SlideShare a Scribd company logo
1 of 48
Download to read offline
Instructor Materials
Chapter 3: Dynamic Routing
CCNA Routing and Switching
Routing and Switching Essentials v6.0
2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 This PowerPoint deck is divided in two parts:
 Instructor Planning Guide
• Information to help you become familiar with the chapter
• Teaching aids
 Instructor Class Presentation
• Optional slides that you can use in the classroom
• Begins on slide # 12
 Note: Remove the Planning Guide from this presentation before sharing with anyone.
Instructor Materials – Chapter 3 Planning Guide
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 3: Dynamic Routing
Routing and Switching Essentials v6.0
Planning Guide
4© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What activities are associated with this chapter?
Chapter 3: Activities
Page # Activity Type Activity Name Optional?
3.0.1.2 Class Activity How Much Does This Cost Optional
3.1.2.5 Interactive Activity Compare Static and Dynamic Routing Recommended
3.2.1.2 Syntax Checker Advertising the R2 and R3 Networks Recommended
3.2.1.3 Syntax Checker Verifying RIP Settings and Routes on R2 and R3 Recommended
3.2.1.4 Syntax Checker Enable and Verify RIPv2 on R2 and R3 Recommended
3.2.1.5 Syntax Checker Disable Automatic Summarization on R2 and R3 Recommended
3.2.1.6 Syntax Checker Configuring and Verifying a Passive Interface on R2 and R3 Recommended
3.2.1.7 Syntax Checker Verifying the Gateway of Last Resort on R2 and R3 Recommended
3.2.1.8 Packet Tracer Configuring RIPv2 Recommended
3.2.1.9 Lab Configuring Basic RIPv2 Optional
The password used in the Packet Tracer activities in this chapter is: PT_ccna5
5© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What activities are associated with this chapter?
Chapter 3: Activities (Cont.)
Page # Activity Type Activity Name Optional?
3.3.1.4 Interactive Activity Identify Parts of an IPv4 Routing Table Entry Recommended
3.3.2.6 Interactive Activity Identify Parent and Child IPv4 Routes Recommended
3.3.3.3 Interactive Activity Determine the Longest Match Route Recommended
3.3.4.4 Interactive Activity Identify Parts of an IPv6 Routing Table Entry Recommended
3.4.1.1 Class Activity IPv6, Details, Details… Optional
The password used in the Packet Tracer activities in this chapter is: PT_ccna5
6© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Students should complete Chapter 3, “Assessment” after completing Chapter 3.
 Quizzes, labs, Packet Tracers and other activities can be used to informally assess student
progress.
Chapter 3: Assessment
7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prior to teaching Chapter 3, the instructor should:
 Complete Chapter 3, “Assessment.”
 The objectives of this chapter are:
• Explain the purpose of dynamic routing protocols.
• Explain the use of dynamic routing and static routing.
• Configure the RIPv2 routing protocol.
• Explain the components of an IPv4 routing table entry for a given route.
• Explain the parent/child relationship in a dynamically built routing table.
• Determine which route will be used to forward a IPv4 packet.
• Determine which route will be used to forward a IPv6 packet.
Chapter 3: Best Practices
8© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 3.1
• Create topologies in Packet Tracer similar to the topologies in the chapter and demonstrate static
versus dynamic routing. Stress the advantages and disadvantages of static and dynamic routing.
• Introduce terms such as metrics, convergence, distance vector, link state, classless, classful, IGP,
and EGP.
• During this chapter, consider setting up a large network as a Packet Tracer demonstration to
allow students to see size and complexity.
 3.2
• Demonstrate each RIP command using Packet Tracer.
• Recommend that students do the Syntax checkers in this section to aid in memorizing commands
and interpreting error messages.
• Follow-up with the recommended lab, 3.2.1.8 Configuring RIPv2.
Chapter 3: Best Practices (Cont.)
9© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 3.3
• Stress the importance of understanding the entries in the routing table, particularly for
troubleshooting.
• Provide students with a variety of example networks using Packet Tracer and challenge them to
interpret the routing table entries.
• Create the reference topology in section 3.3.1 in Packet Tracer and use that to demonstrate
directly connected and dynamically learned IPv4 routes. Also use it to explain router lookup.
• Create the reference topology in section 3.3.4 in Packet Tracer and use that to demonstrate the
IPv6 routing table entries as well as router lookup.
• Recommend that students complete the activities 3.3.1.4, 3.3.3.3 and 3.3.4.4 to reinforce their
understanding.
Chapter 3: Best Practices (Cont.)
10© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 For additional help with teaching strategies, including lesson plans, analogies for difficult concepts,
and discussion topics, visit the CCNA Community at:
https://www.netacad.com/group/communities/community-home
 Best practices from around the world for teaching CCNA Routing and Switching.
https://www.netacad.com/group/communities/ccna
 If you have lesson plans or resources that you would like to share, upload them to the CCNA
Community in order to help other instructors.
 Students can enroll in Introduction to Packet Tracer (self-paced).
Chapter 3: Additional Help
Chapter 3: Dynamic Routing
CCNA Routing and Switching
Routing and Switching Essentials v6.0
13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 3.1 Dynamic Routing Protocols
• Explain the function of dynamic routing protocols.
• Explain the purpose of dynamic routing protocols.
• Explain the use of dynamic routing and static routing.
 3.2 RIPv2
• Implement RIPv2.
• Configure the RIPv2 routing protocol.
• 3.3 The Routing Table
• Determine the route source, administrative distance, and metric for a given route.
• Explain the components of an IPv4 routing table entry for a given route.
• Explain the parent/child relationship in a dynamically built routing table.
• Determine which route will be used to forward a IPv4 packet.
• Determine which route will be used to forward a IPv6 packet.
Chapter 3 - Sections & Objectives
14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3.1 Dynamic Routing
Protocols
15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic Routing Protocol Overview
Dynamic Routing Protocol Overview
 RIP protocol was updated to RIPv2 to accommodate growth in the network environment
• RIPv2 does not scale to current larger network implementations
 Routing Protocols developed to meet the need of larger networks include:
• Open Shortest Path First (OSPF)
• Intermediate System-to-Intermediate System (IS-IS).
• Enhanced IGRP (EIGRP)
 Border Gateway Protocol (BGP) is used between Internet service providers (ISPs)
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic Routing Protocol Overview
Dynamic Routing Protocol Components
 Purpose of dynamic routing protocols includes:
• Discovery of remote networks
• Maintaining up-to-date routing information
• Choosing the best path to destination networks
• Ability to find a new best path if the current path is no
longer available
 The main components of dynamic routing
protocols include:
• Data structures - tables or databases kept in RAM.
• Routing protocol messages - to discover neighboring
routers, exchange routing information, and maintain
accurate information about the network.
• Algorithms – to facilitate learning routing information
and for best path determination.
17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic versus Static Routing
Static Routing Uses
 Networks often use both static
and dynamic routing.
 Static Routing is used as
follows:
• For easy routing table
maintenance in small networks.
• Routing to and from a stub
network.
• Accessing a single default route.
18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic versus Static Routing
Static Routing Advantages and Disadvantages
19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic versus Static Routing
Dynamic Routing Protocols Uses
 Dynamic routing is the best
choice for large networks
 Dynamic routing protocols help
the network administrator
manage the network:
• Providing redundant paths
• Automatically implementing the
alternate path when a link goes
down.
20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic versus Static Routing
Dynamic Routing Advantages and Disadvantages
21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3.2 RIPv2
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Use the router rip command to enable RIP v1
 Use the no router rip command to disable RIP
Dynamic versus Static Routing
Router RIP Configuration Mode
23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Advertise Networks
 The network network-address
router configuration mode
command:
• Enables RIP on all interfaces that
belong to a specific network
• Advertises the network in RIP routing
updates sent to other routers every 30
seconds.
Note: RIPv1 is a classful routing protocol
for IPv4.
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Verify RIP Routing
show ip protocols – displays IPv4 routing
protocols configured on the router.
show ip route – displays RIP routes
installed in the routing table.
25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Enable and Verify RIPv2
 Use the version 2 router
configuration mode command to
enable RIPv2
 Use the show ip protocols
command to verify that RIPv2 is
configured.
 Use the show ip route
command to verify the RIPv2
routes in the routing table.
26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Disable Auto Summarization
 RIPv2 automatically
summarizes networks at major
network boundaries.
 Use the no auto-summary
router configuration mode
command to disable auto
summarization.
 Use the show ip protocols
command to verify that auto
summarization is off.
27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Configure Passive Interfaces
 RIP updates:
• Are forwarded out all RIP-enabled interfaces
by default.
• Only need to be sent out interfaces that are
connected to other RIP-enabled routers.
 Sending RIP updates to LANs wastes
bandwidth, wastes resources, and is a
security risk.
 Use the passive-interface router
configuration command to stop routing
updates out the interface. Still allows
that network to be advertised to other
routers.
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Propagate a Default Route
 In the diagram a default static
route to the Internet is configured
on R1.
 The default-information
originate router configuration
command instructs R1 to send the
default static route information in
the RIP updates.
29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Packet Tracer - Configuring RIPv2
30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring the RIP Protocol
Lab - Configuring Basic RIPv2
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3.3 The Routing Table
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Parts of an IPv4 Route Entry
Routing Table Entries
Routing Table for R1
33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Parts of an IPv4 Route Entry
Directly Connected Entries  Directly Connected Networks (C) are
automatically added to the routing table
when the interface is configured and
activated.
 Entries contain the following information:
• Route source - how the route was learned.
• Destination network – remote network.
• Outgoing Interface – exit interface used to
forward packets to destination.
 Other route source entries include:
• S –Static Route
• D – EIGRP routing protocol
• O – OSPF routing protocol
• R - RIP routing protocol
34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Parts of an IPv4 Route Entry
Remote Network Entries
 Routes to remote networks contain the
following information:
• Route source – how route was learned
• Destination network
• Administrative distance (AD) -
trustworthiness of the route.
• Metric – value assigned to reach the
remote network. Lower is better.
• Next hop – IPv4 address of the next router
that the packet should be forwarded to.
• Route timestamp – time since the route
was updated.
• Outgoing interface - the exit interface to use
to forward the packet
35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamically Learned IPv4 Routes
Routing Table Terms
 The routing table is a hierarchical
structure that is used to speed up the
lookup process when locating routes
and forwarding packets.
 The hierarchy includes:
• Ultimate Routes
• Level 1 routes
• Level 1 parent routes
• Level 2 child routes
36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamically Learned IPv4 Routes
Ultimate Route
 An ultimate route is a routing table
entry that contains either a next-hop
IPv4 address or an exit interface.
 Directly connected, dynamically
learned, and local routes are
ultimate routes.
37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamically Learned IPv4 Routes
Level 1 Route
 A level 1 route can be a:
• Network route - a network route that
has a subnet mask equal to that of the
classful mask.
• Supernet route - a network address
with a mask less than the classful
mask, for example, a summary
address.
• Default route - a static route with the
address 0.0.0.0/0
38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamically Learned IPv4 Routes
Level 1 Parent Route
 A parent route is a level 1 network
route that is subnetted.
 In the routing table, it basically
provides a heading for the specific
subnets it contains.
39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamically Learned IPv4 Routes
Level 2 Child Route
 A level 2 child route is a route that
is a subnet of a classful network
address.
 Level 1 parent routes contain level
2 child routes.
 Level 2 child routes are also
ultimate routes.
40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The IPv4 Route Lookup Process
Route Lookup Process  Router lookup process:
• If the best match is a level 1 ultimate
route, then this route is used to forward
the packet.
• If the best match is a level 1 parent route,
the router then examines child routes
(the subnet routes).
• If there is a match with a level 2 child
route, that is used to forward the packet.
• If there is no match with level 2 child
routes, the router searches level 1
supernet or default routes. If there is a
match, that route is used.
• If there is no match found in the routing
table the packet is dropped.
41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The IPv4 Route Lookup Process
Best Route = Longest Match
 The best match is the route in the
routing table that has the most
number of far left matching bits with
the destination IPv4 address of the
packet.
 The route with the greatest number of
equivalent far left bits, or the longest
match, is always the preferred route.
42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Analyze an IPv6 Routing Table
IPv6 Routing Table Entries
 An IPv6 routing table includes directly
connected, static and dynamically
learned routes.
 All IPv6 routes are level 1 ultimate
routes.
43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Analyze an IPv6 Routing Table
Directly Connected Entries
 Use the show ipv6 route command to
display the IPv6 routing table.
 The directly connected route entries
include the following:
• Route source – How the route was learned.
Directly connected indicated with a C and L
for local route.
• Directly connected network address.
• Administrative distance – Trustworthiness of
the route (lower more trustworthy).
• Metric – Value assigned to reach the network
(lower is preferred route).
• Outgoing interface – Exit interface used to
forward packet.
44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Analyze an IPv6 Routing Table
Remote IPv6 Network Entries
 The remote IPv6 route entries also
include the following:
• Route source – How the route was
learned. Common codes include O
(OSPF), D (EIGRP), R (RIP), and S
(Static route).
• Next hop - Identifies the IPv6 address
of the next router to forward the packet
to.
 The IPv6 router lookup process:
• Examines level 1 network routes for the
best match.
• Longest match is the best match.
45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3.4 Chapter Summary
46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Chapter 3: Dynamic Routing
 Explain the function of dynamic routing protocols.
 Implement RIPv2.
 Determine the route source, administrative distance, and
metric for a given route.
47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 3
New Terms and Commands
• Routing Information Protocol (RIP)
• RIPv1
 RIPv2
 Open Shortest Path First (OSPF)
 Intermediate System-to-Intermediate System (IS-IS)
 Interior Gateway Routing Protocol (IGRP)
 Enhanced IGRP (EIGRP)
 Border Gateway Protocol (BGP)
 IPv4 addressing space
 Data structures
 Routing protocol messages
 Algorithm
 routing algorithm
 classful routing protocol
 classless routing protocol
 automatic summarization
CCNA Dynamic Routing Chapter 3

More Related Content

What's hot

ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfGomzAriez
 
Vlan lab
Vlan labVlan lab
Vlan labtmim8
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)Netwax Lab
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPVuz Dở Hơi
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routingteknetir
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)Netwax Lab
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 

What's hot (20)

ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
 
Vlan lab
Vlan labVlan lab
Vlan lab
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Ccna command
Ccna commandCcna command
Ccna command
 

Similar to CCNA Dynamic Routing Chapter 3

CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing conceptnewbie2019
 
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptxCCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptxManishkumarSharma338257
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptxAliJrboy
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)newbie2019
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3Chaing Ravuth
 
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docx
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docxITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docx
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docxvrickens
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
 
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docx
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docxNE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docx
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docxhallettfaustina
 
CCNA R&S At A Glance
CCNA R&S At A GlanceCCNA R&S At A Glance
CCNA R&S At A GlanceCNA KFUPM
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptxAyaanMohamed4
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 

Similar to CCNA Dynamic Routing Chapter 3 (20)

CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing concept
 
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptxCCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
 
EIGRP
EIGRPEIGRP
EIGRP
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptx
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docx
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docxITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docx
ITNE3007 Advanced Routing Copyright © 2015-2018 VIT, All R.docx
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docx
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docxNE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docx
NE3007 Advanced RoutingCopyright © 2015-2018 VIT, All Rights.docx
 
Ccna2v3 mod07
Ccna2v3 mod07Ccna2v3 mod07
Ccna2v3 mod07
 
CCNA R&S At A Glance
CCNA R&S At A GlanceCCNA R&S At A Glance
CCNA R&S At A Glance
 
Ccna r&s at a glance
Ccna r&s at a glanceCcna r&s at a glance
Ccna r&s at a glance
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injectionnewbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web securitynewbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

CCNA Dynamic Routing Chapter 3

  • 1. Instructor Materials Chapter 3: Dynamic Routing CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 2. 2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  This PowerPoint deck is divided in two parts:  Instructor Planning Guide • Information to help you become familiar with the chapter • Teaching aids  Instructor Class Presentation • Optional slides that you can use in the classroom • Begins on slide # 12  Note: Remove the Planning Guide from this presentation before sharing with anyone. Instructor Materials – Chapter 3 Planning Guide
  • 3. 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 3: Dynamic Routing Routing and Switching Essentials v6.0 Planning Guide
  • 4. 4© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What activities are associated with this chapter? Chapter 3: Activities Page # Activity Type Activity Name Optional? 3.0.1.2 Class Activity How Much Does This Cost Optional 3.1.2.5 Interactive Activity Compare Static and Dynamic Routing Recommended 3.2.1.2 Syntax Checker Advertising the R2 and R3 Networks Recommended 3.2.1.3 Syntax Checker Verifying RIP Settings and Routes on R2 and R3 Recommended 3.2.1.4 Syntax Checker Enable and Verify RIPv2 on R2 and R3 Recommended 3.2.1.5 Syntax Checker Disable Automatic Summarization on R2 and R3 Recommended 3.2.1.6 Syntax Checker Configuring and Verifying a Passive Interface on R2 and R3 Recommended 3.2.1.7 Syntax Checker Verifying the Gateway of Last Resort on R2 and R3 Recommended 3.2.1.8 Packet Tracer Configuring RIPv2 Recommended 3.2.1.9 Lab Configuring Basic RIPv2 Optional The password used in the Packet Tracer activities in this chapter is: PT_ccna5
  • 5. 5© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What activities are associated with this chapter? Chapter 3: Activities (Cont.) Page # Activity Type Activity Name Optional? 3.3.1.4 Interactive Activity Identify Parts of an IPv4 Routing Table Entry Recommended 3.3.2.6 Interactive Activity Identify Parent and Child IPv4 Routes Recommended 3.3.3.3 Interactive Activity Determine the Longest Match Route Recommended 3.3.4.4 Interactive Activity Identify Parts of an IPv6 Routing Table Entry Recommended 3.4.1.1 Class Activity IPv6, Details, Details… Optional The password used in the Packet Tracer activities in this chapter is: PT_ccna5
  • 6. 6© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Students should complete Chapter 3, “Assessment” after completing Chapter 3.  Quizzes, labs, Packet Tracers and other activities can be used to informally assess student progress. Chapter 3: Assessment
  • 7. 7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Prior to teaching Chapter 3, the instructor should:  Complete Chapter 3, “Assessment.”  The objectives of this chapter are: • Explain the purpose of dynamic routing protocols. • Explain the use of dynamic routing and static routing. • Configure the RIPv2 routing protocol. • Explain the components of an IPv4 routing table entry for a given route. • Explain the parent/child relationship in a dynamically built routing table. • Determine which route will be used to forward a IPv4 packet. • Determine which route will be used to forward a IPv6 packet. Chapter 3: Best Practices
  • 8. 8© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  3.1 • Create topologies in Packet Tracer similar to the topologies in the chapter and demonstrate static versus dynamic routing. Stress the advantages and disadvantages of static and dynamic routing. • Introduce terms such as metrics, convergence, distance vector, link state, classless, classful, IGP, and EGP. • During this chapter, consider setting up a large network as a Packet Tracer demonstration to allow students to see size and complexity.  3.2 • Demonstrate each RIP command using Packet Tracer. • Recommend that students do the Syntax checkers in this section to aid in memorizing commands and interpreting error messages. • Follow-up with the recommended lab, 3.2.1.8 Configuring RIPv2. Chapter 3: Best Practices (Cont.)
  • 9. 9© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  3.3 • Stress the importance of understanding the entries in the routing table, particularly for troubleshooting. • Provide students with a variety of example networks using Packet Tracer and challenge them to interpret the routing table entries. • Create the reference topology in section 3.3.1 in Packet Tracer and use that to demonstrate directly connected and dynamically learned IPv4 routes. Also use it to explain router lookup. • Create the reference topology in section 3.3.4 in Packet Tracer and use that to demonstrate the IPv6 routing table entries as well as router lookup. • Recommend that students complete the activities 3.3.1.4, 3.3.3.3 and 3.3.4.4 to reinforce their understanding. Chapter 3: Best Practices (Cont.)
  • 10. 10© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the CCNA Community at: https://www.netacad.com/group/communities/community-home  Best practices from around the world for teaching CCNA Routing and Switching. https://www.netacad.com/group/communities/ccna  If you have lesson plans or resources that you would like to share, upload them to the CCNA Community in order to help other instructors.  Students can enroll in Introduction to Packet Tracer (self-paced). Chapter 3: Additional Help
  • 11.
  • 12. Chapter 3: Dynamic Routing CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 13. 13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  3.1 Dynamic Routing Protocols • Explain the function of dynamic routing protocols. • Explain the purpose of dynamic routing protocols. • Explain the use of dynamic routing and static routing.  3.2 RIPv2 • Implement RIPv2. • Configure the RIPv2 routing protocol. • 3.3 The Routing Table • Determine the route source, administrative distance, and metric for a given route. • Explain the components of an IPv4 routing table entry for a given route. • Explain the parent/child relationship in a dynamically built routing table. • Determine which route will be used to forward a IPv4 packet. • Determine which route will be used to forward a IPv6 packet. Chapter 3 - Sections & Objectives
  • 14. 14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3.1 Dynamic Routing Protocols
  • 15. 15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic Routing Protocol Overview Dynamic Routing Protocol Overview  RIP protocol was updated to RIPv2 to accommodate growth in the network environment • RIPv2 does not scale to current larger network implementations  Routing Protocols developed to meet the need of larger networks include: • Open Shortest Path First (OSPF) • Intermediate System-to-Intermediate System (IS-IS). • Enhanced IGRP (EIGRP)  Border Gateway Protocol (BGP) is used between Internet service providers (ISPs)
  • 16. 16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic Routing Protocol Overview Dynamic Routing Protocol Components  Purpose of dynamic routing protocols includes: • Discovery of remote networks • Maintaining up-to-date routing information • Choosing the best path to destination networks • Ability to find a new best path if the current path is no longer available  The main components of dynamic routing protocols include: • Data structures - tables or databases kept in RAM. • Routing protocol messages - to discover neighboring routers, exchange routing information, and maintain accurate information about the network. • Algorithms – to facilitate learning routing information and for best path determination.
  • 17. 17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic versus Static Routing Static Routing Uses  Networks often use both static and dynamic routing.  Static Routing is used as follows: • For easy routing table maintenance in small networks. • Routing to and from a stub network. • Accessing a single default route.
  • 18. 18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic versus Static Routing Static Routing Advantages and Disadvantages
  • 19. 19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic versus Static Routing Dynamic Routing Protocols Uses  Dynamic routing is the best choice for large networks  Dynamic routing protocols help the network administrator manage the network: • Providing redundant paths • Automatically implementing the alternate path when a link goes down.
  • 20. 20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic versus Static Routing Dynamic Routing Advantages and Disadvantages
  • 21. 21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3.2 RIPv2
  • 22. 22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Use the router rip command to enable RIP v1  Use the no router rip command to disable RIP Dynamic versus Static Routing Router RIP Configuration Mode
  • 23. 23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Advertise Networks  The network network-address router configuration mode command: • Enables RIP on all interfaces that belong to a specific network • Advertises the network in RIP routing updates sent to other routers every 30 seconds. Note: RIPv1 is a classful routing protocol for IPv4.
  • 24. 24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Verify RIP Routing show ip protocols – displays IPv4 routing protocols configured on the router. show ip route – displays RIP routes installed in the routing table.
  • 25. 25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Enable and Verify RIPv2  Use the version 2 router configuration mode command to enable RIPv2  Use the show ip protocols command to verify that RIPv2 is configured.  Use the show ip route command to verify the RIPv2 routes in the routing table.
  • 26. 26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Disable Auto Summarization  RIPv2 automatically summarizes networks at major network boundaries.  Use the no auto-summary router configuration mode command to disable auto summarization.  Use the show ip protocols command to verify that auto summarization is off.
  • 27. 27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Configure Passive Interfaces  RIP updates: • Are forwarded out all RIP-enabled interfaces by default. • Only need to be sent out interfaces that are connected to other RIP-enabled routers.  Sending RIP updates to LANs wastes bandwidth, wastes resources, and is a security risk.  Use the passive-interface router configuration command to stop routing updates out the interface. Still allows that network to be advertised to other routers.
  • 28. 28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Propagate a Default Route  In the diagram a default static route to the Internet is configured on R1.  The default-information originate router configuration command instructs R1 to send the default static route information in the RIP updates.
  • 29. 29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Packet Tracer - Configuring RIPv2
  • 30. 30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring the RIP Protocol Lab - Configuring Basic RIPv2
  • 31. 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3.3 The Routing Table
  • 32. 32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Parts of an IPv4 Route Entry Routing Table Entries Routing Table for R1
  • 33. 33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Parts of an IPv4 Route Entry Directly Connected Entries  Directly Connected Networks (C) are automatically added to the routing table when the interface is configured and activated.  Entries contain the following information: • Route source - how the route was learned. • Destination network – remote network. • Outgoing Interface – exit interface used to forward packets to destination.  Other route source entries include: • S –Static Route • D – EIGRP routing protocol • O – OSPF routing protocol • R - RIP routing protocol
  • 34. 34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Parts of an IPv4 Route Entry Remote Network Entries  Routes to remote networks contain the following information: • Route source – how route was learned • Destination network • Administrative distance (AD) - trustworthiness of the route. • Metric – value assigned to reach the remote network. Lower is better. • Next hop – IPv4 address of the next router that the packet should be forwarded to. • Route timestamp – time since the route was updated. • Outgoing interface - the exit interface to use to forward the packet
  • 35. 35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamically Learned IPv4 Routes Routing Table Terms  The routing table is a hierarchical structure that is used to speed up the lookup process when locating routes and forwarding packets.  The hierarchy includes: • Ultimate Routes • Level 1 routes • Level 1 parent routes • Level 2 child routes
  • 36. 36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamically Learned IPv4 Routes Ultimate Route  An ultimate route is a routing table entry that contains either a next-hop IPv4 address or an exit interface.  Directly connected, dynamically learned, and local routes are ultimate routes.
  • 37. 37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamically Learned IPv4 Routes Level 1 Route  A level 1 route can be a: • Network route - a network route that has a subnet mask equal to that of the classful mask. • Supernet route - a network address with a mask less than the classful mask, for example, a summary address. • Default route - a static route with the address 0.0.0.0/0
  • 38. 38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamically Learned IPv4 Routes Level 1 Parent Route  A parent route is a level 1 network route that is subnetted.  In the routing table, it basically provides a heading for the specific subnets it contains.
  • 39. 39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamically Learned IPv4 Routes Level 2 Child Route  A level 2 child route is a route that is a subnet of a classful network address.  Level 1 parent routes contain level 2 child routes.  Level 2 child routes are also ultimate routes.
  • 40. 40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The IPv4 Route Lookup Process Route Lookup Process  Router lookup process: • If the best match is a level 1 ultimate route, then this route is used to forward the packet. • If the best match is a level 1 parent route, the router then examines child routes (the subnet routes). • If there is a match with a level 2 child route, that is used to forward the packet. • If there is no match with level 2 child routes, the router searches level 1 supernet or default routes. If there is a match, that route is used. • If there is no match found in the routing table the packet is dropped.
  • 41. 41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The IPv4 Route Lookup Process Best Route = Longest Match  The best match is the route in the routing table that has the most number of far left matching bits with the destination IPv4 address of the packet.  The route with the greatest number of equivalent far left bits, or the longest match, is always the preferred route.
  • 42. 42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Analyze an IPv6 Routing Table IPv6 Routing Table Entries  An IPv6 routing table includes directly connected, static and dynamically learned routes.  All IPv6 routes are level 1 ultimate routes.
  • 43. 43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Analyze an IPv6 Routing Table Directly Connected Entries  Use the show ipv6 route command to display the IPv6 routing table.  The directly connected route entries include the following: • Route source – How the route was learned. Directly connected indicated with a C and L for local route. • Directly connected network address. • Administrative distance – Trustworthiness of the route (lower more trustworthy). • Metric – Value assigned to reach the network (lower is preferred route). • Outgoing interface – Exit interface used to forward packet.
  • 44. 44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Analyze an IPv6 Routing Table Remote IPv6 Network Entries  The remote IPv6 route entries also include the following: • Route source – How the route was learned. Common codes include O (OSPF), D (EIGRP), R (RIP), and S (Static route). • Next hop - Identifies the IPv6 address of the next router to forward the packet to.  The IPv6 router lookup process: • Examines level 1 network routes for the best match. • Longest match is the best match.
  • 45. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3.4 Chapter Summary
  • 46. 46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Chapter 3: Dynamic Routing  Explain the function of dynamic routing protocols.  Implement RIPv2.  Determine the route source, administrative distance, and metric for a given route.
  • 47. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 3 New Terms and Commands • Routing Information Protocol (RIP) • RIPv1  RIPv2  Open Shortest Path First (OSPF)  Intermediate System-to-Intermediate System (IS-IS)  Interior Gateway Routing Protocol (IGRP)  Enhanced IGRP (EIGRP)  Border Gateway Protocol (BGP)  IPv4 addressing space  Data structures  Routing protocol messages  Algorithm  routing algorithm  classful routing protocol  classless routing protocol  automatic summarization