIGRP has auto summary feature enabled. Because of this, EIGRP automatically summarizes networks at the classful boundary. One of the advantages of EIGRP over other routing protocol like, OSPF is that manual summarization can be done on any router within a network. A single route can be used to represent multiple routes, which reduces the size of routing tables in a network. Manual summarization is configured on a per-interface basis on EIGRP. The syntax of the command is (config-if) ip summary-address eigrp ASN SUMMARY_ADDRESS SUBNET_MASK
  • 32. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Commands Description R1(config)#router eigrp 1 R1(config-router)#network 0.0.0.0 R1(config-router)#no auto-summary Enter EIGRP mode Advertise all networks Disable auto summary feature R2(config)#router eigrp 1 R2(config-router)#network 1.0.0.0 R2(config-router)#no auto-summary Enter EIGRP mode Advertise only 1 network Disable auto summary feature R2#show ip route eigrp View routing table for EIGRP all four networks of 192.168. present R1(config)#interface f0/0 R1(config-if)#ip summary-address eigrp 1 192.168.0.0 255.255.248.0 Enter interface mode facing R2 Enter summary route to send R2#show ip route eigrp Check again routing table only summary route 192.168.0.0/21 only R1#show ip route eigrp Checking summary route in R1 192.168.0.0/21 is a summary, Null0 R1(config)#interface f0/0 R1(config-if)#no ip summary-address eigrp 1 192.168.0.0 255.255.248.0 255 R1(config-if)#ip summary-address eigrp 1 192.168.0.0 255.255.248.0 255 Enter interface mode of R1 Remove the summary route configure before Set summary route again with AD 255 to remove Null0 in R1 table EIGRP Load Balancing: Load balancing is a router's capability to distribute traffic over all of its network ports that are the same metric from the destination address. By default, the Cisco IOS balances between a maximum of four equal-cost paths for IP. EIGRP Equal Cost: By default, EIGRP supports equal-cost load balancing over four links. Equal-cost means that multiple routes must have the same metric to reach a destination, so that router can choose to load balance across equal cost links. Using maximum-path router configuration command, to request up to 16 equally good routes to be kept in the routing table. Set maximum-path to 1 to disable load balancing. Commands Description (config)#router eigrp 1 (config-router)#no auto-summary (config-router)#network 0.0.0.0 Apply this on both R6 and R7 Disable auto summary Enable EIGRP for all networks R6#show ip route eigrp Check routing table for EIGRP equal 2 paths R6#show ip eigrp topology Check EIGRP topology table for all paths
  • 33. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY R6(config)#router eigrp 1 R6(config‐router)# maximum-paths 1 Enters EIGRP routing mode To disable equal cost load balancing set 1 R6#show ip route eigrp Check routing table for EIGRP now 1 path R6(config)#router eigrp 1 R6(config‐router)# maximum-paths 4 Enters EIGRP routing mode Enable back equal cost load balancing EIGRP Unequal Cost: EIGRP can also balance traffic across multiple routes that have different metrics; this is called Unequal-Cost Load Balancing. The degree to which EIGRP performs load balancing is controlled by the variance multiplier router configuration command. The multiplier is a variance value, between 1 and 128, used for load balancing. The default is 1, which means equal-cost load balancing. The multiplier defines the range of metric values that are accepted for load balancing. Commands Description (config)#router eigrp 1 (config-router)#no auto-summary (config-router)#network 0.0.0.0 Apply this on all R1,R2,R3,R4 & R5 Disable auto summary Enable EIGRP for all networks R1#show ip route eigrp Check routing table for EIGRP one path only R1#show ip eigrp topology Check EIGRP topology table for all paths 412160 / 158720 = 2.6 Need variance 3 to install Ethernet1/0 path R1(config)#router eigrp 1 R1(config‐router)#variance 3 Enters EIGRP routing mode Set variance 3 to install other route R1#show ip route eigrp Check routing table for EIGRP two path now 2300416 /158720 = 14.5 Need variance 15 to install S2/0 path R1(config)#router eigrp 1 R1(config‐router)#variance 15 Enters EIGRP routing mode Set variance 15 to install other route
  • 34. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY R1#show ip route eigrp Check routing table for EIGRP three path now R1#show ip route 5.5.5.5 EIGRP is sharing traffic f0/1 240, S2/0 17 and E1/0 92 proportion R1#traceroute 5.5.5.5 Apply many time to check path changing EIGRP Basic Configuration: Let us do basic configuration of EIGRP protocols on cisco routers. Wildcard mask is 32 bits long. It is inverted subnet masks, with the zero bits indicating that the corresponding bit position must match the same bit position in the IP address. The one bits indicate that the corresponding bit position does not have to match the bit position in the IP address. To form a neighborship, EIGRP has these requirements: 1) Interface’s primary IP addresses must be on the same subnet.2) Connected interface must not be passive.3) Routers must use the same AS number.4) Must pass authentication. 5) K-values must match. Commands Description R1(config)#router eigrp 1 R1(config-router)#network 192.168.12.0 R1(config-router)#network 1.1.1.0 Enter EIGRP mode Advertise 192.168.12.0 network Advertise 1.1.1.0 network R1#show run | sec eigrp router eigrp 1 network 1.0.0.0 network 192.168.12.0 To verify by running configuration EIGRP with AS 1 Its convert 1.1.1.0 network class A R1(config)#router eigrp 1 R1(config-router)#no network 1.1.1.0 R1(config-router)#network 1.1.1.0 0.0.0.255 Enter EIGRP mode Remove network Advertise again with wild card R1#show run | sec eigrp router eigrp 1 network 1.1.1.0 0.0.0.255 Verify by running configuration EIGRP with AS 1 This time it’s not converted R1(config)#router eigrp 1 R1(config-router)#no network 1.1.1.0 0.0.0.255 R1(config-router)#network 1.1.1.0 255.255.255.0 Enter EIGRP mode Remove network With subnetmask not with wildcard R1#show run | sec eigrp router eigrp 1 network 1.1.1.0 0.0.0.255 Verify by running configuration EIGRP with AS 1 IOS converted subnetmask to wildcard R1(config)#router eigrp 1 R1(config-router)#network 0.0.0.0 Enter EIGRP mode with AS 1 Advertise all networks R2(config)#router eigrp 100 R2(config-router)#network 0.0.0.0 Enter EIGRP mode with AS 100 Advertise all networks, no neighbor adjacency because of different AS R1(config)#router eigrp 1 R1(config-router)#network 0.0.0.0 Enter EIGRP mode with AS 1 Advertise all networks
  • 35. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY R1(config-router)# metric weights tos 1 1 1 1 1 Changing Metric Weights Again no neighbor adjacency, K value mismatch R2(config)#router eigrp 1 R2(config-router)#network 0.0.0.0 Enter EIGRP mode with AS 1 Advertise all networks EIGRP Commands: Commands Description R1(config-router)#auto-summary Enable auto summarization feature R1(config-router)#no auto-summary Disable auto summarization feature R1(config-router)# metric weights tos k1 k2 k3 k4 k5 Adjusting the EIGRP Metric Weights R1(config-router)# metric maximum-hops <1- 255> Advertise greater than hops R1(config-router)#maximum-paths <1-32> Set the maximum equal paths R1(config-router)#variance <1-128> Control unequal load balancing R1(config-if)# ip hello-interval eigrp <asn> <interval> Changing EIGRP hello interval R1(config-if)# ip hold-time eigrp <asn> <interval> Changing EIGRP hold time interval R1#show ip eigrp neighbors Display the neighbor table in brief R1#show ip eigrp neighbors detail Display the neighbor table in detail. To verify the neighbor is configured as stub router R1#show ip eigrp interfaces Display info about all EIGRP interfaces R1#show ip eigrp interfaces s0/0 Display info EIGRP interface R1#show ip eigrp interfaces 20 Display info EIGRP interfaces AS 20 R1#show ip eigrp topology Displays the topology table R1#show ip eigrp traffic Displays EIGEP different packets R1#show ip route eigrp Display EIGRP route from routing table R1#debug eigrp fsm Displays the events related to FSM R1#debug eigrp packet Displays EIGRP event packets R1#no debug eigrp fsm Turn off FSM debug R1#no debug eigrp packet Turn off EIGRP packets debug
  • 36. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY OSPF (OPEN SHORTEST PATH FIRST) ▪ No hop-count limitation ▪ Rapid convergence ▪ Classless (allows the use of VLSM) ▪ Password authentication ▪ Advanced path selection capabilities ▪ Tagging of external routes ▪ Better use of bandwidth via multicasts and periodic routing updates ▪ Allows networks to be divided into smaller logical areas for efficiency ▪ Uses multicast addresses for efficient and reliable routing update process ▪ Uses equal-cost load balancing over multiple paths for efficient bandwidth usage ▪ Supports MD5 authentication for secure route exchange ▪ No split horizon issues ▪ OSPF protocols is the Link-State dynamic routing protocol. ▪ OSPF protocols uses the Shortest Path First (SPF) algorithm. ▪ OSPF protocols uses IP protocol type 89 (not TCP or UDP). ▪ OSPF External and Internal Administrative Distance is 110. ▪ OSPF is a classless Routing protocol and OSPF metric is Cost. ▪ OSPF use multicast address 224.0.0.5 to send the hello packet. ▪ OSPF use multicast address 224.0.0.6 for all designated routers. ▪ OSPF default Hello time is 10 seconds and dead time is 40 seconds. ▪ OSPF protocols supports both the VLSM and route summarization. ▪ OSPF use wildcard mask, which is the reciprocal of subnet mask. ▪ OSPF protocols supports both MD5 and clear text authentication. ▪ OSPF protocols supports the summarization at ABRs router only. ▪ OSPF are requires more memory and CPU processing to run. ▪ OSPF work on area, Area 0 is the backbone of OSPF technology. ▪ OSPF have Neighbor table, Topology table and Routing table. ▪ OSPF packets are only sends to the neighbor of own Area. ▪ OSPF protocols supports both IPv4 and IPv6 routed protocols. ▪ OSPF load balancing with equal cost routes for same destination. ▪ OSPF protocols supports trigger updates for fast convergence. ▪ OSPF sends update with a sequence number of 0x80000001. ▪ The sequence number ends with 0x7FFFFFFF and start again. ▪ The sequence number will increment by one in every updates. ▪ OSPF protocol is more complex to setup and hard to troubleshoot.
  • 37. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY OSPF PACKET TYPES Type Packet Name Functional Overview 1 Hello These packets are for discovering and maintaining neighbors. Packets are sent out periodically on all OSPF interfaces to discover new neighbors while ensuring that other adjacent neighbors are still online. 2 Database description (DBD) or (DDP) These packets are for summarizing database contents. Packets are exchanged when an OSPF adjacency is first being formed. These packets are used to describe the contents of the LSDB. 3 Link-state request (LSR) These packets are for database downloads. When a router thinks that part of its LSDB is stale, it may request a portion of a neighbor’s database by using this packet type. 4 Link-state update (LSU) These packets are for database updates. This is an explicit LSA for a specific network link and normally is sent in direct response to an LSR. 5 Link-state ack These packets are for flooding acknowledgments. These packets are sent in response to the flooding of LSAs, thus making flooding a reliable transport feature. OSPF HELLO PACKET COMPONENTS OSPF hello packets are responsible for discovering and maintaining neighbors. In most instances, a router sends hello packets to the AllSPFRouters address (224.0.0.5). Data Field Description Router ID (RID) A unique 32-bit ID within an OSPF domain. Authentication options A field that allows secure communication between OSPF routers to prevent malicious activity. Options are none, clear text, or Message Digest 5 (MD5) authentication. Area ID The OSPF area that the OSPF interface belongs to. It is a 32-bit number that can be written in dotted-decimal format (0.0.1.0) or decimal (256). Interface address mask The network mask for the primary IP address for the interface out which the hello is sent. Interface priority The router interface priority for DR elections. Hello interval The time span, in seconds, that a router sends out hello packets on the interface. Dead interval The time span, in seconds, that a router waits to hear a hello from a neighbor router before it declares that router down. Designated router and backup designated router The IP address of the DR and backup DR (BDR) for the network link. Active neighbor A list of OSPF neighbors seen on the network segment. A router must have received a hello from the neighbor within the dead interval.
  • 38. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY ROUTER ID The OSPF router ID (RID) is a 32-bit number that uniquely identifies an OSPF router. In some OSPF output commands, neighbor ID refers to the RID; the terms are synonymous. The RID must be unique for each OSPF process in an OSPF domain and must be unique between OSPF processes on a router. 3-Ways to Configure Router-ID: 1. Manually Set. Example CLI command: router-id router-id 2. Highest ‘up’ Loopback interface IP address 3. Highest ‘up’ Physical Interface IP address The command clear ip ospf process restarts the OSPF process on a router so that OSPF can use the new RID. OSPF SEVEN STATES NEIGHBORSHIP An OSPF neighbor is a router that shares a common OSPF-enabled network link. OSPF routers discover other neighbors via the OSPF hello packets. An adjacent OSPF neighbor is an OSPF neighbor that shares a synchronized OSPF database between the two neighbors. Each OSPF process maintains a table for adjacent OSPF neighbors and the state of each router. OSPF Neighbor States State Description 1) Down This is the initial state of a neighbor relationship. It indicates that the router has not received any OSPF hello packets. 2) Init This state indicates that a hello packet has been received from another router, but bidirectional communication has not been established. 3) 2-Way Bidirectional communication has been established. If a DR or BDR is needed, the election occurs during this state. 4) ExStart This is the first state in forming an adjacency. Routers identify which router will be the master or slave for the LSDB synchronization. 5) Exchange During this state, routers are exchanging link states by using DBD packets. 6) Loading LSR packets are sent to the neighbor, asking for the more recent LSAs that have been discovered (but not received) in the Exchange state. 7) Full Neighboring routers are fully adjacent.
  • 39. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DESIGNATED ROUTER AND BACKUP DESIGNATED ROUTER Multi-access networks such as Ethernet (LANs) and Frame Relay allow more than two routers to exist on a network segment. Such a setup could cause scalability problems with OSPF as the number of routers on a segment increases. Additional routers flood more LSAs on the segment, and OSPF traffic becomes excessive as OSPF neighbor adjacencies increase. If four routers share the same multi-access network, six OSPF adjacencies form, along with six occurrences of database flooding on a network. The number of edges formula, n(n – 1) / 2, where n represents the number of routers, is used to identify the number of sessions in a full mesh topology. If 5 routers were present on a segment, 5(5 – 1) / 2 = 10, then 10 OSPF adjacencies would exist for that segment. Continuing the logic, adding 1 additional router would makes 15 OSPF adjacencies on a network segment. Having so many adjacencies per segment consumes more bandwidth, more CPU processing, and more memory to maintain each of the neighbor states.
  • 40. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DESINGATED ROUTER: OSPF overcomes this inefficiency by creating a pseudonode (virtual router) to manage the adjacency state with all the other routers on that broadcast network segment. A router on the broadcast segment, known as the designated router (DR), assumes the role of the pseudonode. The DR reduces the number of OSPF adjacencies on a multi-access network segment because routers only form a full OSPF adjacency with the DR and not each other. The DR is responsible for flooding updates to all OSPF routers on that segment as the updates occur. BACKUP DESGINATED ROUTER: If the DR were to fail, OSPF would need to form new adjacencies, invoking all new LSAs, and could potentially cause a temporary loss of routes. In the event of DR failure, a backup designated router (BDR) becomes the new DR; then an election occurs to replace the BDR. To minimize transition time, the BDR also forms full OSPF adjacencies with all OSPF routers on that segment. The DR/BDR process distributes LSAs in the following manner: 1. All OSPF routers (DR, BDR, and DROTHER) on a segment form full OSPF adjacencies with the DR and BDR. 2. As an OSPF router learns of a new route, it sends the updated LSA to the AllDRouters (224.0.0.6) address, which only the DR and BDR receive and process, as illustrated in step 1.
  • 41. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY The DR sends a unicast acknowledgment to the router that sent the initial LSA update, as illustrated in step 2. The DR floods the LSA to all the routers on the segment via the AllSPFRouters (224.0.0.5) address, as shown in step 3. OSPF CONFIGURATION The configuration process for OSPF resides mostly under the OSPF process, but some OSPF options go directly on the interface configuration submode. The command router ospf process-id defines and initializes the OSPF process. The OSPF process ID is locally significant but is generally kept the same for operational consistency. OSPF is enabled on an interface using two methods: • An OSPF network statement • Interface-specific configuration OSPF Network Statement The OSPF network statement identifies the interfaces that the OSPF process will use and the area that those interfaces participate in. The network statements match against the primary IPv4 address and netmask associated with an interface. A common misconception is that the network statement advertises the networks into OSPF; in reality, though, the network statement is selecting and enabling OSPF on the interface. The interface is then advertised in OSPF through the LSA. The network statement uses a wildcard mask, which allows the configuration to be as specific or vague as necessary. The selection of interfaces within the OSPF process is accomplished by using the command network ip-address wildcard-mask area area-id. The concept is similar to the configuration of Enhanced Interior Gateway Routing Protocol (EIGRP), except that the OSPF area is specified. If the IP address for an interface matches two network statements with different areas, the most explicit network statement (that is, the longest match) preempts the other network statements for area allocation.
  • 42. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY The connected network for the OSPF-enabled interface is added to the OSPF LSDB under the corresponding OSPF area in which the interface participates. Secondary connected networks are added to the LSDB only if the secondary IP address matches a network statement associated with the same area. router ospf 1 network 10.0.0.10 0.0.0.0 area 0 network 10.0.10.10 0.0.0.0 area 0 network 192.0.0.10 0.0.0.0 area 0 network 192.10.0.10 0.0.0.0 area 0 Interface-Specific Configuration The second method for enabling OSPF on an interface for IOS is to configure it specifically on an interface with the command ip ospf process-id area area-id [secondaries none]. This method also adds secondary connected networks to the LSDB unless the secondaries none option is used. This method provides explicit control for enabling OSPF; however, the configuration is not centralized and increases in complexity as the number of interfaces on the routers increases. If a hybrid configuration exists on a router, interface-specific settings take precedence over the network statement with the assignment of the areas. interface GigabitEthernet 0/0 ip address 10.0.0.1 255.255.255.0 ip ospf 1 area PASSIVE INTERFACES Enabling an interface with OSPF is the quickest way to advertise a network segment to other OSPF routers. However, it might be easy for someone to plug in an unauthorized OSPF router on an OSPF-enabled network segment and introduce false routes, thus causing havoc in the network. Making the network interface passive still adds the network segment into the LSDB but prohibits the interface from forming OSPF adjacencies. A passive interface does not send out OSPF hellos and does not process any received OSPF packets. The command passive interface-id under the OSPF process makes the interface passive, and the command passive interface default makes all interfaces passive. To allow for an interface to process OSPF packets, the command no passive interface-id is used.
  • 43. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY REQUIREMENTS FOR NEIGHBOR ADJACENCY The following list of requirements must be met for an OSPF neighborship to be formed: • RIDs must be unique between the two devices. They should be unique for the entire OSPF routing domain to prevent errors. • The interfaces must share a common subnet. OSPF uses the interface’s primary IP address when sending out OSPF hellos. The network mask (netmask) in the hello packet is used to extract the network ID of the hello packet. • The MTUs (maximum transmission units) on the interfaces must match. The OSPF protocol does not support fragmentation, so the MTUs on the interfaces should match. • The area ID must match for the segment. • The DR enablement must match for the segment. • OSPF hello and dead timers must match for the segment. • Authentication type and credentials (if any) must match for the segment. • Area type flags must match for the segment (for example, Stub, NSSA). (These are not discussed in this book.) Example: Configuring OSPF ! OSPF is enabled with a single command, and the passive interface is ! set individually R1# configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)# interface Loopback0 R1(config-if)# ip address 192.168.1.1 255.255.255.255 R1(config-if)# interface GigabitEthernet0/1 R1(config-if)# ip address 10.123.4.1 255.255.255.0 R1(config-if)# interface GigabitEthernet0/2 R1(config-if)# ip address 10.1.1.1 255.255.255.0 R1(config-if)# R1(config-if)# router ospf 1 R1(config-router)# router-id 192.168.1.1 R1(config-router)# passive-interface GigabitEthernet0/2 R1(config-router)# network 0.0.0.0 255.255.255.255 area 0 A. Confirmation of Interfaces It is a good practice to verify that the correct interfaces are running OSPF after making changes to the OSPF configuration. The command show ip ospf interface [brief | interface-id] displays the OSPF-enabled interfaces. R1# show ip ospf interface ! Output omitted for brevity Loopback0 is up, line protocol is up Internet Address 192.168.1.1/32, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.1, Network Type LOOPBACK, Cost: 1
  • 44. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Topology-MTID Cost Disabled Shutdown Topology Name 0 1 no no Base Loopback interface is treated as a stub Host GigabitEthernet0/1 is up, line protocol is up Internet Address 10.123.4.1/24, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.1, Network Type BROADCAST, Cost: 1 Topology-MTID Cost Disabled Shutdown Topology Name 0 1 no no Bas Transmit Delay is 1 sec, State DROTHER, Priority 1 Designated Router (ID) 192.168.4.4, Interface address 10.123.4.4 Backup Designated router (ID) 192.168.3.3, Interface address 10.123.4.3 Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 .. Neighbor Count is 3, Adjacent neighbor count is 2 Adjacent with neighbor 192.168.3.3 (Backup Designated Router) Adjacent with neighbor 192.168.4.4 (Designated Router) Suppress hello for 0 neighbor(s) R1# show ip ospf interface brief Interface PID Area IP Address/Mask Cost State Nbrs F/C Lo0 1 0 192.168.1.1/32 1 LOOP 0/0 Gi0/2 1 0 10.1.1.1/24 1 DR 0/0 Gi0/1 1 0 10.123.4.1/24 1 DROTH 2/3 OSPF Interface Columns Field Description Interface Interfaces with OSPF enabled PID The OSPF process ID associated with this interface Area The area that this interface is associated with IP Address/Mask The IP address and subnet mask for the interface Cost The cost metric assigned to an interface that is used to calculate a path metric State The current interface state, which could be DR, BDR, DROTHER, LOOP, or Down Nbrs F The number of neighbor OSPF routers for a segment that are fully adjacent Nbrs C The number of neighbor OSPF routers for a segment that have been detected and are in a 2-Way state The DROTHER is a router on the DR-enabled segment that is not the DR or the BDR; it is simply the other router. DROTHERs do not establish full adjacency with other DROTHERs. B. Verification of OSPF Neighbor Adjacencies The command show ip ospf neighbor [detail] provides the OSPF neighbor table. R1# show ip ospf neighbor
  • 45. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Neighbor ID Pri State Dead Time Address Interface 192.168.2.2 1 2WAY/DROTHER 00:00:37 10.123.4.2 GigabitEthernet0/1 192.168.3.3 1 FULL/BDR 00:00:35 10.123.4.3 GigabitEthernet0/1 192.168.4.4 1 FULL/DR 00:00:33 10.123.4.4 GigabitEthernet0/1 OSPF Neighbor State Fields Field Description Neighbor ID The router ID (RID) of the neighboring router. PRI The priority for the neighbor’s interface, which is used for DR/BDR elections. State The second field is the DR, BDR, or DROTHER role if the interface requires a DR. For non- DR network links, the second field shows just a hyphen (-). Dead Time The time left until the router is declared unreachable. Address The primary IP address for the OSPF neighbor. Interface The local interface to which the OSPF neighbor is attached. C. Verification of OSPF Routes The next step is to verify the OSPF routes installed in the IP routing table. OSPF routes that install into the Routing Information Base (RIB) are shown with the command show ip route ospf. R1# show ip route ospf ! Output omitted for brevity Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 7 subnets, 2 masks O 10.2.2.0/24 [110/2] via 10.123.4.2, 00:35:03, GigabitEthernet0/1 O 10.3.3.0/24 [110/2] via 10.123.4.3, 00:35:03, GigabitEthernet0/1 O 10.4.4.0/24 [110/2] via 10.123.4.4, 00:35:03, GigabitEthernet0/1 192.168.2.0/32 is subnetted, 1 subnets O 192.168.2.2 [110/2] via 10.123.4.2, 00:35:03, GigabitEthernet0/1 192.168.3.0/32 is subnetted, 1 subnets O 192.168.3.3 [110/2] via 10.123.4.3, 00:35:03, GigabitEthernet0/1 192.168.4.0/32 is subnetted, 1 subnets O 192.168.4.4 [110/2] via 10.123.4.4, 00:35:03, GigabitEthernet0/1
  • 46. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DAY#3 OSPF ADVANCE OSPF OSPF Networks Types 1. Broadcast - This type of Network is by default enabled on every Ethernet interfaces - Elects DR/BDR - Uses Multicast 224.0.0.5 - Allows more than 2 routers on a link - Timers: Hello = 10sec, Dead = 40sec 2. Point-to-Point - Default for Serial and Tunnel interfaces - Do not Elects DR/BDR - Uses Multicast 224.0.0.5 - Only 2 routers allowed on a link - Timers: Hello = 10sec, Dead = 40sec 3. Point-to-Multipoint Broadcast - Do not Elects DR/BDR - Multicast 224.0.0.5 - Allows more than 2 routers on a link - Timers: Hello = 30sec, Dead = 120sec - Automatic neighbor discovery so no need to configure OSPF neighbors yourself. - No DR/BDR election since OSPF sees the network as a collection of point-to-point links. - Only a single IP subnet is used in the topology below. - Make sure your frame-relay network is configured with the broadcast keyword.
  • 47. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 4. Point-to-Multipoint Non-Broadcast - Do not Elects DR/BDR - Uses Unicast (neighbor statements) - Allows more than 2 routers on a link - Timers: Hello = 30sec, Dead = 120sec - No Automatic neighbor discovery so you need to configure OSPF neighbors yourself! - No DR/BDR election since OSPF sees the network as a collection of point-to-point links. - Only a single IP subnet is used in the topology above. 5. Non-Broadcast - DR/BDR - Timers: Hello = 30sec, Dead = 120sec - Non-broadcast network type assume you are running a multi-access network. - Couple of key things to remember here: • Multi-access means we have to select a DR and BDR. • Non-broadcast means that OSPF expects us to configure neighbors ourselves 6. Loopback - Default enabled for loopback interfaces - When used in OSPF, /32 is considered always - To override this limitation, set network type to “point-to-point”
  • 48. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Types of OSPF LSAs Router LSA (Type 1) Originated from each router Flooded within same area Tells the area about all links participating in the OSPF process within that area Network LSA (Type 2) Originated by the DR If there is no DR, the Type 2 LSA wouldn’t be seen Network Summary LSA (Type 3) Originated by ABR router Carry the destination network prefixes from one area into another ASBR Summary (Type 4) Originated by an ASBR router Tells all the other areas about the ASBR Tell all the other areas “to get to this Router-ID(ASBR) go through Me(ABR)”
  • 49. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY External LSA (Type 5) Originated by an ASBR Flooded throughout OSPF domain, except Stubby areas Consist of Network prefix/subnet-mask of external network (ex. RIP, EIGRP..) NSSA External LSA (Type 7) Originated by an ASBR Exist only in Not-So-Stubby-Area (NSSA) Are Not flooded outside the area they were originated Example: Allows LSA Types: 1, 2, 3, 7 ( No External Type-5’s )
  • 50. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY OSPF AREAS TYPES ❖ Backbone area (area 0) ❖ Standard area (area 1 to area 255.255.255.255) ❖ Stub area (LSA TYPE 5) - - A stub area is an area in which you do not allow advertisements of external routes, reducing the size of the database. - Allows LSA Types: 1, 2, 3 & Summary default route (No External Type-5’s) - A default summary LSA, with a prefix of 0.0.0.0/0 is originated into the stub area by an ABR, so that devices in the area can forward all traffic for which a specific route is not known, via ABR. - A stub area disables advertisements of external routes. - Stub Configuration: router ospf 1 area 100 stub ❖ Totally stubby area: - Allows LSA Types: 1, 2, 7 & Summary Default Route - {No Type 5 and Type 3 LSA’s, NO ASBR} - Configurations: router ospf 1 area 100 stub no-summary ❖ Not-so-stubby area (NSSA) : The motivation behind NSSA is to allow OSPF Stub areas to carry External routes (routes learned using other routing protocols like RIP, EIGRP, BGP, etc). Stub areas are defined as areas that are not capable of importing routes external to OSPF. Allows LSA Types: 1, 2, 3, 7 (No External Type-5’s, ASBR allowed) - NSSA Configuration: router ospf 1 area 100 nssa
  • 51. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY NSSA {N-bit and E-bit} - Together, the N-bit (NSSA supported bit) and E-bit (External Routing Capability of the area) reflect an interface's external LSA flooding capability - When the peers exchange Hello messages, they check for the N-bit (should be set to 1) and E-bit (should be set to 0), along with Area ID. A mismatch in the Options field could result in failed adjacency. - The NSSA ABR (the routers connecting NSSA to backbone area 0) translates Type 7 LSA into Type 5 LSA, and flooded into the OSPF topology. NSSA Type 7/5 {P-bit} - Bit P—This bit is used in order to tell the NSSA ABR whether to translate type 7 into type 5. - No Type 7/5 translation means bit P = 0. - Type 7/5 translation means bit P = 1. - If bit P = 0, then the NSSA ABR must not translate this LSA into Type 5. This happens when NSSA ASBR is also an NSSA ABR. - If bit P = 1, then the NSSA ABR must translate this type 7 LSA into a type 5 LSA. If there are multiple NSSA ABRs, the one with highest router ID.
  • 52. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Area Restriction Normal None Stub No Type 5 AS-external LSA allowed Totally Stub No Type 3, 4 or 5 LSAs allowed except the default summary route NSSA No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse NSSA Totally Stub No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed
  • 53. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DAY#4 OSPF OSPF PATH SELECTION: 1. Intra-area 2. Interarea 3. External routes (which involves additional logic not covered in CCNP) 1. Intra-area Routes advertised via a type 1 LSA for an area are always preferred over type 3 LSAs. If multiple intra-area routes exist, the path with the lowest total path metric is installed in the OSPF Routing Information Base (RIB), which is then presented to the router’s global RIB. If there is a tie in metric, both routes install into the OSPF RIB. In below diagram, Best Route: R1–R3–R4 Not preferred: R1–R2–R4 (inter-area) MUMBAIR1#sh ip rout 3.3.3.3 Routing entry for 3.3.3.3/32 Known via "ospf 100", distance 110, metric 11, type intra area Last update from 192.168.23.12 on Ethernet0/0, 00:16:34 ago Routing Descriptor Blocks: * 192.168.23.12, from 3.3.3.3, 00:16:34 ago, via Ethernet0/0 Route metric is 11, traffic share count is 1
  • 54. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 2. Inter-area The next priority for selecting a path to a network is selection of the path with the lowest total path metric to the destination. If there is a tie in metric, both routes install into the OSPF RIB. All interarea paths for a route must go through Area 0 to be considered. In below diagram: R1 uses the path R1–R3–R5–R6 because its total path metric is 35 R1–R2–R4–R6 path NOT preferred, with a metric of 40 MUMBAIR1#sh ip rout 6.6.6.6 Routing entry for 6.6.6.6/32 Known via "ospf 100", distance 110, metric 21, type inter area Last update from 192.168.23.14 on Ethernet0/0, 00:15:23 ago Routing Descriptor Blocks: * 192.168.23.14, from 4.4.4.4, 00:15:23 ago, via Ethernet0/0 Route metric is 21, traffic share count is 1 Equal-Cost Multipathing If OSPF identifies multiple paths in the path selection algorithms, those routes are installed into the routing table as equal-cost multipathing (ECMP) routes. The default maximum number of ECMP paths is four paths. The default ECMP setting can be overwritten with the command maximum-paths maximum-paths under the OSPF process to modify the default setting.
  • 55. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY METRIC: (COST) Default cost of essential interfaces:
  • 56. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Solution: AUTO-COST REFERENCE-BANDWIDTH >router(config)# router ospf 1 auto-cost reference-bandwidth 1000 (equals to 1000 Mbps) New Reference BW = 10^8 X 10^2 = 10^10 OSPF METRIC (cost) = (New Reference BW / Interface BW) Example: ROUTER4(config)#int e0/1 ROUTER4(config-if)#ip ospf cost 1 AUTO-COST REFERENCE BANDWITH (Reference 10^10)
  • 57. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Summarization of Routes: Route scalability is a large factor for the IGP routing protocols used by service providers because there can be thousands of routers running in a network. Before Summarization: MUMBAIR6(config-if)#do sh ip rout | i 192. O IA 192.168.23.0/24 [110/20] via 10.100.100.1, 00:00:17, Ethernet0/0 192.168.24.0/32 is subnetted, 1 subnets O IA 192.168.24.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0 192.168.25.0/32 is subnetted, 1 subnets O IA 192.168.25.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0 192.168.26.0/32 is subnetted, 1 subnets O IA 192.168.26.1 [110/21] via 10.100.100.1, 00:00:17, Ethernet0/0 CONFIG: MUMBAIR2(config)# interface Loopback24 ip address 192.168.24.1 255.255.255.0 end interface Loopback25 ip address 192.168.25.1 255.255.255.0 end interface Loopback26 ip address 192.168.26.1 255.255.255.0 end MUMBAIR2(config)# router ospf 100 network 192.168.24.0 0.0.0.255 area 0 network 192.168.25.0 0.0.0.255 area 0 network 192.168.26.0 0.0.0.255 area 0 Summarization is enabled always on ABR only MUMBAIR4(config)# router ospf 1 area 0 range 192.168.0.0 255.255.0.0 cost 11 After Summarization: MUMBAIR6(config-if)#do sh ip rout | begin 192. O IA 192.168.0.0/16 [110/21] via 10.100.100.1, 00:01:14, Ethernet0/0
  • 58. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DAY#5 OSPF ROUTE FILTERING: Route filtering is a method for selectively identifying routes that are advertised or received from neighbor routers. Route filtering may be used to manipulate traffic flows, reduce memory utilization, or improve security. Filtering with Summarization One of the easiest methodologies for filtering routes is to use the not-advertise keyword during prefix summarization. Using this keyword prevents creation of any type 3 LSAs for any networks in that range, thus making the subordinate routes visible only within the area where the route originates. MUMBAIR4# configure terminal MUMBAIR4(config-router)# area 0 range 192.168.0.0 255.255.0.0 not-advertise RESULTS: MUMBAIR6#show ip route | i 192. No 192.x.x.x routes found Area Filtering Although filtering via summarization is very easy, it is limited in its ability. if the 172.16.1.0/24 network needs to be present in Area 0 but removed in Area 34, it is not possible to filter the route using summarization. R2 ip prefix-list PREFIX-FILTER seq 5 deny 172.16.1.0/24 ip prefix-list PREFIX-FILTER seq 10 permit 0.0.0.0/0 le 32 ! router ospf 1
  • 59. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY router-id 192.168.2.2 network 10.12.1.0 0.0.0.255 area 12 network 10.23.1.0 0.0.0.255 area 0 area 0 filter-list prefix PREFIX-FILTER in RESULT: R3# show ip route ospf | begin Gateway Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks O IA 10.12.1.0/24 [110/2] via 10.23.1.2, 00:17:39, GigabitEthernet0/1 172.16.0.0/24 is subnetted, 2 subnets O IA 172.16.2.0 [110/3] via 10.23.1.2, 00:16:30, GigabitEthernet0/1 O IA 172.16.3.0 [110/3] via 10.23.1.2, 00:16:30, GigabitEthernet0/1 MUMBAIR4(config)# ip prefix-list PREFIX-FILTER seq 5 deny 192.168.24.1/32 ip prefix-list PREFIX-FILTER seq 10 permit 192.168.0.0/16 router ospf 1 area 40 filter-list prefix PREFIX-FILTER in MUMBAIR6# sh ip rout | i 192.168.24. MUMBAIR6# -> NO ROUTES FOUND FOR 192.168.24. Local OSPF Filtering In some scenarios, routes need to be removed only on specific routers in an area. OSPF is a link-state protocol that requires all routers in the same area to maintain an identical copy of the LSDB for that area. A route can exist in the OSPF LSDB, but it could be prevented from being installed in the local RIB. This is accomplished by using a Distribute List. MUMBAIR4(config)# MUMBAIR4(config)#ip access-list standard ACL-OSPF MUMBAIR4(config-std-nacl)#10 deny 192.168.24.0 0.0.0.255 MUMBAIR4(config-std-nacl)#20 permit any router ospf 1 distribute-list ACL-OSPF in MUMBAIR6# sh ip rout | i 192.168.24 192.168.24.0/32 is subnetted, 1 subnets O IA 192.168.24.1 [110/21] via 10.100.100.1, 00:09:02, Ethernet0/0 MUMBAIR6# Route will be present but no reachability MUMBAIR6#ping 192.168.24.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.24.1, timeout is 2 seconds: UUUUU
  • 60. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY DEFAULT ROUTE ORIGINATE: A common situation is where you have some internet-facing routers running BGP with some ISP, probably receiving full routes, and you want to send a default route to the internal routers, so they will use the "nearest" router (in terms of metric) to send traffic destined outside the AS. To generate a default external route into an Open Shortest Path First (OSPF) routing domain. The topology is something like this: R1(config)#router ospf 1 R1(config-router)#default-information originate ? If you use the default-information originate you can advertise a default route in OSPF. OSPF won’t advertise a default route if you don’t already have it in your routing table. If you add the always keyword it will advertise the default route even if you don’t have it in the routing table. Once you have advertised the default route it will look like this on other routers:
  • 61. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY MUMBAIR6#show ip ospf database | begin Type-5 Type-5 AS External Link States Link ID ADV Router Age Seq# Checksum Tag 0.0.0.0 172.16.3.1 59 0x80000001 0x008D64 1 MUMBAIR6#show ip route ospf O*E2 0.0.0.0/0 [110/1] via 192.168.12.1, 00:00:24, FastEthernet0/0 EXAMPLE: MUMBAIR6 hostname MUMBAIR6 ! interface FastEthernet0/1 ip address 192.168.12.1 255.255.255.0 ! router ospf 1 network 192.168.12.0 default-information originate always ! end VIRTUAL LINKS: All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non- backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. router ospf 1 area 1 virtual-link 3.3.3.3 router ospf 1 area 1 virtual-link 1.1.1.1 show ip ospf virtual-links Router3.3.3.3#show ip ospf neighbor
  • 62. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY Neighbor ID Pri State Dead Time Address Interface 2.2.2.2 1 FULL/ - 00:00:38 6.0.0.2 ATM2/0.20 Router3.3.3.3#show ip ospf virtual-links Virtual Link OSPF_VL3 to router 1.1.1.1 is up Run as demand circuit DoNotAge LSA allowed. Transit area 1, via interface ATM2/0.20, Cost of using 65 Transmit Delay is 1 sec, State POINT_TO_POINT, Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:01 Adjacency State FULL (Hello suppressed) Index 1/2, retransmission queue length 0, number of retransmission 0 First 0x0(0)/0x0(0) Next 0x0(0)/0x0(0) Last retransmission scan length is 0, maximum is 0 Last retransmission scan time is 0 msec, maximum is 0 msec Notice that adjacencies over virtual links are not displayed in the show ip ospf neighbor command output. The only way to see them is to look at the router LSA and observe debug commands as the adjacency comes up, or issue the show ip ospf virtual-links command. ======OSPF TOPIC ENDS HERE======== OSPF QUIZ# 1. OSPF uses the protocol number ___________ for its inter-router communication. 87 88 89 90 2. OSPF uses ___________ packet types for inter-router communication. three four five
  • 63. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY six seven 3. What destination addresses does OSPF use, when feasible? (Choose two.) IP address 224.0.0.5 IP address 224.0.0.10 IP address 224.0.0.8 MAC address 01:00:5E:00:00:05 MAC address 01:00:5E:00:00:0A 4. True or false: OSPF is only enabled on a router interface by using the command network ip- address wildcard-mask area area-id under the OSPF router process. True False 5. True or false: The OSPF process ID must match for routers to establish a neighbor adjacency. True False 6. True or false: A default route advertised with the command default information-originate in OSPF will always appear as an OSPF inter-area route. True False 7. True or false: The router with the highest IP address is the designated router when using a serial point-to-point link. True False 8. OSPF automatically assigns a link cost to an interface based on a reference bandwidth of ___________. 100 Mbps 1 Gbps 10 Gbps
  • 64. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY 40 Gbps 9. What command is configured to prevent a router from becoming the designated router for a network segment? The interface command ip ospf priority 0 The interface command ip ospf priority 255 The command dr-disable interface-id under the OSPF process The command passive interface interface-id under the OSPF process The command dr-priority interface-id 255 under the OSPF process 10. What is the advertised network for the loopback interface with IP address 10.123.4.1/30? 10.123.4.1/24 10.123.4.0/30 10.123.4.1/32 10.123.4.0/24 Answers to the “Do I Know This Already?” quiz: 1 C 2 C 3 A, D 4 B 5 B 6 B 7 B 8 A 9 A 10 C
  • 65. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY BGP (BORDER GATEWAY PROTOCOL) RFC (REQUEST FOR COMMENT) 1654 defines Border Gateway Protocol (BGP) as an EGP standardized path vector routing protocol that provides scalability, flexibility, and network stability. When BGP was created, the primary design consideration was for IPv4 inter-organization connectivity on public networks like the Internet and on private dedicated networks. BGP is the only protocol used to exchange networks on the Internet, which has more than 780,000 IPv4 routes and continues to grow. Due to the large size of the BGP tables, BGP does not advertise incremental updates or refresh network advertisements as OSPF and IS-IS do. BGP Key Points • BGP stand for Border Gateway Protocol. • BGP is also a Dynamic Routing Protocol. • BGP is Exterior Gateway Protocol (EGP). • BGP is the only EGP use now a days. • BGP is called Protocol of the Internet. • BGP is called an application layer protocol. • BGP is also called Policy-based routing protocol. • BGP is an AS-by-AS dynamic routing protocol. • BGP is a Path-Vector Routing protocol. • Path-Vector means list of AS on path to destination. • BGP Protocols uses TCP Port Number 179. • BGP is open standard routing protocol. • BGP is mainly used for Scalability and Reliability. • BGP is mainly used for control but not for speed. • BGP prevents loop using the AS Numbers. • BGP is classless supports FLSM, VLSM, and CIDR. • BGP support auto and manual summarization. • BGP Updates are incremental and triggered. • BGP Updates are sent as unicast to manually defined neighbors. • BGP Administrative Distance is 20 for External Updates • BGP Administrative Distance is 200 for Internal Updates. • BGP does not use load balancing, uses only one path per network. • BGP Protocols has two flavors eBGP and iBGP. • If peers are in the same AS called internal BGP (iBGP). • If peers are in a different AS called external BGP (eBGP). • Neighbor relationships for eBGP and iBGP are slightly different.
  • 66. TRAINER: SAGAR | NetworkJourney.com | www.youtube.com/c/NetworkJourney | LinkedIN CCNP ENTERPRISE 2020 LAB WORKBOOK|| TRAINER: SAGAR || WWW.YOUTUBE.COM/C/NETWORKJOURNEY • IBPG the neighbors no need to be connected directly. • EBGP the neighbors need to be connected directly. • BGP guarantees loop-free routing information. • BGP has no auto discovery mechanism peers to be set manually. • BGP Protocol is used to exchange Internet routes. • BGP is a Layer 4 protocol that sits on top of TCP. BGP itself is an application (layer 7). BGP’s purpose is for routing (layer 3); exchanging layer 3 information. It’s a routing protocol. BGP uses TCP port 179 (layer 4: transport), but the application is what does the processing of the logic (routing policy). Autonomous System Numbers An organization requiring connectivity to the Internet must obtain an autonomous system number (ASN). ASNs were originally 2 bytes (16-bit range), which made 65,535 ASNs possible. Due to exhaustion, RFC 4893 expanded the ASN field to accommodate 4 bytes (32-bit range). This allows for 4,294,967,295 unique ASNs, providing quite an increase from the original 65,535 ASNs. An autonomous system (AS) is a group of IP networks operated by one or more network operator(s) that has a single and clearly defined external routing policy. Exterior routing protocols are used to exchange routing information between Autonomous Systems.