Unicast Book
Unicast Book
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
©2012–2013 Cisco Systems, Inc. All rights reserved.
C O N T E N T S
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 iii
Contents
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
iv OL-25630-04
Contents
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 v
Contents
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
vi OL-25630-04
Contents
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 vii
Contents
GLOSSARY
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
viii OL-25630-04
CH A P T E R 1
Unicast Routing
This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000
Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul
redundancy.The system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About Layer 3 Unicast Routing, page 1-1
• Routing Algorithms, page 1-7
• Summary of Layer 3 Unicast Routing Features, page 1-9
• WAN Backhaul Redundancy, page 1-10
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 1-1
Chapter 1 Unicast Routing
Information About Layer 3 Unicast Routing
Routing Fundamentals
Routing protocols use a metric to evaluate the best path to the destination. A metric is a standard of
measurement, such as a path bandwidth, that routing algorithms use to determine the optimal path to a
destination. To aid path determination, routing algorithms initialize and maintain routing tables that
contain route information such as the IP destination address, the address of the next router, or the next
hop. Destination and next-hop associations tell a router that an IP destination can be reached optimally
by sending the packet to a particular router that represents the next hop on the way to the final
destination. When a router receives an incoming packet, it checks the destination address and attempts
to associate this address with the next hop.
Routing tables can contain other information, such as the data about the desirability of a path. Routers
compare metrics to determine optimal routes, and these metrics differ depending on the design of the
routing algorithm used. See the Routing Metrics, page 1-3.
Routers communicate with one another and maintain their routing tables by transmitting a variety of
messages. The routing update message is one such message that consists of all or a portion of a routing
table. By analyzing routing updates from all other routers, a router can build a detailed picture of the
network topology. A link-state advertisement, which is another example of a message sent between
routers, informs other routers of the link state of the sending router. You can also use link information
to enable routers to determine optimal routes to network destinations. For more information, see the
Routing Algorithms, page 1-7.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
1-2 OL-25630-04
Chapter 1 Unicast Routing
Information About Layer 3 Unicast Routing
Packet
Router 1
To: Destination host (Protocol address)
Router 2 (MAC address)
Router 2
Packet
Destination host
283682
PC
Routing Metrics
Routing algorithms use many different metrics to determine the best route. Sophisticated routing
algorithms can base route selection on multiple metrics.
This section includes the following metrics:
• Path Length, page 1-4
• Reliability, page 1-4
• Routing Delay, page 1-4
• Bandwidth, page 1-4
• Load, page 1-4
• Communication Cost, page 1-4
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 1-3
Chapter 1 Unicast Routing
Information About Layer 3 Unicast Routing
Path Length
The path length is the most common routing metric. Some routing protocols allow you to assign arbitrary
costs to each network link. In this case, the path length is the sum of the costs associated with each link
traversed. Other routing protocols define the hop count, which is a metric that specifies the number of
passes through internetworking products, such as routers, that a packet must take from a source to a
destination.
Reliability
The reliability, in the context of routing algorithms, is the dependability (in terms of the bit-error rate)
of each network link. Some network links might go down more often than others. After a network fails,
certain network links might be repaired more easily or more quickly than other links. The reliability
factors that you can take into account when assigning the reliability rating are arbitrary numeric values
that you usually assign to network links.
Routing Delay
The routing delay is the length of time required to move a packet from a source to a destination through
the internetwork. The delay depends on many factors, including the bandwidth of intermediate network
links, the port queues at each router along the way, the network congestion on all intermediate network
links, and the physical distance that the packet must travel. Because the routing delay is a combination
of several important variables, it is a common and useful metric.
Bandwidth
The bandwidth is the available traffic capacity of a link. Although the bandwidth is the maximum
attainable throughput on a link, routes through links with greater bandwidth do not necessarily provide
better routes than routes through slower links. For example, if a faster link is busier, the actual time
required to send a packet to the destination could be greater.
Load
The load is the degree to which a network resource, such as a router, is busy. You can calculate the load
in a variety of ways, including CPU usage and packets processed per second. Monitoring these
parameters on a continual basis can be resource intensive.
Communication Cost
The communication cost is a measure of the operating cost to route over a link. The communication cost
is another important metric, especially if you do not care about performance as much as operating
expenditures. For example, the line delay for a private line might be longer than a public line, but you
can send packets over your private line rather than through the public lines that cost money for usage
time.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
1-4 OL-25630-04
Chapter 1 Unicast Routing
Information About Layer 3 Unicast Routing
Router IDs
Each routing process has an associated router ID. You can configure the router ID to any interface.
The Cisco CG-OS router supports cellular, Ethernet (Fast Ethernet and Gigabit Ethernet), and WiMax
interfaces. When you do not configure the router ID, the Cisco CG-OS router selects the router ID based
on the following criteria:
• The Cisco CG-OS router prefers loopback0 over any other interface. When loopback0 does not exist,
then the router prefers the first loopback interface over any other interface type.
• When you do not configure a loopback interface, the Cisco CG-OS router uses the first interface in
the configuration file as the router ID. When you configure any loopback interface after the
Cisco CG-OS software selects the router ID, the loopback interface becomes the router ID. When
the loopback interface is not loopback0 and you configure loopback0 with an IP address, the router
ID changes to the IP address of loopback0.
• When the interface that the router ID is based on changes, that new IP address becomes the router
ID. When any other interface changes its IP address, there is no router ID change.
Related Topics
Cisco 1000 Series Connected Grid Routers WiFi Software Configuration Guide
Cisco 1240 Connected Grid Router Hardware Installation Guide
Cisco Connected Grid Cellular 3G Module for CGR1000 Series Installation and Configuration Guide
Cisco Connected Grid WiMAX Module for CGR1000 Series Installation and Configuration Guide
Autonomous Systems
An autonomous system (AS) is a network controlled by a single technical administration entity.
Autonomous systems divide global external networks into individual routing domains, where local
routing policies are applied. This organization simplifies routing domain administration and simplifies
consistent policy configuration.
Each autonomous system can support multiple interior routing protocols that dynamically exchange
routing information through route redistribution. The Regional Internet Registries assign a unique
number to each public autonomous system that directly connects to the Internet. This autonomous
system number (AS number) identifies both the routing process and the autonomous system.
The Cisco CG-OS router supports 4-byte AS numbers. Table 1-1 lists the AS number ranges.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 1-5
Chapter 1 Unicast Routing
Information About Layer 3 Unicast Routing
Private autonomous system numbers are used for internal routing domains but must be translated by the
Cisco CG-OS router for traffic that is routed out to the Internet. It is important not to configure routing
protocols to advertise private autonomous system numbers to external networks. By default, the
Cisco CG-OS router does not remove private autonomous system numbers from routing updates.
Note The autonomous system number assignment for public and private networks is governed by the Internet
Assigned Number Authority (IANA). For information about autonomous system numbers, including the
reserved number assignment, or to apply to register an autonomous system number, see this URL:
http://www.iana.org/
Convergence
A key aspect to measure for any routing algorithm is how much time a router takes to react to network
topology changes. When a part of the network changes for any reason, such as a link failure, the routing
information in different routers might not match. Some routers will have updated information about the
changed topology, while other routers will still have the old information. The convergence is the amount
of time before all routers in the network have updated, matching routing information. The convergence
time varies depending on the routing algorithm. Fast convergence minimizes the chance of lost packets
caused by inaccurate routing information.
Administrative Distance
An administrative distance is a rating of the trustworthiness of a routing information source. A higher
value indicates a lower trust rating. Typically, a route can be learned through more than one protocol.
Administrative distance is used to discriminate between routes learned from more than one protocol. The
route with the lowest administrative distance is installed in the IP routing table.
Stub Routing
You can use stub routing in a hub-and-spoke network topology, where one or more end (stub) networks
are connected to a remote router (the spoke) that is connected to one or more distribution routers (the
hub). The remote router is adjacent only to one or more distribution routers. The only route for IP traffic
to follow into the remote router is through a distribution router. This type of configuration is commonly
used in WAN topologies in which the distribution router is directly connected to a WAN. The distribution
router can be connected to many more remote routers. Often, the distribution router is connected to 100
or more remote routers. In a hub-and-spoke topology, the remote router must forward all nonlocal traffic
to a distribution router, so it becomes unnecessary for the remote router to hold a complete routing table.
Generally, the distribution router sends only a default route to the remote router.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
1-6 OL-25630-04
Chapter 1 Unicast Routing
Routing Algorithms
Only specified routes are propagated from the remote (stub) router. The stub router responds to all
queries for summaries, connected routes, redistributed static routes, external routes, and internal routes
with the message “inaccessible.” A router that is configured as a stub sends a special peer information
packet to all neighboring routers to report its status as a stub router.
Any neighbor that receives a packet that informs it of the stub status does not query the stub router for
any routes, and a router that has a stub peer does not query that peer. The stub router depends on the
distribution router to send the proper updates to all peers.
Figure 1-2 shows a simple hub-and-spoke configuration.
Internet
192.0.2.0/24
Corporate Distribution Remote
network router router
182979
(hub) (spoke)
Stub routing does not prevent routes from being advertised to the remote router. Figure 1-2 shows that
the remote router can access the corporate network and the Internet through the distribution router only.
A full route table on the remote router, in this example, serves no functional purpose because the path to
the corporate network and the Internet is always through the distribution router. A larger route table
reduces only the amount of memory required by the remote router. The bandwidth and memory used can
be lessened by summarizing and filtering routes in the distribution router. In this network topology, the
remote router does not need to receive routes that have been learned from other networks because the
remote router must send all nonlocal traffic, regardless of its destination, to the distribution router. To
configure a true stub network, you should configure the distribution router to send only a default route
to the remote router.
The Open Shortest Path First (OSPF) protocol supports stub areas. For more information on OSPF, see
OSPF, page 1-9.
Routing Algorithms
Routing algorithms determine how a router gathers and reports reachability information, how it deals
with topology changes, and how it determines the optimal route to a destination. Various types of routing
algorithms exist, and each algorithm has a different impact on network and router resources. Routing
algorithms use a variety of metrics that affect calculation of optimal routes. You can classify routing
algorithms by type, such as static or dynamic, and interior or exterior.
This section includes the following topics:
• Static Routes and Dynamic Routing Protocols, page 1-8
• Interior and Exterior Gateway Protocols, page 1-8
• Link-State Protocols, page 1-8
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 1-7
Chapter 1 Unicast Routing
Routing Algorithms
Note The Cisco CG-OS router does not support any exterior gateway protocols.
Link-State Protocols
The link-state protocols, also known as shortest path first (SPF), share information with neighboring
routers. Each router builds a link-state advertisement (LSA) that contains information about each link
and directly connected neighbor router.
Each LSA has a sequence number. When a router receives an LSA and updates its link-state database,
the LSA floods all adjacent neighbors. When a router receives two LSAs with the same sequence number
(from the same router), the router does not flood its neighbors with the last LSA received because it
wants to prevent an LSA update loop.
Discovering neighbors and establishing adjacency is an important part of a link state protocol. Neighbors
use special Hello packets to discover on another. Hello packets also serve as keepalive notifications for
each neighbor router. Adjacency establishes a common set of operating parameters for the link-state
protocol between neighbor routers.
When a router receives an LSA, the router adds the LSA to its link-state database. Each entry consists
of the following parameters:
• Router ID (for the router that originated the LSA)
• Neighbor ID
• Link cost
• Sequence number of the LSA
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
1-8 OL-25630-04
Chapter 1 Unicast Routing
Summary of Layer 3 Unicast Routing Features
IP Services
IP Services addresses Domain Name System (DNS) clients. For more information, see Chapter 4,
“Configuring IP Services.”
OSPF
The Open Shortest Path First (OSPF) protocol is a link-state routing protocol that exchanges network
reachability information within an autonomous system (AS). Each OSPF router advertises information
about its active links to its neighbor routers. Link information consists of the link type, the link metric,
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 1-9
Chapter 1 Unicast Routing
WAN Backhaul Redundancy
and the neighbor router that is connected to the link. The advertisements that contain this link
information are called link-state advertisements (LSAs). The Cisco CG-OS router supports both OSPFv2
for IPv4 networks and OSPFv3 for IPv6 networks.
For more information, see Chapter 5, “Configuring OSPFv2” and Chapter 6, “Configuring OSPFv3.”
Static Routing
Static routing allows you to configure a fixed route to a destination. This feature is useful for small
networks where the topology is simple. Static routing is also used with other routing protocols to control
default routes. For more information, see Chapter 8, “Configuring Static Routing.”
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
1-10 OL-25630-04
CH A P T E R 2
Configuring IPv4
This chapter describes how to configure Internet Protocol version 4 (IPv4), which includes addressing,
Address Resolution Protocol (ARP), Reverse ARP, and Internet Control Message Protocol (ICMP), on
Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router). The
system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About IPv4, page 2-1
• Prerequisites for IPv4, page 2-5
• Guidelines and Limitations for IPv4, page 2-5
• Default Settings, page 2-5
• Configuring IPv4, page 2-6
• Verifying the IPv4 Configuration, page 2-11
• Configuration Example for IPv4, page 2-11
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-1
Chapter 2 Configuring IPv4
Information About IPv4
The IP feature is responsible for handling IPv4 packets that terminate on the Cisco CG-OS router, as
well as forwarding of IPv4 packets, which includes IPv4 unicast and multicast route lookup, reverse path
forwarding (RPF) checks, and software access control list and policy-based routing (ACL/PBR)
forwarding. The IP feature also manages the network interface IP address configuration, duplicate
address checks, static routes, and packet send and receive interface for IP clients.
This section includes the following topics:
• Multiple IPv4 Addresses, page 2-2
• Address Resolution Protocol, page 2-2
• ARP Caching, page 2-3
• Static and Dynamic Entries in the ARP Cache, page 2-3
• Devices That Do Not Use ARP, page 2-4
• Proxy ARP, page 2-4
• Local Proxy ARP, page 2-4
• Gratuitous ARP, page 2-4
• Path MTU Discovery, page 2-5
• ICMP, page 2-5
Note If any device on a network segment uses a secondary IPv4 address, then all other devices on that same
network interface must also use a secondary address from the same network or subnet. The inconsistent
use of secondary addresses on a network segment can quickly cause routing loops.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-2 OL-25630-04
Chapter 2 Configuring IPv4
Information About IPv4
Each device compares the IP address to its own. Only the device with the matching IP address replies to
the device that sends the data with a packet that contains the MAC address for the device. The source
device adds the destination device MAC address to its ARP table for future reference, creates a data-link
header and trailer that encapsulates the packet, and proceeds to transfer the data. Figure 2-1 shows the
ARP broadcast and response process.
Fred Barney
135075
I need the address of 10.1.1.2. I heard that broadcast. The message is for me.
Here is my MAC address: 00:1D:7E:1D:00:01.
When the destination device lies on a remote network that is beyond another device, the process is the
same except that the device that sends the data sends an ARP request for the MAC address of the default
gateway. After the address is resolved and the default gateway receives the packet, the default gateway
broadcasts the destination IP address over the networks connected to it. The device on the destination
device network uses ARP to obtain the MAC address of the destination device and delivers the packet.
ARP is enabled by default.
ARP Caching
ARP caching allows the Cisco CG-OS router to store information from previous ARP translations (IP to
MAC address mappings for devices). The mapping of IP addresses to MAC addresses occurs at each hop
(device) on the network for every packet sent over an internetwork.
By caching the network addresses and the associated data-link addresses in the memory for a period of
time, the Cisco CG-OS router eliminates the need to reexamine each packet when it is broadcast. Instead,
the Cisco CG-OS router can reference the ARP cache first and then apply the appropriate address to a
packet that is destined for a known destination device. This process helps limit possible negative affects
on network performance.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-3
Chapter 2 Configuring IPv4
Information About IPv4
Proxy ARP
Proxy ARP enables a device that is physically located on one network to appear to be logically part of a
different physical network that connects to the same device or firewall. Proxy ARP allows you to hide a
device with a public IP address on a private network behind a router and still have the device appear to
be on the public network in front of the router. By hiding its identity, the router accepts responsibility
for routing packets to the real destination. Proxy ARP can help devices on a subnet reach remote subnets
without configuring routing or a default gateway.
When devices are not in the same data link layer network but in the same IP network, they try to transmit
data to each other as if they are on the local network. However, the router that separates the devices does
not send a broadcast message because routers do not pass hardware-layer broadcasts and it cannot
resolve the addresses.
When you enable Proxy ARP on the device and it receives an ARP request, it identifies the request as a
request for a system that is not on the local LAN. The device responds as if it is the remote destination
to which the broadcast is addressed by sending an ARP response that associates the MAC address of the
device with the IP address of the remote destination. The local device believes that it is directly
connected to the destination device, although their local device is forwarding packets from its local
subnetwork to the destination subnetwork. By default, Proxy ARP is disabled.
Gratuitous ARP
Gratuitous ARP sends a request with an identical source IP address and a destination IP address to detect
duplicate IP addresses.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-4 OL-25630-04
Chapter 2 Configuring IPv4
Prerequisites for IPv4
ICMP
You can use the Internet Control Message Protocol (ICMP) to provide message packets that report errors
and other information that is relevant to IP processing. ICMP generates error messages, such as ICMP
destination unreachable messages, ICMP Echo Requests (which send a packet on a round trip between
two hosts), and Echo Reply messages. ICMP also provides many diagnostic functions and can send and
redirect error packets to the host. By default, ICMP is enabled on the Cisco CG-OS router.
Some of the ICMP message types are as follows:
• Network error messages
• Network congestion messages
• Troubleshooting information
• Timeout announcements
Note ICMP redirects are disabled on interfaces on which the local proxy ARP feature is enabled.
Default Settings
Table 2-1 lists the default settings for IP parameters.
Parameters Default
ARP timeout 1500 seconds
proxy ARP Disabled
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-5
Chapter 2 Configuring IPv4
Configuring IPv4
Configuring IPv4
This section includes the following topics:
• Configuring IPv4 Addressing, page 2-6
• Configuring Multiple IP Addresses, page 2-7
• Configuring a Static ARP Entry, page 2-7
• Configuring Proxy ARP, page 2-8
• Configuring Local Proxy ARP, page 2-8
• Configuring Gratuitous ARP, page 2-9
• Configuring Path MTU Discovery, page 2-10
• Configuring IP Directed Broadcasts, page 2-10
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ip address ip address mask [secondary] Specifies a primary or secondary IPv4 address for an
interface.
• The network mask can be a four-part dotted
decimal address. For example, 255.0.0.0 indicates
that each bit equal to 1 means the corresponding
address bit belongs to the network address.
• The network mask can be indicated as a slash (/)
and a number (a prefix length). The prefix length
is a decimal value that indicates how many of the
high-order contiguous bits of the address
comprise the prefix (the network portion of the
address). A slash must precede the decimal value
and there is no space between the IP address and
the slash.
Step 4 show ip interface (Optional) Displays interfaces configured for IPv4.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-6 OL-25630-04
Chapter 2 Configuring IPv4
Configuring IPv4
EXAMPLE
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ip address ip address mask [secondary] Specifies the configured address as a secondary IPv4
address.
Step 4 show ip interface (Optional) Displays interfaces configured for IPv4.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to assign multiple, secondary IPv4 addresses to an interface.
router# configure terminal
router(config)# interface ethernet 2/3
router(config-if)# ip address 192.168.1.1 255.0.0.0 secondary
router(config-if)# copy running-config startup-config
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-7
Chapter 2 Configuring IPv4
Configuring IPv4
Command Purpose
Step 3 ip arp ip-address mac-address Associates an IP address with a MAC address as a
static entry.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ip proxy-arp Enables Proxy ARP on the interface.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure Proxy ARP on the Cisco CG-OS router.
router# configure terminal
router(config)# interface ethernet 2/3
router(config-if)# ip proxy-arp
router(config-if)# copy running-config startup-config
No prerequisites.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-8 OL-25630-04
Chapter 2 Configuring IPv4
Configuring IPv4
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ip local-proxy-arp Enables Local Proxy ARP on the interface.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure local proxy ARP on an Ethernet interface.
router# configure terminal
router(config)# interface ethernet 2/3
router(config-if)# ip local-proxy-arp
router(config-if)# copy running-config startup-config
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ip arp gratuitous {request | update} Configures gratuitous ARP parameters on the
interface. Gratuitous ARP is enabled by default.
request—Enables sending of gratuitous ARP requests
when the Cisco CG-OS router detects a duplicate
address.
update—Enables ARP cache updates for gratuitous
ARP.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to enable sending of gratuitous ARP requests when the Cisco CG-OS router
detects duplicate addresses:
router# configure terminal
router(config)# interface ethernet 2/3
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-9
Chapter 2 Configuring IPv4
Configuring IPv4
To disable gratuitous ARP requests or updates, use the no ip arp gratuitous command.
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 ip tcp path-mtu-discovery Enables path MTU discovery.
Step 3 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure path MTU discovery on the Cisco CG-OS router.
router# configure terminal
router(config)# ip tcp path-mtu-discovery
router(config)# copy running-config startup-config
Command Purpose
ip directed-broadcast Enables the translation of a directed broadcast to physical
broadcasts for an interface.
To disable directed broadcasts, enter the no ip
directed-broadcast command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-10 OL-25630-04
Chapter 2 Configuring IPv4
Verifying the IPv4 Configuration
Note The Cisco CG-OS router does not support the optional parameter, [vrf vrf-name], when present in any
of the show commands listed below.
Command Purpose
show ip adjacency Displays the adjacency table.
show ip adjacency summary Displays the summary of number of throttle adjacencies.
show ip arp Displays the ARP table.
show ip arp summary Displays the summary of the number of throttle
adjacencies.
show ip adjacency throttle statistics Displays only the throttled adjacencies.
show ip interface Displays IP-related interface information.
show ip arp statistics Displays the ARP statistics.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 2-11
Chapter 2 Configuring IPv4
Configuration Example for IPv4
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
2-12 OL-25630-04
CH A P T E R 3
Configuring IPv6
This chapter describes how to configure Internet Protocol version 6 (IPv6), which includes addressing,
Neighbor Discovery (ND) Protocol, and Internet Control Message Protocol version 6 (ICMPv6), on the
Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).
The system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About IPv6, page 3-1
• Prerequisites for IPv6, page 3-17
• Guidelines and Limitations for IPv6, page 3-18
• Default Settings, page 3-18
• Configuring IPv6, page 3-18
• Verifying the IPv6 Configuration, page 3-22
• Configuration Example for IPv6, page 3-22
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-1
Chapter 3 Configuring IPv6
Information About IPv6
IPv6 addresses contain consecutive zeros within the address. You can use two colons (::) at the
beginning, middle, or end of an IPv6 address to replace the consecutive zeros. Table 3-1 shows a list of
compressed IPv6 address formats.
Note You can use two colons (::) only once in an IPv6 address to replace the longest string of consecutive
zeros within the address.
You can use a double colon as part of the IPv6 address when consecutive 16-bit values are denoted as
zero. You can configure multiple IPv6 addresses per interface but only one link-local address.
The hexadecimal letters in IPv6 addresses are not case sensitive.
A node may use the loopback address listed in Table 3-1 to send an IPv6 packet to itself. The loopback
address in IPv6 is the same as the loopback address in IPv4. For more information, see Router IDs,
page 1-5.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-2 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
Note You cannot assign the IPv6 loopback address to a physical interface. A packet that contains the IPv6
loopback address as its source or destination address must remain within the node that created the packet.
IPv6 routers do not forward packets that have the IPv6 loopback address as their source or destination
address.
Note You cannot assign an IPv6 unspecified address to an interface. Additionally, do not use the unspecified
IPv6 addresses as destination addresses in IPv6 packets or the IPv6 routing header.
The IPv6 address is specified in hexadecimal using 16-bit values between colons. The IPv6-prefix length
is a decimal value that indicates how many of the high-order contiguous bits of the address comprise the
prefix (the network portion of the address). For example, 2001:0DB8:8086:6502::/32 is a valid IPv6
prefix. For more information, refer to RFC 4291.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-3
Chapter 3 Configuring IPv6
Information About IPv6
88119
Global Routing Prefix SLA Interface ID
001
Addresses with a prefix of 2000::/3 (001) through E000::/3 (111) must have 64-bit interface identifiers
in the extended universal identifier (EUI)-64 format. The Internet Assigned Numbers Authority (IANA)
allocates the IPv6 address space in the range of 2000::/16 to regional registries.
The aggregatable global address consists of a 48-bit global routing prefix and a 16-bit subnet ID or
Site-Level Aggregator (SLA). In the IPv6 aggregatable global unicast address format document
(RFC 2374), the global routing prefix included two other hierarchically structured fields called
Top-Level Aggregator (TLA) and Next-Level Aggregator (NLA). The IETF decided to remove the TLS
and NLA fields from the RFCs because these fields are policy based. Some existing IPv6 networks
deployed before the change might still use networks that are on the older architecture.
A subnet ID, which is a 16-bit subnet field, can be used by individual organizations to create a local
addressing hierarchy and to identify subnets. A subnet ID is similar to a subnet in IPv4, except that an
organization with an IPv6 subnet ID can support up to 65,535 individual subnets.
An interface ID identifies interfaces on a link. The interface ID is unique to the link. In many cases, an
interface ID is the same as or based on the link-layer address of an interface. Interface IDs used in
aggregatable global unicast and other IPv6 address types have 64 bits and are in the modified EUI-64
format.
Interface IDs are in the modified EUI-64 format in one of the following ways:
• For all IEEE 802 interface types (for example, Ethernet, and Fiber Distributed Data interfaces), the
first three octets (24 bits) are the Organizationally Unique Identifier (OUI) of the 48-bit link-layer
address (MAC address) of the interface, the fourth and fifth octets (16 bits) are a fixed hexadecimal
value of FFFE, and the last three octets (24 bits) are the last three octets of the MAC address. The
Universal/Local (U/L) bit, which is the seventh bit of the first octet, has a value of 0 or 1. Zero
indicates a locally administered identifier; 1 indicates a globally unique IPv6 interface identifier.
• For all other interface types (for example, serial, loopback, ATM, Frame Relay, and tunnel interface
types—except tunnel interfaces used with IPv6 overlay tunnels), the interface ID is similar to the
interface ID for IEEE 802 interface types; however, the router uses the first MAC address from the
pool of MAC addresses as the identifier (because the interface does not have a MAC address).
• For tunnel interface types that employ IPv6 overlay tunnels, the interface ID is the IPv4 address
assigned to the tunnel interface with all zeros in the high-order 32 bits of the identifier.
Note For interfaces that use the Point-to-Point Protocol (PPP), where the interfaces at both ends of the
connection might have the same MAC address, the interface identifiers negotiate at both ends of
the connection (picked randomly and, if necessary, reconstructed) until both identifiers are
unique. The router uses the first MAC address as the identifier for interfaces using PPP.
When no IEEE 802 interface types are in the router, link-local IPv6 addresses are generated on the
interfaces in the router in the following sequence:
1. The router is queried for MAC addresses (from the pool of MAC addresses in the router).
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-4 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
2. When there are no MAC addresses available in the router, the router serial number is used to form
the link-local addresses.
3. When the serial number of the router cannot be used to form the link-local addresses, the router uses
a Message Digest 5 (MD5) hash to determine the MAC address of the router from the hostname of
the router.
Link-Local Addresses
A link-local address is an IPv6 unicast address that can be automatically configured on any interface
using the link-local prefix FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64
format. Link-local addresses are used in the Neighbor Discovery (ND) protocol and the stateless
autoconfiguration process. Devices on a local link can use link-local addresses to communicate; the
devices do not need globally unique addresses to communicate. Figure 3-2 shows the structure of a
link-local address.
IPv6 routers cannot forward packets that have link-local source or destination addresses to other links.
128 bits
0 Interface ID
1111 1110 10
FE80::/10
52669
10 bits
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-5
Chapter 3 Configuring IPv6
Information About IPv6
/7 /48 /64
Local IPv6
Subnet prefix
Link prefix
232389
• Subnet ID — 16-bit subnet ID is an identifier of a subnet within the site.
• Interface ID — 64-bit IID
Site-Local Address
Because RFC 3879 deprecates the use of site-local addresses, you should follow the recommendations
of unique local addressing (ULA) in RFC 4193 when you configure private IPv6 addresses.
Note Anycast addresses can be used only by a router, not a host. Anycast addresses cannot be used as the
source address of an IPv6 packet.
Figure 3-4 shows the format of the subnet router anycast address; the address has a prefix concatenated
by a series of zeros (the interface ID). The subnet router anycast address can be used to reach a router
on the link that is identified by the prefix in the subnet router anycast address.
128 bits
52670
Prefix 0000000000000...000
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-6 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
128 bits
0 Interface ID
4 bits 4 bits
1111 1111
0 if permanent
F F Lifetime Scope Lifetime =
1 if temporary
1 = node
8 bits 8 bits 2 = link
Scope = 5 = site
8 = organization
52671
E = global
IPv6 nodes (hosts and routers) must join the following multicast groups:
• All-nodes multicast group FF02:0:0:0:0:0:0:1 (the scope is link-local)
• Solicited-node multicast group FF02:0:0:0:0:1:FF00:0000/104 for each of its assigned unicast and
anycast addresses
IPv6 routers must also join the all-routers multicast group FF02:0:0:0:0:0:0:2 (the scope is link-local).
The solicited-node multicast address is a multicast group that corresponds to an IPv6 unicast or anycast
address. IPv6 nodes must join the associated solicited-node multicast group for every unicast and
anycast address to which it is assigned. The IPv6 solicited-node multicast address has the prefix
FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6 unicast
or anycast address (see Figure 3-6). For example, the solicited-node multicast address that corresponds
to the IPv6 address 2037::01:800:200E:8C6C is FF02::1:FF0E:8C6C. Solicited-node addresses are used
in neighbor solicitation messages.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-7
Chapter 3 Configuring IPv6
Information About IPv6
128 bits
52672
Note IPv6 has no broadcast addresses. IPv6 multicast addresses are used instead of broadcast addresses.
32 bits
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-8 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
Field Description
Version Similar to the Version field in the IPv4 packet header, except that the
field lists number 6 for IPv6 instead of number 4 for IPv4.
Traffic Class Similar to the Type of Service field in the IPv4 packet header. The
Traffic Class field tags packets with a traffic class that is used in
differentiated services.
Flow Label New field in the IPv6 packet header. The Flow Label field tags
packets with a specific flow that differentiates the packets at the
network layer.
Payload Length Similar to the Total Length field in the IPv4 packet header. The
Payload Length field indicates the total length of the data portion of
the packet.
Next Header Similar to the Protocol field in the IPv4 packet header. The value of
the Next Header field determines the type of information that follows
the basic IPv6 header. The type of information that follows the basic
IPv6 header can be a transport-layer packet, for example, a TCP or
UDP packet, or an Extension Header, as shown in Figure 3-8.
Hop Limit Similar to the Time to Live field in the IPv4 packet header. The value
of the Hop Limit field specifies the maximum number of routers that
an IPv6 packet can pass through before the packet is considered
invalid. Each router decrements the value by one. Because no
checksum is in the IPv6 header, the router can decrement the value
without needing to recalculate the checksum, which saves processing
resources.
Source Address Similar to the Source Address field in the IPv4 packet header, except
that the field contains a 128-bit source address for IPv6 instead of a
32-bit source address for IPv4.
Destination Address Similar to the Destination Address field in the IPv4 packet header,
except that the field contains a 128-bit destination address for IPv6
instead of a 32-bit destination address for IPv4.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-9
Chapter 3 Configuring IPv6
Information About IPv6
Source Address
40
octets
Destination Address
51458
32 bits
Optional extension headers and the data portion of the packet are after the eight fields of the basic IPv6
packet header. When present, each extension header is aligned to 64 bits. There is no fixed number of
extension headers in an IPv6 packet. Each extension header is identified by the Next Header field of the
previous header. Typically, the final extension header has a Next Header field of a transport-layer
protocol, such as TCP or UDP. Figure 3-9 shows the IPv6 extension header format.
IPv6
packet
Any number of
extension headers
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-10 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
Table 3-3 lists the extension header types and their Next Header field values along with their
recommended order in the packet.
Table 3-3 IPv6 Extension Header Types and Recommended Packet Order
Next Header
Header Type Value Description
Hop-by-hop options header 0 Header that is processed by all hops in the path of a
packet. When present, the hop-by-hop options header
always follows immediately after the basic IPv6
packet header.
Destination options header 6 Header that can follow any hop-by-hop options
header. The header is processed at the final destination
and at each visited address specified by a routing
header. Alternatively, the destination options header
can follow any Encapsulating Security Payload (ESP)
header. The destination options header is processed
only at the final destination.
Routing header 43 Header that is used for source routing.
Fragment header 44 Header that is used when a source fragments a packet
that is larger than the maximum transmission unit
(MTU) for the path between itself and a destination.
The Fragment header is used in each fragmented
packet.
Upper-layer headers 6 (TCP) Headers within a packet that transport the data. The
17 (UDP) two main transport protocols are TCP and UDP.
Note IPv6 also supports the reverse mapping of IPv6 addresses to DNS names.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-11
Chapter 3 Configuring IPv6
Information About IPv6
Note In IPv6, the minimum link MTU is 1280 octets. Cisco recommends that you use an MTU value of 1500
octets for IPv6 links.
Note The IPv6 header does not have a checksum. However, a checksum on the transport layer can determine
when packets are not delivered correctly. All checksum calculations that include the IP address in the
calculation must be modified for IPv6 to accommodate the new128-bit address. A pseudo header
generates the checksum.
The ICMPv6 Data field contains error or diagnostic information that relates to IP packet processing.
Figure 3-10 shows the IPv6 ICMP packet header format.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-12 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
ICMPv6 Payload
52728
IPv6 Neighbor Discovery
You can use the IPv6 Neighbor Discovery Protocol (NDP) to determine whether a neighboring router is
reachable. IPv6 nodes use neighbor discovery to determine the addresses of nodes on the same network
(local link), to find neighboring routers that can forward their packets, to verify whether neighboring
routers are reachable or not, and to detect changes to link-layer addresses. NDP uses ICMP messages to
detect whether packets are sent to neighboring routers that are unreachable.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-13
Chapter 3 Configuring IPv6
Information About IPv6
52673
A and B can now exchange
packets on this link
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor
advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the
local link. The source address is the IPv6 address of the node (the IPv6 address of the node interface that
sends the neighbor advertisement message). The destination address is the IPv6 address of the node that
sends the neighbor solicitation message. The data portion includes the link-layer address of the node that
sends the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node can
communicate.
Neighbor solicitation messages can verify the reachability of a neighbor after a node identifies the
link-layer address of a neighbor. When a node wants to verify the reachability of a neighbor, it uses the
destination address in a neighbor solicitation message as the unicast address of the neighbor.
Neighbor advertisement messages are also sent when there is a change in the link-layer address of a node
on a local link. When there is a change, the destination address for the neighbor advertisement is the
all-nodes multicast address.
Neighbor unreachability detection identifies the failure of a neighbor or the failure of the forward path
to the neighbor and is used for all paths between hosts and neighboring nodes (hosts or routers).
Neighbor unreachability detection is performed for neighbors to which only unicast packets are being
sent and is not performed for neighbors to which multicast packets are being sent.
A neighbor is considered reachable when a positive acknowledgment is returned from the neighbor
(indicating that packets previously sent to the neighbor have been received and processed). A positive
acknowledgment—from an upper-layer protocol (such as TCP)—indicates that a connection is making
forward progress (reaching its destination). If packets are reaching the peer, they are also reaching the
next-hop neighbor of the source. Forward progress is also a confirmation that the next-hop neighbor is
reachable.
For destinations that are not on the local link, forward progress implies that the first-hop router is
reachable. When acknowledgments from an upper-layer protocol are not available, a node probes the
neighbor using unicast neighbor solicitation messages to verify that the forward path is still working.
The return of a solicited neighbor advertisement message from the neighbor is a positive
acknowledgment that the forward path is still working (neighbor advertisement messages that have the
solicited flag set to a value of 1 are sent only in response to a neighbor solicitation message). Unsolicited
messages confirm only the one-way path from the source to the destination node; solicited neighbor
advertisement messages indicate that a path is working in both directions.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-14 OL-25630-04
Chapter 3 Configuring IPv6
Information About IPv6
Note A neighbor advertisement message that has the solicited flag set to a value of 0 is not considered as
positive acknowledgment that the forward path is still working.
Neighbor solicitation messages are also used in the stateless autoconfiguration process to verify the
uniqueness of unicast IPv6 addresses before the addresses are assigned to an interface. Duplicate address
detection is performed first on a new, link-local IPv6 address before the address is assigned to an
interface (the new address remains in a tentative state while duplicate address detection is performed).
A node sends a neighbor solicitation message with an unspecified source address and a tentative
link-local address in the body of the message.When another node is already using that address, the node
returns a neighbor advertisement message that contains the tentative link-local address. When another
node is simultaneously verifying the uniqueness of the same address, that node also returns a neighbor
solicitation message. If no neighbor advertisement messages are received in response to the neighbor
solicitation message and no neighbor solicitation messages are received from other nodes that are
attempting to verify the same tentative address, then the node that sent the original neighbor solicitation
message considers the tentative link-local address to be unique and assigns the address to the interface.
Router Router
advertisement advertisement
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-15
Chapter 3 Configuring IPv6
Information About IPv6
RAs are also sent in response to router solicitation messages. Router solicitation messages, which have
a value of 133 in the Type field of the ICMP packet header, are sent by hosts at system startup so that
the host can immediately auto-configure without needing to wait for the next scheduled RA message.
The source address is usually the unspecified IPv6 address (0:0:0:0:0:0:0:0). When the host has a
configured unicast address, the unicast address of the interface that sends the router solicitation message
is used as the source address in the message. The destination address is the all-routers multicast address
with a scope of the link. When an RA is sent in response to a router solicitation, the destination address
in the RA message is the unicast address of the source of the router solicitation message.
You can configure the following RA message parameters:
• The time interval between periodic RA messages
• The router life-time value, which indicates the usefulness of a router as the default router (for use
by all nodes on a given link)
• The network prefixes in use on a given link
• The time interval between neighbor solicitation message retransmissions (on a given link)
• The amount of time that a node considers a neighbor reachable (for use by all nodes on a given link)
The configured parameters are specific to an interface. The sending of RA messages (with default
values) is automatically enabled on Ethernet interfaces. For other interface types, you must enter the no
ipv6 nd suppress-ra command to send RA messages. You can disable the RA message feature on
individual interfaces by entering the ipv6 nd suppress-ra command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-16 OL-25630-04
Chapter 3 Configuring IPv6
Prerequisites for IPv6
Host H
Device B Device A
Note A router must be able to determine the link-local address for each of its neighboring routers in order to
ensure that the target address (the final destination) in a redirect message identifies the neighbor router
by its link-local address. For static routing, you should specify the address of the next-hop router using
the link-local address of the router. For dynamic routing, you must configure all IPv6 routing protocols
to exchange the link-local addresses of neighboring routers.
After forwarding a packet, a router sends a redirect message to the source of the packet under the
following circumstances:
• The destination address of the packet is not a multicast address
• The packet was not addressed to the router
• The packet is about to be sent out the interface on which it was received
• The router determines that a better first-hop node for the packet resides on the same link as the
source of the packet
• The source address of the packet is a global IPv6 address of a neighbor on the same link or a
link-local address
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-17
Chapter 3 Configuring IPv6
Guidelines and Limitations for IPv6
Default Settings
Table 3-5 lists the default settings for IPv6 parameters.
Parameters Default
Neighbor Discovery (ND) reachable time 0 milliseconds
Neighbor solicitation retransmit interval 1000 milliseconds
Configuring IPv6
This section includes the following topics:
• Configuring IPv6 Addressing, page 3-18
• Configuring IPv6 Neighbor Discovery, page 3-20
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-18 OL-25630-04
Chapter 3 Configuring IPv6
Configuring IPv6
Command Purpose
Step 3 ipv6 address {addr [eui64] Specifies an IPv6 address for an interface and enables
[route-preference preference] [secondary] IPv6 processing on the interface.
tag tag-id]
Entering the ipv6 address command configures a
global IPv6 address for the interface.
(Optional) Specifying eui64 in the command assigns
an interface identifier (ID) in the low-order 64 bits of
the IPv6 address. Only the 64-bit network prefix for
the address needs to be specified; the last 64 bits are
automatically computed from the interface ID.
(Optional) Specifying router preference in the
command allows a preference for local or direct routes
to be set. Range is 0 to 255.
(Optional) Specifying secondary in the command
allows for definition of a secondary IPv6 address.
(Optional) Specifying tag in the command assigns a
value for the local or direct routes.
ipv6 address ipv6-address Entering the ipv6 address use-link-local-only
use-link-local-only command configures a link-local address for the
interface rather than the link-local address that is
automatically configured when IPv6 is enabled on the
interface.
This command enables IPv6 processing on an
interface without configuring an IPv6 address.
Step 4 show ipv6 interface (Optional) Displays interfaces configured for IPv6.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure a specific local-link address on the interface that the interface uses
instead of the link-local address that is automatically configured when IPv6 is enabled on the interface.
router# configure terminal
router(config)# interface ethernet 3/1
router(config-if)# ipv6 address use-link-local-only
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-19
Chapter 3 Configuring IPv6
Configuring IPv6
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface ethernet slot/port Enters interface configuration mode.
Step 3 ipv6 nd reachable-time time Advertises the time (in seconds) that the router
considers neighbor considers a neighbor up after
receiving a reachability confirmation within an
ICMPv6 router advertisement message.
Time is a value between 0 and 9000 seconds.
When the router has a reachable time value of 0, it is
not the default router.
Step 4 show ipv6 nd interface [type number] (Optional) Displays interfaces configured for IPv6
[detail] neighbor discovery.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure IPv6 neighbor discovery reachable time.
router# configure terminal
router(config)# interface ethernet 3/1
router(config-if)# ipv6 nd reachable-time 10
router(config-if)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-20 OL-25630-04
Chapter 3 Configuring IPv6
Configuring IPv6
Note Ignore all references to VRF in the display below. The router does not support the VRF feature;
however, it might be seen in command displays.
OPTIONAL COMMANDS
You can use the following optional IPv6 Neighbor Discovery commands.
Command Purpose
ipv6 nd hop-limit Configures the maximum number of hops used in router
advertisements and all IPv6 packets that the router
originates.
ipv6 nd managed-config-flag Sets the managed address configuration flag in IPv6 router
advertisements.
Note Command must be configured when DHCPv6 is
active in the network.
ipv6 nd mtu Sets the maximum transmission unit (MTU) size of IPv6
packets sent on an interface.
ipv6 nd ns-interval Configures the interval between IPv6 neighbor solicitation
retransmissions on an interface.
ipv6 nd other-config-flag Configures the other stateful configuration flag in IPv6
router advertisements.
ipv6 nd prefix ipv6 address Advertises the IPv6 prefix in the router advertisement
(RA).
ipv6 nd ra-interval Configures the interval between IPv6 RA transmissions on
an interface.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 3-21
Chapter 3 Configuring IPv6
Verifying the IPv6 Configuration
Command Purpose
ipv6 nd ra-lifetime Configures the router lifetime value in IPv6 RAs on an
interface.
ipv6 nd redirects Enables ICMPv6 redirect messages to be sent.
ipv6 nd retrans-timer Configures the advertised time between neighbor
solicitation messages in router advertisements.
ipv6 nd suppress-ra Suppresses IPv6 router advertisement transmissions on a
LAN interface.
Command Purpose
show ipv6 interface Displays IPv6-related interface information.
show ipv6 adjacency Displays the adjacency table.
show ipv6 icmp Displays ICMPv6 information.
show ipv6 nd Displays IPv6 neighbor discovery interface information.
show ipv6 neighbor Displays IPv6 neighbor entry.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
3-22 OL-25630-04
CH A P T E R 4
Configuring IP Services
This chapter describes how to configure the Domain Name Server (DNS) client and enable the Dynamic
Host Configuration Protocol version 4 (DHCPv4) client on the Cisco 1000 Series Connected Grid
Routers (hereafter referred to as the Cisco CG-OS router). The system software for the Cisco CG-OS
router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About IP Services, page 4-1
• Prerequisites, page 4-2
• Guidelines and Limitations, page 4-3
• Default Settings, page 4-3
• Configuring IP Services, page 4-3
• Verifying the Configuration, page 4-5
• Configuration Examples, page 4-6
DNS Client
When your network devices require connectivity with devices in networks for which you do not control
the name assignment, you can assign device names that uniquely identify your devices within the entire
internetwork using the domain name server (DNS). DNS uses a hierarchical scheme for establishing host
names for network nodes, which allows local control of the segments of the network through a
client-server scheme. The DNS system can locate a network device by translating the hostname of the
device into its associated IP address.
On the Internet, a domain is a portion of the naming hierarchy tree that refers to general groupings of
networks based on the organization type or geography. Domain names are pieced together with periods
(.) as the delimiting characters. For example, Cisco is a commercial organization that the Internet
identifies by a com domain, so its domain name is cisco.com. A specific hostname in this domain, the
File Transfer Protocol (FTP) system, for example, is identified as ftp.cisco.com.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 4-1
Chapter 4 Configuring IP Services
Prerequisites
Name Servers
Name servers keep track of domain names and know the parts of the domain tree for which they have
complete information. A name server might also store information about other parts of the domain tree.
To map domain names to IP addresses on the Cisco CG-OS router, you must identify the hostnames,
specify a name server, and enable the DNS service.
The Cisco CG-OS software allows you to statically map IP addresses to domain names. You can also
configure the Cisco CG-OS software to use one or more domain name servers to find an IP address for
a host name.
DNS Operation
A name server handles client-issued queries to the DNS server for locally defined hosts within a
particular zone as follows:
• An authoritative name server responds to DNS user queries for a domain name that is under its zone
of authority by using the permanent and cached entries in its own host table. When the query is for
a domain name that is under its zone of authority but for which it does not have any configuration
information, the authoritative name server replies that no such information exists.
• A name server that is not configured as the authoritative name server responds to DNS user queries
by using information that it has cached from previously received query responses. When no
Cisco CG-OS router is configured as the authoritative name server for a zone, queries to the DNS
server for locally defined hosts receive nonauthoritative responses.
Name servers answer DNS queries (forward incoming DNS queries or resolve internally generated DNS
queries) according to the forwarding and lookup parameters configured for the specific domain.
Stateless Restart
The Cisco CG-OS router supports stateless restarts for the DNS client. After a system reboot, the
Cisco CG-OS software applies the running configuration.
Prerequisites
DNS
You must have a DNS name server accessible to the Cisco CG-OS router.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
4-2 OL-25630-04
Chapter 4 Configuring IP Services
Guidelines and Limitations
DHCPv4
You must have a DHCPv4 server accessible to the Cisco CG-OS router.
When the Cisco CG-OS router and the DHCPv4 server are on different subnets, DHCPv4 relay must be
enabled on a router in the path between the Cisco CG-OS router and the DHCPv4 server.
DNS
DNS Security Extension (DNSSEC) is not supported on the Cisco CG-OS router.
Default Settings
Table 4-1 lists the default settings for IP Services parameters.
Parameters Default
DNS client Enabled
DHCPv4 server Disabled
Configuring IP Services
This section includes the following topics:
• Configuring DNS Clients, page 4-3
• Enabling DHCPv4 on Interfaces, page 4-4
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 4-3
Chapter 4 Configuring IP Services
Configuring IP Services
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 ip host name address1 [address2... address6] Defines up to six static hostname-to-address mappings
in the hostname cache. The address can be either an
IPv4 address or an IPv6 address.
Step 3 ip domain-name name (Optional) Defines the default domain name that the
Cisco CG-OS router uses to complete unqualified host
names.
The Cisco CG-OS router appends the default domain
name to any hostname that does not contain a complete
domain name before starting a domain-name lookup.
Step 4 ip domain-list name (Optional) Defines additional domain names that the
Cisco CG-OS router uses to complete unqualified
hostnames.
The Cisco CG-OS router uses each entry in the domain
list to append that domain name to any hostname that
does not contain a complete domain name before
starting a domain-name lookup. The process continues
for each entry in the domain list until it finds a match.
Step 5 ip name-server address1 [address2... (Optional) Defines up to six name servers. The address
address6] can be either an IPv4 address or an IPv6 address.
Step 6 ip domain-lookup (Optional) Enables DNS-based address translation.
Step 7 show hosts (Optional) Displays information about DNS.
Step 8 copy running-config startup-config (Optional) Saves this configuration change by copying
it from the running-config file to the startup-config
file.
EXAMPLE
This example shows how to configure a default domain name and enable DNS lookup.
router# configure terminal
router(config)# ip host cisco-rtp 192.0.2.1
router(config)# ip domain-name myserver.com
router(config)# ip domain-list mycompany.com
router(config)# copy running-config startup-config
Verify that the Cisco CG-OS router has access to the DHCPv4 server.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
4-4 OL-25630-04
Chapter 4 Configuring IP Services
Verifying the Configuration
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Step 2 interface {ethernet | wimax} Specifies an interface and enters the interface configuration
slot/port mode.
Step 3 ip address dhcp Enables DHCPv4 client on the interface to allow automatic
assignment of IP addresses to the specified interface.
To disable DHCPv4 on the interface, enter no ip address dhcp
for the interface.
Step 4 show ip interface brief (Optional) Displays abbreviated configuration details for
interfaces configured with IPv4 addresses.
Step 5 show ip interface slot/port (Optional) Displays configuration details for a specific interface.
Step 6 copy running-config (Optional) Saves this configuration change by copying it from the
startup-config running-config file to the startup-config file.
EXAMPLE
Command Purpose
show hosts Displays information about DNS.
show interface Displays configuration information about the
interface.
show ip interface slot/port Displays configuration details for a specific IPv4
interface.
show ip interface brief Displays abbreviated configuration details for
interfaces configured with IPv4 addresses.
show running-config interface slot/port Displays the running configuration for the
specified interface.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 4-5
Chapter 4 Configuring IP Services
Configuration Examples
Configuration Examples
DNS Client
This example shows how to establish a domain list with several alternate domain names.
ip domain-list csi.com
ip domain-list telecomprog.edu
ip domain-list merit.edu
This example shows how to locate local name servers, configure the hostname-to-address mapping,
configure the addresses of the two name servers, and the default domain name.
ip domain lookup
ip name-server 192.168.1.111 192.168.1.2
ip domain-name cisco.com
DHCPv4 Client
This example shows how to enable DHCPv4 client on a specific interface.
router# configure terminal
router(config)# interface ethernet 3/1
router(config-if)# ip address dhcp
router(config-if)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
4-6 OL-25630-04
CH A P T E R 5
Configuring OSPFv2
This chapter describes how to configure Open Shortest Path First version 2 (OSPFv2) for IPv4 networks
on the Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).
The system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About OSPFv2, page 5-1
• Prerequisites for OSPFv2, page 5-12
• Guidelines and Limitations for OSPFv2, page 5-12
• Default Settings, page 5-12
• Configuring Basic OSPFv2, page 5-13
• Configuring Advanced OSPFv2, page 5-19
• Verifying the OSPFv2 Configuration, page 5-30
• Monitoring OSPFv2 Statistics, page 5-31
• Configuration Example for OSPFv2, page 5-31
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-1
Chapter 5 Configuring OSPFv2
Information About OSPFv2
Hello Packet
OSPFv2 routers periodically send Hello packets on every OSPF-enabled interface. The hello interval
determines how frequently the router sends these Hello packets. You configure the hello interval on
interfaces. OSPFv2 uses Hello packets for the following tasks:
• Neighbor discovery
• Keepalives
• Bidirectional communications
• Designated router election (see Designated Routers, page 5-3)
The Hello packet contains information about the originating OSPFv2 interface and router, including the
assigned OSPFv2 cost of the link, the hello interval, and optional capabilities of the originating router.
An OSPFv2 interface that receives these Hello packets determines if the settings are compatible with the
receiving interface settings. Compatible interfaces are considered neighbors and are added to the
neighbor table (see Neighbors, page 5-2).
Hello packets also include a list of router IDs for the routers that communicate with the originating
interface. When the receiving interface sees its own router ID in this list, that state confirms that
bidirectional communication between the two interfaces exists.
OSPFv2 uses Hello packets as a keepalive message to determine if a neighbor is still communicating. If
a router does not receive a Hello packet by the configured dead interval (usually a multiple of the hello
interval), then the router removes the neighbor from the local neighbor table.
Neighbors
An OSPFv2 interface must have a compatible configuration with a remote interface before the two can
be considered neighbors. The two OSPFv2 interfaces must match the following criteria:
• Hello interval
• Dead interval
• Area ID (see Areas, page 5-4)
• Authentication
• Optional capabilities
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-2 OL-25630-04
Chapter 5 Configuring OSPFv2
Information About OSPFv2
When there is a match, the following information is entered into the neighbor table:
• Neighbor ID—The router ID of the neighbor.
• Priority—Priority of the neighbor, which is a component in designated router election (see
Designated Routers, page 5-3).
• State—Indication of whether the neighbor has just been heard from, is in the process of setting up
bidirectional communications, is sharing the link-state information, or has achieved full adjacency.
• Dead time—Indication of the time since the last Hello packet was received from this neighbor.
• IP Address—The IP address of the neighbor.
• Designated Router—Indication of whether the neighbor has been declared as the designated router
or as the backup designated router (see Designated Routers, page 5-3).
• Local interface—The local interface that received the Hello packet for this neighbor.
Adjacency
Adjacency is the path from each router to its local designated router (DR). Not all neighbors establish
adjacency. Depending on the network type and designated router establishment, some neighbors become
fully adjacent and share LSAs with all their neighbors, while other neighbors do not. For more
information, see Designated Routers, page 5-3.
Adjacency is established using Database Description packets, Link State Request packets, and Link
State Update packets in OSPFv2. The Database Description packet includes just the LSA headers from
the link-state database of the neighbor (see Link-State Database, page 5-7). The local router compares
these headers with its own link-state database and determines which LSAs are new or updates. The local
router sends a Link State Request packet for each LSA for which it needs new or updated information.
The neighbor responds with a Link State Update packet. This exchange continues until both routers have
the same link-state information.
Designated Routers
Networks with multiple routers present a unique situation for OSPFv2. When every router floods the
network with LSAs, this results in multiple resources sending the same link-state information.
Depending on the type of network, OSPFv2 might use a single router, the designated router (DR), to
control the LSA floods and represent the network to the rest of the OSPFv2 area (see Areas, page 5-4).
When the DR fails, OSPFv2 selects a backup designated router (BDR).
Network types are as follows:
• Point-to-point—A network that exists only between two routers. All neighbors on a point-to-point
network establish adjacency and there is no DR.
• Broadcast—A network with multiple routers that can communicate over a shared medium that
allows broadcast traffic such as Ethernet. OSPFv2 routers establish a DR and BDR that controls
LSA flooding on the network. OSPFv2 uses the well-known IPv4 multicast addresses 224.0.0.5 and
a MAC address of 0100.5300.0005 to communicate with neighbors.
OSPFv2 selects the DR and BDR based on the information in the Hello packet. When an interface sends
a Hello packet, it sets the priority field and the DR and BDR field when it knows details on the DR and
BDR. The routers follow an election procedure based on which routers declare themselves in the DR and
BDR fields and the priority field in the Hello packet. As a final determinant, OSPFv2 chooses the router
with the highest router IDs as the DR and BDR.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-3
Chapter 5 Configuring OSPFv2
Information About OSPFv2
All other routers establish adjacency with the DR and the BDR and use the IPv4 multicast address
224.0.0.6 to send LSA updates to the DR and BDR. Figure 5-1 shows this adjacency relationship
between all routers and the DR.
DRs are tied to router interfaces. A router might be the DR for one network and not for another network
that it connects through a different interface.
Router D Router E
or DR
182982
= Multi-access network
= Logical connectivity to Designated Router for OSPF
Areas
You can limit the CPU and memory requirements that OSPFv2 puts on the routers by dividing an
OSPFv2 network into areas. An area is a logical division of routers and links within an OSPFv2 domain
that creates separate subdomains. LSA flooding is contained within an area, and the link-state database
can only access links within the area. You can assign an area ID to the interfaces within the defined area.
The Area ID is a 32-bit value that you can enter as a number or in dotted decimal notation such as
10.2.3.1.
The Cisco CG-OS software always displays the area in dotted decimal notation.
When you define more than one area in an OSPFv2 network, you must also define the backbone area,
which has the reserved area ID of 0. If you have more than one area, then one or more routers become
area border routers (ABRs). An ABR connects to both the backbone area and at least one other defined
area (see Figure 5-2).
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-4 OL-25630-04
Chapter 5 Configuring OSPFv2
Information About OSPFv2
ABR1
Area 0 Area 3
ABR2
Area 5
182983
The ABR has a separate link-state database for each area to which it connects. The ABR sends Network
Summary (type 3) LSAs (see Route Summarization, page 5-10) from one connected area to the backbone
area. The backbone area sends summarized information about one area to another area. In Figure 5-2,
Area 0 sends summarized information about Area 5 to Area 3.
OSPFv2 defines one other router type: the autonomous system boundary router (ASBR). This router
connects an OSPFv2 area to another autonomous system. OSPFv2 can redistribute its routing
information into another autonomous system or receive redistributed routes from another autonomous
system. For more information, see Advanced Features, page 5-8.
Link-State Advertisements
OSPFv2 uses link-state advertisements (LSAs) to build its routing table.
This section includes the following topics:
• LSA Types, page 5-5
• Link Cost, page 5-6
• Flooding and LSA Group Pacing, page 5-6
• Link-State Database, page 5-7
• Opaque LSAs, page 5-7
LSA Types
Table 5-1 shows the LSA types supported by the Cisco CG-OS software.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-5
Chapter 5 Configuring OSPFv2
Information About OSPFv2
Link Cost
Each OSPFv2 interface has a link cost. The cost is an arbitrary number. By default, the Cisco CG-OS
software assigns a cost that is the configured reference bandwidth divided by the interface bandwidth.
By default, the reference bandwidth is 40 Gb/s. Each LSA update contains the link cost.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-6 OL-25630-04
Chapter 5 Configuring OSPFv2
Information About OSPFv2
Link-State Database
Each router maintains a link-state database for the OSPFv2 network. This database contains all the
collected LSAs, and includes information on all the routes through the network. OSPFv2 uses this
information to calculate the best path to each destination and populates the routing table with these best
paths.
The router removes LSAs from the link-state database when it does not receive an LSA update within a
set interval (MaxAge). Routers flood a repeat of the LSA every 30 minutes to prevent accurate link-state
information from aging out. The Cisco CG-OS software supports the LSA grouping feature to prevent
all LSAs from refreshing at the same time. For more information, see Flooding and LSA Group Pacing,
page 5-6.
Opaque LSAs
Opaque LSAs allow you to extend OSPF functionality. Opaque LSAs consist of a standard LSA header
followed by application-specific information. This information might be used by OSPFv2 or by other
applications. OSPFv2 uses Opaque LSAs to support OSPFv2 Graceful Restart capability. Three Opaque
LSA types are defined as follows:
• LSA type 9—Flooded to the local network.
• LSA type 10—Flooded to the local area.
• LSA type 11—Flooded to the local autonomous system.
Authentication
You can configure authentication on OSPFv2 messages to prevent unauthorized or invalid routing
updates in your network. The Cisco CG-OS software supports two authentication methods:
• Simple password authentication
• MD5 authentication digest
You can configure the OSPFv2 authentication for an OSPFv2 area or per interface.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-7
Chapter 5 Configuring OSPFv2
Information About OSPFv2
MD5 Authentication
Cisco recommends using MD5 authentication to authenticate OSPFv2 messages. With MD5
authentication, you configure a password that is shared by the local router and all remote OSPFv2
neighbors. For each OSPFv2 message, the Cisco CG-OS software creates an MD5 one-way message
digest based on the message itself and the encrypted password. The interface sends this digest with the
OSPFv2 message. The receiving OSPFv2 neighbor validates the digest using the same encrypted
password. If the message has not changed, then the digest calculation is identical and the OSPFv2
message is considered valid.
MD5 authentication includes a sequence number with each OSPFv2 message to ensure that no message
is replayed in the network.
Advanced Features
The Cisco CG-OS software supports advanced OSPFv2 features that enhance the usability and
scalability of OSPFv2 in the network. This section includes the following topics:
• Stub Area, page 5-8
• Not-So-Stubby Area, page 5-9
• Virtual Links, page 5-9
• Route Summarization, page 5-10
• Configuring Graceful Restart, page 5-29
• OSPFv2 Stub Router Advertisements, page 5-11
• Multiple OSPFv2 Instances, page 5-11
• SPF Optimization, page 5-11
Stub Area
You can limit the amount of external routing information that floods an area by making it a stub area. A
stub area is an area that does not allow AS External (type 5) LSAs (see Link-State Advertisements,
page 5-5). These LSAs usually flood the local autonomous system to propagate external route
information. Stub areas have the following requirements:
• All routers in the stub area must be stub routers. See Stub Routing, page 1-6.
• No ASBR routers exist in the stub area.
• You cannot configure virtual links in the stub area.
Figure 5-3 shows an example of an OSPFv2 autonomous system where all routers in area 0.0.0.10 have
to go through the ABR to reach external autonomous systems. Area 0.0.0.10 can be configured as a stub
area.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-8 OL-25630-04
Chapter 5 Configuring OSPFv2
Information About OSPFv2
ABR
Backbone Area 10
Stub area
182984
ASBR
Stub areas use a default route for all traffic that must go through the backbone area to the external
autonomous system. The default route is 0.0.0.0 for IPv4.
Not-So-Stubby Area
A Not-so-Stubby Area (NSSA) is similar to a stub area, except that an NSSA allows you to import
autonomous system external routes within an NSSA by using redistribution. The NSSA ASBR
redistributes these routes and generates NSSA External (type 7) LSAs that it floods throughout the
NSSA. You can optionally configure the ABR that connects the NSSA to other areas to translate this
NSSA External LSA to AS External (type 5) LSAs. The ABR then floods these AS External LSAs
throughout the OSPFv2 autonomous system. The router supports summarization and filtering during the
translation. See Link-State Advertisements, page 5-5 for information about NSSA External LSAs.
You can, for example, use NSSA to simplify administration when you are connecting a central site using
OSPFv2 to a remote site that is using a different routing protocol. Before NSSA, the connection between
the corporate site border router and a remote router could not be run as an OSPFv2 stub area because
routes for the remote site could not be redistributed into a stub area. With NSSA, you can extend OSPFv2
to cover the remote connection by defining the area between the corporate router and the remote router
as an NSSA (see Configuring NSSA, page 5-22).
The backbone Area 0 cannot be an NSSA.
Virtual Links
Virtual links allow you to connect an OSPFv2 area ABR to a backbone area ABR when a direct physical
connection is not available. Figure 5-4 shows a virtual link that connects Area 3 to the backbone area
through Area 5.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-9
Chapter 5 Configuring OSPFv2
Information About OSPFv2
Area 0
ABR2 ABR1
Area 5 Area 3
182985
You can also use virtual links to temporarily recover from a partitioned area, which occurs when a link
within the area fails, isolating part of the area from reaching the designated ABR to the backbone area.
Route Summarization
Because OSPFv2 shares all learned routes with every OSPF-enabled router, you might want to use route
summarization to reduce the number of unique routes that are flooded to every OSPF-enabled router.
Route summarization simplifies route tables by replacing more-specific addresses with an address that
represents all the specific addresses. For example, you can replace 10.1.1.0/24, 10.1.3.0/24, and
10.1.5.0/24 with one summary address, 10.1.0.0/24.
Typically, you would summarize at the boundaries of area border routers (ABRs). Although you could
configure summarization between any two areas, it is better to summarize in the direction of the
backbone so that the backbone receives all the aggregate addresses and injects them, already
summarized, into other areas.
Graceful Restart
OSPFv2 automatically restarts when the process experiences problems. After the restart, OSPFv2
initiates a graceful restart so that the platform is not taken out of the network topology. When you
manually restart OSPF, it performs a graceful restart, which is similar to a stateful switchover. The router
applies the running configuration in both cases.
A graceful restart, known as nonstop forwarding (NSF), allows OSPFv2 to remain in the data forwarding
path through a process restart. When OSPFv2 needs to restart, it first sends a link-local opaque (type 9)
LSA, called a grace LSA (see Opaque LSAs, page 5-7).
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-10 OL-25630-04
Chapter 5 Configuring OSPFv2
Information About OSPFv2
The grace LSA includes a grace period, which is a specified time that the neighbor OSPFv2 interfaces
hold onto the LSAs from the restarting OSPFv2 interface. (Typically, OSPFv2 tears down the adjacency
and discards all LSAs from a down or restarting OSPFv2 interface.) The participating neighbors, which
are called NSF helpers, keep all LSAs that originate from the restarting OSPFv2 interface as if the
interface were still adjacent.
When the restarting OSPFv2 interface is operational again, it rediscovers its neighbors, establishes
adjacency, and starts sending its LSA updates again. At this point, the NSF helpers recognize that
graceful restart has finished.
Note When the restarting OSPFv2 interface does not come back up before the end of the grace period, or if
the network experiences a topology change, the OSPFv2 neighbors tear down adjacency with the
restarting OSPFv2 and treat it as a normal OSPFv2 restart.
SPF Optimization
The Cisco CG-OS software optimizes the SPF algorithm in the following ways:
• Partial SPF for Network (type 2) LSAs, Network Summary (type 3) LSAs, and AS External (type
5) LSAs—When there is a change on any of these LSAs, the Cisco CG-OS software performs a
faster partial calculation rather than running the whole SPF calculation.
• SPF timers—You can configure different timers for controlling SPF calculations. These timers
include exponential backoff for subsequent SPF calculations. The exponential backoff limits the
CPU load of multiple SPF calculations.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-11
Chapter 5 Configuring OSPFv2
Prerequisites for OSPFv2
Default Settings
Table 5-2 lists the default settings for OSPFv2 parameters.
Parameters Default
Hello interval 10 seconds
Dead interval 40 seconds
Graceful restart grace period 60 seconds
Graceful restart notify period 15 seconds
OSPFv2 feature Disabled
Stub router advertisement announce time 600 seconds
Reference bandwidth for link cost calculation 40 Gb/s
LSA minimal arrival time 1000 milliseconds
LSA group pacing 240 seconds
SPF calculation initial delay time 200 milliseconds
SPF minimum hold time 5000 milliseconds
SPF calculation initial delay time 1000 milliseconds
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-12 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
Enabling OSPFv2
You must enable the OSPFv2 feature before you can configure OSPFv2.
No prerequisites.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 feature ospf Enables the OSPFv2 feature.
Step 3 show feature (Optional) Displays enabled and disabled features.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To disable the OSPFv2 feature and remove all associated configuration, use the no feature ospf
command in configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-13
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
Enter the show feature command to verify that OSPFv2 is enabled (see Enabling OSPFv2, page 5-13).
Enter the show ip ospf command to verify that the instance tag is not in use.
Ensure that OSPFv2 can obtain a router identifier (router ID) such as a configured loopback address. If
not, you must configure the router ID option as shown in the Detailed Steps section below.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag and enters the router configuration area.
Step 3 router-id 32-bit number (Optional) Configures the OSPFv2 router ID. This 32-
bit number identifies this OSPFv2 instance and must
exist on a configured interface in the system.
Step 4 show ip ospf (Optional) Displays OSPF information.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To remove the OSPFv2 instance and all associated configuration, use the no router ospf instance-tag
command in configuration mode.
Note When configured in the interface mode, the no router ospf instance-tag command does not remove the
OSPF configuration. You must manually remove all OSPFv2 commands configured in interface mode.
Ensure that you have enabled the OSPFv2 feature on the router (see Enabling OSPFv2, page 5-13).
OSPFv2 must be able to obtain a router identifier (for example, a configured loopback address) or you
must configure the router ID option.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-14 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
OPTIONAL PARAMETERS
You can configure the following optional parameters for OSPFv2 in the router configuration mode by
entering the router ospf instance-tag command.
Command Purpose
distance number Configures the administrative distance for this
OSPFv2 instance. The range is from 1 to 255. The
default is 110.
log-adjacency-changes [detail] Generates a system message whenever a neighbor
changes state.
maximum-paths path-number Configures the maximum number of equal OSPFv2
paths to a destination in the route table. This
command is used for load balancing. The range is
from 1 to 16. The default is 8.
Note All areas must connect to the backbone area either directly or through a virtual link.
Note You must assign a valid IP address to an interface before you can enable OSPF on that interface.
Ensure that you have enabled OSPF on the router (see Enabling OSPFv2, page 5-13).
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface interface-type slot/port Enters interface configuration mode.
Step 3 ip address ip-prefix/length Assigns an IP address and subnet mask to this interface
Step 4 ip router ospf instance-tag area area-id Adds the interface to the OSPFv2 instance and area.
[secondaries none]
Step 5 show ip ospf interface [interface-type] (Optional) Displays OSPF information.
[slot/port]
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-15
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
OPTIONAL COMMANDS
You can configure the following optional parameters for OSPFv2 in interface configuration mode.
Command Purpose
ip ospf cost interface-cost Configures the OSPFv2 cost metric for this
interface. The default is to calculate cost metric,
based on the reference bandwidth and interface
bandwidth. The range is from 1 to 65535.
Use the no ip ospf cost interface-cost command to
return to the default setting which is the reference.
ip ospf dead-interval seconds Configures the OSPFv2 dead interval, in seconds.
The range is from 1 to 65535. The default is four
times the hello interval, in seconds.
ip ospf hello-interval seconds Configures the OSPFv2 hello interval, in seconds.
The range is from 1 to 65535. The default is 10
seconds.
ip ospf mtu-ignore Configures OSPFv2 to ignore any IP MTU
mismatch with a neighbor. The default is to not
establish adjacency if the neighbor MTU does not
match the local interface MTU.
ip ospf passive-interface Suppresses routing updates on the interface.
ip ospf priority number Configures the OSPFv2 priority, that the router
uses to determine the DR for an area. The range is
from 0 to 255. The default is 1. See Designated
Routers, page 5-3.
ip ospf shutdown Shuts down the OSPFv2 instance on this interface.
EXAMPLE
This example shows how to add an interface into area 0.0.0.10 in OSPFv2 instance 201.
router# configure terminal
router(config)# interface ethernet 2/1
router(config-if)# ip address 192.0.2.1/16
router(config-if)# ip router ospf 201 area 0.0.0.10
router(config-if)# copy running-config startup-config
Use the show ip ospf interface command to verify the interface configuration. Use the show ip ospf
neighbor command to see the neighbors for this interface.
To remove the area, use the no ip router ospf instance-tag area area-id command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-16 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
Ensure that OSPFv2 is enabled on the router (see Enabling OSPFv2, page 5-13).
Ensure that all neighbors on an interface share the same authentication configuration, including the
shared authentication key.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id authentication [message-digest] Configures the authentication mode for an area. Area
identifier (area-id) for an OSPF area can be an IP
address or a positive integer value.
Step 4 interface interface-type slot/port Enters interface configuration mode.
Step 5 ip ospf authentication-key [0 | 3] password (Optional) Configures simple password authentication
for this interface. Use this command if the
authentication is not set to key-chain or
message-digest.
• Assigning an authentication key value of zero (0)
configures an unencrypted password.
• Assigning an authentication key value of 3
configures a 3DES encrypted password.
ip ospf message-digest-key key-id md5 [0 | 3] (Optional) Configures message digest authentication
key for this interface.
The key-id range is from 1 to 255. The MD5 option 0
configures the password in clear text and 3 configures
the key as 3DES encrypted.
Step 6 show ip ospf interface interface-type (Optional) Displays OSPF information.
slot/port
Step 7 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to configure authentication for area 0.0.0.10 in OSPFv2 instance 201.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 authentication
router(config-router)# interface ethernet 2/1
router(config-if)# ip ospf authentication-key 0 mypass
router(config-if)# copy running-config startup-config
To terminate an OSPF routing process, use the no router ospf instance-tag command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-17
Chapter 5 Configuring OSPFv2
Configuring Basic OSPFv2
Ensure that OSPFv2 is enabled on the router (see Enabling OSPFv2, page 5-13).
Ensure that all neighbors on an interface share the same authentication configuration, including the
shared authentication key.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface interface-type slot/port Enters interface configuration mode.
Step 3 ip ospf authentication [message-digest | Enables interface authentication mode for OSPFv2 as
null] either key-chain, message-digest type, or null.
Note Entering the null option specifies that no
authentication is in use.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-18 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
Step 4 ip ospf authentication-key [0 | 3 | 7] key-name (Optional) Configures simple password authentication
for this interface.
Use this command if the authentication is set to
key-chain.
The options are as follows:
• 0—Configures the password in clear text
(unencrypted).
• 3—Configures the pass key as 3DES encrypted.
• 7—Configures the key as Cisco type 7 encrypted.
ip ospf message-digest-key key-id (Optional) Configures message-digest authentication
md5 [0 | 3 | 7] key for this interface.
Use this command if the authentication is set to
message-digest.
The key-id range is from 1 to 255. The MD5 options
are as follows:
• 0—Configures the password in clear text
(unencrypted).
• 3—Configures the pass key as 3DES encrypted.
• 7—Configures the key as Cisco type 7 encrypted.
Step 5 show ip ospf interface interface-type slot/port (Optional) Displays OSPF information.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to set an interface for simple, unencrypted passwords, and set the password for
Ethernet interface 2/1.
router# configure terminal
router(config)# router ospf 201
router(config-router)# exit
router(config)# interface ethernet 2/1
router(config-if)# ip router ospf 201 area 0.0.0.10
router(config-if)# ip ospf authentication-key 0 ifpass
router(config-if)# copy running-config startup-config
To terminate an OSPF routing process, use the no router ospf instance-tag command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-19
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Ensure that you have enabled the OSPF feature (see Enabling OSPFv2, page 5-13).
Create the route map that the filter list uses to filter IP prefixes in incoming or outgoing Network
Summary (type 3) LSAs.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id filter-list route-map map-name Filters incoming or outgoing Network Summary (type
{in | out} 3) LSAs on an ABR.
Step 4 show ip ospf policy statistics area id (Optional) Displays OSPF policy information.
filter-list {in | out}
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-20 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
EXAMPLE
To terminate an OSPF routing process, use the no router ospf instance-tag command.
Ensure that you have enabled the OSPF feature (see Enabling OSPFv2, page 5-13).
Ensure that there are no virtual links or ASBRs in the proposed stub area.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id stub Creates this area as a stub area.
Step 4 area area-id default-cost cost (Optional) Sets the cost metric for the default summary
route sent into this stub area. The range is from 0 to
16777215. The default is 1.
Step 5 show ip ospf (Optional) Displays OSPF information.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create a stub area within an OSPFv2 area.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 stub
router(config-router)# copy running-config startup-config
To terminate an OSPF routing process, use the no router ospf instance-tag command.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-21
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
area area-id stub no-summary Creates this area as a totally stubby area.
Configuring NSSA
You can configure an NSSA for part of an OSPFv2 domain where limited external traffic is required. For
information about NSSAs, see Not-So-Stubby Area, page 5-9. You can optionally translate this external
traffic to an AS External (type 5) LSA and flood the OSPFv2 domain with this routing information. An
NSSA can be configured with the following optional parameters:
• No redistribution—Redistributed routes bypass the NSSA and are redistributed to other areas in the
OSPFv2 autonomous system. Use this option when the NSSA ASBR is also an ABR.
• Default information originate—Generates an NSSA External (type 7) LSA for a default route to the
external autonomous system. Use this option on an NSSA ASBR if the ASBR contains the default
route in the routing table. This option can be used on an NSSA ABR whether or not the ABR
contains the default route in the routing table.
• Route map—Filters the external routes to limit those routes that the router floods throughout NSSA
and other areas.
• Translate—Translates NSSA External LSAs to AS External LSAs for areas outside the NSSA. Use
this command on an NSSA ABR to flood the redistributed routes throughout the OSPFv2
autonomous system. You can optionally suppress the forwarding address in these AS External LSAs.
If you choose this option, the forwarding address is set to 0.0.0.0.
• No summary—Blocks all summary routes from flooding the NSSA. Use this option on the NSSA
ABR.
Ensure that you have enabled the OSPF feature (see Enabling OSPFv2, page 5-13).
Ensure that there are no virtual links in the proposed NSSA and that it is not the backbone area.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id nssa [no-redistribution] Creates this area as an NSSA.
[default-information-originate [route-map
map-name]] [no-summary] [translate type7
{always | never} [suppress-fa]]
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-22 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
Step 4 area area-id default-cost cost (Optional) Sets the cost metric for the default summary
route sent into this NSSA.
Step 5 show ip ospf (Optional) Displays OSPF information.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create an NSSA that blocks all summary route updates.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 nssa no-summary
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that generates a default route.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 nssa default-info-originate
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that filters external routes and blocks all summary route
updates.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 nssa route-map ExternalFilter no-summary
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that always translates NSSA External (type 5) LSAs to AS
External (type 7) LSAs.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 nssa translate type 7 always
router(config-router)# copy running-config startup-config
To terminate an OSPF routing process, use the no router ospf instance-tag command.
Note You must configure the virtual link on both routers involved before the link becomes active.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-23
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Ensure that you have enabled OSPF (see Enabling OSPFv2, page 5-13).
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id virtual-link router-id Creates one end of a virtual link on a local router that
will connect to a remote router.
Be sure to create a virtual link on the remote router
to complete the link.
Step 4 show ip ospf virtual-link [brief] (Optional) Displays OSPF virtual link information.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
OPTIONAL COMMANDS
You can configure the following optional commands in the virtual link configuration mode.
Command Purpose
authentication [message-digest | null] (Optional) Overrides area-based authentication for this
virtual link.
authentication-key [0 | 3] key (Optional) Configures a simple password for this virtual
link. Use this command when the authentication is not set
to either key-chain or message-digest. Entering the value
of zero (0) configures the password in clear text. Entering
the value of 3 configures the password as 3DES
encrypted.
dead-interval seconds (Optional) Configures the OSPFv2 dead interval, in
seconds. The range is from 1 to 65535. The default is four
times the hello interval, in seconds.
hello-interval seconds (Optional) Configures the OSPFv2 hello interval, in
seconds. The range is from 1 to 65535. The default is 10
seconds.
message-digest-key key-id md5 [0 | 3] key (Optional) Configures message digest authentication for
this virtual link. Use this command if the authentication
is set to message-digest. Entering the value of zero (0)
configures the password in cleartext. Entering the value
of 3 configures the pass key as 3DES encrypted.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-24 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
retransmit-interval seconds (Optional) Configures the OSPFv2 retransmit interval, in
seconds. The range is from 1 to 65535. The default is 5.
transmit-delay seconds (Optional) Configures the OSPFv2 transmit-delay, in
seconds. The range is from 1 to 450. The default is 1.
EXAMPLE
This example shows how to create a simple virtual link between two ABRs.
The configuration for ABR 1 (router ID 27.0.0.55) is as follows.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 virtual-link 10.1.2.3
router(config-router-vlink)# copy running-config startup-config
Ensure that you have enabled OSPF (see Enabling OSPFv2, page 5-13).
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 area area-id range ip-prefix/length Creates a summary address on an ABR for a range of
[no-advertise] addresses and optionally does not advertise this
summary address in a Network Summary (type 3)
LSA.
summary-address ip-prefix/length Creates a summary address on an ASBR for a range of
[no-advertise | tag tag-id] addresses and optionally assigns a tag for this
summary address that can be used for redistribution
with route maps.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-25
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
Step 4 show ip ospf summary-address (Optional) Displays information about OSPF summary
addresses.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create summary addresses between areas on an ABR.
router# configure terminal
router(config)# router ospf 201
router(config-router)# area 0.0.0.10 range 10.3.0.0/16
router(config-router)# copy running-config startup-config
Note When you configure the router for a graceful shutdown, do not save the running configuration because
the router continues to advertise a maximum metric after it reloads.
Ensure that you have enabled OSPF on the router (see Enabling OSPFv2, page 5-13).
DETAILED STEPS
]
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 max-metric router-lsa [on-startup [seconds] Configures OSPFv2 stub route to advertise a maximum
metric (in seconds) so that other routers do not prefer
the router as an intermediate hop in their shortest path
first (SPF) calculations. The configurable range is 5 to
86400, the default value is 600.
By entering the on-startup option, the router advertises
a maximum metric at system startup only.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-26 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
EXAMPLE
This example shows how to enable the stub router advertisements and advertise a maximum metric of
750 seconds at system startup only.
router# configure terminal
router(config)# router ospf 201
router(config-router)# max-metric router-lsa on-startup 750
router(config-router)# copy running-config startup-config
Ensure that you have enabled OSPFv2 (see Enabling OSPFv2, page 5-13).
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag and enters the router configuration mode.
Step 3 timers lsa-arrival milliseconds Sets the minimum interval in which the software
accepts the same link-state advertisement (LSA) from
Open Shortest Path First version 2 (OSPFv2)
neighbors in milliseconds. The range is from 10 to
600000. The default is 1000 milliseconds.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-27
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Command Purpose
Step 4 timers lsa-group-pacing seconds Sets the interval (in seconds) at which the router
collects OSPFv2 LSAs into a group and refreshes,
checksums or ages them. The range is from 1 to 1800.
The default is 240 seconds.
Step 5 timers throttle lsa start-time hold-interval Sets the rate limit in milliseconds for generating LSAs
max-time with the following timers:
start-time—The range is from 50 to 5000 milliseconds.
The default value is 50 milliseconds.
hold-interval—The range is from 50 to 30,000
milliseconds. The default value is 5000 milliseconds.
max-time—The range is from 50 to 30,000
milliseconds. The default value is 5000 milliseconds.
Step 6 timers throttle spf delay-time hold-time Sets the SPF best path schedule initial delay time and
max-wait the minimum hold time in seconds between SPF best
path calculations. The range is from 1 to 600000. The
default is no delay time and a 5000-millisecond hold
time.
Step 7 interface type slot/port Enters interface configuration mode.
Step 8 ip ospf hello-interval seconds Sets the hello interval for this interface. The range is
from 1 to 65535. The default is 10.
Step 9 ip ospf dead-interval seconds Sets the dead interval for this interface. The range is
from 1 to 65535.
Step 10 ip ospf retransmit-interval seconds Sets the estimated time in seconds between LSAs
transmitted from this interface. The range is from 1 to
65535. The default is 5.
Step 11 ip ospf transmit-delay seconds Sets the estimated time in seconds to transmit an LSA
to a neighbor. The range is from 1 to 450. The default
is 1.
Step 12 show ip ospf (Optional) Displays information about OSPFv2.
Step 13 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to modify system defaults to control LSA flooding with the lsa-group-pacing
and timers throttle lsa parameters.
router# configure terminal
router(config)# router ospf 201
router(config-router)# timers lsa-arrival 300
router(config-router)# timers lsa-group-pacing 2000
router(config-router)# timers throttle lsa 3000
router(config-router)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-28 OL-25630-04
Chapter 5 Configuring OSPFv2
Configuring Advanced OSPFv2
Ensure that you have enabled OSPFv2 (see Enabling OSPFv2, page 5-13).
Ensure that all neighbors are configured for graceful restart with matching optional parameters set.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospf instance-tag Creates a new OSPFv2 instance with the configured
instance tag.
Step 3 graceful-restart Enables graceful restart after it has been disabled.
Graceful restart is enabled by default on the router.
Step 4 graceful-restart grace-period seconds (Optional) Sets the grace period, in seconds. The range
is from 5 to 1800. The default is 60 seconds.
Step 5 graceful-restart helper-disable (Optional) Disables helper mode. This feature is
enabled by default.
Step 6 graceful-restart planned-only (Optional) Configures a graceful restart for planned
(controlled) restarts only.
Step 7 show ip ospf (Optional) Displays OSPFv2 information.
Step 8 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to re-enable graceful restart on the router (after it was disabled on the router)
and then set the grace period to 120 seconds.
router# configure terminal
router(config)# router ospf 201
router(config-router)# graceful-restart
router(config-router)# graceful-restart grace-period 120
router(config-router)# copy running-config startup-config
To disable graceful restart on the router, enter the no graceful-restart command in the router
configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-29
Chapter 5 Configuring OSPFv2
Verifying the OSPFv2 Configuration
Command Purpose
restart ospf instance-tag Restarts the OSPFv2 instance and removes all
neighbors.
Note The Cisco CG-OS software does not support the [vrf {vrf-name | all | default | management}]
parameter in the commands listed below.
Command Purpose
show ip ospf Displays the OSPFv2 configuration.
show ip ospf border-routers Displays the OSPFv2 border router configuration.
show ip ospf database Displays the OSPFv2 link-state database summary.
show ip ospf interface number Displays the OSPFv2 interface configuration.
show ip ospf lsa-content-changed-list Displays the OSPFv2 LSAs that have changed.
neighbor-id interface-type number
show ip ospf neighbors [neighbor-id] Displays the list of OSPFv2 neighbors.
[detail] [interface-type number]
show ip ospf request-list neighbor-id Displays the list of OSPFv2 link-state requests.
interface-type number
show ip ospf retransmission-list Displays the list of OSPFv2 link-state retransmissions.
neighbor-id interface-type number
show ip ospf route [ospf-route] Displays the internal OSPFv2 routes.
[summary]
show ip ospf summary-address Displays information about the OSPFv2 summary
addresses.
show ip ospf virtual-links [brief] Displays information about OSPFv2 virtual links.
show running-configuration ospf Displays the current running OSPFv2 configuration.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-30 OL-25630-04
Chapter 5 Configuring OSPFv2
Monitoring OSPFv2 Statistics
Command Purpose
show ip ospf policy statistics area area-id Displays the OSPFv2 route policy statistics for an area.
filter-list {in | out}
show ip ospf policy statistics redistribute Displays the OSPFv2 route policy statistics.
{direct | ospf id | static}
show ip ospf statistics Displays the OSPFv2 event counters.
show ip ospf traffic [interface-type Displays the OSPFv2 packet counters.
number]
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 5-31
Chapter 5 Configuring OSPFv2
Configuration Example for OSPFv2
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
5-32 OL-25630-04
CH A P T E R 6
Configuring OSPFv3
This chapter describes how to configure Open Shortest Path First version 3 (OSPFv3) for IPv6 networks
on the Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).
The system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About OSPFv3, page 6-1
• Prerequisites for OSPFv3, page 6-11
• Guidelines and Limitations for OSPFv3, page 6-12
• Default Settings, page 6-12
• Configuring Basic OSPFv3, page 6-12
• Configuring Advanced OSPFv3, page 6-16
• Verifying the OSPFv3 Configuration, page 6-27
• Monitoring OSPFv3, page 6-27
• Configuration Examples for OSPFv3, page 6-28
Note OSPFv3 only supports IPv6 on the router. IPv4 is not supported.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-1
Chapter 6 Configuring OSPFv3
Information About OSPFv3
Hello Packet
OSPFv3 routers periodically send Hello packets on every OSPF-enabled interface. The hello interval
determines how frequently the router sends these Hello packets and is configured per interface. OSPFv3
uses Hello packets for the following tasks:
• Neighbor discovery
• Keepalives
• Bidirectional communications
• Designated router election (see Designated Routers, page 6-4)
The Hello packet contains information about the originating OSPFv3 interface and router, including the
assigned OSPFv3 cost of the link, the hello interval, and optional capabilities of the originating router.
An OSPFv3 interface that receives these Hello packets determines if the settings are compatible with the
receiving interface settings. Compatible interfaces are considered neighbors and are added to the
neighbor table (see Neighbors, page 6-3).
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-2 OL-25630-04
Chapter 6 Configuring OSPFv3
Information About OSPFv3
Hello packets also include a list of router IDs for the routers that communicate with the originating
interface. When the receiving interface sees its own router ID in this list, that state confirms that
bidirectional communication between the two interfaces exists.
OSPFv3 uses Hello packets as a keepalive message to determine if a neighbor is still communicating. If
a router does not receive a Hello packet by the configured dead interval (usually a multiple of the hello
interval), then the neighbor is removed from the local neighbor table.
Neighbors
An OSPFv3 interface must have a compatible configuration with a remote interface before the two are
considered neighbors. The two OSPFv3 interfaces must match the following criteria:
• Hello interval
• Dead interval
• Area ID (see Areas, page 6-5)
• Authentication
• Optional capabilities
When there is a match, the router enters the following information into the neighbor table:
• Neighbor ID—The router ID of the neighbor router.
• Priority—Priority of the neighbor router. The priority is used for designated router election (see
Designated Routers, page 6-4).
• State—Indication of whether the neighbor has just been heard from, is in the process of setting up
bidirectional communications, is sharing the link-state information, or has achieved full adjacency.
• Dead time—Indication of how long since the last Hello packet was received from this neighbor.
• Link-local IPv6 Address—The link-local IPv6 address of the neighbor.
• Designated Router—Indication of whether the neighbor has been declared the designated router or
backup designated router (see Designated Routers, page 6-4).
• Local interface—The local interface that received the Hello packet for this neighbor.
When the first Hello packet is received from a new neighbor, the neighbor is entered into the neighbor
table in the initialization state. Once bidirectional communication is established, the neighbor state
becomes two-way. Start and exchange states come next, as the two interfaces exchange their link-state
database. Once this is all complete, the neighbor moves into the full state, which signifies full adjacency.
If the neighbor fails to send any Hello packets in the dead interval, then the neighbor is moved to the
down state and it is no longer considered adjacent.
Adjacency
Adjacency is the path from each router to its local designated router (DR). Not all neighbors establish
adjacency. Depending on the network type and designated router establishment, some neighbors become
fully adjacent and share LSAs with all their neighbors, while other neighbors do not. For more
information, see Designated Routers, page 6-4.
Adjacency is established using Database Description packets, Link State Request packets, and Link
State Update packets in OSPFv3. The Database Description packet includes the LSA headers from the
link-state database of the neighbor (see Link-State Database, page 6-7). The local router compares these
headers with its own link-state database and determines which LSAs are new or updated. The local router
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-3
Chapter 6 Configuring OSPFv3
Information About OSPFv3
sends a Link State Request packet for each LSA for which it needs new or updated information. The
neighbor responds with a Link State Update packet. This exchange continues until both routers have the
same link-state information.
Designated Routers
Networks with multiple routers present a unique situation for OSPFv3. When every router floods the
network with LSAs, multiple sources send the same link-state information. Depending on the type of
network, OSPFv3 might use a single router, the designated router (DR), to control the LSA floods and
represent the network to the rest of the OSPFv3 area (see Areas, page 6-5). When the DR fails, OSPFv3
selects a backup designated router (BDR).
Network types are as follows:
• Point-to-point—A network that exists only between two routers. All neighbors on a point-to-point
network establish adjacency and there is no DR.
• Broadcast—A network with multiple routers that can communicate over a shared medium that
allows broadcast traffic, such as Ethernet. OSPFv3 routers establish a DR and BDR that controls
LSA flooding on the network. OSPFv3 uses the well-known IPv6 multicast addresses, FF02::5, and
a MAC address of 0100.5300.0005 to communicate with neighbors.
OSPFv3 selects the DR and BDR based on the information in the Hello packet. When an interface sends
a Hello packet, it sets the priority field and the DR and BDR field when known. The routers follow an
election procedure based on which routers declare themselves in the DR and BDR fields and the priority
field in the Hello packet. As a final determinant, OSPFv3 chooses the highest router IDs as the DR and
BDR.
All other routers establish adjacency with the DR and the BDR and use the IPv6 multicast address
FF02::6 to send LSA updates to the DR and BDR. Figure 6-1 shows this adjacency relationship between
all routers and the DR.
DRs are based on a router interface. A router might be the DR for one network and not for another
network on a different interface.
Router D Router E
or DR
182982
= Multi-access network
= Logical connectivity to Designated Router for OSPF
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-4 OL-25630-04
Chapter 6 Configuring OSPFv3
Information About OSPFv3
Areas
You can limit the CPU and memory requirements that OSPFv3 puts on the routers by dividing an
OSPFv3 network into areas. An area is a logical division of routers and links within an OSPFv3 domain
that creates separate subdomains. For a defined area, the router contain LSA flooding within that area,
and the link-state database only includes links within that area. You can assign an area ID to the
interfaces within the defined area. The Area ID is a 32-bit value that can be expressed as a number or in
dotted decimal notation, such as 10.2.3.1.
The Cisco CG-OS software always displays the area in dotted decimal notation.
When you define more than one area in an OSPFv3 network, you must also define the backbone area.
Backbone areas have a reserved area ID of zero (0). If you have more than one area, then one or more
routers become area border routers (ABRs). An ABR connects to both the backbone area and at least one
other defined area (see Figure 6-2).
ABR1
Area 0 Area 3
ABR2
Area 5
The ABR has a separate link-state database for each area to which it connects. The ABR sends Inter-Area 182983
Prefix (type 3) LSAs (see Route Summarization, page 6-10) from one connected area to the backbone
area. The backbone area sends summarized information about one area to another area. In Figure 6-2,
Area 0 sends summarized information about Area 5 to Area 3.
OSPFv3 defines an additional router type: the autonomous system boundary router (ASBR). This router
connects an OSPFv3 area to another autonomous system.
Link-State Advertisement
OSPFv3 uses link-state advertisements (LSAs) to build its routing table.
This section includes the following topics:
• LSA Types, page 6-6
• Link Cost, page 6-6
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-5
Chapter 6 Configuring OSPFv3
Information About OSPFv3
LSA Types
Table 6-1 shows the LSA types supported by the Cisco CG-OS software.
Link Cost
Each OSPFv3 interface has a link cost. The cost is an arbitrary number. By default, the Cisco CG-OS
software assigns a cost that is the configured reference bandwidth divided by the interface bandwidth.
By default, the reference bandwidth is 40 Gb/s. The link cost is carried in the LSA updates for each link.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-6 OL-25630-04
Chapter 6 Configuring OSPFv3
Information About OSPFv3
• Area-local—LSA is flooded throughout a single OSPFv3 area only. Used for Router LSAs, Network
LSAs, Inter-Area-Prefix LSAs, Inter-Area-Router LSAs, and Intra-Area-Prefix LSAs.
• AS scope—LSA is flooded throughout the routing domain. An AS scope is used for AS External
LSAs.
LSA flooding guarantees that all routers in the network have identical routing information. LSA flooding
depends on the OSPFv3 area configuration (see Areas, page 6-5). The LSAs are flooded based on the
link-state refresh time (every 30 minutes by default). Each LSA has its own link-state refresh time.
You can control the flooding rate of LSA updates in your network by using the LSA group pacing
feature. LSA group pacing can reduce high CPU or buffer utilization. This feature groups LSAs with
similar link-state refresh times to allow OSPFv3 to pack multiple LSAs into an OSPFv3 Update
message.
By default, LSAs with link-state refresh times within four minutes of each other are grouped together.
You should lower this value for large link-state databases or raise it for smaller databases to optimize the
OSPFv3 load on your network.
Link-State Database
Each router maintains a link-state database for the OSPFv3 network. This database contains all the
collected LSAs and includes information on all the routes through the network. OSPFv3 uses this
information to calculate the best path to each destination and populates the routing table with these best
paths.
The router removes LSAs from the link-state database when it does not receive an LSA update within a
set interval (MaxAge). Routers flood a repeat of the LSA every 30 minutes to prevent aging out of
accurate link-state information. The Cisco CG-OS software supports the LSA grouping feature to
prevent all LSAs from refreshing at the same time. For more information, see Flooding and LSA Group
Pacing, page 6-6.
Multi-Area Adjacency
OSPFv3 multi-area adjacency allows you to configure a link on the primary interface that is in more than
one area. This link becomes the preferred intra-area link in those areas. Multi-area adjacency establishes
a point-to-point unnumbered link in an OSPFv3 area that provides a topological path for that area. The
primary adjacency uses the link to advertise an unnumbered point-to-point link in the Router LSA for
the corresponding area when the neighbor state is full.
The multi-area interface exists as a logical construct over an existing primary interface for OSPFv3;
however, the neighbor state on the primary interface is independent of the multi-area interface. The
multi-area interface establishes a neighbor relationship with the corresponding multi-area interface on
the neighboring router. See Configuring Multi-Area Adjacency, page 6-20 for more information.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-7
Chapter 6 Configuring OSPFv3
Information About OSPFv3
• Provide convergence updates to remove stale OSPFv3 routes and for stub router advertisements (see
Multiple OSPFv3 Instances, page 6-11)
OSPFv3 also runs a modified Dijkstra algorithm for fast recalculation for Inter-Area Prefix, Inter-Area
Router, AS-External, type-7, and Intra-Area Prefix (type 3, 4, 5, 7, 8) LSA changes.
Advanced Features
The Cisco CG-OS software supports advanced OSPFv3 features that enhance the usability and
scalability of OSPFv3 in the network.
This section includes the following topics:
• Stub Area, page 6-8
• Not-So-Stubby Area, page 6-9
• Virtual Links, page 6-9
• Route Summarization, page 6-10
• Graceful Restart, page 6-10
• Multiple OSPFv3 Instances, page 6-11
• SPF Optimization, page 6-11
Stub Area
You can limit the amount of external routing information that floods an area by making it a stub area. A
stub area is an area that does not allow AS External (type 5) LSAs (see Link-State Advertisement,
page 6-5). These LSAs usually flood the local autonomous system to propagate external route
information. Stub areas have the following requirements:
• All routers in the stub area must be stub routers. See Stub Routing, page 1-6.
• No ASBR routers exist in the stub area.
• You cannot configure virtual links in the stub area.
Figure 6-3 shows an example of an OSPFv3 autonomous system where all routers in area 0.0.0.10 have
to go through the ABR to reach external autonomous systems. Area 0.0.0.10 can be configured as a stub
area.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-8 OL-25630-04
Chapter 6 Configuring OSPFv3
Information About OSPFv3
ABR
Backbone Area 10
Stub area
182984
ASBR
Stub areas use a default route for all traffic that needs to go through the backbone area to the external
autonomous system. The default route is an Inter-Area-Prefix LSA with the prefix length set to 0 for
IPv6.
Not-So-Stubby Area
A Not-So-Stubby Area (NSSA) is similar to the stub area, except that an NSSA allows you to import
autonomous system external routes within an NSSA using redistribution. The NSSA ASBR redistributes
these routes and generates type-7 LSAs that it floods throughout the NSSA. You can optionally configure
the ABR that connects the NSSA to other areas to translate this type-7 LSA to AS External (type 5)
LSAs. The ABR then floods these AS External LSAs throughout the OSPFv3 autonomous system.
The router supports summarization and filtering during the translation. See Link-State Advertisement,
page 6-5 for details on type-7 LSAs.
You can, for example, use NSSA to simplify administration when you are connecting a central site using
OSPFv3 to a remote site that is using a different routing protocol. Before NSSA, the connection between
the corporate site border router and a remote router could not be run as an OSPFv3 stub area because
routes for the remote site could not be redistributed into a stub area. With NSSA, you can extend OSPFv3
to cover the remote connection by defining the area between the corporate site router and remote router
as an NSSA (see Configuring NSSA, page 6-19).
The backbone area 0 cannot be an NSSA.
Virtual Links
Virtual links allow you to connect an OSPFv3 area ABR to a backbone area ABR when a direct physical
connection is not available. Figure 6-4 shows a virtual link that connects Area 3 to the backbone area
through Area 5.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-9
Chapter 6 Configuring OSPFv3
Information About OSPFv3
Area 0
ABR2 ABR1
Area 5 Area 3
182985
You can also use virtual links to temporarily recover from a partitioned area, which occurs when a link
within the area fails, isolating part of the area from reaching the designated ABR to the backbone area.
Route Summarization
Because OSPFv3 shares all learned routes with every OSPF-enabled router, you might want to use route
summarization to reduce the number of unique routes that are flooded to every OSPF-enabled router.
Route summarization simplifies route tables by replacing more-specific addresses with an address that
represents all the specific addresses. For example, you can replace 2010:11:22:0:1000::1 and
2010:11:22:0:2000:679:1 with one summary address, 2010:11:22::/48.
Typically, you would summarize at the boundaries of area border routers (ABRs). Although you could
configure summarization between any two areas, it is better to summarize in the direction of the
backbone so that the backbone receives all the aggregate addresses and injects them, already
summarized, into other areas.
Graceful Restart
OSPFv3 automatically restarts if the process experiences problems. After the restart, OSPFv3 initiates
a graceful restart so that the platform is not taken out of the network topology. When you manually
restart OSPFv3, it performs a graceful restart, which is similar to a stateful switchover. The
Cisco CG-OS software applies the running configuration in both cases.
A graceful restart, also known as nonstop forwarding (NSF), allows OSPFv3 to remain in the data
forwarding path through a process restart. When OSPFv3 needs to restart, it first sends a link-local Grace
(type 11) LSA.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-10 OL-25630-04
Chapter 6 Configuring OSPFv3
Prerequisites for OSPFv3
The Grace LSA includes a grace period, which is a specified time that the neighbor OSPFv3 interfaces
hold onto the LSAs from the restarting OSPFv3 interface. (Typically, OSPFv3 tears down the adjacency
and discards all LSAs from a down or restarting OSPFv3 interface.) The participating neighbors, which
are called NSF helpers, keep all LSAs that originate from the restarting OSPFv3 interface as if the
interface were still adjacent.
When the restarting OSPFv3 interface is operational again, it rediscovers its neighbors, establishes
adjacency, and starts sending its LSA updates again. At this point, the NSF helpers recognize that
graceful restart has finished.
Note When the restarting OSPFv3 interface does not come back up before the end of the grace period, or if
the network experiences a topology change, then the OSPFv3 neighbors tear down adjacency with the
restarting OSPFv3 and treat it as a normal OSPFv3 restart.
SPF Optimization
The Cisco CG-OS software optimizes the SPF algorithm in the following ways:
• Partial SPF for Network (type 2) LSAs, Inter-Area Prefix (type 3) LSAs, and AS External (type 5)
LSAs—When there is a change on any of these LSAs, the Cisco CG-OS software performs a faster
partial calculation rather than running the whole SPF calculation.
• SPF timers—You can configure different timers for controlling SPF calculations. These timers
include exponential backoff for subsequent SPF calculations. The exponential backoff limits the
CPU load of multiple SPF calculations.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-11
Chapter 6 Configuring OSPFv3
Guidelines and Limitations for OSPFv3
Default Settings
Table 6-2 lists the default settings for OSPFv3 parameters.
Parameter Default
Hello interval 10 seconds
Dead interval 40 seconds
Graceful restart grace period 60 seconds
Graceful restart notify period 15 seconds
OSPFv3 feature Disabled
Stub router advertisement announce time 600 seconds
Reference bandwidth for link cost calculation 40 Gb/s
LSA minimal arrival time 1000 milliseconds
LSA group pacing 240 seconds
SPF calculation initial delay time 0 milliseconds
SPF calculation hold time 5000 milliseconds
SPF calculation initial delay time 0 milliseconds
Enabling OSPFv3
You must enable OSPFv3 before you can configure OSPFv3.
No prerequisites.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-12 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Basic OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 feature ospfv3 Enables OSPFv3.
Step 3 show feature (Optional) Displays enabled and disabled features.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To disable the OSPFv3 feature and remove all associated configurations, use the no feature ospfv3
command in configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-13
Chapter 6 Configuring OSPFv3
Configuring Basic OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 router-id 128-bit number Configures the OSPFv3 router ID. This ID is a 128-bit
number and uses the dotted decimal notation. It
identifies this OSPFv3 instance and must exist on a
configured interface in the system.
Step 4 log-adjacency-changes [detail] (Optional) Generates a system message whenever a
neighbor changes state (Router config mode).
Step 5 distance number (Optional) Configures the administrative distance for
this OSPFv3 instance. The range is from 1 to 255. The
default is 110. (Address family mode)
Step 6 maximum-paths paths (Optional) Configures the maximum number of equal
OSPFv3 paths to a destination in the route table. The
range is from 1 to 16. The default is 8.
Use this command for load balancing. (Address family
mode)
Step 7 show ipv6 ospfv3 (Optional) Displays OSPFv3 configuration
information for the router.
Step 8 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To remove the OSPFv3 instance and all associated configuration, use the no router ospfv3 instance-tag
command in configuration mode.
Note When operating in the interface mode, the no router ospfv3 instance-tag command does not
remove all associated OSPFv3 configurations. You must manually remove any associated
OSPFv3 commands for the interface.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-14 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Basic OSPFv3
Note All areas must connect to the backbone area either directly or through a virtual link.
Note When configuring OSPFv3 on an interface, you must assign a valid IPv6 address to that interface before
you can enable OSPFv3 on the interface.
You must enable OSPFv3 on the router (see Enabling OSPFv3, page 6-12).
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface interface-type slot/port Enters interface configuration mode.
Step 3 ipv6 address ipv6-prefix/length Assigns an IPv6 address to this interface.
Step 4 ipv6 router ospfv3 instance-tag area area-id Adds the interface to the OSPFv3 instance and area.
[secondaries none]
Step 5 show ipv6 ospfv3 interface interface-type (Optional) Displays OSPFv3 information for the
slot/port interface.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to add an interface to a OSPFv3 instance 201 and area a network area 0.0.0.10.
router# configure terminal
router(config)# interface ethernet 2/1
router(config-if)# ipv6 address 2001:0DB8::1/48
router(config-if)# ipv6 ospfv3 201 area 0.0.0.10
router(config-if)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-15
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
OPTIONAL PARAMETERS
You can configure the following optional parameters for OSPFv3 in interface configuration mode.
Command Purpose
ospfv3 cost number Configures the OSPFv3 cost metric for this
interface. The default is to calculate a cost metric,
based on the reference bandwidth and interface
bandwidth. The range is from 1 to 65535.
ospfv3 dead-interval seconds Configures the OSPFv3 dead interval, in seconds.
The range is from 1 to 65535. The default is four
times the hello interval, in seconds.
ospfv3 hello-interval seconds Configures the OSPFv3 hello interval, in seconds.
The range is from 1 to 65535. The default is 10
seconds.
ospfv3 mtu-ignore Configures OSPFv3 to ignore any IP maximum
transmission unit (MTU) mismatch with a
neighbor. The default is to not establish adjacency
if the neighbor MTU does not match the local
interface MTU.
ospfv3 network {broadcast | point-point} Sets the OSPFv3 network type.
ospfv3 passive-interface Suppresses routing updates on the interface.
ospfv3 priority number Configures the OSPFv3 priority, used to determine
the DR for an area. The range is from 0 to 255. The
default is 1. See Designated Routers, page 6-4.
ospfv3 shutdown Shuts down the OSPFv3 instance on the interface.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-16 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 address-family ipv6 unicast Enters IPv6 unicast into address family mode.
Step 4 area area-id filter-list route-map map-name Filters incoming or outgoing Inter-Area Prefix (type 3)
{in | out} LSAs on an ABR.
Step 5 show ipv6 ospfv3 policy statistics area id (Optional) Displays OSPFv3 policy information.
filter-list {in | out}
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to define a filter-list for OSPFv3 area 0.0.0.10:
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# address-family ipv6 unicast
router(config-router-af)# area 0.0.0.10 filter-list route-map FilterLSAs in
router(config-router-af)# show ipv6 ospfv3 policy statistics area 0.0.0.10 filter-list in
router(config-router-af)# copy running-config startup-config
To terminate an OSPFv3 routing process, use the no router ospfv3 instance-tag command in
configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-17
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 area area-id stub [no-summary] Creates this area as a stub area.
When you specify the optional no-summary
parameter in the command, an area border router
(ABR) does not forward summary link advertisements
into the stub area.
Step 4 address-family ipv6 unicast (Optional) Enters IPv6 unicast address family mode.
Step 5 area area-id default-cost cost (Optional) Sets the cost metric for the default summary
route sent into this stub area. The range is from 0 to
16777215.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create a stub area that blocks all summary route updates:
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 stub no-summary
router(config-router)# copy running-config startup-config
To terminate an OSPFv3 routing process, use the no router ospfv3 instance-tag command in the
configuration mode.
Command Purpose
area area-id stub no-summary Creates an area as a totally stubby area.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-18 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
EXAMPLE
This example shows how to create a totally stub area that blocks all summary route updates from entering
the stub area.
router(config-router)# area 20 stub no-summary
To remove an OSPFv3 stub area, use the no area area-id stub [no-summary] command in router mode.
Configuring NSSA
You can configure an NSSA for part of an OSPFv3 domain where limited external traffic is required. See
Not-So-Stubby Area, page 6-9. You can optionally translate this external traffic to an AS External (type
5) LSA and flood the OSPFv3 domain with this routing information.
An NSSA can be configured with the following optional parameters:
• Default information originate—Generates a Type-7 LSA for a default route to the external
autonomous system. Use this option on an NSSA ASBR if the ASBR contains the default route in
the routing table. This option can be used on an NSSA ABR whether or not the ABR contains the
default route in the routing table.
• No redistribution—Redistributes routes that bypass the NSSA to other areas in the OSPFv3
autonomous system. Use this option when the NSSA ASBR is also an ABR.
• No summary—Blocks all summary routes from flooding the NSSA. Use this option on the NSSA
ABR.
• Route map—Filters the external routes to limit those routes that the router floods throughout the
NSSA and other areas.
• Suppress—Suppresses the forwarding address in translated LSAs. The ABR uses 0.0.0.0 as the
forwarding IPV4 address.
• Translate—Translates Type-7 LSAs to AS External (type 5) LSAs for areas outside the NSSA. Use
this command on an NSSA ABR to flood the redistributed routes throughout the OSPFv3
autonomous system. You can optionally suppress the forwarding address in these AS External LSAs.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 area area-id nssa [no-redistribution] Creates this area as an NSSA.
[default-information-originate][route-map
map-name][no-summary] [translate type7
{always | never} [suppress-fa]]
Step 4 address-family ipv6 unicast (Optional) Enters IPv6 unicast address family mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-19
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
Command Purpose
Step 5 area area-id default-cost cost (Optional) Sets the cost metric for the default summary
route sent into this NSSA. The range is from 0 to
16777215.
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create an NSSA that blocks all summary route updates.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 nssa no-summary
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that generates a default route.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 nssa default-info-originate
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that filters external routes and blocks all summary route
updates.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 nssa route-map ExternalFilter no-summary
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that always translates Type-7 LSAs to AS External (type 5)
LSAs.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 nssa translate type 7 always
router(config-router)# copy running-config startup-config
This example shows how to create an NSSA that always translates Type-7 LSAs to AS External (type 5)
LSAs but does not place the Type-7 forwarding addresses into the AS External (type 5) LSAs.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 nssa translate type 7 suppress-fa
router(config-router)# copy running-config startup-config
To remove the NSSA, use the no area command in the router mode.
You must enable OSPFv3 on the router (see Enabling OSPFv3, page 6-12).
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-20 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
Ensure that you have configured a primary area for the interface (see Configuring Networks in OSPFv3,
page 6-14.)
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 interface interface-type slot/port Enters interface configuration mode.
Step 3 ipv6 router ospfv3 multi-area area-id Adds additional areas to an OSPFv3 interface. The
area-id can be either an IP address or a positive integer.
Step 4 show ipv6 ospfv3 interface interface-type (Optional) Displays OSPFv3 information.
slot/port
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To remove the multi-area adjacency on the OSPFv3 interface, use the no ipv6 router ospfv3 multi-area
area-id command.
Note You must configure the virtual link on both routers involved before the link becomes active.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-21
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 area area-id virtual-link router-id Creates one end of a virtual link to a remote router.
You must also create a virtual link on the remote
router to complete the link.
Step 4 show ipv6 ospfv3 virtual-link [brief] (Optional) Displays OSPFv3 virtual link
information.
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
These examples show how to create a simple virtual link between two ABRs.
Configuration for ABR 1 (router ID 2001:0DB8::1) is as follows.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# area 0.0.0.10 virtual-link 2001:0DB8::10
router(config-router-vlink)# copy running-config startup-config
To remove a virtual link on the OSPFv3 interface, use the no area area-id virtual link router router-id
command.
OPTIONAL COMMANDS
You can configure the following optional commands in virtual link configuration mode.
Command Purpose
dead-interval seconds (Optional) Configures the OSPFv3 dead interval, in
seconds. The range is from 1 to 65535. The default is four
times the hello interval, in seconds.
hello-interval seconds (Optional) Configures the OSPFv3 hello interval, in
seconds. The range is from 1 to 65535. The default is 10
seconds.
retransmit-interval seconds (Optional) Configures the OSPFv3 retransmit interval, in
seconds. The range is from 1 to 65535. The default is 5.
transmit-delay seconds (Optional) Configures the OSPFv3 transmit delay, in
seconds. The range is from 1 to 450. The default is 1.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-22 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 address-family ipv6 unicast Enters IPv6 unicast address family mode.
Step 4 area area-id range ipv6-prefix/length Creates a summary address on an ABR for a range of
[not-advertise] addresses and advertises this summary address in a
Inter-Area Prefix (type 3) LSA.
To not advertise the summary address, append the
command with not-advertise.
Step 5 summary-address ipv6-prefix/length Creates a summary address on an ASBR for a range of
[not-advertise][tag tag] addresses.
Optionally, you can suppress (not-advertise)
addresses that match the ipv6-prefix/length.
Note The router does not support the [tag tag]
option of this command because it does not
support redistribution of routes.
Step 6 show ipv6 ospfv3 summary-address (Optional) Displays information about OSPFv3
summary addresses.
Step 7 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to create summary addresses between areas on an ABR.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# address-family ipv6 unicast
router(config-router-af)# area 0.0.0.10 range 2001:0DB8::/48
router(config-router)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-23
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
To terminate an OSPFv3 routing process, use the no router ospfv3 instance-tag command in the
configuration mode.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 timers lsa-arrival milliseconds (Optional) Sets the minimum LSA arrival time in
milliseconds. The range is from 10 to 600000. The
default is 1000 milliseconds.
Step 4 timers lsa-group-pacing seconds (Optional) Sets the interval in seconds for grouping
LSAs. The range is from 1 to 1800. The default is 240
seconds.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-24 OL-25630-04
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
Command Purpose
Step 5 timers throttle lsa start-time hold-interval (Optional) Sets the rate limit in milliseconds for
max-time generating LSAs. You can configure the following
timers:
start-time—The range is from 50 to 5000 milliseconds.
The default value is 50 milliseconds.
hold-interval—The range is from 50 to 30,000
milliseconds. The default value is 5000 milliseconds.
max-time—The range is from 50 to 30,000
milliseconds. The default value is 5000 milliseconds.
Step 6 address-family ipv6 unicast Enters IPv6 unicast address family mode.
Step 7 timers throttle spf delay-time hold-time (Optional) Sets the SPF best path schedule initial delay
time and the minimum hold time in seconds between
SPF best path calculations. The range is from 1 to
600000. The default is no delay time and 5000
millisecond hold time.
Step 8 interface type slot/port Enters interface configuration mode.
Step 9 ospfv3 retransmit-interval seconds (Optional) Sets the estimated time in seconds between
LSAs transmitted from this interface. The range is
from 1 to 65535. The default is 5.
Step 10 ospfv3 transmit-delay seconds Sets the estimated time in seconds to transmit an LSA
to a neighbor. The range is from 1 to 450. The default
is 1.
Step 11 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to control LSA flooding with the lsa-group-pacing option.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# timers lsa-group-pacing 300
router(config-router)# copy running-config startup-config
To return to the default settings for a timer, use the no option for each command as shown in the example
below.
router(config-router)# no timers throttle lsa
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-25
Chapter 6 Configuring OSPFv3
Configuring Advanced OSPFv3
• Planned graceful restart only—Configures OSPFv3 to support graceful restart only in the event of a
planned restart.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 router ospfv3 instance-tag Creates a new OSPFv3 instance with the configured
instance tag.
Step 3 graceful-restart Enables graceful restart after an admin disables it. A
graceful restart is enabled by default.
Step 4 graceful-restart grace-period seconds Sets the grace period, in seconds. The range is from 5
to 1800. The default is 60 seconds.
Step 5 graceful-restart helper-disable Disables helper mode. Enabled by default.
Step 6 graceful-restart planned-only Configures graceful restart for planned restarts only.
Step 7 show ipv6 ospfv3 (Optional) Displays OSPFv3 information.
Step 8 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
This example shows how to enable graceful restart on the router after it was disabled and then set the
grace period to 120 seconds.
router# configure terminal
router(config)# router ospfv3 201
router(config-router)# graceful-restart
router(config-router)# graceful-restart grace-period 120
router(config-router)# copy running-config startup-config
Command Purpose
restart ospfv3 instance-tag Restarts the OSPFv3 instance and removes all
neighbors.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-26 OL-25630-04
Chapter 6 Configuring OSPFv3
Verifying the OSPFv3 Configuration
Command Purpose
show ipv6 ospfv3 Displays the OSPFv3 configuration.
show ipv6 ospfv3 border-routers Displays the internal OSPF routing table entries
to an ABR and ASBR.
show ipv6 ospfv3 database Displays lists of information related to the
OSPFv3 database for a specific router.
show ipv6 ospfv3 interface type number Displays the OSPFv3 interface configuration.
show ipv6 ospfv3 neighbors Displays the neighbor information. Use the clear
ospfv3 neighbors command to remove adjacency
with all neighbors.
show ipv6 ospfv3 request-list Displays a list of LSAs requested by a router.
show ipv6 ospfv3 retransmission-list Displays a list of LSAs waiting to be
retransmitted.
show ipv6 ospfv3 summary-address Displays a list of all summary address
redistribution information configured under an
OSPFv3 instance.
show running-configuration ospfv3 Displays the current running OSPFv3
configuration.
Monitoring OSPFv3
To display OSPFv3 statistics, use the following commands.
Command Purpose
show ipv6 ospfv3 memory Displays the OSPFv3 memory usage statistics.
show ipv6 ospfv3 policy statistics area Displays the OSPFv3 route policy statistics for an area.
area-id filter-list {in | out}
show ipv6 ospfv3 policy statistics Displays the OSPFv3 route policy statistics.
redistribute {direct | static}
show ipv6 ospfv3 statistics Displays the OSPFv3 event counters.
show ipv6 ospfv3 traffic [interface-type Displays the OSPFv3 packet counters.
number]
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 6-27
Chapter 6 Configuring OSPFv3
Configuration Examples for OSPFv3
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
6-28 OL-25630-04
CH A P T E R 7
Configuring WAN Backhaul Redundancy
This chapter describes how to configure WAN backhaul redundancy for cellular and WiMAX interfaces
on the Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).
The system software for the router is identified as the Cisco CG-OS software.
This chapter includes the following sections:
• Information About WAN Backhaul Redundancy, page 7-1
• Prerequisites for WAN Backhaul Redundancy, page 7-2
• Configuring WAN Backhaul Redundancy, page 7-2
• Verifying the WAN Backhaul Configuration, page 7-12
• Monitoring Statistics, page 7-13
• Configuration Example, page 7-13
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-1
Chapter 7 Configuring WAN Backhaul Redundancy
Prerequisites for WAN Backhaul Redundancy
Figure 7-1 WAN Backhaul Redundancy Employing IPSec and GRE Tunnels
Tunnel Topology
IPSec Tunnel over WIMAX (Interface wimax 5/1) OSPF cost - 100
Loopback 0 Loopback 0
Connected IPSec Tunnel over Ethernet (Interface eth 2/7) OSPF cost - 1000 Head-End
Grid Router Router
300189
GRE Tunnel over Loopback 0
Tip Cisco recommends that you configure the feature on the Cisco CG-OS router in the order noted below.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-2 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
Note An example configuration for the head-end router (and Cisco CG-OS router) is provided in the
Configuration Example section. For details on configuring the Cisco ASR 1000 Series, refer to the
following URL: http://www.cisco.com/en/US/partner/products/ps9343/index.html
Ensure that all of the requirements listed in the Prerequisites for WAN Backhaul Redundancy section are
met before beginning to configure the Cisco CG-OS router.
DETAILED STEPS
Command Purpose
Step 1 interface loopback number Creates a path between the Cisco CG-OS router and the head-end
router.
Step 2 ip address ip address Creates an IP address for the loopback interface.
Step 3 ip router ospf instance-tag area Creates an OSPFv2 area on the interface.
area-id [secondaries none]
Command Purpose
Step 1 chat-script gsm1 name Defines the ATDT modem commands when the dialer is initiated
to automate the connect procedure.
Step 2 interface dialer number Configures an external dialer interface.
Step 3 dialer persistent Initiates a dial-out when the connection disconnects to ensure the
connection remains active.
Step 4 dialer pool number Creates a dialer pool.
Step 5 dialer string gsm number Specifies the number or string to call. Reference the name of the
chat script in this command for call setup.
Step 6 interface cellular slot/port Configures the 3G cellular interface. Slot value range is 3 to 6.
Port value is 1.
Step 7 dialer pool-member number Assigns membership to a defined dialer pool.
Step 8 no shutdown Brings up the port, administratively.
Step 9 exit Exits to the global configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-3
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
Command Purpose
Step 1 wimax scan-list name Sets a scan-list and enters the scan list mode.
Step 2 channel {index number | Configures the channel number, frequency, or bandwidth for the
frequency number | bandwidth interface.
number}
Step 3 nap id nap-id priority value Defines the Network Access Provider (NAP) ID, priority, and
channel-index value channel for the interface.
nap-id–Must be in the following format: XX:XX:XX (maximum
size of 64).
priority value–Any value in the range of 1 to 250.
channel-index value–Any value in the range of 0 to15.
Step 4 nsp id nsp-id home Defines the Network Service Provider (NSP) ID for the interface.
nsp-id–Must be in the following format: XX:XX:XX (maximum
size of 64).
Step 5 interface wimax slot/port Configures the WiMAX cellular interface. Slot value range is 3 to
6. Port value is 1.
Step 6 scan-list name Attaches a scan list to the interface.
Step 7 ip address ip address Assigns an IP address to the interface.
Step 8 no shutdown Brings up the port, administratively.
Step 9 exit Enter exit to return to the global configuration mode.
Command Purpose
Step 1 feature crypto ike Enables IKEv2 on the Cisco CG-OS router.
Note To prevent loss of the IKEv2 configuration, do not disable
IKEv2 when IPSec is enabled on the Cisco CG-OS router.
Step 2 crypto ike domain ipsec Configures the IKEv2 domain and enters the IKEv2 configuration
submode.
Step 3 identity hostname (Optional) Configures the identity of the IKEv2 protocol. By
default, the IP address of the Cisco CG-OS router is taken as the
identity for IKEv2 protocol.
Note This command is optional when using pre-share key
(PSK) authentication.
Step 4 keepalive value (Optional) Configures the frequency of keep alive messages sent
between peers in the tunnel. Keep alive messages validate the
ability of peers to send and receive traffic. Value can be any
number between 120 and 86400 seconds. The default value is
3600 seconds.
Step 5 policy value Defines IKEv2 priority policy and enters the policy configuration
submode. The lower the number, the higher the priority.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-4 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
Command Purpose
Step 6 authentication method Specifies the IKEv2 authentication method.
Method options are PSK (pre-share) and RSA signature (rsa-sig)
authentication.
Note RSA is the default setting.
Step 7 encryption enc_algo (Optional) Specifies the encryption algorithm for the policy.
Options are:
3des–168-bit DES (3DES)
aes–AES-CBC
Default setting for the Cisco CG-OS router is aes.
Step 8 hash hash_algo (Optional) Configures the hash algorithm for the IKEv2 policy.
Options are:
md5–HMAC-MD5
sha–HMAC-SHA1
Default setting for the Cisco CG-OS router is sha.
Step 9 group DH_group Configures the Diffie Hellman group for the policy. Options are:
1–768-bit Diffie Hellman group
2–1024-bit Diffie Hellman group
5–1536-bit Diffie Hellman group
Default setting for the Cisco CG-OS router is 2.
Step 10 lifetime seconds value (Optional) Specifies the IKEv2 SA lifetime for the policy. Value
is a range from 600 to 86400 seconds. Default setting is 86400
seconds.
Step 11 exit Exits to the global configuration mode.
Step 12 key pre-share key {address ip Configures the key that IKEv2 communicates to the peer
address | hostname name} (head-end router) ip address. The peer must have the same key in
its configuration. Maximum per-shared ley length is 128.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-5
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
To enable IPSec tunnelling on the Cisco CG-OS router and configure its parameters, follow these steps.
Command Purpose
Step 1 feature crypto ipsec virtual- Enables IPSec tunnelling on the Cisco CG-OS router and creates
tunnel a virtual tunnel interface.
Step 2 crypto ipsec transform-set Configures a single transform set that is included within the
tx-form-name {txform | IPSec protection profile.
encr_txform auth_txform}
Options for txform are:
• esp-gcm 128–128-bit AES-GCM authenticated encryption
AES-CBC
• esp-gcm 256–256-bit AES-GCM authenticated encryption
Options for encr_txform are:
• esp-aes 128 or esp-aes 256 AES-CBC
Options for auth_txform are:
• esp-sha1-hmac or esp-sha256-hmac HMAC-SHA
Note The transform-set name (tx-form-name) defined here
must match that transform-set name associated with the
IPSec profile in Step 5 below.
Step 3 crypto ip sec profile profile-name Configures an IPSec profile for attachment to the tunnel
interface.
Step 4 description text (Optional) Allows the user to provide a description for the profile.
The character limit is 64 characters.
Step 5 set transform-set txfrom-name Associates the transformation set to the currently configured
IPSec profile (see Step 2 above).
Step 6 set pfs group (Optional) Configures the Diffie-Hillman group for perfect
forward secrecy for the IPSec tunnel. Options for group are as
follows:
group 1–768-bit mode Diffie-Hillman
group 4–2048-bit mode Diffie-Hillman
group 2–1024-bit mode Diffie-Hillman
group 5–1536-bit mode Diffie-Hillman
By default, PFS is disabled.
Step 7 set security-association lifetime (Optional) Specifies the lifetime of the IPSec security
[seconds] [kilobytes] association. When the configured lifetime value expires, a new
security association is negotiated.
Lifetime can be expressed in both time (seconds, 120 to 86400)
and data volume (kilobytes, 2560 to 4292967295).
The default time value is 3600 seconds.
The default data volume is 4608000 kilobytes.
Step 8 exit Exits to the global configuration mode.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-6 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
To enable OSPFv2 processing on the Cisco CG-OS router, enter the following command in the global
configuration mode.
Command Purpose
Step 1 router ospf instance-tag Creates an OSPFv2 routing instance.
instance-tag–Internal identifier for the routing instance and can
be an alphanumeric word or positive integer.
To enable OSPFv3 processing on the Cisco CG-OS router, enter the following command in the global
configuration mode.
Command Purpose
Step 1 router ospfv3 instance-tag Creates an OSPFv3 routing instance.
instance-tag–Internal identifier for the routing instance and can
be an alphanumeric word or positive integer.
To enable tunneling on the Cisco CG-OS router, enter the following command in the global configuration
mode.
Command Purpose
Step 1 feature tunnel Enables tunneling on the Cisco CG-OS router.
To create an IPSec tunnel on the Cisco CG-OS router and define an OSPFv2 area on each of the
interfaces (cellular and WiMAX), follow these steps to configure each interface.
An individual tunnel must be configured for each of the interfaces, cellular and WiMAX (see
Figure 7-1).
Command Purpose
Step 1 interface tunnel number Creates a virtual tunnel.
When configuring a 3G or WiMAX interface, number is any
value from 1 to 4095.
Step 2 ip address ip address Assigns an IP address for the tunnel.
Step 3 ip ospf cost interface-cost Specifies the cost of sending a packet on an interface.
Step 4 ip ospf dead-interval seconds Sets the interval during which a router must receive at least one
hello packet before the router declares that neighbor as down. The
range in seconds is from 1 to 65535.
Step 5 ip ospf hello-interval seconds Sets the interval between hello packets that OSPFv2 sends on the
interface. The range in seconds is from 1 to 65535.
Step 6 ip ospf mtu-ignore Disables the OSPFv2 MTU mismatch detection on database
descriptor (DBD) packets.
Note This parameter allows systems with Cisco IOS (such as
the head-end router) and the Cisco CG-OS router to
communicate and must be configured.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-7
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
Command Purpose
Step 7 ip router ospf instance-tag area Creates an OSPFv2 area on the interface.
area-id [secondaries none]
Step 8 tunnel mode ipsec ipv4 Configures the encapsulation mode for the tunnel.
Step 9 tunnel source {ip-address | Configures the source endpoint for the tunnel.
interface-type slot-port}
Step 10 tunnel destination {ip-address | Configures the destination endpoint for the tunnel.
host-name}
Step 11 no keepalive value (Optional) Disables the keepalive value on the Cisco CG-OS
router.
The keepalive value command configures the frequency of keep
alive messages sent between peers in the tunnel. Keep alive
messages validate the ability of peers to send and receive traffic.
Value can be any number between 120 and 86400 seconds. The
default value is 3600 seconds.
Step 12 tunnel protection ipsec profile Binds the IPSec protection profile to the tunnel interfaces.
profile-name Note The profile-name defined in this step must match the
profile name assigned to the virtual tunnel interface in
Step 3 by using the crypto ip sec profile profile-name
command.
Step 13 no shutdown (Optional) Brings the port up, administratively.
Step 14 exit Exits the interface configuration mode.
To configure a Generic Routing Encapsulation (GRE) tunnel on the Cisco CG-OS router, follow these
steps.
Command Purpose
Step 1 interface tunnel number Creates a GRE tunnel on an interface.
number–Any value from 1 to 4095.
Step 2 ip address ip address Assigns an IPv4 address to the tunnel interface.
Step 3 ipv6 address addr Assigns an IPv6 address to the tunnel interface. The format is
A:B::C:D/length. The length range is 1 to 128.
Step 4 ipv6 router ospfv3 instance-tag Creates an OSPFv3 area on the tunnel interface.
area area-id [secondaries none]
Step 5 tunnel source {ip-address | Configures the source endpoint for the tunnel.
interface-type slot-port}
Step 6 tunnel destination {ip-address | Configures the destination endpoint for the tunnel.
host-name}
Step 7 no shutdown (Optional) Brings the port up, administratively.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-8 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
EXAMPLE
These commands show how to enable IKEv2 on the Cisco CG-OS router.
router(config)# feature crypto ike
router(config)# crypto ike domain ipsec
router(config-ike-ipsec)# policy 10
router(config-ike-ipsec-policy)# authentication pre-share
router(config-ike-ipsec-policy)# group 5
router(config-ike-ipsec-policy)# exit
router(config-ike-ipsec)# key company123 address 11.0.0.1
router(config-ike-ipsec)# key company123 address 192.10.0.1
router(config-ike-ipsec)# key company123 address 192.168.168.1
router(config-ike-ipsec)# exit
router(config)#
These commands show how to enable IPSec tunnelling (and configure its parameters) on the
Cisco CG-OS router.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-9
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
This command shows how to enable OSPFv2 processing on the Cisco CG-OS router.
router(config)# router ospf 2
This command shows how to enable OSPFv3 processing on the Cisco CG-OS router.
router(config)# router ospfv3 1
This command shows how to enable tunneling on the Cisco CG-OS router.
router(config)# feature tunnel
These commands show how to configure tunnels that transport WiMAX (tunnel 15) and cellular
(tunnel 15) data within the IPSec virtual tunnel from the Cisco CG-OS router to the head-end router.
These commands show how to configure a Generic Routing Encapsulation (GRE) tunnel on the
Cisco CG-OS router.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-10 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Configuring WAN Backhaul Redundancy
These commands show how to enable IPSec tunnelling and configure its parameters on the head-end
router.
HeadEndRtr(config)# crypto ipsec transform-set AES128SHA1 esp-aes esp-sha-hmac
HeadEndRtr(config)# crypto ipsec profile IPSecProfile
HeadEndRtr(config-ipsec-profile)# set transform-set AES128SHA1
HeadEndRtr(config-ipsec-profile)# set ikev2-profile MyIke2Profile
HeadEndRtr(config-ipsec-profile)# responder-only
HeadEndRtr(config-ipsec-profile)# exit
HeadEndRtr(config)#
These commands show how to configure tunnels that transport WiMAX (tunnel 15) and
cellular (tunnel 16) data from the head-end router to the Cisco CG-OS router.
HeadEndRtr(config)# interface tunnel 15
HeadEndRtr(config-if)# ip address 23.0.5.1 255.255.255.252
HeadEndRtr(config-if)# ip ospf cost 100
HeadEndRtr(config-if)# ip ospf hello-interval 5
HeadEndRtr(config-if)# ip ospf mtu-ignore
HeadEndRtr(config-if)# tunnel source GigabitEthernet 0/2
HeadEndRtr(config-if)# tunnel mode ipsec ipv4
HeadEndRtr(config-if)# tunnel destination 192.10.0.21
HeadEndRtr(config-if)# tunnel protection ipsec profile IPSecProfile
HeadEndRtr(config-if)# exit
HeadEndRtr(config)# interface tunnel 16
HeadEndRtr(config-if)# ip address 23.0.6.1 255.255.255.252
HeadEndRtr(config-if)# ip ospf cost 500
HeadEndRtr(config-if)# ip ospf hello-interval 5
HeadEndRtr(config-if)# ip ospf mtu-ignore
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-11
Chapter 7 Configuring WAN Backhaul Redundancy
Verifying the WAN Backhaul Configuration
These command shows how to create a GRE tunnel on the head-end router.
HeadEndRtr(config)# interface tunnel 1
HeadEndRtr(config)# ip address 25.0.0.1 255.255.255.0
HeadEndRtr(config-if)# ip ospf mtu-ignore
HeadEndRtr(config-if)# ip address 25::1/64
HeadEndRtr(config-if)# ipv6 enable
HeadEndRtr(config-if)# ipv6 ospf mtu-ignore
HeadEndRtr(config-if)# ipv6 ospf 1 area 1
HeadEndRtr(config-if)# tunnel source loopback 0
HeadEndRtr(config-if)# tunnel destination 20.0.0.2
HeadEndRtr(config-if)# exit
HeadEndRtr(config)#
These command shows how to enable OSPFv3 processing, define OSPFv3 areas, and enable the OSPFv3
for IPv6 router configuration mode (which allows you to configure IPv6 parameters) on the head-end
router.
HeadEndRtr(config)# router ospf 2
HeadEndRtr(config-router)# network 20.0.0.0 0.0.0.255 area 2
HeadEndRtr(config-router)# network 23.0.5.0 0.0.0.255 area 2
HeadEndRtr(config-router)# network 23.0.6.0 0.0.0.255 area 2
HeadEndRtr(config-router)# exit
HeadEndRtr(config)# ipv6 router ospf 1
Note The Cisco CG-OS software does not support the [vrf {vrf-name | all | default | management}]
parameter in the commands listed below.
Command Purpose
show crypto ike domain ipsec Displays the IKEv2 configuration.
show crypto ike domain ipsec policy Displays the configured IKEv2 policies.
show crypto ipsec profile profile_name Displays all defined IPSec profiles.
show crypto ipsec transform set tx-form Displays all defined transform-sets.
name
show file volatile:///bhmgr.tcl Confirms installation status of the backhaul manager
script (loaded during manufacture) and location of the
script.
show {ip ospf | ospfv3} Displays the configuration of the selected option.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-12 OL-25630-04
Chapter 7 Configuring WAN Backhaul Redundancy
Monitoring Statistics
Command Purpose
show ipv6 ospfv3 interface Displays configured tunnels and their state and
configuration.
show running-config {ospf | ospfv3} Displays the currently running OSPFv2 or OSPFv3
configuration.
show running-config interface {wimax | Displays the currently running WiMAX or cellular
cellular} slot/port configuration.
show tunnel internal database Displays the configured tunnel names and IP addresses.
reachability
Monitoring Statistics
To display WAN backhaul statistics, enter the following commands:
Command Purpose
show {ip ospf | ospfv3} policy statistics Displays the route policy statistics for an area for the
area area-id filter-list {in | out} selected option.
show {ip ospf | ospfv3 | ipv6 ospfv3} Displays event counters for the selected option.
statistics
show {ip ospf | opsfv3 | ipv6 ospfv3} Displays the packet counters for the selected option.
traffic [interface-type slot/port]
Configuration Example
See EXAMPLE, page 7-9.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 7-13
Chapter 7 Configuring WAN Backhaul Redundancy
Configuration Example
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
7-14 OL-25630-04
CH A P T E R 8
Configuring Static Routing
This chapter describes how to configure static routing on the Cisco 1000 Series Connected Grid Routers
(hereafter referred to as the Cisco CG-OS router). The system software for the router is identified as the
Cisco CG-OS software.
This chapter includes the following sections:
• Information About Static Routing, page 8-1
• Prerequisites for Static Routing, page 8-3
• Guidelines and Limitations for Static Routing, page 8-3
• Default Settings, page 8-3
• Configuring Static Routing, page 8-3
• Verifying the Static Routing Configuration, page 8-4
• Configuration Example for Static Routing, page 8-4
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 8-1
Chapter 8 Configuring Static Routing
Information About Static Routing
Administrative Distance
An administrative distance is the metric used by routers to choose the best path when there are two or
more routes to the same destination from two different routing protocols. An administrative distance
guides the selection of one routing protocol (or static route) over another, when more than one protocol
adds the same route to the unicast routing table. Each routing protocol is prioritized in order of most to
least reliable using an administrative distance value.
Static routes have a default administrative distance of 1. A router prefers a static route to a dynamic route
because the router considers a route with a low number to be the shortest. When you want a dynamic
route to override a static route, you can specify an administrative distance for the static route. For
example, when you have two dynamic routes with an administrative distance of 120, you would specify
an administrative distance that is greater than 120 for the static route when you want the dynamic route
to override the static route.
Note By default, a router prefers a static route to a dynamic route because a static route has a smaller
administrative distance than a dynamic route.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
8-2 OL-25630-04
Chapter 8 Configuring Static Routing
Prerequisites for Static Routing
Default Settings
Table 8-1 lists the default setting for the static routing administrative distance parameter.
Parameters Default
administrative distance 1
No prerequisites.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 8-3
Chapter 8 Configuring Static Routing
Verifying the Static Routing Configuration
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters configuration mode.
Step 2 ip route {ip-prefix | ip-addr ip-mask} Configures a static route and the interface for this
{[next-hop | nh-prefix] | [interface next-hop | static route. You can optionally configure the next-hop
nh-prefix]} [tag tag-value [pref] address. The preference value sets the administrative
distance. The range is from 1 to 255. The default is 1.
ipv6 route ipv6-prefix Configures a static route and the interface for this
{nh-prefix|link-local-nh-prefix} | (nexthop static route. You can optionally configure the next-hop
[interface] | link-local-nexthop [interface]} address. The preference value sets the administrative
[tag tag-value [pref] distance. The range is from 1 to 255. The default is 1.
Step 3 show {ip | ipv6} static-route (Optional) Displays information about static routes.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
EXAMPLE
To remove the static route, use the no {ip | ipv6} static-route command.
Command Purpose
show ip static-route Displays the configured static routes.
show ipv6 static-route Displays the configured static routes.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
8-4 OL-25630-04
G L OS S A RY
address family A specific type of network addressing supported by a routing protocol. Examples include IPv4 unicast
and IPv4 multicast.
adjacency Two OSPF routers that have compatible configurations and have synchronized their link-state
databases.
administrative A rating of the trustworthiness of a routing information source. In general, the higher the value, the
distance lower the trust rating.
area A logical division of routers and links within an OSPF domain that creates separate subdomains. LSA
flooding is contained within an area.
area border router A router that connects one OSPF area to another OSPF area.
ARP Address resolution protocol. ARP discovers the MAC address for a known IPv4 address.
autonomous A router that connect a an OSPF autonomous system to an external autonomous system.
system border
router
BDR Backup designated router. An elected router in a multi-access OSPF network that acts as the backup if
the designated router fails. All neighbors form adjacencies with the backup designated router (BDR)
as well as the designated router.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 GL-1
Glossary
converged The point at which all routers in a network have identical routing information.
dead interval The time within which an OSPF router must receive a Hello packet from an OSPF neighbor. The dead
interval is usually a multiple of the hello interval. If no Hello packet is received, the neighbor adjacency
is removed.
default gateway A router to which all unroutable packets are sent. Also called the router of last resort.
delay The length of time required to move a packet from the source to the destination through the
internetwork.
distance vector Defines routes by distance (for example, the number of hops to the destination) and direction (for
example, the next-hop router) and then broadcasts to the directly connected neighbor routers.
DNS client Domain Name System client. Communicates with DNS server to translate a hostname to an IP address.
DR Designated router. An elected router in a multi-access OSPF network that sends LSAs on behalf of all
its adjacent neighbors. All neighbors establish adjacency with only the designated router and the
backup designated router.
gateway A switch or router that forwards Layer 3 traffic from a LAN to the rest of the network.
graceful restart A feature that allows a router to remain in the data forwarding path while a routing protocol reboots.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
GL-2 OL-25630-04
Glossary
hello packet A special message used by OSPF to discover neighbors. Also acts as a keep alive messages between
established neighbors.
high availability The ability of a system or component to limit or avoid network disruption when a component fails.
IP tunnels A method of encapsulating packets within various Internet Protocols (IP) to interconnect
communications between different networks.
keepalive A special message sent between routing peers to verify and maintain communications between the pair.
link cost An arbitrary number configured on an OSPF interface which is in shortest path first calculations.
link-state Shares information about a link and link cost to neighboring routers.
LSA Link-state advertisement. An OSPF message to share information on the operational state of a link, link
cost, and other OSPF neighbor information.
link-state database OSPF database of all LSAs received. OSPF uses this database to calculate the best path to each
destination in the network.
link-state refresh The time that OSPF floods the network with LSAs to ensure all OSPF routers have the same
information.
load balancing The distribution of network traffic across multiple paths to a given destination.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 GL-3
Glossary
message digest A one-way hash applied to a message using a shared password and appended to the message to
authenticate the message and ensure the message has not been altered in transit.
metric A standard of measurement, such as the path bandwidth, that is used by routing algorithms to determine
the optimal path to a destination.
MD5 authentication A cryptographic construction that is calculated based on an authentication key and the original message
digest and sent along with the message to the destination. Allows the destination to determine the authenticity
of the sender and guarantees that the message has not been tampered with during transmission.
MTU Maximum transmission unit. The largest packet size that a network link transmits without
fragmentation.
NDP Neighbor Discovery Protocol. The protocol used by IPv6 to find the MAC address associated with an
IPv6 address.
next hop The next router that a packet is sent to on its way to the destination address.
OSPF Open Shortest Path First. An IETF link-state protocol. OSPFv2 supports IPv4 and OSPFv3 supports
IPv6.
path length Sum of all link costs or the hop count that a packet experiences when routed from the source to the
destination.
policy-based The method of using route maps to alter the route selected for a packet.
routing
redistribution One routing protocol accepts route information from another routing protocol and advertises it in the
local autonomous system.
reliability The dependability (usually described in terms of the bit-error rate) of each network link.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
GL-4 OL-25630-04
Glossary
RIB Routing Information Base. Maintains the routing table with directly connected routes, static routes, and
routes learned from dynamic unicast routing protocols.
route map A construct used to map a route or packet based on match criteria and optionally alter the route or
packet based on set criteria. Used in route redistribution and policy-based routing.
route A process that replaces a series of related, specific routes in a route table with a more generic route.
summarization
router ID A unique identifier used by routing protocols. If not manually configured, the routing protocol selects
the highest IP address configured on the system.
SPF algorithm Shortest Path First algorithm. Dijkstra’s algorithm used by OSPF to determine the shortest route
through a network to a particular destination.
split horizon Routes learned from an interface are not advertised back along the interface they were learned on,
preventing the router from seeing its own route updates.
split horizon with Routes learned from an interface are set as unreachable and advertised back along the interface they
poison reverse were learned on, preventing the router from seeing its own route updates.
stub area An OSPF area that does not allow AS External (type 5) LSAs.
stub router A router that has no direct connection to the main network and which routes to that network using a
known remote router.
U6RIB Unicast IPv6 Routing Information Base. The unicast routing table that gathers information from all
routing protocols and updates the forwarding information base for each module.
URIB Unicast Routing Information Base for IPv4. The unicast routing table that gathers information from all
routing protocols and updates the forwarding information base for each module.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
OL-25630-04 GL-5
Glossary
VDC virtual device context. Used to split a physical system into secure, independent, logical systems.
virtualization A method of making a physical entity act as multiple, independent logical entities.
Cisco 1000 Series Connected Grid Routers Unicast Routing Software Configuration Guide
GL-6 OL-25630-04