3 - Scaling Networks Companion Guide
3 - Scaling Networks Companion Guide
Companion Guide
Cisco Press
800 East 96th Street
Indianapolis, Indiana 46240 USA
ii Scaling Networks Companion Guide
Publisher
Scaling Networks Companion Guide Paul Boger
The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Composition
Systems, Inc. shall have neither liability nor responsibility to any person or entity with Bumpy Design
respect to any loss or damages arising from the information contained in this book or Indexer
from the use of the discs or programs that may accompany it. Ken Johnson
The opinions expressed in this book belong to the author and are not necessarily those Proofreader
of Cisco Systems, Inc. Debbie Williams
iii
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capi-
talized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any trademark or service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities (which may include
electronic versions; custom cover designs; and content particular to your business, training goals, marketing
focus, or branding interests), please contact our corporate sales department at [email protected] or
(800) 382-3419.
For questions about sales outside the U.S., please contact [email protected].
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted
with care and precision, undergoing rigorous development that involves the unique expertise of members from the
professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could
improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at
[email protected]. Please make sure to include the book title and ISBN in your message.
Contents at a Glance
Introduction xx
Glossary 569
Index 583
vi Scaling Networks Companion Guide
Contents
Introduction xx
Practice 45
Class Activities 45
Labs 45
Packet Tracer Activities 45
Check Your Understanding Questions 46
Practice 446
Class Activities 446
Labs 447
Packet Tracer Activities 447
Check Your Understanding Questions 447
Glossary 569
Index 583
xix
Syntax Conventions
The conventions used to present command syntax in this book are the same con-
ventions used in the IOS Command Reference. The Command Reference describes
these conventions as follows:
Q Boldface indicates commands and keywords that are entered literally as shown.
In actual configuration examples and output (not general command syntax),
boldface indicates commands that are manually input by the user (such as a
show command).
Q Italics indicate arguments for which you supply actual values.
Q Vertical bars (|) separate alternative, mutually exclusive elements.
Q Square brackets ([ ]) indicate an optional element.
Q Braces ({ }) indicate a required choice.
Q Braces within brackets ([{ }]) indicate a required choice within an optional element.
xx Scaling Networks Companion Guide
Introduction
Scaling Networks Companion Guide is the official supplemental textbook for the
Cisco Networking Academy Scaling Networks course. Cisco Networking Academy
is a comprehensive program that delivers information technology skills to students
around the world. The curriculum emphasizes real-world practical application, while
providing opportunities for you to gain the skills and hands-on experience needed
to design, install, operate, and maintain networks in small- to medium-sized busi-
nesses, as well as enterprise and service provider environments.
As a textbook, this book provides a ready reference to explain the same networking
concepts, technologies, protocols, and devices as the online curriculum. This book
emphasizes key topics, terms, and activities and provides some alternate explana-
tions and examples as compared with the course. You can use the online curriculum
as directed by your instructor and then use this Companion Guide’s study tools to
help solidify your understanding of all the topics.
Book Features
The educational features of this book focus on supporting topic coverage, readabil-
ity, and practice of the course material to facilitate your full understanding of the
course material.
Topic Coverage
The following features give you a thorough overview of the topics covered in each
chapter so that you can make constructive use of your study time:
xxi
Q Objectives: Listed at the beginning of each chapter, the objectives reference the
core concepts covered in the chapter. The objectives match the objectives stated
in the corresponding chapters of the online curriculum. However, the question
format in the Companion Guide encourages you to think about finding the
answers as you read the chapter.
Q Notes: These are short sidebars that point out interesting facts, timesaving
methods, and important safety issues.
Q Chapter summaries: At the end of each chapter is a summary of the chapter’s
key concepts. It provides a synopsis of the chapter and serves as a study aid.
Q Practice: At the end of each chapter, there is a full list of all the Labs, Class
Activities, and Packet Tracer Activities to refer back to for study time.
Readability
The following features have been updated to assist your understanding of the net-
working vocabulary:
Q Key terms: Each chapter begins with a list of key terms, along with a page-
number reference from inside the chapter. The terms are listed in the order in
which they are explained in the chapter. This handy reference allows you to find
a term, flip to the page where the term appears, and see the term used in con-
text. The Glossary defines all the key terms.
Q Glossary: This book contains an all-new Glossary with almost 200 terms.
Practice
Practice makes perfect. This new Companion Guide offers you ample opportunities
to put what you learn into practice. You will find the following features valuable
and effective in reinforcing the instruction that you receive:
Q Check Your Understanding questions and answer key: Updated review ques-
tions are presented at the end of each chapter as a self-assessment tool. These
questions match the style of questions that you see in the online course.
Appendix A, “Answers to ‘Check Your Understanding’ Questions,” provides an
answer key to all the questions and includes an explanation of each answer.
xxii Scaling Networks Companion Guide
Q Labs and activities: Throughout each chapter, you will be directed back to the
online course to take advantage of the activities created to reinforce concepts.
In addition, at the end of each chapter, there is a Practice section that collects a
Packet Tracer list of all the labs and activities to provide practice with the topics introduced in
Activity this chapter. The labs and class activities are available in the companion Scaling
Networks Lab Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities
PKA files are found in the online course.
Video
Q Page references to online course: After headings, you will see, for example,
(1.1.2.3). This number refers to the page number in the online course so that you
can easily jump to that spot online to view a video, practice an activity, perform
a lab, or review a topic.
Lab Manual
The supplementary book Scaling Networks Lab Manual, by Cisco Press
(ISBN 978-1-58713-325-1), contains all the labs and class activities from the course.
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q How is the hierarchical network used in Q What types of routers are available for small-
small business? to medium-sized business networks?
Q What are the recommendations for design- Q What are the basic configuration settings for
ing a network that is scalable? a Cisco IOS device?
Q What features in switch hardware are neces-
sary to support small- to medium-sized busi-
ness network requirements?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Introduction (1.0.1.1)
As a business grows, so do its networking requirements. Businesses rely on the net-
work infrastructure to provide mission-critical services. Network outages can result
in lost revenue and lost customers. Network designers must design and build an
enterprise network that is scalable and highly available.
This chapter introduces strategies that can be used to systematically design a highly
functional network, such as the hierarchical network design model, the Cisco
Enterprise Architecture, and appropriate device selections. The goals of network
design are to limit the number of devices impacted by the failure of a single network
device, provide a plan and path for growth, and create a reliable network.
6. The enterprise expands to other countries (not all enterprises are international).
4
2
7
An enterprise network must support the exchange of various types of network traf-
fic, including data files, email, IP telephony, and video applications for multiple
business units. All enterprise networks must
Q Support critical applications
Q Support converged network traffic
Chapter 1: Introduction to Scaling Networks 5
initiated at the access layer and passes through the other layers if the functionality
of those layers is required.
Even though the hierarchical model has three layers, some smaller enterprise net-
works might implement a two-tier hierarchical design. In a two-tier hierarchical
design, the core and distribution layers are collapsed into one layer, reducing cost
and complexity, as shown in Figure 1-4.
Enterprise Campus
The Enterprise Campus consists of the entire campus infrastructure, to include the
access, distribution, and core layers. The access layer module contains Layer 2 or
Layer 3 switches to provide the required port density. Implementation of VLANs
and trunk links to the building distribution layer occurs here. Redundancy to the
building distribution switches is important. The distribution layer module aggregates
building access using Layer 3 devices. Routing, access control, and QoS are per-
formed at this distribution layer module. The core layer module provides high-speed
interconnectivity between the distribution layer modules, data center server farms,
and the enterprise edge. Redundancy, fast convergence, and fault tolerance are the
focus of the design in this module.
In addition to these modules, the Enterprise Campus can include other submodules
such as
Q Server Farm and Data Center Module: This area provides high-speed connec-
tivity and protection for servers. It is critical to provide security, redundancy,
and fault tolerance. The network management systems monitor performance by
monitoring device and network availability.
Q Services Module: This area provides access to all services, such as IP Telephony
services, wireless controller services, and unified services.
Chapter 1: Introduction to Scaling Networks 9
Enterprise Edge
The Enterprise Edge consists of the Internet, VPN, and WAN modules connecting
the enterprise with the service provider’s network. This module extends the enter-
prise services to remote sites and enables the enterprise to use Internet and partner
resources. It provides QoS, policy reinforcement, service levels, and security.
1 4
Interactive
Activity 1.1.1.6: Identify Cisco Enterprise Architecture Modules
Graphic Go to the course online to perform this practice activity.
Chapter 1: Introduction to Scaling Networks 11
Implementing Redundancy
For many organizations, the availability of the network is essential to supporting
business needs. Redundancy is an important part of network design for preventing
disruption of network services by minimizing the possibility of a single point of fail-
ure. One method of implementing redundancy is by installing duplicate equipment
and providing failover services for critical devices.
Another method of implementing redundancy is using redundant paths, as shown in
Figure 1-8.
Redundant paths offer alternate physical paths for data to traverse the network.
Redundant paths in a switched network support high availability. However, because
of the operation of switches, redundant paths in a switched Ethernet network can
cause logical Layer 2 loops. For this reason, Spanning Tree Protocol (STP) is
required.
Chapter 1: Introduction to Scaling Networks 13
STP allows for the redundancy required for reliability but eliminates the switch-
ing loops. It does this by providing a mechanism for disabling redundant paths in a
switched network until the path is necessary, such as when failures occur. STP is an
open standard protocol, used in a switched environment to create a loop-free logical
topology.
More details about LAN redundancy and the operation of STP are covered in
Chapter 2, “LAN Redundancy.”
Implementing EtherChannel
In hierarchical network design, some links between access and distribution switches
might need to process a greater amount of traffic than other links. As traffic from
multiple links converges onto a single, outgoing link, it is possible for that link to
become a bottleneck. Link aggregation allows an administrator to increase the
amount of bandwidth between devices by creating one logical link made up of sev-
eral physical links. EtherChannel is a form of link aggregation used in switched net-
works, as shown in Figure 1-9.
14 Scaling Networks Companion Guide
EtherChannel uses the existing switch ports; therefore, additional costs to upgrade
the link to a faster and more expensive connection are not necessary. The Ether-
Channel is seen as one logical link using an EtherChannel interface. Most configu-
ration tasks are done on the EtherChannel interface, instead of on each individual
port, ensuring configuration consistency throughout the links. Finally, the Ether-
Channel configuration takes advantage of load balancing between links that are part
of the same EtherChannel, and depending on the hardware platform, one or more
load-balancing methods can be implemented.
EtherChannel operation and configuration will be covered in more detail in
Chapter 3, “LAN Aggregation.”
Additionally, a wireless router or a wireless access point (AP) is required for users
to connect, as shown in Figure 1-10.
There are many considerations when implementing a wireless network, such as the
types of wireless devices to use, wireless coverage requirements, interference consid-
erations, and security considerations.
Wireless operation and implementation will be covered in more detail in Chapter 4,
“Wireless LANs.”
OSPF routers establish and maintain neighbor adjacency or adjacencies with other
connected OSPF routers. When routers initiate an adjacency with neighbors, an
exchange of link-state updates begins. Routers reach a FULL state of adjacency
when they have synchronized views on their link-state database. With OSPF, link-
state updates are sent when network changes occur.
OSPF is a popular link-state routing protocol that can be fine-tuned in many ways.
Chapter 5, “Adjust and Troubleshoot Single-Area OSPF,” will cover some of the
more advanced features of OSPF configuration and troubleshooting.
Additionally, OSPF supports a two-layer hierarchical design, or multiarea OSPF, as
shown in Figure 1-12.
All OSPF networks begin with Area 0, also called the backbone area. As the network
is expanded, other nonbackbone areas can be created. All nonbackbone areas must
directly connect to area 0. Chapter 6, “Multiarea OSPF,” introduces the benefits,
operation, and configuration of multiarea OSPF.
Another popular routing protocol for larger networks is Enhanced Interior Gate-
way Routing Protocol (EIGRP). Cisco developed EIGRP as a proprietary distance
vector routing protocol with enhanced capabilities. Although configuring EIGRP
is relatively simple, the underlying features and options of EIGRP are extensive
and robust. For example, EIGRP uses multiple tables to manage the routing process
using Protocol Dependent Modules (PDM), as shown in Figure 1-13.
EIGRP contains many features that are not found in any other routing protocols. It
is an excellent choice for large, multiprotocol networks that employ primarily Cisco
devices.
Chapter 7, “EIGRP,” introduces the operation and configuration of the EIGRP rout-
ing protocol, while Chapter 8, “EIGRP Advanced Configurations and Troubleshoot-
ing,” covers some of the more advanced configuration options of EIGRP.
Interactive
Activity 1.1.2.6: Identify Scalability Terminology
Graphic Go to the course online to perform this practice activity.
18 Scaling Networks Companion Guide
When selecting switches, network administrators must determine the switch form
factors. This includes the fixed configuration shown in Figure 1-15, the modular
configuration shown in Figure 1-16, the stackable configuration shown in Figure
1-17, or the nonstackable configuration.
The height of the switch, which is expressed in the number of rack units, is also
important for switches that are mounted in a rack. For example, the fixed configura-
tion switches shown in Figure 1-15 are all one rack unit (1U) high.
In addition to these considerations, the following list highlights other common busi-
ness considerations when selecting switch equipment:
Chapter 1: Introduction to Scaling Networks 21
Q Cost: The cost of a switch will depend on the number and speed of the inter-
faces, supported features, and expansion capability.
Q Port Density: Network switches must support the appropriate number of
devices on the network.
Q Power: It is now common to power access points, IP phones, and even compact
switches using Power over Ethernet (PoE). In addition to PoE considerations,
some chassis-based switches support redundant power supplies.
Q Reliability: The switch should provide continuous access to the network.
Q Port Speed: The speed of the network connection is of primary concern to
end users.
Q Frame Buffers: The ability of the switch to store frames is important in a net-
work where there might be congested ports to servers or other areas of the
network.
Q Scalability: The number of users on a network typically grows over time; there-
fore, the switch should provide the opportunity for growth.
For example, a typical 48-port gigabit switch operating at full wire speed generates
48 Gb/s of traffic. If the switch only supports a forwarding rate of 32 Gb/s, it can-
not run at full wire speed across all ports simultaneously. Fortunately, access layer
switches typically do not need to operate at full wire speed, because they are physi-
cally limited by their uplinks to the distribution layer. This means that less expen-
sive, lower-performing switches can be used at the access layer, and more expensive,
higher-performing switches can be used at the distribution and core layers, where
the forwarding rate has a greater impact on network performance.
PoE Port
PoE Port
With IOS versions prior to 15.x, these switches supported only one active switched
virtual interface (SVI). The Catalyst 2960 also supports multiple active SVIs. This
means that the switch can be remotely accessed through multiple IP addresses on
distinct networks.
Interactive
Activity 1.2.1.6: Selecting Switch Hardware
Graphic Go to the course online to perform this practice activity.
Routers use the network portion of the destination IP address to route packets to
the proper destination. They select an alternate path if a link goes down or traffic
is congested. All hosts on a local network specify the IP address of the local router
interface in their IP configuration. This router interface is the default gateway.
Routers also serve the following beneficial functions, as shown in Figure 1-23:
Q Provide broadcast containment
Q Connect remote locations
Q Group users logically by application or department
Q Provide enhanced security
Routers limit broadcasts to the local network. Routers can be configured with access
control lists to filter unwanted traffic.
Routers can be used to interconnect Routers logically group users who require
geographically separated locations. access to the same resources.
With the enterprise and the ISP, the ability to route efficiently and recover from
network link failures is critical to delivering packets to their destination.
28 Scaling Networks Companion Guide
Routers can also be categorized as fixed configuration or modular. With the fixed
configuration, the desired router interfaces are built in. Modular routers come with
multiple slots that allow a network administrator to change the interfaces on the
router. As an example, a Cisco 1841 router comes with two Fast Ethernet RJ-45
interfaces built in and two slots that can accommodate many different network
interface modules. Routers come with a variety of different interfaces, such as Fast
Ethernet, Gigabit Ethernet, Serial, and Fiber-Optic.
Interactive
Activity 1.2.2.4: Identify the Router Category
Graphic Go to the course online to perform this practice activity.
30 Scaling Networks Companion Guide
Chapter 9, “IOS Images and Licensing,” covers more information on managing and
maintaining the Cisco IOS licenses.
Example 1-2 shows the results of the configuration commands that were entered in
Example 1-1. To clear the router configuration, use the erase startup-config com-
mand and then the reload command.
Q show ip route: As shown in Example 1-4, this command displays routing table
information, including routing codes, known networks, administrative distance
and metrics, how routes were learned, next hop, static routes, and default
routes.
Chapter 1: Introduction to Scaling Networks 35
Q show ip ospf neighbor: As shown in Example 1-5, this command displays infor-
mation about OSPF neighbors that have been learned, including the Router ID
of the neighbor, the priority, the state (Full = adjacency has been formed), the IP
address, and the local interface that learned of the neighbor.
and I/O statistics. If specified without a specific interface designation, all inter-
faces will be displayed. If a specific interface is specified after the command,
information about that interface only will be displayed.
Q show ip interface brief: As shown in Example 1-8, this command displays all
interfaces with IP addressing information and interface and line protocol status.
Switch# enable
Switch# configure terminal
Switch(config)# hostname S1
S1(config)# enable secret class
S1(config)# line con 0
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# line vty 0 4
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# service password-encryption
S1(config)# banner motd $ Authorized Access Only! $
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.5 255.255.255.0
S1(config-if)# no shutdown
S1(config-if)# ip default-gateway 192.168.1.1
S1(config)# interface fa0/2
S1(config-if)# switchport mode access
S1(config-if)# switchport port-security
S1(config-if)# end
S1# copy running-config startup-config
Example 1-12 shows the results of the configuration commands that were entered in
Example 1-11.
service password-encryption
!
hostname S1
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
interface FastEthernet0/2
switchport mode access
switchport port-security
!
interface Vlan1
ip address 192.168.1.5 255.255.255.0
!
ip default-gateway 192.168.1.1
!
banner motd ^C Authorized Access Only ^C
!
line con 0
exec-timeout 0 0
password 7 1511021F0725
login
line vty 0 4
password 7 1511021F0725
login
line vty 5 15
login
!
end
Verify and save the switch configuration using the copy running-config startup-
config command. To clear the switch configuration, use the erase startup-config
command and then the reload command. It might also be necessary to erase any
VLAN information using the delete flash:vlan.dat command. When switch con-
figurations are in place, view the configurations using the show running-config
command.
Q show interfaces: As shown in Example 1-15, this command displays one or all
interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation,
duplex, and I/O statistics.
42 Scaling Networks Companion Guide
Like the router, the switch also supports the show cdp neighbors command.
The same in-band and out-of-band management techniques that apply to routers also
apply to switch configuration.
44 Scaling Networks Companion Guide
Summary (1.3)
Class Activity 1.3.1.1: Layered Network Design Simulation
As the network administrator for a very small network, you want to prepare a sim-
ulated-network presentation for your branch manager to explain how the network
currently operates.
The small network includes the following equipment:
Q One 2911 Series router
Q One 3560 switch
Q One 2960 switch
Q Four user workstations (PCs or laptops)
Q One printer
Interactive
Activity 1.3.1.2: Basic Switch Configurations
Graphic Go to the course online to perform this practice activity.
The hierarchical network design model divides network functionality into the access
layer, the distribution layer, and the core layer. The Cisco Enterprise Architecture
further divides the network into functional components.
A well-designed network controls traffic and limits the size of failure domains. Rout-
ers and multilayer switches can be deployed in pairs so that the failure of a single
device does not cause service disruptions.
A network design should include an IP addressing strategy, scalable and fast-
converging routing protocols, appropriate Layer 2 protocols, and modular or clus-
tered devices that can be easily upgraded to increase capacity.
Chapter 1: Introduction to Scaling Networks 45
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Introduction to Scaling
Networks Lab Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA
files are found in the online course.
Class Activities
Q Class Activity 1.0.1.2: Network by Design
Q Class Activity 1.3.1.1: Layered Network Design Simulation
Labs
Q Lab 1.2.1.8: Selecting Switching Hardware
4. Which network design solution will best extend access layer connectivity to
host devices?
A. Implementing EtherChannel
B. Implementing redundancy
C. Implementing routing protocols
D. Implementing wireless connectivity
Chapter 1: Introduction to Scaling Networks 47
6. Which type of router would an enterprise use to allow customers to access con-
tent anytime and anyplace, regardless of whether they are at home or work?
A. Service provider routers
B. Network edge routers
C. Branch routers
D. Modular routers
LAN Redundancy
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the issues that you should be con- Q What are the commands to configure Rapid
cerned with when implementing a redundant PVST+ in a switched LAN environment?
network?
Q What are the common STP configuration
Q How does IEEE 802.1D STP operate? issues?
Q What are the different varieties of spanning Q What are the purpose and operation of First
tree? Hop Redundancy Protocols?
Q How does PVST+ operate in a switched LAN Q What are the different varieties of First Hop
environment? Redundancy Protocols?
Q How does Rapid PVST+ operate in a Q What are the commands to verify HSRP and
switched LAN environment? GLBP implementations?
Q What are the commands to configure PVST+
in a switched LAN environment?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Introduction (2.0.1.1)
Network redundancy is a key to maintaining network reliability. Multiple physical
links between devices provide redundant paths. The network can then continue to
operate when a single link or port has failed. Redundant links can also share the traf-
fic load and increase capacity.
Multiple paths need to be managed so that Layer 2 loops are not created. The best
paths are chosen, and an alternate path is immediately available should a primary
path fail. The Spanning Tree Protocols are used to manage Layer 2 redundancy.
Redundant devices, such as multilayer switches or routers, provide the capability for
a client to use an alternate default gateway should the primary default gateway fail.
A client can now have multiple paths to more than one possible default gateway.
First Hop Redundancy Protocols are used to manage how a client is assigned a
default gateway, and to be able to use an alternate default gateway should the pri-
mary default gateway fail.
This chapter focuses on the protocols used to manage these forms of redundancy.
It also covers some of the potential redundancy problems and their symptoms.
Use the Internet to research STP. As you research, take notes and describe
Q Broadcast storm
Q Switching loops
Q The purpose of STP
Q Variations of STP
Complete the reflection questions that accompany the PDF file for this activity.
Save your work and be prepared to share your answers with the class.
2. When the network link between S1 and S2 is disrupted, the path between PC1
and PC4 is automatically adjusted to compensate for the disruption (shown in
Figure 2-1).
3. When the network connection between S1 and S2 is restored, the path is then
readjusted to route traffic directly from S2 to S1 to get to PC4.
Note
To view an animation of these steps, refer to the online course.
Chapter 2: LAN Redundancy 53
Note
The OSI Layer 1 redundancy is illustrated using multiple links and devices, but more than just
physical planning is required to complete the network setup. For the redundancy to work in
a systematic way, the use of OSI Layer 2 protocols such as STP is also required.
Q Broadcast storms: Without some loop-avoidance process, each switch can flood
broadcasts endlessly. This situation is commonly called a broadcast storm.
Q Multiple frame transmission: Multiple copies of unicast frames can be delivered
to destination stations. Many protocols expect to receive only a single copy of
each transmission. Multiple copies of the same frame can cause unrecoverable
errors.
5. When S2 receives the broadcast frames from S3 and S1, the MAC address
table is updated again, this time with the last entry received from the other two
switches.
Note
To view an animation of these steps, refer to the online course.
This process repeats over and over again until the loop is broken by physically dis-
connecting the connections causing the loop or powering down one of the switches
in the loop. This creates a high CPU load on all switches caught in the loop. Because
the same frames are constantly being forwarded back and forth between all switches
in the loop, the CPU of the switch must process a lot of data. This slows down per-
formance on the switch when legitimate traffic arrives.
A host caught in a network loop is not accessible to other hosts on the network.
Additionally, because of the constant changes in the MAC address table, the switch
does not know out of which port to forward unicast frames. In the previous exam-
ple, the switches will have the incorrect ports listed for PC1. Any unicast frame des-
tined for PC1 loops around the network, just as the broadcast frames do. More and
more frames looping around the network eventually create a broadcast storm.
56 Scaling Networks Companion Guide
2. The broadcast frame loops between all the interconnected switches on the
network.
3. PC4 also sends a broadcast frame out on to the looped network.
4. The PC4 broadcast frame also gets caught in the loop between all the intercon-
nected switches, just like the PC1 broadcast frame.
5. As more devices send broadcasts over the network, more traffic is caught within
the loop, consuming resources. This eventually creates a broadcast storm that
causes the network to fail.
6. When the network is fully saturated with broadcast traffic that is looping
between the switches, new traffic is discarded by the switch because it is unable
to process it. In Figure 2-3, S2 is now discarding additional frames.
Note
To view an animation of these steps, refer to the online course.
Because devices connected to a network are regularly sending out broadcast frames,
such as ARP requests, a broadcast storm can develop in seconds. As a result, when a
loop is created, the switched network is quickly brought down.
Chapter 2: LAN Redundancy 57
2. S2 does not have an entry for PC4 in its MAC table, so it floods the unicast
frame out all switch ports in an attempt to find PC4.
3. The frame arrives at switches S1 and S3.
4. S1 does have a MAC address entry for PC4, so it forwards the frame out
to PC4.
5. S3 also has an entry in its MAC address table for PC4, so it forwards the unicast
frame out Trunk3 to S1.
6. S1 receives the duplicate frame and forwards the frame out to PC4.
Note
To view an animation of these steps, refer to the online course.
Most upper-layer protocols are not designed to recognize, or cope with, duplicate
transmissions. In general, protocols that make use of a sequence-numbering mecha-
nism assume that the transmission has failed and that the sequence number has
recycled for another communication session. Other protocols attempt to hand the
duplicate transmission to the appropriate upper-layer protocol to be processed and
possibly discarded.
Layer 2 LAN protocols, such as Ethernet, lack a mechanism to recognize and elimi-
nate endlessly looping frames. Some Layer 3 protocols implement a TTL mechanism
that limits the number of times a Layer 3 networking device can retransmit a packet.
Lacking such a mechanism, Layer 2 devices continue to retransmit looping traffic
indefinitely. A Layer 2 loop-avoidance mechanism, STP, was developed to address
these problems.
To prevent these issues from occurring in a redundant network, some type of span-
ning tree must be enabled on the switches. Spanning tree is enabled, by default, on
Cisco switches to prevent Layer 2 loops from occurring.
2. S2 is configured with STP and has set the port for Trunk2 to a blocking state, as
shown in Figure 2-5. The blocking state prevents ports from being used to for-
ward user data, thus preventing a loop from occurring. S2 forwards a broadcast
frame out all switch ports, except the originating port from PC1 and the port for
Trunk2.
3. S1 receives the broadcast frame and forwards it out all of its switch ports, where
it reaches PC4 and S3. S3 forwards the frame out the port for Trunk2 and S2
drops the frame. The Layer 2 loop is prevented.
Note
To view an animation of these steps, refer to the online course.
2. The broadcast is then forwarded around the network, just as in the previous
animation.
3. The trunk link between S2 and S1 fails, resulting in the previous path being
disrupted.
4. S2 unblocks the previously blocked port for Trunk2 and allows the broadcast
traffic to traverse the alternate path around the network, permitting communica-
tion to continue. If this link comes back up, STP reconverges and the port on S2
is again blocked.
Chapter 2: LAN Redundancy 61
Note
To view an animation of these steps, refer to the online course.
STP prevents loops from occurring by configuring a loop-free path through the net-
work using strategically placed “blocking-state” ports. The switches running STP are
able to compensate for failures by dynamically unblocking the previously blocked
ports and permitting traffic to traverse the alternate paths.
Up to now, we have used the term Spanning Tree Protocol and the acronym STP.
The usage of the Spanning Tree Protocol term and the STP acronym can be mislead-
ing. Many professionals generically use these to refer to various implementations
of spanning tree, such as Rapid Spanning Tree Protocol (RSTP) and Multiple
Spanning Tree Protocol (MSTP). In order to communicate spanning tree concepts
correctly, it is important to refer to the particular implementation or standard in
context. The latest IEEE documentation on spanning tree, IEEE-802-1D-2004,
says “STP has now been superseded by the Rapid Spanning Tree Protocol (RSTP).”
So one sees that the IEEE uses “STP” to refer to the original implementation of
spanning tree and “RSTP” to describe the version of spanning tree specified in
IEEE-802.1D-2004. In this book, when the original Spanning Tree Protocol is the
context of a discussion, the phrase “original 802.1D spanning tree” is used to avoid
confusion.
Note
STP is based on an algorithm invented by Radia Perlman while working for Digital Equipment
Corporation, and published in the 1985 paper “An Algorithm for Distributed Computation
of a Spanning Tree in an Extended LAN.”
Note
For simplicity, assume until otherwise indicated that all ports on all switches are assigned to
VLAN 1. Each switch has a unique MAC address associated with VLAN 1.
62 Scaling Networks Companion Guide
A BPDU is a messaging frame exchanged by switches for STP. Each BPDU contains a
BID that identifies the switch that sent the BPDU. The BID contains a priority value,
the MAC address of the sending switch, and an optional extended system ID. The
lowest BID value is determined by the combination of these three fields.
After the root bridge has been determined, the STA calculates the shortest path to it.
Each switch uses the STA to determine which ports to block. While the STA deter-
mines the best paths to the root bridge for all switch ports in the broadcast domain,
traffic is prevented from being forwarded through the network. The STA considers
both path and port costs when determining which ports to block. The path costs are
calculated using port cost values associated with port speeds for each switch port
along a given path. The sum of the port cost values determines the overall path cost
to the root bridge. If there is more than one path to choose from, STA chooses the
path with the lowest path cost.
When the STA has determined which paths are most desirable relative to each
switch, it assigns port roles to the participating switch ports. The port roles describe
their relation in the network to the root bridge and whether they are allowed to
forward traffic:
Q Root ports: Switch ports closest to the root bridge. In Figure 2-7, the root port
on S2 is F0/1 configured for the trunk link between S2 and S1. The root port
on S3 is F0/1, configured for the trunk link between S3 and S1. Root ports are
selected on a per-switch basis.
Chapter 2: LAN Redundancy 63
Q Designated ports: All nonroot ports that are still permitted to forward traffic
on the network. In Figure 2-7, switch ports (F0/1 and F0/2) on S1 are designated
ports. S2 also has its port F0/2 configured as a designated port. Designated ports
are selected on a per-trunk basis. If one end of a trunk is a root port, the other
end is a designated port. All ports on the root bridge are designated ports.
Q Alternate and backup ports: Alternate ports and backup ports are configured
to be in a blocking state to prevent loops. In the figure, the STA configured
port F0/2 on S3 in the alternate role. Port F0/2 on S3 is in the blocking state.
Alternate ports are selected only on trunk links where neither end is a root port.
Notice in Figure 2-7 that only one end of the trunk is blocked. This allows for
faster transition to a forwarding state, when necessary. (Blocking ports only
come into play when two ports on the same switch are connected to each other
through a hub or single cable.)
Q Disabled ports: A disabled port is a switch port that is shut down.
All switches in the broadcast domain participate in the election process. After a
switch boots, it begins to send out BPDU frames every two seconds. These BPDUs
contain the switch BID and the root ID.
As the switches forward their BPDU frames, adjacent switches in the broadcast
domain read the root ID information from the BPDU frames. If the root ID from
a BPDU received is lower than the root ID on the receiving switch, the receiving
switch updates its root ID, identifying the adjacent switch as the root bridge. Actu-
ally, it might not be an adjacent switch, but could be any other switch in the broad-
cast domain. The switch then forwards new BPDU frames with the lower root ID
to the other adjacent switches. Eventually, the switch with the lowest BID ends up
being identified as the root bridge for the spanning tree instance.
There is a root bridge elected for each spanning tree instance. It is possible to have
multiple distinct root bridges. If all ports on all switches are members of VLAN 1,
there is only one spanning tree instance. The extended system ID plays a role in how
spanning tree instances are determined.
10 Gbps 2 1
1 Gbps 4 1
100 Mbps 19 10
Note
As newer, faster Ethernet technologies enter the marketplace, the path cost values can change
to accommodate the different speeds available. The nonlinear numbers in Table 2-1 accom-
modate some improvements to the older Ethernet standard. The values have already been
changed to accommodate the 10-Gb/s Ethernet standard. To illustrate the continued change
associated with high-speed networking, Catalyst 4500 and 6500 switches support a longer
path cost method. For example, 10 Gb/s has a 2000 path cost, 100 Gb/s has a 200 path cost,
and 1 Tb/s has a 20 path cost.
Although switch ports have a default port cost associated with them, the port cost
is configurable. The ability to configure individual port costs gives the administrator
the flexibility to manually control the spanning tree paths to the root bridge.
To configure the port cost of an interface, enter the spanning-tree cost value com-
mand in interface configuration mode. The value can be between 1 and 200,000,000.
In Example 2-1, switch port F0/1 has been configured with a port cost of 25 using
the spanning-tree cost 25 interface configuration mode command on the F0/1
interface.
To restore the port cost to the default value of 19, enter the no spanning-tree cost
interface configuration mode command.
The path cost is equal to the sum of all the port costs along the path to the root
bridge, as shown in Figure 2-10.
66 Scaling Networks Companion Guide
Paths with the lowest cost become preferred, and all other redundant paths are
blocked. In the example, the path cost from S2 to the root bridge S1, over path 1
is 19 (based on the IEEE-specified individual port cost), while the path cost over
path 2 is 38. Because path 1 has a lower overall path cost to the root bridge, it is the
preferred path. STP then configures the redundant path to be blocked, preventing a
loop from occurring.
To verify the port and path cost to the root bridge, enter the show spanning-tree
command, as shown in Example 2-2.
The Cost field near the top of the output is the total path cost to the root bridge.
This value changes depending on how many switch ports must be traversed to get
to the root bridge. In the output, each interface is also identified with an individual
port cost of 19.
1–4 2 Protocol ID
1 Version
1 Message type
1 Flags
5–8 8 Root ID
4 Cost of path
8 Bridge ID
2 Port ID
2 Max age
2 Hello time
2 Forward delay
68 Scaling Networks Companion Guide
The first four fields identify the protocol, version, message type, and status flags.
Q The next four fields are used to identify the root bridge and the cost of the path
to the root bridge.
Q The last four fields are all timer fields that determine how frequently BPDU
messages are sent and how long the information received through the BPDU
process (next topic) is retained.
Figure 2-11 shows a BPDU frame that was captured using Wireshark.
In the capture, the BPDU frame contains more fields than previously described. The
BPDU message is encapsulated in an Ethernet frame when it is transmitted across
the network. The 802.3 header indicates the source and destination addresses of
the BPDU frame. This frame has a destination MAC address of 01:80:C2:00:00:00,
which is a multicast address for the spanning tree group. When a frame is addressed
with this MAC address, each switch that is configured for spanning tree accepts and
reads the information from the frame; all other devices on the network disregard
the frame.
Also note in the capture, the root ID and the BID are the same in the captured
BPDU frame. This indicates that the frame was captured from a root bridge. The
timers are all set to the default values.
is two seconds. Each switch maintains local information about its own BID, the root
ID, and the path cost to the root.
When adjacent switches receive a BPDU frame, they compare the root ID from the
BPDU frame with the local root ID. If the root ID in the BPDU is lower than the
local root ID, the switch updates the local root ID and the ID in its BPDU messages.
These messages indicate the new root bridge on the network. The distance to the
root bridge is also indicated by the path cost update. For example, if the BPDU was
received on a Fast Ethernet switch port, the path cost would increment by 19. If the
local root ID is lower than the root ID received in the BPDU frame, the BPDU frame
is discarded.
After a root ID has been updated to identify a new root bridge, all subsequent BPDU
frames sent from that switch contain the new root ID and updated path cost. That
way, all other adjacent switches are able to see the lowest root ID identified at all
times. As the BPDU frames pass between other adjacent switches, the path cost is con-
tinually updated to indicate the total path cost to the root bridge. Each switch in the
spanning tree uses its path costs to identify the best possible path to the root bridge.
The following summarizes the BPDU process:
Note
Priority is the initial deciding factor when electing a root bridge. If the priorities of all the
switches are the same, the device with the lowest MAC address becomes the root bridge.
1. Initially, each switch identifies itself as the root bridge. S2 forwards BPDU
frames out all switch ports. (See Figure 2-12.)
2. When S3 receives a BPDU from switch S2, S3 compares its root ID with the
BPDU frame it received. The priorities are equal, so the switch is forced to
examine the MAC address portion to determine which MAC address has a
lower value. Because S2 has a lower MAC address value, S3 updates its root
ID with the S2 root ID. At that point, S3 considers S2 as the root bridge. (See
Figure 2-13.)
3. When S1 compares its root ID with the one in the received BPDU frame, it iden-
tifies its local root ID as the lower value and discards the BPDU from S2. (See
Figure 2-14.)
4. When S3 sends out its BPDU frames, the root ID contained in the BPDU frame
is that of S2. (See Figure 2-15.)
5. When S2 receives the BPDU frame, it discards it after verifying that the root ID
in the BPDU matched its local root ID. (See Figure 2-16.)
6. Because S1 has a lower priority value in its root ID, it discards the BPDU frame
received from S3. (See Figure 2-17.)
8. S3 identifies the root ID in the BPDU frame as having a lower value and, there-
fore, updates its root ID values to indicate that S1 is now the root bridge. (See
Figure 2-19.)
9. S2 identifies the root ID in the BPDU frame as having a lower value and, there-
fore, updates its root ID values to indicate that S1 is now the root bridge. (See
Figure 2-20.)
Bridge Priority
The bridge priority is a configurable value that can be used to influence which
switch becomes the root bridge. The switch with the lowest priority, which implies
the lowest BID, becomes the root bridge because a lower-priority value takes prece-
dence. For example, to ensure that a specific switch is always the root bridge, set the
priority to a lower value than the rest of the switches on the network. The default
priority value for all Cisco switches is 32768. The range is 0 to 61440 in increments
of 4096. Valid priority values are 0, 4096, 8192, 12288, 16384, 20480, 24576,
28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. All other
values are rejected. A bridge priority of 0 takes precedence over all other bridge
priorities.
Extended System ID
Early implementations of IEEE 802.1D were designed for networks that did not
use VLANs. There was a single common spanning tree across all switches. For this
reason, in older Cisco switches, the extended system ID could be omitted in BPDU
frames. As VLANs became common for network infrastructure segmentation,
802.1D was enhanced to include support for VLANs, requiring the VLAN ID to
be included in the BPDU frame. VLAN information is included in the BPDU frame
through the use of the extended system ID. All newer switches include the use of
the extended system ID by default.
As shown in Figure 2-21, the bridge priority field is 2 bytes or 16 bits in length; 4
bits are used for the bridge priority and 12 bits for the extended system ID, which
identifies the VLAN participating in this particular STP process.
Using these 12 bits for the extended system ID reduces the bridge priority to 4 bits.
This process reserves the rightmost 12 bits for the VLAN ID and the far left 4 bits
for the bridge priority. This explains why the bridge priority value can only be con-
figured in multiples of 4096, or 212. If the far left bits are 0001, the bridge priority
Chapter 2: LAN Redundancy 75
is 4096; if the far left bits are 1111, the bridge priority is 61440 (= 15 x 4096). The
Catalyst 2960 and 3560 Series switches do not allow the configuration of a bridge
priority of 65536 (= 16 x 4096) because it assumes the use of a fifth bit that is
unavailable because of the use of the extended system ID.
The extended system ID value is added to the bridge priority value in the BID to
identify the priority and VLAN of the BPDU frame.
When two switches are configured with the same priority and have the same
extended system ID, the switch having the MAC address with the lowest hexadeci-
mal value will have the lower BID. Initially, all switches are configured with the same
default priority value. The MAC address is then the deciding factor on which switch
is going to become the root bridge. To ensure that the root bridge decision best
meets network requirements, it is recommended that the administrator configure the
desired root bridge switch with a lower priority. This also ensures that the addition
of new switches to the network does not trigger a new spanning tree election, which
can disrupt network communication while a new root bridge is being selected.
In Figure 2-22, S1 has a lower priority than the other switches; therefore, it is pre-
ferred as the root bridge for that spanning tree instance.
76 Scaling Networks Companion Guide
When all switches are configured with the same priority, as is the case with all
switches kept in the default configuration with a priority of 32768, the MAC
address becomes the deciding factor for which switch becomes the root bridge, as
shown in Figure 2-23.
Note
In the example, the priority of all the switches is 32769. The value is based on the 32768
default priority and the VLAN 1 assignment associated with each switch (32768+1).
The MAC address with the lowest hexadecimal value is considered to be the pre-
ferred root bridge. In the example, S2 has the lowest value for its MAC address and
is, therefore, designated as the root bridge for that spanning tree instance.
Interactive
Activity 2.1.2.8: Identify 802.1D Port Roles
Graphic Go to the course online to perform this practice activity.
Overview (2.2.1)
To begin to understand the scope of STP versions available, let’s briefly look at a list
of all of them.
78 Scaling Networks Companion Guide
Note
The legacy Cisco-proprietary features UplinkFast and BackboneFast are not described in this
course. These features are superseded by the implementation of Rapid PVST+, which incor-
porates these features as part of the implementation of the RSTP standard.
Chapter 2: LAN Redundancy 79
The default spanning tree mode for Cisco Catalyst switches is PVST+, which is
enabled on all ports. PVST+ has much slower convergence after a topology change
than Rapid PVST+.
Note
It is important to distinguish between the legacy IEEE 802.1D-1998 (and earlier) standard
and the IEEE 802.1D-2004 standard. IEEE 802.1D-2004 incorporates RSTP functional-
ity, while IEEE 802.1D-1998 refers to the original implementation of the spanning tree
algorithm. Newer Cisco switches running newer versions of the IOS, such as Catalyst 2960
switches with IOS 15.0, run PVST+ by default, but incorporate many of the specifications of
IEEE 802.1D-1998 in this mode (such as alternate ports in place of the former nondesignated
ports). But to run rapid spanning tree on such a switch, it still must be explicitly configured
for rapid spanning tree mode.
Interactive
Activity 2.2.1.3: Identify Types of Spanning Tree Protocols
Graphic Go to the course online to perform this practice activity.
PVST+ (2.2.2)
PVST+ is a Cisco implementation of STP and is the default STP mode on Cisco
Catalyst switches.
Cisco developed PVST+ so that a network can run an independent instance of the
Cisco implementation of IEEE 802.1D for each VLAN in the network. With PVST+,
it is possible for one trunk port on a switch to be blocking for a VLAN while not
blocking for other VLANs. PVST+ can be used to implement Layer 2 load balanc-
ing. Because each VLAN runs a separate instance of STP, the switches in a PVST+
environment require greater CPU process and BPDU bandwidth consumption than a
traditional CST implementation of STP.
In a PVST+ environment, spanning tree parameters can be tuned so that half of the
VLANs forward on each uplink trunk. In Figure 2-24, port F0/3 on S2 is the for-
warding port for VLAN 20, and F0/2 on S2 is the forwarding port for VLAN 10.
This is accomplished by configuring one switch to be elected the root bridge for
half of the VLANs in the network, and a second switch to be elected the root bridge
for the other half of the VLANs. In the figure, S3 is the root bridge for VLAN
20, and S1 is the root bridge for VLAN 10. Multiple STP root bridges per VLAN
increase redundancy in the network.
Networks running PVST+ have these characteristics:
Q Optimum load balancing can result.
Q One spanning tree instance for each VLAN maintained can mean a considerable
waste of CPU cycles for all the switches in the network (in addition to the band-
width that is used for each instance to send its own BPDU). This would only be
problematic if a large number of VLANs are configured.
82 Scaling Networks Companion Guide
Table 2-4 summarizes the operations that are allowed during each port state.
Note that the number of ports in each of the various states (blocking, listening,
learning, or forwarding) can be displayed with the show spanning-tree summary
command.
For each VLAN in a switched network, PVST+ performs four steps to provide a
loop-free logical network topology:
1. Elects one root bridge: Only one switch can act as the root bridge (for a given
VLAN). The root bridge is the switch with the lowest bridge ID. On the root
bridge, all ports are designated ports (in particular, no root ports).
2. Selects the root port on each nonroot bridge: STP establishes one root port
on each nonroot bridge. The root port is the lowest-cost path from the nonroot
bridge to the root bridge, indicating the direction of the best path to the root
bridge. Root ports are normally in the forwarding state.
3. Selects the designated port on each segment: On each link, STP establishes one
designated port. The designated port is selected on the switch that has the low-
est-cost path to the root bridge. Designated ports are normally in the forwarding
state, forwarding traffic for the segment.
4. The remaining ports in the switched network are alternate ports: Alternate
ports normally remain in the blocking state, to logically break the loop topol-
ogy. When a port is in the blocking state, it does not forward traffic, but can
still process received BPDU messages.
There are situations where the administrator might want a specific switch to be
selected as the root bridge. This can be for a variety of reasons, including the switch
is more centrally located within the LAN design, the switch has higher processing
power, or the switch is simply easier to access and manage remotely. To manipulate
the root bridge election, simply assign a lower priority to the switch that should be
selected as the root bridge.
Interactive
Activity 2.2.2.4: Identifying PVST+ Operation
Graphic Go to the course online to perform this practice activity.
S1 is the root bridge with two designated ports in a forwarding state. RSTP supports
a new port type: Port F0/3 on S2 is an alternate port in discarding state. Notice that
there are no blocking ports. RSTP does not have a blocking port state. RSTP defines
port states as discarding, learning, or forwarding.
RSTP speeds the recalculation of the spanning tree when the Layer 2 network topol-
ogy changes. RSTP can achieve much faster convergence in a properly configured
network, sometimes in as little as a few hundred milliseconds. RSTP redefines the
type of ports and their state. If a port is configured to be an alternate port or a
backup port, it can immediately change to forwarding state without waiting for the
network to converge. The following briefly describes RSTP characteristics:
Q RSTP is the preferred protocol for preventing Layer 2 loops in a switched
network environment. Many of the differences were established by Cisco-
proprietary enhancements to the original 802.1D. These enhancements, such as
BPDUs carrying and sending information about port roles only to neighboring
switches, require no additional configuration and generally perform better than
the earlier Cisco-proprietary versions. They are now transparent and integrated
in the protocol’s operation.
Q Cisco-proprietary enhancements to the original 802.1D, such as UplinkFast and
BackboneFast, are not compatible with RSTP.
Q RSTP (802.1w) supersedes the original 802.1D while retaining backward compat-
ibility. Much of the original 802.1D terminology remains and most parameters
86 Scaling Networks Companion Guide
Note
Like STP, an RSTP switch sends a BPDU with its current information every Hello time period
(two seconds, by default), even if the RSTP bridge does not receive any BPDUs from the root
bridge.
As shown in Figure 2-27, RSTP uses the flag byte of version 2 BPDU:
Q Bits 0 and 7 are used for topology change and acknowledgment as they are in
the original 802.1D.
Q Bits 1 and 6 are used for the Proposal Agreement process (used for rapid
convergence).
Q Bits from 2 to 5 encode the role and state of the port.
Q Bits 4 and 5 are used to encode the port role using a 2-bit code.
Chapter 2: LAN Redundancy 87
Note
Configuring an edge port to be attached to another switch is not recommended. This can
have negative implications for RSTP because a temporary loop can result, possibly delaying
the convergence of RSTP.
Point-to-Point Link
Shared Link
The link type can determine whether the port can immediately transition to a for-
warding state, assuming that certain conditions are met. These conditions are differ-
ent for edge ports and nonedge ports. Nonedge ports are categorized into two link
types, point-to-point and shared. The link type is automatically determined, but can
be overridden with an explicit port configuration using the spanning-tree link-type
parameter command.
Edge port connections and point-to-point connections are candidates for rapid tran-
sition to the forwarding state. However, before the link-type parameter is consid-
ered, RSTP must determine the port role. Characteristics of port roles with regard to
link types include the following:
Q Root ports do not use the link-type parameter. Root ports are able to make a
rapid transition to the forwarding state as soon as the port is in sync.
Q Alternate and backup ports do not use the link-type parameter in most cases.
Q Designated ports make the most use of the link-type parameter. Rapid transi-
tion to the forwarding state for the designated port occurs only if the link-type
parameter is set to point-to-point.
90 Scaling Networks Companion Guide
Interactive
Activity 2.2.3.5: Identify Port Roles in Rapid PVST+
Graphic Go to the course online to perform this practice activity.
Interactive
Activity 2.2.3.6: Compare PVST+ and Rapid PVST+
Graphic Go to the course online to perform this practice activity.
10 Mbps: 100
Method 1
To ensure that the switch has the lowest bridge priority value, use the spanning-tree
vlan vlan-id root primary command in global configuration mode. The priority
for the switch is set to the predefined value of 24,576 or to the highest multiple of
4,096, less than the lowest bridge priority detected on the network.
If an alternate root bridge is desired, use the spanning-tree vlan vlan-id root sec-
ondary global configuration mode command. This command sets the priority for
the switch to the predefined value of 28,672. This ensures that the alternate switch
becomes the root bridge if the primary root bridge fails. This assumes that the rest
of the switches in the network have the default 32,768 priority value defined.
In Figure 2-31, S1 has been assigned as the primary root bridge using the spanning-
tree vlan 1 root primary command, and S2 has been configured as the secondary
root bridge using the spanning-tree vlan 1 root secondary command.
Method 2
Another method for configuring the bridge priority value is using the spanning-tree
vlan vlan-id priority value global configuration mode command. This command
gives more granular control over the bridge priority value. The priority value is con-
figured in increments of 4,096 between 0 and 61,440.
In Figure 2-31, S3 has been assigned a bridge priority value of 24,576 using the
spanning-tree vlan 1 priority 24576 command.
To verify the bridge priority of a switch, use the show spanning-tree command. In
Example 2-3, the priority of the switch has been set to 24,576. Also notice that the
switch is designated as the root bridge for the spanning tree instance.
Cisco PortFast technology is useful for DHCP. Without PortFast, a PC can send a
DHCP request before the port is in forwarding state, denying the host from getting a
usable IP address and other information. Because PortFast immediately changes the
state to forwarding, the PC always gets a usable IP address.
Note
Because the purpose of PortFast is to minimize the time that access ports must wait for span-
ning tree to converge, it should only be used on access ports. If you enable PortFast on a
port connecting to another switch, you risk creating a spanning tree loop.
!
interface FastEthernet0/11
spanning-tree portfast
spanning-tree bpduguard enable
end
There are two VLANs, 10 and 20, that are being trunked across these links. The
goal is to configure S3 as the root bridge for VLAN 20 and S1 as the root bridge
for VLAN 10. Port F0/3 on S2 is the forwarding port for VLAN 20 and the block-
ing port for VLAN 10. Port F0/2 on S2 is the forwarding port for VLAN 10 and the
blocking port for VLAN 20.
In addition to establishing a root bridge, it is also possible to establish a secondary
root bridge. A secondary root bridge is a switch that can become the root bridge
for a VLAN if the primary root bridge fails. Assuming that the other bridges in the
VLAN retain their default STP priority, this switch becomes the root bridge if the
primary root bridge fails.
96 Scaling Networks Companion Guide
Another way to specify the root bridge is to set the spanning tree priority on each
switch to the lowest value so that the switch is selected as the primary bridge for its
associated VLAN.
Notice that in Example 2-5, S3 is configured as the primary root bridge for VLAN
20 and S1 is configured as the primary root bridge for VLAN 10. S2 retained its
default STP priority.
Example 2-5 Configuring Primary and Secondary Root Bridge for Each VLAN
Example 2-5 also shows that S3 is configured as the secondary root bridge for
VLAN 10, and S1 is configured as the secondary root bridge for VLAN 20. This
configuration enables spanning tree load balancing, with VLAN 10 traffic passing
through S1 and VLAN 20 traffic passing through S3.
Another way to specify the root bridge is to set the spanning tree priority on each
switch to the lowest value so that the switch is selected as the primary bridge for its
associated VLAN, as shown in Example 2-6.
Example 2-6 Configuring the Lowest Possible Priority to Ensure That the Switch
Is Root
The switch priority can be set for any spanning tree instance. This setting affects
the likelihood that a switch is selected as the root bridge. A lower value increases
the probability that the switch is selected. The range is 0 to 61,440 in increments of
4,096; all other values are rejected. For example, a valid priority value is 4,096 x 2 =
8,192.
As shown in Example 2-7, the show spanning-tree active command displays span-
ning tree configuration details for the active interfaces only.
The output shown is for S1 configured with PVST+. There are a number of Cisco
IOS command parameters associated with the show spanning-tree command.
In Example 2-8, the output shows that the priority for VLAN 10 is 4,096, the lowest
of the three respective VLAN priorities.
Note
The default spanning tree configuration on a Catalyst 2960 Series switch is PVST+. A Cata-
lyst 2960 switch supports PVST+, Rapid PVST+, and MST, but only one version can be active
for all VLANs at any time.
Rapid PVST+ commands control the configuration of VLAN spanning tree instances.
A spanning tree instance is created when an interface is assigned to a VLAN and is
Chapter 2: LAN Redundancy 99
removed when the last interface is moved to another VLAN. As well, you can con-
figure STP switch and port parameters before a spanning tree instance is created.
These parameters are applied when a spanning tree instance is created.
Table 2-6 displays the Cisco IOS command syntax needed to configure Rapid
PVST+ on a Cisco switch.
Specify that the link type for this port is spanning-tree link-type point-to-point
point-to-point.
The spanning-tree mode rapid-pvst global configuration mode command is the one
required command for the Rapid PVST+ configuration. When specifying an inter-
face to configure, valid interfaces include physical ports, VLANs, and port channels.
The VLAN ID range is 1 to 4094 when the enhanced software image (EI) is installed
and 1 to 1005 when the standard software image (SI) is installed. The port-channel
range is 1 to 6.
Example 2-9 shows Rapid PVST+ commands configured on S1.
In Example 2-10, the show spanning-tree vlan 10 command shows the spanning tree
configuration for VLAN 10 on switch S1.
100 Scaling Networks Companion Guide
VLAN0010
Spanning tree enabled protocol rstp
Root ID Priority 4106
Address ec44.7631.3880
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Notice that the BID priority is set to 4,096. In the output, the statement “Spanning
tree enabled protocol rstp” indicates that S1 is running Rapid PVST+. Because S1 is
the root bridge for VLAN 10, all of its interfaces are designated ports.
In Example 2-11, the show running-config command is used to verify the Rapid
PVST+ configuration on S1.
Note
Generally, it is unnecessary to configure the point-to-point link-type parameter for Rapid
PVST+, because it is unusual to have a shared link-type. In most cases, the only differ-
ence between configuring PVST+ and Rapid PVST+ is the spanning-tree mode rapid-pvst
command.
Chapter 2: LAN Redundancy 101
Use the show spanning-tree vlan vlan_id command to get STP information for a
particular VLAN. Use this command to get information about the role and status of
each port on the switch. In Figure 2-36, the example output on switch S1 shows all
three ports in the forwarding (FWD) state and the role of the three ports as either
designated ports or root ports. Any ports being blocked display the output status
as “BLK.”
The output also gives information about the BID of the local switch and the root ID,
which is the BID of the root bridge.
more disruptive. It happens when STP erroneously moves one or more ports into the
forwarding state.
Remember that an Ethernet frame header does not include a TTL field, which means
that any frame that enters a bridging loop continues to be forwarded by the switches
indefinitely. The only exceptions are frames that have their destination address
recorded in the MAC address table of the switches. These frames are simply for-
warded to the port that is associated with the MAC address and do not enter a loop.
However, any frame that is flooded by a switch enters the loop. This can include
broadcasts, multicasts, and unicasts with a globally unknown destination MAC
address.
Figure 2-37 graphically displays the consequences and corresponding symptoms of
STP failure.
The load on all links in the switched LAN quickly starts increasing as more and
more frames enter the loop. This problem is not limited to the links that form the
loop, but also affects any other links in the switched domain because the frames
are flooded on all links. When the spanning tree failure is limited to a single VLAN,
only links in that VLAN are affected. Switches and trunks that do not carry that
VLAN operate normally.
If the spanning tree failure has created a bridging loop, traffic increases exponen-
tially. The switches will then flood the broadcasts out multiple ports. This creates
copies of the frames every time the switches forward them.
Chapter 2: LAN Redundancy 105
When control plane traffic starts entering the loop (for example, OSPF Hellos or
EIGRP Hellos), the devices that are running these protocols quickly start getting
overloaded. Their CPUs approach 100 percent utilization while they are trying to
process an ever-increasing load of control plane traffic. In many cases, the earliest
indication of this broadcast storm in progress is that routers or Layer 3 switches are
reporting control plane failures and that they are running at a high CPU load.
The switches experience frequent MAC address table changes. If a loop exists, a
switch might see a frame with a certain source MAC address coming in on one port
and then see another frame with the same source MAC address coming in on a dif-
ferent port a fraction of a second later. This will cause the switch to update the
MAC address table twice for the same MAC address.
Because of the combination of very high load on all links and the switch CPUs run-
ning at maximum load, these devices typically become unreachable. This makes it
very difficult to diagnose the problem while it is happening.
Interactive
Activity 2.3.3.6: Troubleshoot STP Configuration Issues
Graphic Go to the course online to perform this practice activity.
Note
For the purposes of the discussion on router redundancy, there is no functional difference
between a multilayer switch and a router at the distribution layer. In practice, it is common
for a multilayer switch to act as the default gateway for each VLAN in a switched network.
This discussion focuses on the functionality of routing, regardless of the physical device
used.
In a switched network, each client receives only one default gateway. There is no
way to configure a secondary gateway, even if a second path exists to carry packets
off the local segment.
In Figure 2-38, R1 is responsible for routing packets from PC1.
If R1 becomes unavailable, the routing protocols can dynamically converge. R2 now
routes packets from outside networks that would have gone through R1. However,
traffic from the inside network associated with R1, including traffic from worksta-
tions, servers, and printers configured with R1 as their default gateway, is still sent to
R1 and dropped.
End devices are typically configured with a single IP address for a default gateway.
This address does not change when the network topology changes. If that default
gateway IP address cannot be reached, the local device is unable to send packets off
the local network segment, effectively disconnecting it from the rest of the network.
Even if a redundant router exists that could serve as a default gateway for that seg-
ment, there is no dynamic method by which these devices can determine the address
of a new default gateway.
Chapter 2: LAN Redundancy 107
3. Because the new forwarding router assumes both the IP and MAC addresses of
the virtual router, the host devices see no disruption in service.
Interactive
Activity 2.4.1.4: Identify FHRP Terminology
Graphic Go to the course online to perform this practice activity.
Chapter 2: LAN Redundancy 109
address derived from the HSRP group number and a virtual IPv6 link-local
address derived from the HSRP virtual MAC address. Periodic router advertise-
ments (RA) are sent for the HSRP virtual IPv6 link-local address when the HSRP
group is active. When the group becomes inactive, these RAs stop after a final
RA is sent.
Q Virtual Router Redundancy Protocol version 2 (VRRPv2): A nonproprietary
election protocol that dynamically assigns responsibility for one or more virtual
routers to the VRRP routers on an IPv4 LAN. This allows several routers on a
multiaccess link to use the same virtual IPv4 address. A VRRP router is config-
ured to run the VRRP protocol in conjunction with one or more other routers
attached to a LAN. In a VRRP configuration, one router is elected as the virtual
router master, with the other routers acting as backups, in case the virtual router
master fails.
Q VRRPv3: Provides the capability to support IPv4 and IPv6 addresses. VRRPv3
works in multivendor environments and is more scalable than VRRPv2.
Q Gateway Load Balancing Protocol (GLBP): A Cisco-proprietary FHRP that
protects data traffic from a failed router or circuit, like HSRP and VRRP, while
also allowing load balancing (also called load sharing) between a group of redun-
dant routers.
Q GLBP for IPv6: A Cisco-proprietary FHRP providing the same functionality of
GLBP, but in an IPv6 environment. GLBP for IPv6 provides automatic router
backup for IPv6 hosts configured with a single default gateway on a LAN. Mul-
tiple first-hop routers on the LAN combine to offer a single virtual first-hop
IPv6 router while sharing the IPv6 packet-forwarding load.
Q ICMP Router Discovery Protocol (IRDP): Specified in RFC 1256, this is a leg-
acy FHRP solution. IRDP allows IPv4 hosts to locate routers that provide IPv4
connectivity to other (nonlocal) IP networks.
Interactive
Activity 2.4.2.2: Identify the Type of FHRP
Graphic Go to the course online to perform this practice activity.
Use the show standby command to verify the HSRP state. In Example 2-12, the
output shows that R1 is in the active state.
With GLBP, you can fully utilize resources without the administrative burden of
configuring multiple groups and managing multiple default gateway configurations.
GLBP has the following characteristics:
Q Allows full use of resources on all devices without the administrative burden of
creating multiple groups.
Q Provides a single virtual IP address and multiple virtual MAC addresses.
Chapter 2: LAN Redundancy 113
Use the show glbp command to verify the GLBP status. Example 2-13 for R1 shows
that GLBP group 10 is in the active state with virtual IP address 172.16.10.1. R1 is
the active router for Forwarder 2.
Summary (2.5)
Class Activity 2.5.1.1: Documentation Tree
The employees in your building are having difficulty accessing a web server on the
network. You look for the network documentation that the previous network engi-
neer used before he transitioned to a new job; however, you cannot find any net-
work documentation whatsoever.
Therefore, you decide to create your own network record-keeping system. You
decide to start at the access layer of your network hierarchy. This is where redun-
dant switches are located, as well as the company servers, printers, and local hosts.
You create a matrix to record your documentation and include access layer switches
on the list. You also decide to document switch names, ports in use, cabling connec-
tions, root ports, designated ports, and alternate ports.
Problems that can result from a redundant Layer 2 network include broadcast
storms, MAC database instability, and duplicate unicast frames. STP is a Layer 2
protocol that ensures that there is only one logical path between all destinations on
the network by intentionally blocking redundant paths that could cause a loop.
STP sends BPDU frames for communication between switches. One switch is elected
as the root bridge for each instance of spanning tree. An administrator can control
this election by changing the bridge priority. Root bridges can be configured to
enable spanning tree load balancing by VLAN or by a group of VLANs, depending
on the spanning tree protocol used. STP then assigns a port role to each participat-
ing port using a path cost. The path cost is equal to the sum of all the port costs
along the path to the root bridge. A port cost is automatically assigned to each port;
however, it can also be manually configured. Paths with the lowest cost become
preferred, and all other redundant paths are blocked.
PVST+ is the default configuration of IEEE 802.1D on Cisco switches. It runs one
instance of STP for each VLAN. A newer, faster-converging spanning tree protocol,
RSTP, can be implemented on Cisco switches on a per-VLAN basis in the form of
Rapid PVST+. Multiple Spanning Tree (MST) is the Cisco implementation of Mul-
tiple Spanning Tree Protocol (MSTP), where one instance of spanning tree runs for
a defined group of VLANs. Features such as PortFast and BPDU guard ensure that
hosts in the switched environment are provided immediate access to the network
without interfering with spanning tree operation.
First Hop Redundancy Protocols, such as HSRP, VRRP, and GLBP, provide alternate
default gateways for hosts in the redundant router or multilayer switched environ-
ment. Multiple routers share a virtual IP address and MAC address that is used as
116 Scaling Networks Companion Guide
the default gateway on a client. This ensures that hosts maintain connectivity in the
event of the failure of one device serving as a default gateway for a VLAN or set of
VLANs. When using HSRP or VRRP, one router is active or forwarding for a par-
ticular group while others are in standby mode. GLBP allows the simultaneous use of
multiple gateways in addition to providing automatic failover.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 2.0.1.2: Stormy Traffic
Q Class Activity 2.5.1.1: Documentation Tree
Labs
Q Lab 2.1.2.10: Building a Switched Network with Redundant Links
Q Lab 2.3.2.3: Configuring Rapid PVST+, PortFast, and BPDU Guard
Q Lab 2.4.3.4: Configuring HSRP and GLBP
2. Which of the following issues are the result of a broadcast storm? (Choose two.)
A. During a broadcast storm, constant changes to the MAC address table pre-
vent a switch from accurately forwarding frames.
B. In a network saturated with broadcast traffic, new traffic arriving at the
switch will be forwarded into the broadcast domain, which further consumes
available bandwidth.
C. During a broadcast storm, switches with high-speed interfaces will forward
traffic in half-duplex mode to conserve available bandwidth.
D. Because of high processing demands during a broadcast storm, communica-
tion can fail between end stations in the broadcast domain.
E. During a broadcast storm, a switch will forward a received broadcast out
every port on the switch.
3. During the implementation of Spanning Tree Protocol, all switches are rebooted
by the network administrator. What is the first step of the spanning-tree election
process?
A. Each switch determines the best path to forward traffic.
B. Each switch determines what port to block to prevent a loop from occurring.
C. Each switch with a lower root ID than its neighbor will not send BPDUs.
D. All the switches send out BPDUs advertising themselves as the root bridge.
118 Scaling Networks Companion Guide
4. After the election of the root bridge has been completed, how will switches find
the best paths to the root bridge?
A. Each switch will analyze the sum of all port costs to reach the root and use
the path with the lowest cost.
B. Each switch will analyze the port states of all neighbors and use the desig-
nated ports to forward traffic to the root.
C. Each switch will analyze the sum of the hops to reach the root and use the
path with the fewest hops.
D. Each switch will analyze the BID of all neighbors to reach the root and use
the path through the lowest BID neighbors.
5. When PVST is running over a switched network, which port state can participate
in BPDU frame forwarding based on BPDUs received, but does not forward data
frames?
A. Disabled
B. Blocking
C. Listening
D. Forwarding
A. The switch port immediately transitions from the listening to the forwarding
state.
B. The switch port immediately processes any BPDUs before transitioning to
the forwarding state.
C. The switch port sends DHCP requests before transitioning to the forwarding
state.
D. The switch port should never receive BPDUs from end stations that are con-
nected to the port.
E. The switch port immediately transitions from the blocking to the forwarding
state.
7. Which of the following port states are used by Rapid PVST+? (Choose three.)
A. Learning
B. Blocking
C. Trunking
D. Discarding
E. Forwarding
F. Listening
Chapter 2: LAN Redundancy 119
10. When first hop redundancy protocols are used, which of the following items
will be shared by a set of routers that are presenting the illusion of being a single
router? (Choose two.)
A. Host name
B. BID
C. MAC address
D. IP address
E. Static route
is a legacy standard that runs all VLANs in a single spanning tree instance.
is a Cisco enhancement of RSTP that provides a spanning tree instance for
each VLAN.
allows multiple VLANs to run in a single spanning tree instance.
13. List the three steps that an FHRP initiates during a router failover process.
This page intentionally left blank
CHAPTER 3
LAN Aggregation
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What is link aggregation? Q What are the commands to configure
EtherChannel?
Q What is EtherChannel technology?
Q What are the methods to troubleshoot link
aggregation with EtherChannel?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Port Aggregation Protocol (PAgP) page 122 PAgP auto page 127
Link Aggregation Control Protocol LACP active page 129
(LACP) page 122
LACP passive page 129
PAgP desirable page 127
122 Scaling Networks Companion Guide
Introduction (3.0.1.1)
Link aggregation is the ability to create one logical link using multiple physical links
between two devices. This allows load sharing among the physical links, rather than
having STP block one or more of the links. EtherChannel is a form of link aggrega-
tion used in switched networks.
This chapter describes EtherChannel and the methods used to create an Ether-
Channel. An EtherChannel can be manually configured or can be negotiated by
using the Cisco-proprietary protocol Port Aggregation Protocol (PAgP) or the
IEEE 802.3ad–defined protocol Link Aggregation Control Protocol (LACP). The
configuration, verification, and troubleshooting of EtherChannel are discussed.
It might be possible to use faster links, such as 10 Gb/s, on the aggregated link
between the access and distribution layer switches. However, adding faster links is
expensive. Additionally, as the speed increases on the access links, even the fastest
possible port on the aggregated link is no longer fast enough to aggregate the traffic
coming from all access links.
It is also possible to multiply the number of physical links between the switches to
increase the overall speed of switch-to-switch communication. However, by default,
STP is enabled on switch devices. STP will block redundant links to prevent routing
loops.
For these reasons, the best solution is to implement an EtherChannel configuration.
124 Scaling Networks Companion Guide
that EtherChannel link. Where there is only one EtherChannel link, all physical
links in the EtherChannel are active because STP sees only one (logical) link.
Q EtherChannel provides redundancy because the overall link is seen as one logi-
cal connection. Additionally, the loss of one physical link within the channel
does not create a change in the topology; therefore a spanning tree recalculation
is not required. Assuming that at least one physical link is present, the Ether-
Channel remains functional, even if its overall throughput decreases because of a
lost link within the EtherChannel.
Note
Interface types cannot be mixed. For example, Fast Ethernet and Gigabit Ethernet cannot be
mixed within a single EtherChannel.
Note
Layer 3 EtherChannels can be configured on Cisco Catalyst multilayer switches, such as the
Catalyst 3560, but these are not explored in this course. A Layer 3 EtherChannel has a single
IP address associated with the logical aggregation of switch ports in the EtherChannel.
Each EtherChannel has a logical port channel interface, shown in Figure 3-3. A con-
figuration applied to the port channel interface affects all physical interfaces that are
assigned to that interface.
Note
It is also possible to configure a static or unconditional EtherChannel without PAgP or
LACP.
Chapter 3: LAN Aggregation 127
PAgP
PAgP is a Cisco-proprietary protocol that aids in the automatic creation of Ether-
Channel links, as shown in Figure 3-4.
When an EtherChannel link is configured using PAgP, PAgP packets are sent
between EtherChannel-capable ports to negotiate the forming of a channel. When
PAgP identifies matched Ethernet links, it groups the links into an EtherChannel.
The EtherChannel is then added to the spanning tree as a single port.
When enabled, PAgP also manages the EtherChannel. PAgP packets are sent every
30 seconds. PAgP checks for configuration consistency and manages link additions
and failures between two switches. It ensures that when an EtherChannel is created,
all ports have the same type of configuration.
Note
In EtherChannel, it is mandatory that all ports have the same speed, duplex setting, and
VLAN information. Any port modification after the creation of the channel also changes all
other channel ports.
PAgP helps create the EtherChannel link by detecting the configuration of each side
and ensuring that links are compatible so that the EtherChannel link can be enabled
when needed.
Q On: This mode forces the interface to channel without PAgP. Interfaces config-
ured in the on mode do not exchange PAgP packets.
Q PAgP desirable: This PAgP mode places an interface in an active negotiating
state in which the interface initiates negotiations with other interfaces by send-
ing PAgP packets.
Q PAgP auto: This PAgP mode places an interface in a passive negotiating state in
which the interface responds to the PAgP packets that it receives, but does not
initiate PAgP negotiation.
Table 3-1 summarizes the result for PAgP channel establishment based on the con-
figuration of each side of a link in Figure 3-4.
128 Scaling Networks Companion Guide
S1 S2 Established?
On On Yes
On Desirable No
Auto/On Auto No
The modes must be compatible on each side. If one side is configured to be in auto
mode, it is placed in a passive state, waiting for the other side to initiate the Ether-
Channel negotiation. If the other side is also set to auto, the negotiation never starts
and the EtherChannel does not form. If all modes are disabled by using the no com-
mand, or if no mode is configured, the EtherChannel is disabled.
The on mode manually places the interface in an EtherChannel, without any negotia-
tion. It works only if the other side is also set to on. If the other side is set to negoti-
ate parameters through PAgP, no EtherChannel forms, because the side that is set to
on mode does not negotiate.
Note
LACP was originally defined as IEEE 802.3ad. However, LACP is now defined in the newer
IEEE 802.1AX standard for local and metropolitan-area networks.
LACP provides the same negotiation benefits as PAgP. LACP helps create the Ether-
Channel link by detecting the configuration of each side and making sure that they
are compatible so that the EtherChannel link can be enabled when needed. Figure
3-5 shows the modes for LACP.
Q On: This mode forces the interface to channel without LACP. Interfaces config-
ured in the on mode do not exchange LACP packets.
Q LACP active: This LACP mode places a port in an active negotiating state.
In this state, the port initiates negotiations with other ports by sending LACP
packets.
Q LACP passive: This LACP mode places a port in a passive negotiating state. In
this state, the port responds to the LACP packets that it receives, but does not
initiate LACP packet negotiation.
Just as with PAgP, modes must be compatible on both sides for the EtherChannel
link to form. The on mode is repeated, because it creates the EtherChannel configu-
ration unconditionally, without PAgP or LACP dynamic negotiation. Table 3-2 sum-
marizes the results for LACP channel establishment based on the configuration of
each side of a link in Figure 3-5.
S1 S2 Established?
On On Yes
On Active No
Passive/On Passive No
Interactive
Activity 3.1.2.4: Identify the PAgP and LACP Modes
Graphic Go to the course online to perform this practice activity.
130 Scaling Networks Companion Guide
Figure 3-6 shows example topologies. In the top topology, a channel is established
because none of the restrictions apply. In the bottom topology, the duplex mode
doesn’t match, so a channel is not established.
If these settings must be changed, configure them in port channel interface configu-
ration mode. After the port channel interface is configured, any configuration that
is applied to the port channel interface also affects individual interfaces. However,
configurations that are applied to the individual interfaces do not affect the port
channel interface. Therefore, making configuration changes to an interface that is
part of an EtherChannel link can cause interface compatibility issues.
Chapter 3: LAN Aggregation 131
Note
EtherChannel is disabled by default.
Figure 3-7 shows the topology that is used for the configuration, verification, and
troubleshooting examples in this section.
132 Scaling Networks Companion Guide
When several port channel interfaces are configured on the same device, use the
show etherchannel summary command to simply display one line of information
per port channel. In Example 3-3, the switch has one EtherChannel configured;
group 1 uses LACP.
Group: 1
----------
Port-channels in the group:
---------------------------
------------
In the example, the Port Channel 1 interface consists of two physical interfaces,
FastEthernet0/1 and FastEthernet0/2. It uses LACP in active mode. It is properly
connected to another switch with a compatible configuration, which is why the port
channel is said to be in use.
On any physical interface member of an EtherChannel bundle, the show interfaces
etherchannel command can provide information about the role of the interface in
the EtherChannel, as shown in Example 3-5. The interface FastEthernet 0/1 is part of
the EtherChannel bundle 1. The protocol for this EtherChannel is LACP.
Local information:
LACP port Admin Oper Port Port
Port Flags State Priority Key Key Number State
Fa0/1 SA bndl 32768 0x1 0x1 0x102 0x3D
Partner's information:
Q An EtherChannel supports the same allowed range of VLANs on all the ports.
If the allowed range of VLANs is not the same, the ports do not form an Ether-
Channel, even when PAgP is set to the auto or desirable mode.
Q The dynamic negotiation options for PAgP and LACP must be compatibly con-
figured on both ends of the EtherChannel.
Note
It is easy to confuse PAgP or LACP with the Dynamic Trunking Protocol (DTP), because they
are protocols used to automate behavior on trunk links. PAgP and LACP are used for link
aggregation (EtherChannel). DTP is used for automating the creation of trunk links. When an
EtherChannel trunk is configured, typically EtherChannel (PAgP or LACP) is configured first
and then DTP.
In Example 3-6, interfaces F0/1 and F0/2 on switches S1 and S2 are connected with
an EtherChannel. The output indicates that the EtherChannel is down.
In Example 3-7, more detailed output indicates that there are incompatible PAgP
modes configured on S1 and S2.
Chapter 3: LAN Aggregation 137
In Example 3-8, the PAgP mode on the EtherChannel is changed to desirable and
the EtherChannel becomes active.
Note
EtherChannel and spanning tree must interoperate. For this reason, the order in which
EtherChannel-related commands are entered is important, which is why (in Example 3-8) you
see interface Port-Channel 1 removed and then re-added with the channel-group command,
as opposed to directly changed. If one tries to change the configuration directly, spanning
tree errors cause the associated ports to go into the blocking or errdisabled state.
Summary (3.3)
Class Activity 3.3.1.1: Linking Up
Many bottlenecks occur on your small- to medium-sized business network, even
though you have configured VLANs, STP, and other network traffic options on the
company’s switches.
Instead of keeping the switches as they are currently configured, you would like to
try EtherChannel as an option for, at least, part of the network to see whether it will
decrease traffic congestion between your access and distribution layer switches.
Your company uses Catalyst 3560 switches at the distribution layer and Catalyst
2960 and 2950 switches at the access layer of the network. To verify whether these
switches can perform EtherChannel, you visit the site “The System Requirements to
Implement EtherChannel on Catalyst Switches.” This site allows you to gather more
information to determine whether EtherChannel is a good option for the equipment
and network currently in place.
After researching the models, you decide to use a simulation software program to
practice configuring EtherChannel before implementing it live on your network. As
a part of this procedure, you ensure that the equipment simulated in Packet Tracer
will support these practice configurations.
and LACP do not interoperate. The on mode is repeated in both PAgP and LACP
because it creates an EtherChannel unconditionally, without the use of PAgP or
LACP. The default for EtherChannel is that no mode is configured.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 3.0.1.2: Imagine This
Q Class Activity 3.3.1.1: Linking Up
Labs
Q Lab 3.2.1.4: Configuring EtherChannel
Q Lab 3.2.2.4: Troubleshooting EtherChannel
Packet Tracer
Packet Tracer Activities
Activity Q Packet Tracer Activity 3.2.1.3: Configuring EtherChannel
Q Packet Tracer Activity 3.2.2.3: Troubleshooting EtherChannel
Q Packet Tracer Activity 3.3.1.2: Skills Integration Challenge
Chapter 3: LAN Aggregation 141
Fa0/1 Fa0/1
S1 S2
Fa0/1 Fa0/1
A. On
B. Auto
C. Desirable
D. Off
5. When a range of ports is being configured for EtherChannel, which mode will
configure PAgP so that it initiates the EtherChannel negotiation?
A. Active
B. Auto
C. Desirable
D. Passive
7. What will happen if a network administrator puts a port that is part of an Ether-
Channel bundle into a different VLAN than the other ports in that bundle?
A. The EtherChannel bundle will stay up only if PAgP is used.
B. The EtherChannel bundle will stay up only if LACP is used.
C. The EtherChannel bundle will stay up if either PAgP or LACP is used.
D. The EtherChannel bundle will stay up if the ports were configured with no
negotiation between the switches to form the EtherChannel.
E. The EtherChannel will fail.
Chapter 3: LAN Aggregation 143
8. Refer to Example 3-9. On the basis of the output that is shown, what can be
determined about the EtherChannel bundle?
10. Which command displays only one line of information per port channel?
This page intentionally left blank
CHAPTER 4
Wireless LANs
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the wireless LAN technologies and Q What are the threats to wireless LANs?
standards?
Q What security mechanisms are available for
Q What components make up a wireless LAN wireless LANs?
infrastructure?
Q What are the steps to configure a wireless
Q What are the wireless topologies? router to support a remote site?
Q What is the structure of the 802.11 frame? Q What are the steps to configure a wireless
client to connect to a wireless router?
Q What is the media access method used by
wireless technologies? Q What are some solutions to troubleshooting
common wireless issues?
Q What is channel management in a WLAN?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Wireless LAN (WLAN) page 147 2.4 GHz (UHF) page 151
Wireless Personal-Area Network 5 GHz (SHF) page 151
(WPAN) page 149
60 GHz (EHF) page 151
Wireless Wide-Area Network (WWAN)
IEEE 802.11 page 151
page 149
IEEE 802.11a page 151
Bluetooth page 149
IEEE 802.11b page 152
Wi-Fi (wireless fidelity) page 149
IEEE 802.11g page 152
WiMAX (Worldwide Interoperability
for Microwave Access) page 150 IEEE 802.11n page 152
Introduction (4.0.1.1)
Wireless networks can provide client mobility, the ability to connect from any loca-
tion and at any time, and the ability to roam while staying connected. A Wireless
LAN (WLAN) is a classification of wireless network that is commonly used in
homes, offices, and campus environments. Although it uses radio frequencies instead
of cables, it is commonly implemented in a switched network environment and its
frame format is similar to Ethernet.
This chapter covers WLAN technology, components, security, planning, implemen-
tation, and troubleshooting. The types of network attacks to which wireless net-
works are particularly susceptible are discussed.
Video 4.1.1.1
Video
View the video in the online course for an example of how wireless networks enable
mobility.
whether at the office or out to dinner. They can access email and other work-related
resources quickly and easily, providing better management, better and faster results
for customers, and increased profits.
Wireless networking can also reduce costs. In businesses with a wireless infrastruc-
ture already in place, savings are realized anytime equipment changes or moves are
required, such as when relocating an employee within a building, reorganizing equip-
ment or a lab, or moving to temporary locations or project sites.
Another important benefit of wireless networking is the ability to adapt to chang-
ing needs and technologies. Adding new equipment to the network is fairly seamless
with wireless networking. Consider the wireless connectivity of the home. Users
can surf the web from their kitchen table, living rooms, or even outdoors. Home
users connect new devices, such as smart phones and smart pads, laptops, and smart
televisions. A wireless home router allows the user to connect to these devices with-
out the additional cost or inconvenience of running cables to different locations in
the home.
The various wireless technologies available to connect devices to these wireless net-
works include the following:
Q Bluetooth: Originally an IEEE 802.15 WPAN standard that uses a device-
pairing process to communicate over distances up to 0.05 mile (100m). Newer
Bluetooth versions are standardized by the Bluetooth Special Interest Group
(www.bluetooth.org).
Q Wi-Fi (wireless fidelity): An IEEE 802.11 WLAN standard commonly
deployed to provide network access to home and corporate users, to include
data and voice and video traffic, to distances up to 300m (0.18 mile).
150 Scaling Networks Companion Guide
There are many types of wireless technologies available. However, the focus of this
chapter is on 802.11 WLANs.
Note
WLAN networks operate in the ISM 2.4-GHz frequency band and the UNII 5-GHz band.
Wireless communication occurs in the radio waves range (that is, 3 Hz to 300 GHz)
of the electromagnetic spectrum, as shown in Figure 4-1.
Note
Refer to the online curriculum for additional information provided in this interactive graphic.
The radio waves range is subdivided into a radio frequencies section and a micro-
wave frequencies section. Notice that WLANs, Bluetooth, cellular, and satellite com-
munication all operate in the microwave UHF, SHF, and EHF ranges.
Chapter 4: Wireless LANs 151
Wireless LAN devices have transmitters and receivers tuned to specific frequencies
of the radio waves range. Specifically, the following frequency bands are allocated
to 802.11 wireless LANs:
Q 2.4 GHz (UHF): 802.11b/g/n/ad
Q 5 GHz (SHF): 802.11a/n/ac/ad
Q 60 GHz (EHF): 802.11ad
Q IEEE 802.11b: Released in 1999, it operates in the 2.4-GHz frequency band and
offers speeds of up to 11 Mb/s. Devices implementing this standard have a lon-
ger range and are better able to penetrate building structures than devices based
on 802.11a. Wireless devices have one antenna to transmit and receive wireless
signals.
Q IEEE 802.11g: Released in 2003, it operates in the 2.4-GHz frequency band and
offers speeds of up to 54 Mb/s. Devices implementing this standard, therefore,
operate at the same radio frequency and range as 802.11b, but with the band-
width of 802.11a. Wireless devices have one antenna to transmit and receive
wireless signals. It is backward compatible with 802.11b. However, when sup-
porting an 802.11b client, the overall bandwidth is reduced.
Q IEEE 802.11n: Released in 2009, it operates in the 2.4-GHz and 5-GHz fre-
quency bands and is referred to as a dual-band device. Typical data rates range
from 150 Mb/s to 600 Mb/s with a distance range of up to 70m (0.5 mile).
However, to achieve the higher speeds, APs and wireless clients require multiple
antennas using the multiple-input and multiple-output (MIMO) technology.
MIMO uses multiple antennas as both the transmitter and receiver to improve
communication performance. Up to four antennas can be supported. The
802.11n standard is backward compatible with 802.11a/b/g devices. However,
supporting a mixed environment limits the expected data rates.
Q IEEE 802.11ac: Released in 2013, this operates in the 5-GHz frequency band
and provides data rates ranging from 450 Mb/s to 1.3 Gb/s (1300 Mb/s). It
uses MIMO technology to improve communication performance. Up to eight
antennas can be supported. The 802.11ac standard is backward compatible
with 802.11a/n devices; however, supporting a mixed environment limits the
expected data rates.
Q IEEE 802.11ad: Scheduled for release in 2014 and also known as “WiGig,” it
uses a tri-band Wi-Fi solution using 2.4 GHz, 5 GHz, and 60 GHz, and offers
theoretical speeds of up to 7 Gb/s. However, the 60-GHz band is a line-of-site
technology and, therefore, cannot penetrate through walls. When a user is roam-
ing, the device switches to the lower 2.4-GHz and 5-GHz bands. It is backward
compatible with existing Wi-Fi devices. However, supporting a mixed environ-
ment limits the expected data rates.
The Wi-Fi Alliance certifies Wi-Fi and the following product compatibility:
Q IEEE 802.11a/b/g/n/ac/ad compatible
Q IEEE 802.11i secure using WPA2 and Extensible Authentication Protocol (EAP)
Q Wi-Fi Protected Setup (WPS) to simplify device connections
Q Wi-Fi Direct to share media between devices
154 Scaling Networks Companion Guide
Note
Other Wi-Fi certification products are available such as WMM (Wi-Fi Multimedia), Tun-
neled Direct Link Setup (TDLS), and WMM-Power Save.
Figure 4-2 displays the Wi-Fi Alliance logos identifying specific feature compat-
ibility. Devices displaying specific logos support the identified feature. A device can
display a combination of these logos.
Videos 4.1.1.6
Video
View three videos in the online course that explain the Wi-Fi Direct, Wi-Fi
Passpoint, and Wi-Fi Miracast features. The videos can be found on figure buttons
2, 3, and 4.
dominant 802 working groups are 802.3 Ethernet and 802.11 WLAN. However,
there are important differences between the two, as shown in Table 4-2.
WLANs use RF instead of cables at the physical layer and MAC sublayer of the data
link layer. In comparison to cable, RF has the following characteristics:
Q RF does not have boundaries, such as the limits of a wire in a sheath. This allows
data frames traveling over the RF media to be available to anyone who can
receive the RF signal.
Q RF is unprotected from outside signals, whereas cable is in an insulating sheath.
Radios operating independently in the same geographic area, but using the same
or a similar RF, can interfere with each other.
Q RF transmission is subject to the same challenges inherent in any wave-based
technology, such as consumer radio. For example, as the radio travels farther
away from the source, radio stations can start playing over each other and static
noise increases. Eventually the signal is completely lost. Wired LANs have cables
that are of an appropriate length to maintain signal strength.
Q RF bands are regulated differently in various countries. The use of WLANs is
subject to additional regulations and sets of standards that are not applied to
wired LANs.
Q WLANs support hosts that contend for access on the RF media (frequency
bands). 802.11 prescribes collision avoidance (CSMA/CA) instead of collision
detection (CSMA/CD) for media access to proactively avoid collisions within
the media.
Q WLANs use a different frame format than wired Ethernet LANs. WLANs
require additional information in the Layer 2 header of the frame.
Q WLANs raise more privacy issues because radio frequencies can reach outside
the facility.
Interactive
Activity 4.1.1.8: Identify the Wireless Technology
Graphic Go to the course online to perform this practice activity.
Interactive
Activity 4.1.1.9: Compare Wireless Standards
Graphic Go to the course online to perform this practice activity.
Interactive
Activity 4.1.1.10: Compare WLANs and LANs
Graphic Go to the course online to perform this practice activity.
For example, the Cisco Linksys EA6500 router, shown in Figure 4-4, is commonly
implemented as a small-business or residential wireless access device.
158 Scaling Networks Companion Guide
The wireless router connects to the ISP DSL modem and advertises its services by
sending beacons containing its shared service set identifier (SSID). Internal devices
wirelessly discover the router SSID and attempt to associate and authenticate with it
to access the Internet.
The expected load on the Linksys EA6500 router, in this environment, is low
enough that it should be able to manage the provision of WLAN, 802.3 Ethernet,
and connect to an ISP. It also provides advanced features, such as high-speed access,
support for video streaming, IPv6, QoS, and USB ports to connect printers or por-
table drives.
Additionally, for home users who want to extend their network services, both wire-
less and wired, wireless Powerline adapters can be implemented. With these devices,
a device can connect directly to the network through electrical outlets, which is ideal
for HD video streaming and online gaming. The home user can conveniently set this
up by plugging into a wall outlet or power strip and connecting the device without
the need of outside technical advice or support.
Video 4.1.2.2
Video
View the video in the online course to see an overview of the Linksys Powerline
adapters.
Chapter 4: Wireless LANs 159
Note
IEEE 802.11 refers to a wireless client as a station (STA). In this chapter, the term wireless
client is used to describe any wireless-capable device.
Each client (that is, PC1 and PC2) connects to a switch using a network cable. The
switch is the point where the clients gain access to the network. Notice that the
wireless AP also connects to the switch. In this example, an AP such as the Cisco
WAP4410N AP or the WAP131 AP could be used to provide wireless network
connectivity.
Wireless clients use a wireless NIC to discover nearby APs that are advertising
an SSID. Clients then attempt to associate and authenticate with an AP, as shown
in Figure 4-6. After being authenticated, wireless users have access to network
resources.
160 Scaling Networks Companion Guide
Note
The wireless needs of a small organization differ from those of a large organization. Large,
wireless deployments require additional wireless hardware to simplify the installation and
management of the wireless network.
Autonomous APs
Autonomous APs, sometimes referred to as heavy APs, are standalone devices
configured using the Cisco CLI or a GUI. Autonomous APs are useful in situations
where only a couple of APs are required in the network. Optionally, multiple APs
can be controlled using wireless domain services (WDS) and managed using Cisco-
Works Wireless LAN Solution Engine (WLSE).
Note
A home router is an example of an autonomous AP because the entire AP configuration
resides on the device.
Chapter 4: Wireless LANs 161
If the wireless demands increase, more APs would be required. Each AP would oper-
ate independent of other APs and require manual configuration and management.
Controller-Based APs
Controller-based APs are server-dependent devices that require no initial configura-
tion. Cisco offers two controller-based solutions. Controller-based APs are useful
in situations where many APs are required in the network. As more APs are added,
each AP is automatically configured and managed by a WLAN controller.
Figure 4-8 displays a controller-based AP in a small network.
Notice how a WLAN controller is now required to manage the APs. The benefit of
the controller is that it can be used to manage many APs.
Note
Some AP models can operate in either autonomous mode or in controller-based mode.
162 Scaling Networks Companion Guide
Note
Most enterprise-level APs also support Power over Ethernet (PoE).
For this reason, the WAP121, WAP321, and AP541N APs support the clustering of
APs without the use of a controller. The cluster provides a single point of administra-
tion and enables the administrator to view the deployment of APs as a single wireless
network, rather than a series of separate wireless devices. The clustering capability
makes it easy to set up, configure, and manage a growing wireless network. Multiple
APs can be deployed and push a single configuration to all the devices within the
cluster, managing the wireless network as a single system without worrying about
interference between APs, and without configuring each AP as a separate device.
Specifically, the WAP121 and WAP321 support Single Point Setup (SPS), which
makes AP deployment easier and faster, as shown in Figure 4-11.
SPS helps to enable the wireless LAN to scale up to four WAP121 and up to eight
WAP321 devices to provide broader coverage and support additional users as
business needs change and grow. The Cisco AP541N AP can cluster up to 10 APs
together and can support multiple clusters.
A cluster can be formed between two APs if the following conditions are met:
Q Clustering mode is enabled on the APs.
Q The APs joining the cluster have the same Cluster Name.
Q The APs are connected on the same network segment.
Q The APs use the same radio mode (that is, both radios use 802.11n).
Chapter 4: Wireless LANs 165
Note
There are other controller-based solutions, such as the controllers using Flex mode. Visit
www.cisco.com for more information.
Note
Only management data flows through the Meraki cloud infrastructure. No user traffic passes
through Meraki’s data centers. Therefore, if the Cisco Meraki cannot access the cloud, the
network continues to function normally. This means that users can still authenticate, firewall
rules remain in place, and traffic flows at full line rate. Only management functions, such as
reports and configuration tools, are interrupted.
Other WLAN controllers of greater capacity are also available. For example, the
Cisco 5760 Wireless Controller and the Cisco 8500 Series Controller are designed to
cost-effectively manage, secure, and optimize the performance of sizeable wireless
networks, such as service provider and large campus deployments.
Figure 4-14 summarizes the lightweight APs.
Visit the online curriculum to interact with the figure and learn more information
about the controllers for small- and medium-sized businesses.
Note
Not all wireless routers are the same. For example, entry-level 802.11n routers support 150-
Mb/s bandwidth using one Wi-Fi radio and one antenna attached to the unit. To support
the higher data rates, an 802.11n router requires more radios and antennas to manage more
channels of data in parallel. For example, two radios and two antennas on an 802.11n router
support up to 300 Mb/s, while 450 and 600 Mb/s require three and four radios and antennas,
respectively.
Interactive
Activity 4.1.2.9: Identify WLAN Component Terminology
Graphic Go to the course online to perform this practice activity.
Note
The IEEE 802.11 standard refers to an ad hoc network as an independent basic service set
(IBSS).
A variation of the ad hoc topology is when a smart phone or tablet with cellular data
access is enabled to create a personal hotspot. This feature is sometimes referred to
as tethering. A hotspot is usually a temporary quick solution that enables a smart
phone to provide the wireless services of a Wi-Fi router. Other devices can associ-
ate and authenticate with the smart phone to use the Internet connection. The Apple
iPhone refers to this as the Personal Hotspot feature, while Android devices refer to
it as either Tethering or Portable Hotspot.
The circles depict the coverage area within which the wireless clients of the BSS
can remain in communication. This area is called the Basic Service Area (BSA).
If a wireless client moves out of its BSA, it can no longer directly communicate
with other wireless clients within the BSA. The BSS is the topology building block,
while the BSA is the actual coverage area (the terms BSA and BSS are often used
interchangeably).
The Layer 2 MAC address of the AP is used to uniquely identify each BSS, which is
called the Basic Service Set Identifier (BSSID). Therefore, the BSSID is the formal
name of the BSS and is always associated with only one AP.
An ESS is the union of two or more BSSs interconnected by a wired DS. Wireless
clients in one BSA can now communicate with wireless clients in another BSA within
the same ESS. Roaming mobile wireless clients can move from one BSA to another
(within the same ESS) and seamlessly connect.
The rectangular area depicts the coverage area within which members of an ESS can
communicate. This area is called the Extended Service Area (ESA). An ESA typi-
cally involves several BSSs in overlapping and/or separated configurations.
Each ESS is identified by an SSID, and in an ESS, each BSS is identified by its BSSID.
For security reasons, additional SSIDs can be propagated through the ESS to segre-
gate the level of network access.
Note
The 802.11 standard refers to ad hoc mode as an IBSS.
Interactive
Activity 4.1.3.4: Identify WLAN Topology Terminology
Graphic Go to the course online to perform this practice activity.
As shown in the top portion of Figure 4-21, all 802.11 wireless frames contain the
following fields:
Q Frame Control: Identifies the type of wireless frame and contains subfields for
protocol version, frame type, address type, power management, and security
settings.
Q Duration: Typically used to indicate the remaining duration needed to receive
the next frame transmission.
Q Address1: Usually contains the MAC address of the receiving wireless device
or AP.
Q Address2: Usually contains the MAC address of the transmitting wireless device
or AP.
Q Address3: Sometimes contains the MAC address of the destination, such as the
router interface (default gateway) to which the AP is attached.
Q Sequence Control: Contains the Sequence Number and the Fragment Number
subfields. The Sequence Number indicates the sequence number of each frame.
The Fragment Number indicates the number of each frame sent as a fragmented
frame.
Q Address4: Usually missing because it is used only in ad hoc mode.
Q Payload: Contains the data for transmission.
Q FCS: Frame Check Sequence; used for Layer 2 error control.
Note
The content of the Address fields varies depending on settings in the Frame Control field.
Notice that the Frame Type field and the Frame Subtype fields identify whether the
frame is a management frame, a control frame, or a data frame. In the example, the
Frame Type is 0x0, identifying it as a management frame. The subtype value 8 iden-
tifies this as a beacon frame. The frame is specifically identified as 0x08.
Figure 4-26 displays the field value of common management frames including
Q Association request frame: (0x00) Sent from a wireless client, it enables the AP
to allocate resources and synchronize. The frame carries information about the
wireless connection including supported data rates and the SSID of the network
to the wireless client that wants to associate. If the request is accepted, the AP
reserves memory and establishes an association ID for the device.
Q Association response frame: (0x01) Sent from an AP to a wireless client con-
taining the acceptance or rejection to an association request. If it is an accep-
tance, the frame contains information, such as an association ID and supported
data rates.
Q Reassociation request frame: (0x02) A device sends a reassociation request
when it drops from the range of the currently associated AP and finds another
AP with a stronger signal. The new AP coordinates the forwarding of any infor-
mation that might still be contained in the buffer of the previous AP.
Q Reassociation response frame: (0x03) Sent from an AP containing the accep-
tance or rejection to a device reassociation request frame. The frame includes
information required for association, such as the association ID and supported
data rates.
Q Probe request frame: (0x04) Sent from a wireless client when it requires infor-
mation from another wireless client.
Beacons are the only management frame that can regularly be broadcast by an AP.
All other probing, authentication, and association frames are used only during the
association (or reassociation) process.
Figure 4-27 displays a sample Wireshark screen capture of a management frame.
Note
The example provided was captured using Wireshark. However, Wireshark must be specifi-
cally configured to capture WLAN traffic. The ability to capture traffic varies between oper-
ating systems and might require a special wireless NIC.
180 Scaling Networks Companion Guide
Control frames are integral to wireless transmission and play a significant role in the
media contention method used by wireless, known as Carrier Sense Multiple Access
with Collision Avoidance (CSMA/CA).
Chapter 4: Wireless LANs 181
Interactive
Activity 4.2.1.6: Identify the 802.11 Frame Control Fields
Graphic Go to the course online to perform this practice activity.
Start
Assemble a Frame
No
Is the Channel Wait for Random Backoff Time
Idle?
Yes
Transmit RTS
No
CTS Received?
Yes
End
Notice that the Linksys EA6500 supports 2.4-GHz and 5-GHz radios.
Figure 4-33 displays the options for the 2.4-GHz radio Network mode.
Notice that it can support Mixed, Wireless-N Only, or Wireless-G Only. The Mixed
setting provides more flexibility, but it can also slow communication. For example,
Chapter 4: Wireless LANs 185
if all the wireless clients connecting to the router are using 802.11n, they all enjoy
the better data rates provided. If 802.11g wireless clients associate with the AP,
all the faster wireless clients contending for the channel must wait on the 802.11g
clients to clear the channel before transmitting. However, if all wireless clients sup-
port 802.11n, select Wireless-N Only for best performance.
Figure 4-34 displays the Network mode options for the 5-GHz radio.
Notice that it also supports a Mixed setting, along with the Wireless-N Only and
Wireless-AC Only settings.
Notice that the Linksys EA6500 does not support 802.11ad.
The Security options listed in Figure 4-35 are choices of security protocols available
on the Linksys EA6500 wireless router.
Home users should choose WPA2/WPA Mixed Personal, while business users
would typically choose WPA2/WPA Mixed Enterprise. The 5-GHz radio offers the
identical choices. The wireless end device must also support the selected security
option to associate.
Note
All wireless routers and APs should be secured using the highest available settings. The
None or WEP options should be avoided and only used in situations where security is of no
concern.
Figure 4-36 displays the Channel settings for the 2.4-GHz radio.
The preferred option to use is Auto; however, a specific channel could be selected
if there were other APs or other devices nearby interfering with the channel selected
by the router. Although the 5-GHz radio also has the Auto option, in the example, it
lists a specific channel (153) and channel width.
Chapter 4: Wireless LANs 187
Figure 4-37 illustrates how passive mode works with the AP broadcasting a beacon
frame every so often.
Figure 4-38 illustrates how active mode works with a wireless client broadcasting
a probe request for a specific SSID. The AP with that SSID responds with a probe
response frame.
188 Scaling Networks Companion Guide
A wireless client could also send a probe request without an SSID name to dis-
cover nearby WLAN networks. APs configured to broadcast beacon frames would
respond to the wireless client with a probe response and provide the SSID name.
APs with the broadcast SSID feature disabled do not respond.
Chapter 4: Wireless LANs 189
Authentication (4.2.2.5)
The 802.11 standard was originally developed with two authentication mechanisms:
Q Open authentication: Fundamentally a NULL authentication where the wireless
client says “authenticate me” and the AP responds with “yes.” Open authentica-
tion provides wireless connectivity to any wireless device and should only be
used in situations where security is of no concern.
Q Shared key authentication: Technique is based on a key that is preshared
between the client and the AP.
3. The client encrypts the message using its shared key and returns the encrypted
text to the AP.
4. The AP then decrypts the encrypted text using its shared key.
5. If the decrypted text matches the challenge text, the AP authenticates the client.
If the messages do not match, the wireless client is not authenticated and wire-
less access is denied.
190 Scaling Networks Companion Guide
After a wireless client has been authenticated, the AP proceeds to the association
stage. As shown in Figure 4-40, the association stage finalizes settings and establishes
the data link between the wireless client and the AP.
After a wireless client has associated with an AP, traffic is now able to flow between
the client and the AP.
Interactive
Activity 4.2.2.6: Order the Steps in the Client and AP Association Process
Graphic Go to the course online to perform this practice activity.
Chapter 4: Wireless LANs 191
the spreading code and when it was added, it can mathematically remove it and
reconstruct the original signal. In effect, this creates redundancy in the transmit-
ted signal in an effort to counter quality loss in the wireless medium. DSSS is
used by 802.11b. It is also used by cordless phones operating in the 900-MHz,
2.4-GHz, and 5.8-GHz bands; by CDMA cellular; and by GPS networks.
Q Frequency-hopping spread spectrum (FHSS): FHSS also relies on spread-
spectrum methods to communicate, as shown in Figure 4-42.
FHSS is similar to DSSS but transmits radio signals by rapidly switching a car-
rier signal among many frequency channels. With FHSS, the sender and receiver
must be synchronized to “know” which channel to jump. This channel-hopping
process allows for a more efficient usage of the channels, decreasing channel
congestion. Walkie-talkies and 900-MHz cordless phones also use FHSS, and
Bluetooth uses a variation of FHSS. FHSS is also used by the original 802.11
standard.
Q Orthogonal frequency-division multiplexing (OFDM): OFDM is a subset of
frequency-division multiplexing in which a single channel utilizes multiple sub-
channels on adjacent frequencies, as shown in Figure 4-43.
Chapter 4: Wireless LANs 193
The 2.4-GHz band is subdivided into multiple channels. The overall, combined chan-
nel bandwidth is 22 MHz, with each channel separated by 5 MHz. The 802.11b stan-
dard identifies 11 channels for North America. The 22-MHz bandwidth, combined
with the 5-MHz separation between frequencies, results in an overlap between suc-
cessive channels, as shown in Figure 4-45.
Note
In Europe, there are 13 802.11b channels.
A best practice for WLANs requiring multiple APs is to use nonoverlapping chan-
nels. If there are three adjacent APs, use channels 1, 6, and 11. If there are just two,
select any two that are five channels apart, such as channels 5 and 10. Most APs
can automatically select a channel based on adjacent channels used. Some products
continuously monitor the radio space to adjust the channel settings dynamically in
response to environmental changes.
As enterprise WLANs migrate to 802.11n, they can use channels in the larger, less-
crowded 5-GHz band, reducing “accidental denial of service (DoS).” For example,
the 802.11n standard uses OFDM and can support four nonoverlapping channels, as
shown in Figure 4-47.
802.11n can also use channel bonding, which combines two 20-MHz channels into
one 40-MHz channel, as shown in Figure 4-48.
Channel bonding increases throughput by using two channels at one time to deliver
data. Most modern APs can auto-adjust channels to circumvent interference.
Note
IEEE 802.11ac uses OFDM, with channel widths of 80,160, and 80+80.
Q Position APs in locations where users are expected to be. For example, confer-
ence rooms are typically a better location for APs than a hallway.
When these points have been addressed, estimate the expected coverage area of an
AP. This value varies depending on the WLAN standard or mix of standards that are
deployed, the nature of the facility, the transmit power that the AP is configured
for, and so on. Always consult the specifications for the AP when planning for
coverage areas.
BSAs represent the coverage area provided by a single channel. An ESS should have
10 to 15 percent overlap between BSAs in an ESS, as shown in Figure 4-49. With a
15 percent overlap between BSAs, an SSID, and nonoverlapping channels (that is,
one cell on channel 1 and the other on channel 6), roaming capability can be created.
Other factors include site surveys, which are detailed analyses of where to locate the
various APs.
Interactive
Activity 4.2.3.4: Identify Channel Management Terminology
Graphic Go to the course online to perform this practice activity.
Interactive
Activity 4.2.3.5: Cisco Wireless Explorer Game
Graphic Go to the course online to perform this practice activity.
198 Scaling Networks Companion Guide
Note
Other threats, such as AP/wireless client MAC spoofing, cracking, and infrastructure attacks,
are outside the scope of this chapter.
To minimize the risk of a DoS attack because of improperly configured devices and
malicious attack, harden all devices, keep passwords secure, create backups, and
ensure that all configuration changes are incorporated off-hours.
Accidental interference only happens when another wireless device is introduced.
The best solution is to monitor the WLAN for any interference problems and
address them as they appear. Because the 2.4-GHz band is more prone to interfer-
ence, the 5-GHz band could be used in areas prone to interference. Some WLAN
solutions enable APs to automatically adjust channels and use the 5-GHz band to
compensate for interference. For example, some 802.11n/ac/ad solutions automati-
cally adjust to counter interference.
Figure 4-50 illustrates how a cordless phone, or even a microwave, can interfere with
WLAN communication.
The Cisco CleanAir technology enables devices to identify and locate non-802.11
interference sources. It creates a network that has the ability to adjust automatically
to changes in its environment.
200 Scaling Networks Companion Guide
Figure 4-51 displays how a wireless client and an AP normally use CSMA/CA to
access the medium.
Chapter 4: Wireless LANs 201
Figure 4-52 illustrates how a CTS flood is created by an attacker sending out CTS
frames to a bogus wireless client.
All other clients must now wait the specified duration in the CTS frame. However,
the attacker keeps sending CTS frames, thus making the other clients wait indefi-
nitely. The attacker now has control of the medium.
Note
This is only one example of a management frame attack. Many others exist.
Note
Cisco Prime is network management software that works with other management software
to provide a common look and central location for all network information. It is usually
deployed in very large organizations.
For example, in Figure 4-54, a malicious user is in “Bob’s Latte” coffee shop and
wants to capture traffic from unsuspecting wireless clients.
The attacker launches software that enables his laptop to become an evil twin AP,
matching the same SSID and channel as the legitimate wireless router.
In Figure 4-55, a user sees two wireless connections available, but chooses and asso-
ciates with the evil twin AP.
The attacker captures the user data and forwards it to the legitimate AP, which in
turn directs the return traffic back to the evil twin AP. The evil twin AP captures the
return traffic and forwards the information to the unsuspecting user.
Defeating an attack like an MITM attack depends on the sophistication of the
WLAN infrastructure and the vigilance in monitoring activity on the network. The
process begins with identifying legitimate devices on the WLAN. To do this, users
must be authenticated. After all the legitimate devices are known, the network can
be monitored for abnormal devices or traffic.
Enterprise WLANs that use state-of-the-art WLAN devices provide administrators
with tools that work together as a wireless intrusion prevention system (IPS). These
tools include scanners that identify rogue APs and ad hoc networks, and radio
resource management (RRM), which monitors the RF band for activity and AP load.
An AP that is busier than normal alerts the administrator of possible unauthorized
traffic.
Although these two features would deter most users, the reality is that neither SSID
cloaking nor MAC address filtering would deter a crafty intruder. SSIDs are eas-
ily discovered even if APs do not broadcast them, and the MAC addresses can be
spoofed. The best way to secure a wireless network is to use authentication and
206 Scaling Networks Companion Guide
encryption systems. Two types of authentication were introduced with the original
802.11 standard:
Q Open system authentication: Any wireless client should easily be able to con-
nect, and should only be used in situations where security is of no concern, such
as in locations providing free Internet access like cafes, hotels, and in remote
areas.
Q Shared key authentication: Provides mechanisms, such as WEP, WPA, or
WPA2, to authenticate and encrypt data between a wireless client and AP.
However, the password must be preshared between both parties to connect.
The chart in Figure 4-56 summarizes the various types of authentication with a focus
on the characteristics of open authentication.
Q IEEE 802.11i/WPA2: IEEE 802.11i is the industry standard for securing wire-
less networks. The Wi-Fi Alliance version is called WPA2. 802.11i and WPA2
both use the Advanced Encryption Standard (AES) for encryption. AES is cur-
rently considered the strongest encryption protocol.
WEP is no longer recommended. Its shared WEP keys have proven to be flawed
and, therefore, should never be used. To counteract shared WEP key weakness, the
very first approach by companies was to try techniques such as cloaking SSIDs and
filtering MAC addresses. These techniques have also proven to be too weak.
Following the weakness of WEP-based security, there was a period of interim secu-
rity measures. Vendors like Cisco, wanting to meet the demand for better security,
developed their own systems while simultaneously helping to evolve the 802.11i
standard. On the way to 802.11i, the TKIP encryption algorithm was created, which
was linked to the Wi-Fi Alliance WPA security method.
Modern wireless networks should always use the 802.11i/WPA2 standard. WPA2 is
the Wi-Fi version of 802.11i, and therefore, the terms WPA2 and 802.11i are often
used interchangeably.
Since 2006, any device that bears the Wi-Fi Certified logo is WPA2 certified.
Note
Wireless-N networks should use the WPA2-Personal security mode for best performance.
Table 4-3 summarizes the three types of shared key authentication methods.
208 Scaling Networks Companion Guide
Note
Always choose WPA2 with AES when possible.
Note
Typically both 2.4-GHz and 5-GHz networks would be configured with the same security
modes. The example in the figure is for demonstration purposes only.
The Security Mode drop-down list of the 2.4-GHz network displays the security
methods available on the Linksys EA6500 router. It lists the weakest (that is, None)
to the strongest (that is, WPA2/WPA Mixed Enterprise). The 5-GHz network
includes the same drop-down list.
WPA and WPA2 support two types of authentication:
Q Personal: Intended for home or small-office networks, users authenticate using a
preshared key (PSK). Wireless clients authenticate with the AP using a preshared
password. No special authentication server is required.
Q Enterprise: Intended for enterprise networks but requires a Remote Authen-
tication Dial-In User Service (RADIUS) authentication server. Although more
complicated to set up, it provides additional security. The device must be
authenticated by the RADIUS server and then users must authenticate using the
802.1X standard, which uses the Extensible Authentication Protocol (EAP) for
authentication.
210 Scaling Networks Companion Guide
Notice the new fields displayed when choosing an Enterprise version of WPA or
WPA2. These fields are necessary to supply the AP with the required information to
contact the AAA server:
Q RADIUS Server IP address: This is the reachable address of the RADIUS server.
Q UDP port numbers: Officially assigned UDP ports 1812 for RADIUS Authentica-
tion and 1813 for RADIUS Accounting, but could also operate using UDP ports
1645 and 1646.
Q Shared key: Used to authenticate the AP with the RADIUS server.
The shared key is not a parameter that must be configured on an STA. It is only
required on the AP to authenticate with the RADIUS server.
Note
There is no Password field listed, because the actual user authentication and authorization is
handled by the 802.1X standard, which provides a centralized, server-based authentication of
end users.
Chapter 4: Wireless LANs 211
The 802.1X login process uses EAP to communicate with the AP and RADIUS
server. EAP is a framework for authenticating network access. It can provide a secure
authentication mechanism and negotiate a secure private key that can then be used
for a wireless encryption session utilizing TKIP or AES encryption.
Interactive
Activity 4.3.2.6: Identify the WLAN Authentication Characteristics
Graphic Go to the course online to perform this practice activity.
Step 3. Configure wireless security using WPA2/WPA Mixed Personal. Never use
WEP unless no other options exist.
Step 4. Back up the configuration.
Table 4-4 outlines example settings used to configure the Linksys EA6500 wireless
router.
Note
In our example, the wireless router will not be connected to the Internet.
During this time, the Setup program attempts to configure and enable the
Internet connection. In the example, the Internet connection is unavail-
able, and after a few prompts to connect to the Internet, the option to
skip this step displays.
The Linksys router settings window displays, as shown in Figure 4-62. This
is where the SSID, wireless password, and administrative password are
configured.
Step 3. Click Next to display the summary router settings screen, as shown in
Figure 4-63. Record these settings if the initial table was not previously
completed.
Step 4. Click Next to display the option to configure the Linksys Smart Wi-Fi
account window, as shown in Figure 4-64.
This window enables you to manage the router remotely over the Internet.
In this example, the Linksys Smart Wi-Fi account is not set up because
there is no Internet access.
Step 5. Click Continue to display the Sign In window, as shown in Figure 4-65.
Because the Internet connection has not been configured, the administra-
tive router password is required.
Step 6. When the password is entered, click Log in to display the Linksys Smart
Wi-Fi Home page, as shown in Figure 4-66.
Q Smart Wi-Fi Router Settings: Use this section to alter settings for connectivity,
troubleshooting, wireless, and security.
Q Smart Wi-Fi Widgets: Provides a quick summary of the Smart Wi-Fi Tools
section.
Video 4.4.1.3
Video
View the video in the online course launched from Figure button 4 to see a short
explanation on the Smart Wi-Fi interface.
Q Keep the network safe from Internet threats by configuring the DMZ feature.
Q View connected computers and devices on the network, and set up port
forwarding.
Q Speed Test: A tool used to test the upload and download speed of the Internet
link. Useful for baselining.
Q USB Storage: Controls access to shared files. Configures how users can access
shared files. With this tool, users can access USB storage in the local network,
create shares on a USB storage device, configure the Folder Access settings, con-
figure how devices and computers within the network can access the FTP server,
and configure the access to a Media Server.
Step 2. Click the Diagnostic tab to open the Diagnostics Troubleshooting win-
dow, as shown in Figure 4-81.
Step 3. Under the Router configuration title, click Backup and save the file to an
appropriate folder.
Note
To upload a previously saved backup, click Restore, locate the file, and start the restore
process.
Chapter 4: Wireless LANs 225
Video 4.4.2.1
Video
View the video in the online course launched from Figure button 1 to see a short
explanation on how to connect a Windows computer to the WLAN.
Video 4.4.2.2
Video
View the video in the online course launched from Figure button 2 to see a short
explanation on how to connect an iPod, iPhone, and iPad to the WLAN.
226 Scaling Networks Companion Guide
If the PC is operational but the wireless connection is performing poorly, check the
following:
Q How far is the PC from an AP? Is the PC out of the planned coverage
area (BSA)?
Q Check the channel settings on the wireless client. The client software should
detect the appropriate channel as long as the SSID is correct.
Q Check for the presence of other devices in the area that might be interfering
with the 2.4-GHz band. Examples of other devices are cordless phones, baby
monitors, microwave ovens, wireless security systems, and potentially rogue
APs. Data from these devices can cause interference in the WLAN and intermit-
tent connection problems between a wireless client and AP.
Next, ensure that all the devices are actually in place. Consider a possible physical
security issue. Is there power to all devices and are they powered on?
Finally, inspect links between cabled devices, looking for bad connectors or dam-
aged or missing cables. If the physical plant is in place, verify the wired LAN by
pinging devices, including the AP. If connectivity still fails at this point, perhaps
something is wrong with the AP or its configuration.
When the user PC is eliminated as the source of the problem, and the physical status
of devices is confirmed, begin investigating the performance of the AP. Check the
power status of the AP.
Chapter 4: Wireless LANs 229
By default, dual-band routers use the same network name on both the 2.4-GHz band
and the 5-GHz band. The simplest way to segment traffic is to rename one of the
wireless networks. With a separate, descriptive name, it is easier to connect to the
right network.
To improve the range of a wireless network, ensure that the physical wireless router
location is free of obstructions, such as furniture, fixtures, and tall appliances. These
block the signal, which shortens the range of the WLAN. If this still does not solve
the problem, a Wi-Fi Range Extender or Powerline wireless technology can be used.
Step 3. Under the Firmware Update label, click Check for Updates.
Chapter 4: Wireless LANs 231
The router either responds with “No updates found” or it prompts you to download
and install the new firmware.
Note
Some routers require that the firmware file be downloaded ahead of time and then manually
uploaded. To do so, select Choose File. If a firmware upgrade fails or makes the situation
worse, you can load the previous firmware by clicking Troubleshooting, Diagnostics, and
then selecting Restore previous firmware, as shown in Figure 4-86.
Caution
Do not upgrade the firmware unless there are problems with the AP or the new firmware has
a desired feature.
Interactive
Activity 4.4.3.5: Identify the Troubleshooting Solution
Graphic Go to the course online to perform this practice activity.
232 Scaling Networks Companion Guide
Summary (4.5)
Class Activity 4.5.1.1: Inside and Outside Control
An assessment has been completed to validate the need for an upgrade to your
small- to medium-sized wireless network. Approved for purchase are indoor and
outdoor access points and one wireless controller. You must compare equipment
models and their specifications before you purchase.
Therefore, you visit the “Wireless Compare Products and Services” website and see a
features chart for indoor and outdoor wireless access points and controller devices.
After reviewing the chart, you note there is some terminology with which you are
unfamiliar:
Q Federal Information Processing Standard (FIPS)
Q MIMO
Q Cisco CleanAir Technology
Q Cisco FlexConnect
Q Band Select
Research these terms. Prepare a chart with your company’s most important require-
ments listed for purchasing the indoor and outdoor wireless access points and
wireless controller. This chart will assist in validating your purchase order to your
accounting manager and CEO.
WLANs are often implemented in homes, offices, and campus environments. Only
the 2.4-GHz, 5.0-GHz, and 60-GHz frequencies are used for 802.11 WLANs. The
ITU-R regulates the allocation of the RF spectrum, while the IEEE provides the
802.11 standards to define how these frequencies are used for the physical and
MAC sublayer of wireless networks. The Wi-Fi Alliance certifies that vendor prod-
ucts conform to industry standards and norms.
A wireless client uses a wireless NIC to connect to an infrastructure device, such as
a wireless router or wireless AP. Wireless clients connect using an SSID. APs can be
Chapter 4: Wireless LANs 233
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 4.0.1.2: Make Mine Wireless
Q Class Activity 4.5.1.1: Inside and Outside Control
Labs
Q Lab 4.1.2.10: Investigating Wireless Implementations
Q Lab 4.4.2.3: Configuring a Wireless Router and Client
234 Scaling Networks Companion Guide
A. 900 MHz
B. 2.4 GHz
C. 5 GHz
D. 60 GHz
5. What type of frames are used for advertising, authenticating, and associating
with a wireless AP?
A. Management
B. Control
C. Data
D. Acknowledgment
6. An IEEE 802.11n network has been configured for mixed mode and has clients
that are using 802.11n and 802.11g radios on the network. The 802.11n clients
are complaining of slower than normal speeds. What is the problem?
A. The access point is failing.
B. This is the normal behavior of a mixed-mode network.
C. The authentication is not allowing roaming.
D. Roaming between access points is disabled.
8. The company handbook states that employees cannot have microwave ovens in
their offices. Instead, all employees must use the microwave ovens located in the
employee cafeteria. What wireless security risk is the company trying to avoid?
A. Interception of data
B. Rogue access points
C. Improperly configured devices
D. Accidental interference
236 Scaling Networks Companion Guide
11. Fill in the blank. Known as “WiGig,” the IEEE 802.11 standard pro-
vides average speeds of up to 7 Gb/s, but will switch to a lower-GHz band when
roaming is employed.
12. Fill in the blank. A network administrator discovers a rogue AP in the network.
The rogue AP is capturing traffic and then forwarding it on to the legitimate AP.
This type of attack is known as a attack.
13. Fill in the blank. What wireless technology is described by each of the following
statements?
is an alternative to cable and DSL that can communicate over
distances up to 50 km.
provides network access within a home with connectivity distances
of up to 300 meters.
is useful in remote areas, but requires a clear line of sight.
uses device pairing to communicate over distances of up to
100 meters.
CHAPTER 5
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the commands to modify the Q What are the process and tools available to
OSPF interface priority to influence DR/ troubleshoot a single-area OSPF network?
BDR election?
Q What is the process to troubleshoot missing
Q What are the commands to configure OSPF route entries in a single-area OSPFv2 routing
to propagate a default route? table?
Q What commands are available to modify Q What is the process to troubleshoot missing
OSPF interface settings to improve network route entries in a single-area OSPFv3 routing
performance? table?
Q What are the commands to configure OSPF
authentication to secure routing updates?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Introduction (5.0.1.1)
OSPF is a popular link-state routing protocol that can be fine-tuned in many ways.
Some of the most common methods of fine-tuning include manipulating the
Designated Router/Backup Designated Router (DR/BDR) election process, propa-
gating default routes, fine-tuning the OSPFv2 and OSPFv3 interfaces, and enabling
authentication.
This chapter of OSPF describes these tuning features, the configuration mode com-
mands to implement these features for both IPv4 and IPv6, and the components and
commands used to troubleshoot OSPFv2 and OSPFv3.
aggregation, LAN redundancy, and wireless LANs are all technologies that provide
or enhance user access to network resources.
Scalable networks also require optimal reachability between sites. Remote network
reachability is provided by routers and Layer 3 switches, which operate in the distri-
bution and core layers, as shown in Figure 5-1.
Routers and Layer 3 switches learn about remote networks in one of two ways:
Q Manually: Remote networks are manually entered into the route table using
static routes.
Q Dynamically: Remote routes are automatically learned using a dynamic routing
protocol such as Enhanced Interior Gateway Routing Protocol (EIGRP) or Open
Shortest Path First (OSPF).
Note
All dynamic routing protocols are capable of advertising and propagating static routes in
their routing updates.
The routers in the topology have a starting configuration, including enabled inter-
face addresses. There is currently no static routing or dynamic routing configured on
any of the routers. All interfaces on Routers R1, R2, and R3 (except the loopback
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 243
on R2) are within the OSPF backbone area. The ISP router is used as the routing
domain’s gateway to the Internet.
Example 5-1 shows the configuration for R1.
The Gigabit Ethernet 0/0 interface is configured to reflect its true bandwidth of
1,000,000 kilobits (that is 1,000,000,000 b/s). Next, from OSPF router configuration
mode, the router ID is assigned, the reference bandwidth is adjusted to account for
fast interfaces, and the three networks attached to R1 are advertised. Notice how the
wildcard mask is used to identify the specific networks.
Example 5-2 shows the configuration for R2.
The Gigabit Ethernet 0/0 interface is configured to reflect its true bandwidth, the
router ID is assigned, the reference bandwidth is adjusted to account for fast inter-
faces, and the three networks attached to R2 are advertised. Notice how the use of
the wildcard mask can be avoided by identifying the actual router interface with a
quad-zero mask. This effectively makes OSPF use the subnet mask assigned to the
router interface as the advertised network mask.
Example 5-3 shows the configuration for R3, which is similar to R1 and R2.
244 Scaling Networks Companion Guide
Notice the informational messages displaying that R3 has established a full neighbor
adjacency with R1 with router ID 1.1.1.1 and R2 with router ID 2.2.2.2. The OSPF
network has converged.
Q show ip protocols: This command provides a quick way to verify vital OSPF
configuration information. This includes the OSPF process ID, the router ID,
networks the router is advertising, the neighbors the router is receiving updates
from, and the default administrative distance, which is 110 for OSPF. Example
5-5 shows the output for R2.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 245
Q show ip ospf: This command is used to display the OSPF process ID and router
ID as well as the OSPF SPF and OSPF area information. Example 5-6 shows the
output for R2.
Q show ip ospf interface: This command provides a detailed list for every OSPF-
enabled interface and is very useful to determine whether the network state-
ments were correctly composed. Example 5-7 shows the output for the Serial
0/0/1 interface on R2.
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:03
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 3/3, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 3.3.3.3
Suppress hello for 0 neighbor(s)
Q show ip ospf interface brief: This command is useful to display a summary and
status of OSPF-enabled interfaces. Example 5-8 shows the output for R2.
From OSPFv3 router configuration mode on R1, the router ID is manually assigned
and the reference bandwidth is adjusted to account for fast interfaces. Next the
interfaces participating in OSPFv3 are configured. The Gigabit Ethernet 0/0 is also
configured to reflect its true bandwidth. Notice how there is no wildcard mask
required when configuring OSPFv3.
Note
Except for the router ID value, the configuration is the same for R2 and R3.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 249
Q show ipv6 protocols: This command provides a quick way to verify vital
OSPFv3 configuration information, including the OSPF process ID, the router
ID, and the interfaces enabled for OSPFv3. Example 5-11 shows the output
for R1.
Q show ipv6 route ospf: This command provides specifics about OSPFv3 routes in
the routing table. Example 5-12 shows the output for R1.
250 Scaling Networks Companion Guide
Q show ipv6 ospf interface brief: This command is useful to display a summary
and status of OSPFv3-enabled interfaces. Example 5-13 shows the output
for R1.
Q Virtual links: Special OSPF network used to interconnect distant OSPF areas to
the backbone area, as shown in Figure 5-10.
A multiaccess network is a network with multiple devices on the same shared media,
which are sharing communications. Ethernet LANs are the most common example of
broadcast multiaccess networks. In broadcast networks, all devices on the network
see all broadcast and multicast frames. They are multiaccess networks because there
can be numerous hosts, printers, routers, and other devices that are all members of
the same network.
The following formula can be used to calculate the number of required adjacencies.
The number of adjacencies required for any number of routers (designated as n) on a
multiaccess network is:
n (n – 1) / 2
Figure 5-11 shows a simple topology of four routers, all of which are attached to the
same multiaccess Ethernet network.
Routers Adjacencies
n n (n – 1) / 2
4 6
5 10
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 255
Routers Adjacencies
10 45
20 190
50 1225
The DR is responsible for forwarding the LSAs from R1 to all other routers. The DR
uses the multicast address 224.0.0.5 (all OSPF routers). The end result is that there
is only one router doing all the flooding of all LSAs in the multiaccess network, as
shown in Figure 5-13.
Note
DR/BDR elections only occur in multiaccess networks and do not occur in point-to-point
networks.
Unlike serial links that only display a state of FULL/-, the state of neighbors in
multiaccess networks can be
Q FULL/DROTHER: This is a DR or BDR router that is fully adjacent with a non-
DR or BDR router. These two neighbors can exchange Hello packets, updates,
queries, replies, and acknowledgments.
Q FULL/DR: The router is fully adjacent with the indicated DR neighbor. These
two neighbors can exchange Hello packets, updates, queries, replies, and
acknowledgments.
260 Scaling Networks Companion Guide
Q FULL/BDR: The router is fully adjacent with the indicated BDR neighbor.
These two neighbors can exchange Hello packets, updates, queries, replies, and
acknowledgments.
Q 2-WAY/DROTHER: The non-DR or BDR router has a neighbor relationship
with another non-DR or BDR router. These two neighbors exchange Hello
packets.
The normal state for an OSPF router is usually FULL. If a router is stuck in another
state, it is an indication that there are problems in forming adjacencies. The only
exception to this is the 2-WAY state, which is normal in a multiaccess broadcast
network.
In multiaccess networks, DROTHERs only form FULL adjacencies with the DR and
BDR. However, DROTHERs will still form a 2-WAY neighbor adjacency with any
DROTHERs that join the network. This means that all DROTHER routers in the
multiaccess network still receive Hello packets from all other DROTHER routers. In
this way, they are aware of all routers in the network. When two DROTHER routers
form a neighbor adjacency, the neighbor state displays as 2-WAY/DROTHER.
The output generated by R1 confirms that R1 has adjacencies with router
Q R2 with router ID 2.2.2.2 is in a FULL state, and the role of R2 is BDR. (1)
Q R3 with router ID 3.3.3.3 is in a FULL state, and the role of R3 is DR. (2)
Note
In an IPv6 network, if there are no IPv4 addresses configured on the router, the router ID
must be manually configured with the router-id rid command; otherwise, OSPFv3 does not
start.
All Ethernet router interfaces have a default priority of 1. As a result, based on the
selection criteria previously listed, the OSPF router ID is used to elect the DR and
BDR. R3, with the highest router ID, becomes the DR, and R2, with the second-
highest router ID, becomes the BDR.
Note
Serial interfaces have default priorities set to 0; therefore, they do not elect DR and BDRs.
The DR and BDR election process takes place as soon as the first router with an
OSPF-enabled interface is active on the multiaccess network. This can happen when
the routers are powered on, or when the OSPF network command for that interface
is configured. The election process only takes a few seconds. If all of the routers on
the multiaccess network have not finished booting, it is possible that a router with a
lower router ID becomes the DR. (This can be a lower-end router that takes less time
to boot.)
If the DR fails, the BDR is automatically promoted to DR. This is the case even if
another DROTHER with a higher priority or router ID is added to the network after
the initial DR/BDR election. However, after a BDR is promoted to DR, a new BDR
election occurs and the DROTHER with the higher priority or router ID is elected as
the new BDR.
Figures 5-21 to 5-24 illustrate various scenarios relating to the DR and BDR election
process.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 263
In Figure 5-21, the current DR (R3) fails; therefore, the preelected BDR (R2) assumes
the role of DR. Subsequently, an election is held to choose a new BDR. Because R1
is the only DROTHER, it is elected as the BDR.
In Figure 5-22, R3 has rejoined the network after several minutes of being unavail-
able. Because the DR and BDR already exist, R3 does not take over either role;
instead, it becomes a DROTHER.
In Figure 5-23, a new router (R4) with a higher router ID is added to the network.
DR (R2) and BDR (R1) retain the DR and BDR roles. R4 automatically becomes a
DROTHER.
264 Scaling Networks Companion Guide
In Figure 5-24, R2 has failed. The BDR (R1) automatically becomes the DR, and an
election process selects R4 as the BDR because it has the higher router ID.
In the multiaccess broadcast topology shown in Figure 5-14, all routers have an
equal OSPF priority because the priority value defaults to 1 for all router interfaces.
Therefore, the router ID is used to determine the DR (R3) and BDR (R2). Changing
the priority value on an interface from 1 to a higher value would enable the router to
become a DR or BDR router during the next election.
If the interface priority is configured after OSPF is enabled, the administrator must
shut down the OSPF process on all routers, and then reenable the OSPF process, to
force a new DR/BDR election.
Example 5-14 shows the commands to change the R1 interface Gigabit 0/0 priority
from 1 to 255 and to change the R3 interface Gigabit 0/0 priority from 1 to 0.
The changes do not automatically take effect because the DR and BDR are already
elected. Therefore, the OSPF election must be negotiated using one of the following
methods:
Q Shut down the router interfaces and then reenable them starting with the DR,
then the BDR, and then all other routers.
Q Reset the OSPF process using the clear ip ospf process privileged EXEC mode
command on all routers.
Assume that the clear ip ospf process privileged EXEC mode command has also
been configured on R2 and R3. Notice the OSPF state information generated.
The output displayed in Example 5-16 confirms that R1 is now the DR with a prior-
ity of 255 and identifies the new neighbor adjacencies of R1.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 267
Interactive
Activity 5.1.2.10: Identify OSPF Network Type Terminology
Graphic Go to the course online to perform this practice activity.
Interactive
Activity 5.1.2.11: Select the Designated Router
Graphic Go to the course online to perform this practice activity.
268 Scaling Networks Companion Guide
Note
In this example, a loopback interface with IP address 209.165.200.225 is used to simulate the
connection to the service provider.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 269
To propagate a default route, the edge router (R2) must be configured with
Q A default static route using the ip route 0.0.0.0 0.0.0.0 {ip-address | exit-intf}
command.
Q The default-information originate router configuration mode command. This
instructs R2 to be the source of the default route information and propagate the
default static route in OSPF updates.
Example 5-17 shows how to configure a fully specified default static route to the
service provider and then propagate that route in the OSPF process.
The output in Example 5-19 verifies that the default route has been propagated
to R1.
Notice that the route source is O*E2, signifying that it was learned using OSPF. The
asterisk identifies this as a good candidate for the default route. The E2 designation
identifies that it is an external route.
External routes are either external type 1 or external type 2. The difference between
the two is in the way the cost (metric) of the route is being calculated. The cost of a
type 2 route is always the external cost, regardless of the interior cost to reach that
route. A type 1 cost is the addition of the external cost and the internal cost used to
reach that route. A type 1 route is always preferred over a type 2 route for the same
destination.
Note
In this example, a loopback interface with the IP address of 2001:DB8:FEED:1::1/64 is used
to simulate the connection to the service provider.
272 Scaling Networks Companion Guide
To propagate a default route, the edge router (R2) must be configured with
Q A default static route using the ipv6 route ::/0 {ipv6-address | exit-intf}
command.
Q The default-information originate router configuration mode command. This
instructs R2 to be the source of the default route information and propagate the
default static route in OSPF updates.
Example 5-20 shows how to configure a fully specified default static route to the
service provider and propagate that route in OSPF.
The output in Example 5-22 verifies that the default route has been propagated to R1.
O 2001:DB8:CAFE:2::/64 [110/648]
via FE80::2, Serial0/0/0
O 2001:DB8:CAFE:3::/64 [110/648]
via FE80::2, Serial0/0/0
O 2001:DB8:CAFE:A002::/64 [110/1294]
via FE80::2, Serial0/0/0
Notice that the route source is OE2, signifying that it was learned using OSPFv3.
The E2 designation identifies that it is an external route. Unlike the IPv4 routing
table, IPv6 does not use the asterisk to signify that the route is a good candidate for
the default route.
In Example 5-25, the show ip ospf neighbor command is used on R1 to verify that
R1 is adjacent to R2 and R3.
Notice in the output that the Dead Time is counting down from 40 seconds. By
default, this value is refreshed every 10 seconds when R1 receives a Hello from the
neighbor.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 275
Note
The default Hello and Dead intervals are based on best practices and should only be altered
in rare situations.
OSPF Hello and Dead intervals can be modified manually using the following inter-
face configuration mode commands:
Q ip ospf hello-interval seconds
Q ip ospf dead-interval seconds
Immediately after changing the Hello interval, the Cisco IOS automatically modifies
the Dead interval to four times the Hello interval. However, it is always good prac-
tice to explicitly modify the timer instead of relying on an automatic IOS feature so
that modifications are documented in the configuration. Therefore, the Dead inter-
val is also manually set to 20 seconds on the R1 Serial 0/0/0 interface.
As displayed by the highlighted OSPFv2 adjacency message in Example 5-26, when
the Dead Timer on R1 expires, R1 and R2 lose adjacency. This is because the values
have only been altered on one side of the serial link between R1 and R2. Recall that
the OSPF Hello and Dead intervals must match between neighbors.
Use the show ip ospf neighbor command on R1 to verify the neighbor adjacencies,
as shown in Example 5-27.
276 Scaling Networks Companion Guide
Notice that the only neighbor listed is the 3.3.3.3 (R3) router and that R1 is no
longer adjacent with the 2.2.2.2 (R2) neighbor. The timers set on Serial 0/0/0 do not
affect the neighbor adjacency with R3.
To restore adjacency between R1 and R2, the R2 Serial 0/0/0 interface Hello interval
is set to 5 seconds, as shown in Example 5-28.
Almost immediately, the IOS displays a message that adjacency has been established
with a state of FULL. Verify the interface intervals using the show ip ospf interface
command, as shown in Example 5-29.
Notice that the Hello time is 5 seconds and that the Dead Time was automatically
set to 20 seconds instead of the default 40 seconds. Remember that the OSPF auto-
matically sets the Dead interval to four times the Hello interval.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 277
Note
Use the no ipv6 ospf hello-interval and no ipv6 ospf dead-interval commands to reset the
intervals to their default.
Refer to the IPv6 topology shown previously in Figure 5-26. Assume that the net-
work has converged using OSPFv3. Example 5-30 shows the commands to modify
the OSPFv3 Hello interval to 5 seconds.
Immediately after changing the Hello interval, the Cisco IOS automatically modifies
the Dead interval to four times the Hello interval. However, as with OSPFv2, it is
always good practice to explicitly modify the timer instead of relying on an auto-
matic IOS feature so that modifications are documented in the configuration. There-
fore, the Dead interval is also manually set to 20 seconds on the R1 Serial 0/0/0
interface.
After the Dead timer on R1 expires, R1 and R2 lose adjacency, as displayed by the
highlighted OSPFv3 adjacency message in Example 5-30, because the values have
only been altered on one side of the serial link between R1 and R2. Recall that the
OSPFv3 Hello and Dead intervals must be equivalent between neighbors.
Use the show ipv6 ospf neighbor command on R1 to verify the neighbor adjacen-
cies, as shown in Example 5-31.
278 Scaling Networks Companion Guide
Notice that R1 is no longer adjacent with the 2.2.2.2 (R2) neighbor. To restore adja-
cency between R1 and R2, the R2 Serial 0/0/0 interface Hello interval is set to 5
seconds, as shown in Example 5-32.
Almost immediately, the IOS displays a message that adjacency has been established
with a state of FULL. Verify the interface intervals using the show ipv6 ospf inter-
face command, as shown in Example 5-33.
Notice that the Hello timer is 5 seconds and that the Dead timer was automatically
set to 20 seconds instead of the default 40 seconds. Remember that the OSPF auto-
matically sets the Dead interval to four times the Hello interval.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 279
For example, in Figure 5-27, an attacker has been able to connect directly to the
link between Routers R1 and R2. The attacker injects false routing information
destined to Router R1 only, indicating that R2 is the preferred destination to the
192.168.10.10/32 host route. Although R1 has a routing table entry to the directly
connected 192.168.10.0/24 network, it adds the injected route to its routing table
because of the longer subnet mask. A route with a longer matching subnet mask
is considered to be superior to a route with a shorter subnet mask. Consequently,
when a router receives a packet, it selects the longer subnet mask, because it is a
more precise route to the destination.
When PC3 sends a packet to PC1 (192.168.10.10/24), R1 does not forward the
packet to the PC1 host. Instead, it routes the packet to Router R2, because the
apparent best path to 192.168.10.10/32 is through R2. When R2 gets the packet,
it looks in its routing table and forwards the packet back to R1, which creates
the loop.
To mitigate against routing protocol attacks, configure OSPF authentication.
2 1
In the figure, R3 uses the MD5 algorithm to generate a signature (sometimes called
a “hash”) and includes it in the authentication field inside the message header for
routing update (1). R1 receives the message and does the same MD5 calculation (2).
R1 then compares the generated signature with the one received from R3 (3). If the
signatures match (4), the routing update is authenticated (5) and will be used by R1
to make routing decisions. If the signatures do not match, R1 discards the message.
Note
RIPv2, EIGRP, OSPF, IS-IS, and BGP all support various forms of MD5 authentication.
OSPFv3 (OSPF for IPv6) does not include any authentication capabilities of its own.
Instead it relies entirely on IPsec to secure communications between neighbors using
the ipv6 ospf authentication ipsec spi interface configuration mode command. This
is beneficial in simplifying the OSPFv3 protocol and standardizing its authentication
mechanism.
Global and per-interface OSPF MD5 authentication can be used on the same router.
However, the interface setting overrides the global setting. MD5 authentication pass-
words do not have to be the same throughout an area; however, they do need to be
the same between neighbors.
For example, assume that all routers in the previous Figure 5-25 have converged
using OSPF and that routing is functioning properly. OSPF authentication will be
implemented on all routers.
Notice the informational messages stating that the OSPF neighbor adjacencies with
R2 and R3 have changed to the Down state, because R2 and R3 have not yet been
configured to support MD5 authentication.
284 Scaling Networks Companion Guide
Again, notice how the OSPF neighbor adjacencies have changed to the Down state.
oob-resync timeout 40
Hello due in 00:00:02
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 2/2, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 2.2.2.2
Suppress hello for 0 neighbor(s)
Message digest authentication enabled
Youngest key id is 1
R1# show ip ospf interface | include Message
Message digest authentication enabled
Message digest authentication enabled
Message digest authentication enabled
R1#
Example 5-37 confirms that the authentication is successful. R1 has received routes
from both R2 and R3.
Overview (5.2.1.1)
OSPF is a popularly implemented routing protocol used in large enterprise networks.
Troubleshooting problems related to the exchange of routing information is one
of the most essential skills for a network professional who is involved in the imple-
mentation and maintenance of large, routed enterprise networks that use OSPF as
the IGP.
Issues with forming OSPF adjacencies include
Q The interfaces are not on the same network.
Q OSPF network types do not match.
Q OSPF Hello or Dead timers do not match.
Q The interface to neighbor is incorrectly configured as passive.
Q There is a missing or incorrect OSPF network command.
Q Authentication is misconfigured.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 287
The following reviews some specific details about the OSPF states:
Down State
Q No Hello packets received = Down.
Q Router sends Hello packets.
Q Transition to Init state.
Init State
Q Hello packets are received from the neighbor.
Q They contain the sending router’s router ID.
Q Transition to Two-Way state.
Two-Way State
Q On Ethernet links, elect a DR and a BDR.
Q Transition to ExStart state.
288 Scaling Networks Companion Guide
ExStart State
Q Negotiate master/slave relationship and DBD packet sequence number.
Q The master initiates the DBD packet exchange.
Exchange State
Q Routers exchange DBD packets.
Q If additional router information is required, transition to Loading; otherwise,
transition to Full.
Loading State
Q LSRs and LSUs are used to gain additional route information.
Q Routes are processed using the SPF algorithm.
Q Transition to the Full state.
Full State
Q Routers have converged.
When troubleshooting OSPF neighbors, be aware that the FULL or 2WAY state is
normal. All other states are transitory; that is, the router should not remain in those
states for extended periods of time.
Maximum path: 4
Routing for Networks:
172.16.1.1 0.0.0.0 area 0
172.16.3.1 0.0.0.0 area 0
192.168.10.5 0.0.0.0 area 0
Passive Interface(s):
GigabitEthernet0/0
Routing Information Sources:
Gateway Distance Last Update
3.3.3.3 110 00:08:35
2.2.2.2 110 00:08:35
Distance: (default is 110)
R1#
Q show ip ospf neighbor (Example 5-39): Used to verify that the router has
formed an adjacency with its neighboring routers. Displays the neighbor router
ID, neighbor priority, OSPF state, Dead timer, neighbor interface IP address,
and interface that the neighbor is accessible through. If the router ID of the
neighboring router is not displayed, or if it does not show as a state of FULL
or 2WAY, the two routers have not formed an OSPF adjacency. If two rout-
ers do not establish adjacency, link-state information will not be exchanged.
Incomplete link-state databases can cause inaccurate SPF trees and routing
tables. Routes to destination networks might not exist or might not be the most
optimum path.
Q show ip ospf interface (Example 5-40): Used to display the OSPF parameters
configured on an interface, such as the OSPF process ID that the interface is
assigned to, the area that the interfaces are in, the cost of the interface, and the
Hello and Dead intervals. Adding the interface name and number to the com-
mand displays output for a specific interface.
290 Scaling Networks Companion Guide
Q show ip ospf (Example 5-41): Used to examine the OSPF process ID and router
ID. Additionally, this command displays the OSPF area information, as well as
the last time the SPF algorithm was calculated.
Incremental-SPF disabled
Minimum LSA interval 5 secs
Minimum LSA arrival 1000 msecs
LSA group pacing timer 240 secs
Interface flood pacing timer 33 msecs
Retransmission pacing timer 66 msecs
Number of external LSA 1. Checksum Sum 0x00A1FF
Number of opaque AS LSA 0. Checksum Sum 0x000000
Number of DCbitless external and opaque AS LSA 0
Number of DoNotAge external and opaque AS LSA 0
Number of areas in this router is 1. 1 normal 0 stub 0 nssa
Number of areas transit capable is 0
External flood list length 0
IETF NSF helper support enabled
Cisco NSF helper support enabled
Reference bandwidth unit is 100 mbps
Area BACKBONE(0)
Number of interfaces in this area is 3
Area has no authentication
SPF algorithm last executed 00:00:36.936 ago
SPF algorithm executed 3 times
Area ranges are
Number of LSA 3. Checksum Sum 0x016D60
Number of opaque link LSA 0. Checksum Sum 0x000000
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
R1#
Q show ip route ospf (Example 5-42): Used to display only the OSPF-learned
routes in the routing table. The output shows that R1 has learned about four
remote networks through OSPF.
When troubleshooting neighbor issues, verify whether the router has established
adjacencies with neighboring routers using the show ip ospf neighbors command. If
there is no adjacency, the routers cannot exchange routes. Verify whether interfaces
are operational and enabled for OSPF using the show ip interface brief and the
show ip ospf interface commands. If the interfaces are operational and enabled for
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 293
OSPF, ensure that interfaces on both routers are configured for the same OSPF area
and the interfaces are not configured as passive interfaces.
If adjacency between two routers is established, verify that there are OSPF routes
in the routing table using the show ip route ospf command. If there are no OSPF
routes, verify that there are no other routing protocols with lower administrative
distances running in the network. Verify whether all the required networks are
advertised into OSPF. Also verify whether an access list is configured on a router
that would filter either incoming or outgoing routing updates.
If all the required routes are in the routing table, but the path that traffic takes is
not correct, verify the OSPF cost on interfaces on the path. Also be careful in cases
where the interfaces are faster than 100 Mb/s, because all interfaces above this
bandwidth have the same OSPF cost by default.
Interactive
Activity 5.2.1.5: Identify the Troubleshooting Command
Graphic Go to the course online to perform this practice activity.
There are multiple reasons why this could be. However, a prerequisite for the
neighbor relationship to form between two routers is OSI Layer 3 connectivity. The
output in Example 5-44 confirms that the S0/0/0 interface is up and active. The suc-
cessful ping also confirms that the R2 serial interface is active.
A successful ping does not mean that an adjacency will form because it is possible to
have overlapping subnets. You still have to verify that interfaces on the connected
devices share the same subnet. If the ping was not successful, check the cabling and
verify that interfaces on connected devices are configured correctly and operational.
For an interface to be enabled for OSPF, a matching network command must be
configured under the OSPF routing process. Active OSPF interfaces can be verified
using the show ip ospf interface command. The output in Example 5-45 verifies that
the Serial 0/0/0 interface is enabled for OSPF. If connected interfaces on two rout-
ers are not enabled for OSPF, the neighbors will not form an adjacency.
Verify the OSPF settings using the show ip protocols command. The output in
Example 5-46 verifies that OSPF is enabled and also lists the networks being adver-
tised as enabled by the network command.
R1#
296 Scaling Networks Companion Guide
If an IP address on an interface falls within a network that has been enabled for
OSPF, the interface will be enabled for OSPF. However, notice that the Serial 0/0/0
interface is listed as passive. Recall that the passive-interface command stops both
outgoing and incoming routing updates because the effect of the command causes
the router to stop sending and receiving Hello packets over an interface. For this
reason, the routers will not become neighbors.
To disable the interface as passive, use the no passive-interface router configuration
mode command, as shown in Example 5-47.
After you disable the passive interface, the routers become adjacent, as indicated by
the automatically generated information message. A quick verification of the rout-
ing table, as shown in Example 5-48, confirms that OSPF is now exchanging routing
information.
Example 5-48 Verify That OSPF Routes Are Now in the R1 Routing Table
Another problem that can arise is when two neighboring routers have mismatched
MTU sizes on their connecting interfaces. The MTU size is the largest network layer
packet that the router will forward out each interface. Routers default to an MTU
size of 1500 bytes. However, this value can be changed for IPv4 packets using the ip
mtu size interface configuration command or the ipv6 mtu size interface command
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 297
for IPv6 packets. If two connecting routers had mismatched MTU values, they
would still attempt to form an adjacency but they would not exchange their LSDBs
and the neighbor relationship would fail.
The output in Example 5-50 verifies the OSPF settings on R3. Notice that R3
only advertises the link between R3 and R2. It does not advertise the R3 LAN
(192.168.1.0/24).
R3#
The configuration in Example 5-52 adds a network command for the R3 LAN. R3
should now advertise the R3 LAN to its OSPF neighbors.
R3# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)# router ospf 10
R3(config-router)# network 192.168.1.0 0.0.0.255 area 0
R3(config-router)# end
R3#
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 299
The output in Example 5-53 verifies that the R3 LAN is now in the routing table
of R1.
Q show ipv6 ospf neighbor (Example 5-55): Used to verify that the router has
formed an adjacency with its neighboring routers. This output displays the
neighbor router ID, the neighbor priority, OSPFv3 state, Dead timer, neighbor
interface ID, and the interface that the neighbor is accessible through. If the
router ID of the neighboring router is not displayed, or if it does not show as
a state of FULL or 2WAY, the two routers have not formed an OSPFv3 adja-
cency. If two routers do not establish adjacency, link-state information will not
be exchanged. Incomplete link-state databases can cause inaccurate SPF trees
and routing tables. Routes to destination networks might not exist, or they
might not be the most optimum paths.
Q show ipv6 ospf interface (Example 5-56): Used to display the OSPFv3 parame-
ters configured on an interface, such as the OSPFv3 process ID that the interface
is assigned to, the area that the interfaces are in and the cost of the interface,
and the Hello and Dead intervals. Adding the interface name and number to the
command displays output for a specific interface.
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 301
Q show ipv6 ospf (Example 5-57): Used to examine the OSPF process ID and
router ID, as well as information about the LSA transmissions.
R1#
Q show ipv6 route ospf (Example 5-58): Used to display only the OSPFv3-learned
routes in the routing table. The output shows that R1 has learned about four
remote networks through OSPFv3.
Q clear ipv6 ospf [ process-id ] process: Used to reset the OSPFv3 neighbor
adjacencies.
The output in Example 5-60 verifies the OSPFv3 settings on R3. Notice that OSPF
is only enabled on the Serial 0/0/1 interface. It appears that it is not enabled on the
G0/0 R3 interface.
Unlike OSPFv2, OSPFv3 does not use the network command. Instead, OSPFv3 is
enabled directly on the interface. The output in Example 5-61 confirms that the R3
interface is not enabled for OSPFv3.
304 Scaling Networks Companion Guide
R3#
The configuration in Example 5-62 enables OSPFv3 on the R3 Gigabit Ethernet 0/0
interface. R3 should now advertise the R3 LAN to its OSPFv3 neighbors.
R3# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)# interface g0/0
R3(config-if)# ipv6 ospf 10 area 0
R3(config-if)# end
R3#
The output in Example 5-63 verifies that the R3 LAN is now in the routing table
of R1.
Summary (5.3)
Class Activity 5.3.1.1: OSPF Troubleshooting Mastery
You have decided to change your routing protocol from RIPv2 to OSPFv2. Your
small- to medium-sized business network topology will not change from its original
physical settings. Use the diagram on the PDF for this activity as your company’s
small- to medium-sized business network design.
Your addressing design is complete and you then configure your routers with IPv4
and VLSM. OSPF has been applied as the routing protocol. However, some routers
are sharing routing information with each other and some are not.
Open the PDF file that accompanies this modeling activity and follow the directions
to complete the activity.
When the steps in the directions are complete, regroup as a class and compare
recorded activity correction times. The group taking the shortest time to find and fix
the configuration error will be declared the winner only after successfully explaining
how they found the error, fixed it, and proved that the topology is now working.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 5.0.1.2: DR and BDR Election
Q Class Activity 5.3.1.1: OSPF Troubleshooting Mastery
Labs
Q Lab 5.1.1.9: Configuring Basic Single-Area OSPFv2
Q Lab 5.1.2.13: Configuring OSPFv2 on a Multiaccess Network
Q Lab 5.1.5.8: Configuring OSPFv2 Advanced Features
Q Lab 5.2.3.3: Troubleshooting Basic Single-Area OSPFv2 and OSPFv3
Q Lab 5.2.3.4: Troubleshooting Advanced Single-Area OSPFv2
2. Refer to the command output in Example 5-64. These four routers are con-
nected together on the same LAN segment. Based on the output shown, which
of these routers will be elected to be the DR for the segment?
A. R1
B. R2
C. R3
D. R4
3. Which command will verify that a router running OSPFv3 has received a redis-
tributed default static route from another OSPFv3 router?
A. show ip route
B. default-information originate
C. redistribute static
D. show ipv6 route
5. Which of the following parameters should match in order for a pair of routers
to form an adjacency when running OSPFv2? (Choose three.)
A. Router ID
B. OSPFv2 type of network
C. OSPFv2 process number
D. Hello timer
E. Interface priority
F. Subnet mask
Chapter 5: Adjust and Troubleshoot Single-Area OSPF 311
7. Refer to the command output in Example 5-66. Which command did an admin-
istrator issue to produce this output?
11. Refer to the command output in Example 5-68. Fill in the blank. Use a number.
12. Fill in the blanks. What OSPF state is described by each of the following
statements?
A router enters the state when it receives hello packets that contain the
router ID of a neighboring device.
Routers enter the state after a DR and BDR are elected.
Routers exchange DBD packets during the state.
This page intentionally left blank
CHAPTER 6
Multiarea OSPF
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q Why is multiarea OSPF used? Q What are the commands to configure
multiarea route summarization in a routed
Q How does multiarea OSPF use link-state
network?
advertisements to maintain routing tables?
Q What are the commands to verify multiarea
Q How does OSPF establish neighbor adjacen-
OSPFv2 operations?
cies in multiarea OSPF?
Q What are the commands to configure
multiarea OSPFv2 in a routed network?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Introduction (6.0.1.1)
Multiarea OSPF is used to divide a large OSPF network. Having too many routers in
one area increases the load on the CPU and creates a large link-state database. In this
chapter, directions are provided to effectively partition a large single area into mul-
tiple areas. Area 0 used in a single-area OSPF is known as the backbone area.
Discussion is focused on the LSAs exchanged between areas. In addition, activities
for configuring OSPFv2 and OSPFv3 are provided. The chapter concludes with the
show commands used to verify OSPF configurations.
Q Large link-state database (LSDB): Because the LSDB covers the topology of
the entire network, each router must maintain an entry for every network in the
area, even if not every route is selected for the routing table.
Q Frequent SPF algorithm calculations: In a large network, changes are inevitable,
so the routers spend many CPU cycles recalculating the SPF algorithm and
updating the routing table.
To make OSPF more efficient and scalable, OSPF supports hierarchical routing using
areas. An OSPF area is a group of routers that share the same link-state information
in their link-state databases.
In Figure 6-3, assume that a link fails between two internal routers in area 51.
Only the routers in area 51 exchange LSAs and rerun the SPF algorithm for this
event. R1 does not receive LSAs from area 51 and does not recalculate the SPF
algorithm.
Note
A regular area can have a number of subtypes, including a standard area, stub area, totally
stubby area, and not-so-stubby area (NSSA). Stub, totally stubby, and NSSAs are beyond the
scope of this chapter.
320 Scaling Networks Companion Guide
OSPF enforces this rigid two-layer area hierarchy. The underlying physical connec-
tivity of the network must map to the two-layer area structure, with all nonbackbone
areas attaching directly to area 0. All traffic moving from one area to another area
must traverse the backbone area. This traffic is referred to as interarea traffic.
The optimal number of routers per area varies based on factors such as network
stability, but Cisco recommends the following guidelines:
Q An area should have no more than 50 routers.
Q A router should not be in more than three areas.
Q Any single router should not have more than 60 neighbors.
Interactive
Activity 6.1.1.5: Identify the Multiarea OSPF Terminology
Graphic Go to the course online to perform this practice activity.
1 Router LSA
2 Network LSA
5 AS External LSA
Each router link is defined as an LSA type. The LSA includes a link ID field that
identifies, by network number and mask, the object to which the link connects.
Depending on the type, the link ID has different meanings. LSAs differ on how they
are generated and propagated within the routing domain.
Note
OSPFv3 includes additional LSA types.
All routers advertise their directly connected OSPF-enabled links in a type 1 LSA
and forward their network information to OSPF neighbors. The LSA contains a list
of the directly connected interfaces, link types, and link states.
Type 1 LSA features are as follows:
Q All routers generate type 1 LSAs.
Q Type 1 LSAs include a list of directly connected network prefixes and
link types.
Q A type 1 LSA link-state ID is identified by the router ID of the originating
router.
Q Type 1 LSAs are also referred to as router link entries.
Q Type 1 LSAs are flooded only within the area in which they originated. ABRs
subsequently advertise the networks learned from the type 1 LSAs to other areas
as type 3 LSAs.
An LSA Type 2 only exists for multiaccess and nonbroadcast multiaccess (NBMA)
networks where there is a DR elected and at least two routers on the multiaccess
segment. The type 2 LSA contains the router ID and IP address of the DR, along
with the router ID of all other routers on the multiaccess segment. A type 2 LSA is
created for every multiaccess network in the area.
324 Scaling Networks Companion Guide
The purpose of a type 2 LSA is to give other routers information about multiaccess
networks within the same area.
The DR floods type 2 LSAs only within the area in which they originated. Type 2
LSAs are not forwarded outside of an area.
Type 2 LSAs are also referred to as network link entries.
As shown in the figure, ABR1 is the DR for the Ethernet network in area 1. It gener-
ates the type 2 LSA and forwards it into area 1. ABR2 is the DR for the multiaccess
network in area 0. There are no multiaccess networks in area 2, and therefore no
type 2 LSAs are ever propagated in that area.
The link-state ID for a network LSA is the IP interface address of the DR that
advertises it.
LSA Type 3 is used by an ABR to advertise networks from other areas. ABRs collect
type 1 LSAs in the LSDB. After an OSPF area has converged, the ABR creates a type
3 LSA for each of its learned OSPF networks. Therefore, an ABR with many OSPF
routes must create type 3 LSAs for each network.
As shown in the figure, ABR1 and ABR2 flood type 3 LSAs from one area to other
areas. The ABRs propagate the type 3 LSAs into other areas. In a large OSPF deploy-
ment with many networks, propagating type 3 LSAs can cause significant flooding
problems. For this reason, it is strongly recommended that manual route summariza-
tion be configured on the ABR.
Chapter 6: Multiarea OSPF 325
The link-state ID is set to the network number and the mask is also advertised.
Receiving a type 3 LSA into its area does not cause a router to run the SPF algo-
rithm. The routes being advertised in the type 3 LSAs are appropriately added to or
deleted from the router’s routing table, but a full SPF calculation is not necessary.
LSA Type 4 and LSA Type 5 are used collectively to identify an ASBR and advertise
external networks into an OSPF routing domain.
A type 4 summary LSA is generated by an ABR only when an ASBR exists within
an area. A type 4 LSA identifies the ASBR and provides a route to it. All traffic des-
tined to an external autonomous system requires routing table knowledge of the
ASBR that originated the external routes.
As shown in the figure, the ASBR sends a type 1 LSA, identifying itself as an ASBR.
The LSA includes a special bit known as the external bit (e bit) that is used to iden-
tify the router as an ASBR. When ABR1 receives the type 1 LSA, it notices the e
bit, it builds a type 4 LSA, and then floods the type 4 LSA to the backbone (area 0).
Subsequent ABRs flood the type 4 LSA into other areas.
The link-state ID is set to the ASBR router ID.
326 Scaling Networks Companion Guide
Type 5 external LSAs describe routes to networks outside the OSPF autonomous
system. Type 5 LSAs are originated by the ASBR and are flooded to the entire
autonomous system.
Type 5 LSAs are also referred to as autonomous system external LSA entries.
In the figure, the ASBR generates type 5 LSAs for each of its external routes and
floods them into the area. Subsequent ABRs also flood the type 5 LSA into other
areas. Routers in other areas use the information from the type 4 LSA to reach the
external routes.
In a large OSPF deployment with many networks, propagating multiple type 5 LSAs
can cause significant flooding problems. For this reason, it is strongly recommended
that manual route summarization be configured on the ASBR.
The link-state ID is the external network number.
Interactive
Activity 6.1.2.7: Identify the OSPF LSA Type
Graphic Go to the course online to perform this practice activity.
OSPF routes in an IPv4 routing table are identified using the following descriptors:
Q O: Router (type 1) and network (type 2) LSAs describe the details within an area.
The routing table reflects this link-state information with a designation of O,
meaning that the route is intra-area.
Q O IA: When an ABR receives summary LSAs, it adds them to its LSDB and
regenerates them into the local area. When an ABR receives external LSAs, it
adds them to its LSDB and floods them into the area. The internal routers then
assimilate the information into their databases. Summary LSAs appear in the
routing table as IA (interarea routes).
Q O E1 or O E2: External LSAs appear in the routing table marked as external
type 1 (E1) or external type 2 (E2) routes.
Figure 6-12 displays an IPv6 routing table with OSPF router, interarea, and external
routing table entries.
328 Scaling Networks Companion Guide
In the figure, the order in which the best paths are calculated is as follows:
1. All routers calculate the best paths to destinations within their area (intra-area)
and add these entries to the routing table. These are the type 1 and type 2 LSAs,
which are noted in the routing table with a routing designator of O. (1)
2. All routers calculate the best paths to the other areas within the internetwork.
These best paths are the interarea route entries, or type 3 and type 4 LSAs, and
are noted with a routing designator of O IA. (2)
3. All routers (except those that are in a form of stub area) calculate the best paths
to the external autonomous system (type 5) destinations. These are noted with
either an O*E1 or an O*E2 route designator, depending on the configuration. (3)
When converged, a router can communicate with any network within or outside the
OSPF autonomous system.
Interactive
Activity 6.1.3.3: Order the Steps for OSPF Best Path Calculations
Graphic Go to the course online to perform this practice activity.
Step 2. Define the OSPF parameters. Based on information gathered during Step
1, the network administrator must determine if single-area or multiarea
OSPF is the preferred implementation. If multiarea OSPF is selected,
there are several considerations the network administrator must take into
account while determining the OSPF parameters:
Q IP addressing plan: This governs how OSPF can be deployed and how
well the OSPF deployment might scale. A detailed IP addressing plan,
along with the IP subnetting information, must be created. A good IP
addressing plan should enable the usage of OSPF multiarea design and
summarization. This plan more easily scales the network, as well as opti-
mizes OSPF behavior and the propagation of LSAs.
Q OSPF areas: Dividing an OSPF network into areas decreases the LSDB
size and limits the propagation of link-state updates when the topology
changes. The routers that are to be ABRs and ASBRs must be identified,
as are those that are to perform any summarization or redistribution.
Q Network topology: This consists of links that connect the network
equipment and belong to different OSPF areas in a multiarea OSPF
design. Network topology is important to determine primary and
backup links. Primary and backup links are defined by the changing
OSPF cost on interfaces. A detailed network topology plan should also
be used to determine the different OSPF areas, ABR, and ASBR, as well
as summarization and redistribution points, if multiarea OSPF is used.
Step 3. Configure the multiarea OSPF implementation based on the parameters.
Step 4. Verify the multiarea OSPF implementation based on the parameters.
There are no special commands required to implement this multiarea OSPF network.
A router simply becomes an ABR when it has two network statements in different
areas.
Chapter 6: Multiarea OSPF 331
As shown in Example 6-1, R1 is assigned the router ID 1.1.1.1. This example enables
OSPF on the two LAN interfaces in area 1. The serial interface is configured as part
of OSPF area 0. Because R1 has interfaces connected to two different areas, it is
an ABR.
R3(config)#router ospf 10
R3(config-router)# router-id 3.3.3.3
R3(config-router)# network 192.168.10.6 0.0.0.0 area 0
R3(config-router)# network 192.168.1.1 0.0.0.0 area 2
R3(config-router)# network 192.168.2.1 0.0.0.0 area 2
R3(config-router)# end
*Apr 19 18:12:55.881: %OSPF-5-ADJCHG: Process 10, Nbr 2.2.2.2 on Serial0/0/1 from
LOADING to FULL, Loading Done
R3#
In the example, the configuration for R2 uses the wildcard mask of the interface
network address. Notice the informational messages informing of the adjacencies
with R1 (1.1.1.1). The configuration for R3 uses the 0.0.0.0 wildcard mask for all
networks. Notice the informational messages informing of an adjacency with R2
(2.2.2.2). Also notice how the IP addressing scheme used for the router ID makes it
easy to identify the neighbor.
Note
The inverse wildcard masks used to configure R2 and R3 purposely differ to demonstrate the
two alternatives to entering network statements. The method used for R3 is simpler because
the wildcard mask is always 0.0.0.0 and does not need to be calculated.
Notice that the configuration for R2 and R3 begins with the ipv6 router ospf com-
mand. Because a router ID in the IPv4 address format is required for OSPFv3, the
router needs one explicitly configured before the OSPFv3 process can be started.
Instead of forwarding individual LSAs for each route in area 1, R1 forwards a sum-
mary LSA to the core Router C1. C1 in turn, forwards the summary LSA to R2 and
R3. R2 and R3 then forward it to their respective internal routers.
Summarization also helps increase the network’s stability, because it reduces unnec-
essary LSA flooding. This directly affects the amount of bandwidth, CPU, and
memory resources consumed by the OSPF routing process. Without route summari-
zation, every specific-link LSA is propagated into the OSPF backbone and beyond,
causing unnecessary network traffic and router overhead.
In Figure 6-17, a network link on R1a fails.
R1a sends an LSA to R1. However, R1 does not propagate the update, because it
has a summary route configured. Specific-link LSA flooding outside the area does
not occur.
336 Scaling Networks Companion Guide
Note
External route summarization is configured on ASBRs using the summary-address address
mask router configuration mode command.
Note
An ABR can only summarize routes that are within the areas connected to the ABR.
In the following examples, the routing tables of R1 and R3 are examined to see the
effect of the summarization.
Example 6-3 displays the R1 routing table before summarization is configured.
Notice how R3 currently has two interarea entries to the R1 area 1 networks.
Step 3. Copy the matching bits and then add zero bits to determine the summa-
rized network address. In this example, the matching bits with zeros at
the end result in a network address of 10.1.0.0/22. This summary address
summarizes four networks: 10.1.0.0/24, 10.1.1.0/24, 10.1.2.0/24, and
10.1.3.0/24.
In Figure 6-21, the summary address matches four networks, although only two
networks exist.
them into a different area, through the backbone as type 3 summary LSAs. The sum-
marized route 10.1.0.0/22 actually summarizes four network addresses, 10.1.0.0/24
to 10.1.3.0/24.
Note
In OSPFv3, the command is identical except for the IPv6 network address. The command
syntax for OSPFv3 is area area-id range prefix/prefix-length.
Notice how a new entry has appeared with a Null0 exit interface. The Cisco IOS
automatically creates a bogus summary route to the Null0 interface when manual
summarization is configured to prevent routing loops. A packet sent to a null inter-
face is dropped.
For example, assume that R1 received a packet destined for 10.1.0.10. Although it
would match the R1 summary route, R1 does not have a valid route in area 1. There-
fore, R1 would refer to the routing table for the next longest match, which would
be the Null0 entry. The packet would get forwarded to the Null0 interface and
dropped. This prevents the router from forwarding the packet to a default route and
possibly creating a routing loop.
Example 6-7 displays the updated R3 routing table.
Notice how there is now only one interarea entry going to the summary route
10.1.0.0/22. Although this example only reduced the routing table by one entry,
summarization could be implemented to summarize many networks. This would
reduce the size of routing tables.
The internal routes in area 2 can also be summarized on R3, as shown in Example 6-8.
Note
For the equivalent OSPFv3 command, simply substitute ip with ipv6.
R1#
344 Scaling Networks Companion Guide
Notice that the command shows that there are two areas. The “Routing for Net-
works” section identifies the networks and their respective areas.
Use the show ip ospf interface brief command to display concise OSPF-related
information of OSPF-enabled interfaces. This command reveals useful information,
such as the OSPF process ID that the interface is assigned to, the area that the inter-
faces are in, and the cost of the interface.
Example 6-10 verifies the OSPF-enabled interfaces and the areas to which they
belong.
Example 6-11 shows the same verification commands for R2 and R3.
Notice how the O IA entries in the routing table identify networks learned from
other areas. Specifically, O represents OSPF routes, and IA represents interarea,
which means that the route originated from another area. Recall that R1 is in area
0, and the 192.168.1.0 and 192.168.2.0 subnets are connected to R3 in area 2. The
[110/1295] entry in the routing table represents the administrative distance that is
assigned to OSPF (110) and the total cost of the routes (cost of 1295).
Example 6-13 shows the OSPF routes for R2 and R3.
Notice that R1 has entries for area 0 and area 1, because ABRs must maintain a sepa-
rate LSDB for each area to which they belong. In the output, “Router Link States”
in area 0 identifies three routers. The “Summary Net Link States” section identifies
networks learned from other areas and which neighbor advertised the network.
Example 6-15 shows the LSDB for R2 and R3 using the show ip ospf database
command.
348 Scaling Networks Companion Guide
R2 only has interfaces in area 0; therefore, only one LSDB is required. Like R1, R3
contains two LSDBs.
Notice that the command confirms that there are now two areas. It also identifies
each interface enabled for the respective area.
350 Scaling Networks Companion Guide
Example 6-17 verifies the OSPFv3-enabled interfaces and the area to which they
belong.
Notice how the IPv6 routing table displays OI entries in the routing table to identify
networks learned from other areas. Specifically, O represents OSPF routes and I
represents interarea, which means that the route originated from another area. Recall
that R1 is in area 0, and the 2001:DB8:CAFE3::/64 subnet is connected to R3 in
area 2. The [110/1295] entry in the routing table represents the administrative dis-
tance that is assigned to OSPF (110) and the total cost of the routes (cost of 1295).
Example 6-19 displays the contents of the LSDB of R1.
Chapter 6: Multiarea OSPF 351
The command offers similar information to its OSPFv2 counterpart. However, the
OSPFv3 LSDB contains additional LSA types not available in OSPFv2.
Summary (6.3)
Class Activity 6.3.1.1: Digital Trolleys
Your city has an aging digital trolley system based on a one-area design. All commu-
nications within this one area are taking longer to process as trolleys are being added
to routes serving the population of your growing city. Trolley departures and arrivals
are also taking a little longer, because each trolley must check large routing tables to
determine where to pick up and deliver residents from their source and destination
streets.
A concerned citizen has come up with the idea of dividing the city into different
areas for a more efficient way to determine trolley routing information. It is thought
that if the trolley maps are smaller, the system might be improved because of faster
and smaller updates to the routing tables.
Your city board approves and implements the new area-based, digital trolley system.
But to ensure that the new area routes are more efficient, the city board needs data
to show the results at the next open board meeting.
Complete the directions found in the PDF for this activity. Share your answers with
your class.
OSPF routes in an IPv4 routing table are identified using the following descriptors:
O, O IA, O*E1, or O*E2. Each router uses the SPF algorithm against the LSDB to
build the SPF tree. The SPF tree is used to determine the best paths.
There are no special commands required to implement a multiarea OSPF network.
A router simply becomes an ABR when it has two network statements in different
areas.
Example 6-20 shows a multiarea OSPF configuration.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 6.0.1.2: Leaving on a Jet Plane
Q Class Activity 6.3.1.1: Digital Trolleys
Labs
Q Lab 6.2.3.8: Configuring Multiarea OSPFv2
Q Lab 6.2.3.9: Configuring Multiarea OSPFv3
Q Lab 6.2.3.10: Troubleshooting Multiarea OSPFv2 and OSPFv3
2. With multiarea OSPF, which OSPF router type has all interfaces in the
same area?
A. Edge router
B. Internal router
C. Autonomous System Boundary Router
D. Area Border Router
4. What is the correct order of statements for calculating the best path in an
OSPF network?
A. All routers calculate the best path to other areas within the internetwork.
B. All routers calculate the best path to destinations within their area.
C. All routers calculate the best path to the external autonomous system
destinations.
A. B, C, A
B. B, A, C
C. A, B, C
6. Refer to Example 6-21. Why are some of the entries marked O IA?
<output omitted>
7. Which type of routing table entry would indicate that an external route was
redistributed into the multiarea OSPF process?
A. S
B. C
C. O
D. O IA
E. O*E2
Chapter 6: Multiarea OSPF 359
10. A router has six networks that are connected to it with network IDs of
192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24, 192.168.4.0/24,
and 192.168.5.0/24. After summarization of these six networks, how many LSAs
would be sent to advertise the summary route or routes?
A. One
B. Two
C. Three
D. Four
E. Five
F. Six
12. Fill in the blank. What OSPF LSA type is described by each of the following
statements?
LSA type identifies the ASBR and provides a route to it.
LSA type is used to advertise external (non-OSPF) network addresses.
LSA type identifies the routers and network address of the multiaccess
link.
LSA type includes a list of directly attached network prefixes and link
type.
LSA type is used by ABRs to advertise networks from other areas.
CHAPTER 7
EIGRP
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the basic features of EIGRP? Q What is the purpose of the metrics used by
EIGRP?
Q What types of packets are used to establish
and maintain an EIGRP neighbor adjacency? Q How does DUAL operate and use the
topology table?
Q How are EIGRP messages encapsulated?
Q What events trigger EIGRP updates?
Q What are the commands to configure EIGRP
for IPv4 in a small routed network? Q What are the differences between the char-
acteristics and operation of EIGRP for IPv4
Q What are the commands to verify an EIGRP
and EIGRP for IPv6?
for IPv4 implementation in a small routed
network? Q What are the commands to configure EIGRP
for IPv6 in a small routed network?
Q How are neighbor adjacencies formed using
EIGRP? Q What are the commands to verify an EIGRP
for IPv6 implementation in a small routed
network?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Feasible Successor (FS) page 413 Feasible Condition (FC) page 413
Reported Distance (RD) page 413 Finite State Machine (FSM) page 414
Advertised Distance (AD) page 413
Chapter 7: EIGRP 363
Introduction (7.0.1.1)
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vec-
tor routing protocol developed by Cisco Systems. As the name suggests, EIGRP is
an enhancement of another Cisco routing protocol, IGRP (Interior Gateway Routing
Protocol). IGRP is an older classful, distance vector routing protocol, now obsolete
since IOS Release 12.3.
EIGRP is a distance vector routing protocol that includes features found in link-state
routing protocols. EIGRP is suited for many different topologies and media. In a
well-designed network, EIGRP can scale to include multiple topologies and can pro-
vide extremely quick convergence times with minimal network traffic.
This chapter introduces EIGRP and provides basic configuration commands to
enable it on a Cisco IOS router. It also explores the operation of the routing proto-
col and provides more detail on how EIGRP determines best path.
Note
The term hybrid routing protocol is used in some older documentation to define EIGRP.
However, this term is misleading because EIGRP is not a hybrid between distance vector and
link-state routing protocols. EIGRP is solely a distance vector routing protocol; therefore,
Cisco no longer uses this term to refer to it.
PDMs are responsible for the specific routing tasks for each network layer protocol,
including
Q Maintaining the neighbor and topology tables of EIGRP routers that belong to
that protocol suite
Q Building and translating protocol-specific packets for DUAL
Q Interfacing DUAL to the protocol-specific routing table
Q Computing the metric and passing this information to DUAL
Q Implementing filtering and access lists
Q Performing redistribution functions to and from other routing protocols
Q Redistributing routes that are learned by other routing protocols
When a router discovers a new neighbor, it records the neighbor’s address and
interface as an entry in the neighbor table. One neighbor table exists for each pro-
tocol-dependent module, such as IPv4. EIGRP also maintains a topology table. The
topology table contains all destinations that are advertised by neighboring routers.
There is also a separate topology table for each PDM.
Chapter 7: EIGRP 367
Although “reliable” is part of its name, RTP includes both reliable delivery and unre-
liable delivery of EIGRP packets, similar to TCP and UDP, respectively. Reliable
RTP requires an acknowledgment to be returned by the receiver to the sender. An
unreliable RTP packet does not require an acknowledgment. For example, an EIGRP
update packet is sent reliably over RTP and requires an acknowledgment. An EIGRP
Hello packet is also sent over RTP, but unreliably. This means that EIGRP Hello
packets do not require an acknowledgment.
RTP can send EIGRP packets as unicast or multicast.
Q Multicast EIGRP packets for IPv4 use the reserved IPv4 multicast address
224.0.0.10.
Q Multicast EIGRP packets for IPv6 are sent to the reserved IPv6 multicast address
FF02::A.
368 Scaling Networks Companion Guide
Authentication (7.1.1.4)
RIPv2, EIGRP, OSPF, IS-IS, and BGP can each be configured to authenticate their
routing information.
It is a good practice to authenticate transmitted routing information. Doing so
ensures that routers only accept routing information from other routers that have
been configured with the same password or authentication information.
Note
Authentication does not encrypt the EIGRP routing updates.
Hello packets: Used for neighbor discovery and to maintain neighbor adjacencies.
Q Sent with unreliable delivery
Q Multicast (on most network types)
Figure 7-4 shows that EIGRP messages are typically encapsulated in IPv4 or IPv6
packets.
EIGRP for IPv4 messages use IPv4 as the network layer protocol. The IPv4 protocol
field uses 88 to indicate that the data portion of the packet is an EIGRP for IPv4
message. EIGRP for IPv6 messages are encapsulated in IPv6 packets using the next
header field of 88. Similar to the protocol field for IPv4, the IPv6 next header field
indicates the type of data carried in the IPv6 packet.
370 Scaling Networks Companion Guide
EIGRP routers discover neighbors and establish adjacencies with neighbor routers
using the Hello packet. On most networks, EIGRP Hello packets are sent as mul-
ticast packets every five seconds. However, on multipoint, nonbroadcast multiple
access (NBMA) networks, such as X.25, Frame Relay, and Asynchronous Transfer
Mode (ATM) interfaces with access links of T1 (1.544 Mb/s) or slower, Hello pack-
ets are sent as unicast packets every 60 seconds. The default Hello intervals and hold
timers are shown in Table 7-2.
Table 7-2 Default Hello Intervals and Hold Timers for EIGRP
EIGRP also uses Hello packets to maintain established adjacencies. An EIGRP router
assumes that as long as it receives Hello packets from a neighbor, the neighbor and
its routes remain viable.
EIGRP uses a Hold timer to determine the maximum time the router should wait to
receive the next Hello before declaring that neighbor as unreachable. By default, the
hold time is three times the Hello interval, or 15 seconds on most networks and 180
seconds on low-speed NBMA networks. If the hold time expires, EIGRP declares
the route as down and DUAL searches for a new path by sending out queries.
packets are always sent as an unreliable unicast. Unreliable delivery makes sense;
otherwise, there would be an endless loop of acknowledgments.
In Figure 7-5, R2 has lost connectivity to the LAN attached to its Gigabit Ethernet
interface. R2 immediately sends an update to R1 and R3 noting the downed route.
R1 and R3 respond with an acknowledgment to let R2 know that they have received
the update.
Note
Some documentation refers to the Hello and Acknowledgment as a single type of EIGRP
packet.
Because queries use reliable delivery, the receiving router must return an EIGRP
acknowledgment. The acknowledgment informs the sender of the query that it has
received the query message. To keep this example simple, acknowledgments were
omitted in the graphic.
Chapter 7: EIGRP 373
Interactive
Activity 7.1.2.5: Identify the EIGRP Packet Type
Graphic Go to the course online to perform this practice activity.
Important fields include the Opcode field and the Autonomous System Number
field. Opcode specifies the EIGRP packet type as follows:
Q Update
Q Query
Q Reply
Q Hello
The autonomous system number specifies the EIGRP routing process. Unlike RIP,
multiple instances of EIGRP can run on a network; the autonomous system number
is used to track each running EIGRP process.
Figure 7-9 shows the EIGRP parameter’s TLV.
The EIGRP parameter’s message includes the weights that EIGRP uses for its com-
posite metric. By default, only bandwidth and delay are weighted. Both are weighted
equally; therefore, the K1 field for bandwidth and the K3 field for delay are both
set to 1. The other K values are set to 0.
The Hold Time is the amount of time the EIGRP neighbor receiving this message
should wait before considering the advertising router to be down.
Figure 7-10 shows the IP Internal Routes TLV.
The IP internal message is used to advertise EIGRP routes within an autonomous
system. Important fields include the metric fields (delay and bandwidth), the subnet
mask field (prefix length), and the destination field.
Delay is calculated as the sum of delays from source to destination in units of 10
microseconds. Bandwidth is the lowest configured bandwidth of any interface along
the route.
376 Scaling Networks Companion Guide
The subnet mask is specified as the prefix length or the number of network bits in
the subnet mask. For example, the prefix length for the subnet mask 255.255.255.0
is 24, because 24 is the number of network bits.
The Destination field stores the address of the destination network. Although
only 24 bits are shown in this figure, this field varies based on the value of the net-
work portion of the 32-bit network address. For example, the network portion of
10.1.0.0/16 is 10.1; therefore, the Destination field stores the first 16 bits. Because
the minimum length of this field is 24 bits, the remainder of the field is padded
with 0s. If a network address is longer than 24 bits (192.168.1.32/27, for example),
the Destination field is extended for another 32 bits (for a total of 56 bits) and the
unused bits are padded with 0s.
Figure 7-11 shows the IP External Routes TLV.
The IP external message is used when external routes are imported into the EIGRP
routing process. In this chapter, we will import or redistribute a default static route
into EIGRP. Notice that the bottom half of the IP External Routes TLV includes all
the fields used by the IP Internal TLV.
Note
The maximum transmission unit (MTU) is not a metric used by EIGRP. The MTU is included
in the routing updates, but it is not used to determine the routing metric.
Chapter 7: EIGRP 377
The routers in the topology have a starting configuration, including addresses on the
interfaces. There is currently no static routing or dynamic routing configured on any
of the routers.
Example 7-1 shows the interface configurations for the three EIGRP routers in the
topology. Only Routers R1, R2, and R3 are part of the EIGRP routing domain. The
ISP router is used as the routing domain’s gateway to the Internet.
to the Internet. In Figure 7-13, companies A, B, C, and D are all under the adminis-
trative control of ISP1. ISP1 presents a common routing policy for all these compa-
nies when advertising routes to ISP2.
The guidelines for the creation, selection, and registration of an autonomous system
are described in RFC 1930. Global autonomous system numbers are assigned by
IANA, the same authority that assigns IP address space. The local regional Inter-
net registry (RIR) is responsible for assigning an autonomous system number to
an entity from its block of assigned autonomous system numbers. Prior to 2007,
autonomous system numbers were 16-bit numbers ranging from 0 to 65,535. Today,
32-bit autonomous system numbers are assigned, increasing the number of available
autonomous system numbers to over 4 billion.
Usually Internet Service Providers (ISPs), Internet backbone providers, and large
institutions connecting to other entities require an autonomous system number.
These ISPs and large institutions use the exterior gateway routing protocol Border
Gateway Protocol (BGP) to propagate routing information. BGP is the only routing
protocol that uses an actual autonomous system number in its configuration.
The vast majority of companies and institutions with IP networks do not need an
autonomous system number, because they are controlled by a larger entity, such as
an ISP. These companies use interior gateway protocols, such as RIP, EIGRP, OSPF,
and IS-IS to route packets within their own networks. They are one of many inde-
pendent and separate networks within the autonomous system of the ISP. The ISP
is responsible for the routing of packets within its autonomous system and between
other autonomous systems.
Chapter 7: EIGRP 381
The autonomous system number used for EIGRP configuration is only significant to
the EIGRP routing domain. It functions as a process ID to help routers keep track of
multiple, running instances of EIGRP. This is required because it is possible to have
more than one instance of EIGRP running on a network. Each instance of EIGRP can
be configured to support and exchange routing updates for different networks.
R1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# router ?
bgp Border Gateway Protocol (BGP)
eigrp Enhanced Interior Gateway Routing Protocol (EIGRP)
isis ISO IS-IS
iso-igrp IGRP for OSI networks
lisp Locator/ID Separation Protocol
mobile Mobile routes
odr On Demand stub Routes
ospf Open Shortest Path First (OSPF)
rip Routing Information Protocol (RIP)
R1(config)# router
The following global configuration mode command is used to enter the router con-
figuration mode for EIGRP and begin the configuration of the EIGRP process:
Router(config)# router eigrp autonomous-system
The autonomous-system argument can be assigned to any 16-bit value between the
number 1 and 65,535. All routers within the EIGRP routing domain must use the
same autonomous system number.
Example 7-3 shows the configuration of the EIGRP process on Routers R1, R2, and
R3. Notice that the prompt changes from a global configuration mode prompt to
router configuration mode.
382 Scaling Networks Companion Guide
In this example, 1 identifies this particular EIGRP process running on this router.
To establish neighbor adjacencies, EIGRP requires all routers in the same routing
domain to be configured with the same autonomous system number, as shown in
Example 7-3.
Note
Both EIGRP and OSPF can support multiple instances of each routing protocol, although this
type of multiple routing protocol implementation is not usually needed or recommended.
The router eigrp autonomous-system command does not start the EIGRP process
itself. The router does not start sending updates. Rather, this command only pro-
vides access to configure the EIGRP settings.
To completely remove the EIGRP routing process from a device, use the no router
eigrp autonomous-system global configuration mode command, which stops the
EIGRP process and removes all existing EIGRP router configurations.
If the network administrator does not explicitly configure a router ID using the
eigrp router-id command, EIGRP generates its own router ID using either a loop-
back or physical IPv4 address. A loopback address is a virtual interface and is auto-
matically in the up state when configured. The interface does not need to be enabled
for EIGRP, meaning that it does not need to be included in one of the EIGRP net-
work commands. However, the interface must be in the up/up state.
Using the criteria previously described, Figure 7-14 shows the default EIGRP router
IDs that are determined by the routers’ highest active IPv4 address.
Note
The eigrp router-id command is used to configure the router ID for EIGRP. Some versions
of IOS will accept the command router-id, without first specifying eigrp. The running config,
however, will display eigrp router-id regardless of which command is used.
Note
The IPv4 address used to indicate the router ID is actually any 32-bit number displayed in
dotted-decimal notation.
The router ID can be configured with any IPv4 address with two exceptions: 0.0.0.0
and 255.255.255.255. The router ID should be a unique 32-bit number in the EIGRP
routing domain; otherwise, routing inconsistencies can occur.
Note
The EIGRP router ID is not changed unless the EIGRP process is removed with the no router
eigrp command or if the router ID is manually configured with the eigrp router-id command.
Chapter 7: EIGRP 385
Example 7-4 shows the configuration of the router ID for the routers in Figure 7-14.
The network command has the same function as in all IGP routing protocols. The
network command in EIGRP
Q Enables any interface on this router that matches the network address in the net-
work router configuration mode command to send and receive EIGRP updates
Q The network of the interfaces is included in EIGRP routing updates.
The ipv4-network-address argument is the classful IPv4 network address for this
interface. Figure 7-15 shows the network commands configured for R1.
Think of a wildcard mask as the inverse of a subnet mask. The inverse of subnet
mask 255.255.255.252 is 0.0.0.3. To calculate the inverse of the subnet mask, sub-
tract the subnet mask from 255.255.255.255 as follows:
255.255.255.255
- 255.255.255.252
---------------
0. 0. 0. 3 Wildcard mask
However, if the subnet mask is used, the IOS converts the command to the wild-
card-mask format within the configuration. This is verified in the show running-
config output in Example 7-6.
Example 7-7 shows the EIGRP configuration for Router R3.
Figure 7-18 shows that R1, R2, and R3 do not have EIGRP neighbors on their
GigabitEthernet 0/0 interfaces. Yet, each router is still sending out a Hello message
every 5 seconds.
The passive-interface router configuration mode command disables the transmission
and receipt of EIGRP Hello packets on these interfaces.
Router(config)# router eigrp as-number
Router(config-router)# passive-interface interface-type interface-number
390 Scaling Networks Companion Guide
R2#
Note
To configure all interfaces as passive, use the passive-interface default command. To dis-
able an interface as passive, use the no passive-interface interface-type interface-number
command.
For each router, you should be able to see the IPv4 address of the adjacent router
and the interface that this router uses to reach that EIGRP neighbor. Using this
topology, each router has two neighbors listed in the neighbor table.
Chapter 7: EIGRP 393
The show ip eigrp neighbors command is very useful for verifying and trouble-
shooting EIGRP. If a neighbor is not listed after adjacencies have been established
with a router’s neighbors, check the local interface to ensure that it is activated with
the show ip interface brief command. If the interface is active, try pinging the IPv4
address of the neighbor. If the ping fails, it means that the neighbor interface is
down and must be activated. If the ping is successful and EIGRP still does not see
the router as a neighbor, examine the following configurations:
Q Are both routers configured with the same EIGRP autonomous system number?
Q Is the directly connected network included in the EIGRP network statements?
Note
Prior to IOS Release 15, EIGRP automatic summarization was enabled by default.
The output from the show ip protocols command is useful in debugging routing
operations. Information in the Routing Information Sources field can help identify
a router suspected of delivering bad routing information. The Routing Information
Sources field lists all the EIGRP routing sources that the Cisco IOS Software uses to
build its IPv4 routing table. For each source, note the following:
Q IPv4 address
Q Administrative distance
Q Time the last update was received from this source
As shown in Table 7-3, EIGRP has a default AD of 90 for internal routes and 170 for
routes imported from an external source, such as default routes.
Connected 0
Static 1
External BGP 20
Internal EIGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
When compared to other IGPs, EIGRP is the most preferred by the Cisco IOS,
because it has the lowest administrative distance. EIGRP has a third AD value of 5,
for summary routes.
396 Scaling Networks Companion Guide
In Example 7-9, the IPv4 routing table is examined using the show ip route
command.
EIGRP routes are denoted in the routing table with a D. The letter D is used to rep-
resent EIGRP because the protocol is based upon the DUAL algorithm.
The show ip route command verifies that routes received by EIGRP neighbors are
installed in the IPv4 routing table. The show ip route command displays the entire
routing table, including remote networks learned dynamically, directly connected,
and static routes. For this reason, it is normally the first command used to check for
convergence. After routing is correctly configured on all routers, the show ip route
command reflects that each router has a full routing table, with a route to each net-
work in the topology.
Notice that R1 has installed routes to three IPv4 remote networks in its IPv4 routing
table:
Q 172.16.2.0/24 network, received from Router R2 on the Serial0/0/0 interface
Q 192.168.1.0/24 network, received from Router R2 on the Serial0/0/1 interface
Q 192.168.10.8/30 network, received from both R2 on the Serial0/0/0 interface
and from R3 on the Serial0/0/1 interface
R1 has two paths to the 192.168.10.8/30 network, because its cost or metric to reach
that network is the same or equal using both routers. These are known as equal-cost
routes. R1 uses both paths to reach this network, which is known as load balancing.
The EIGRP metric is discussed later in this chapter.
For R2 and R3, notice that similar results are displayed, including equal-cost routes.
3. After both routers have exchanged Hellos, the neighbor adjacency is established.
R1 and R2 update their EIGRP neighbor tables, adding the adjacent router as a
neighbor.
2. EIGRP update packets use reliable delivery; therefore, R1 replies with an EIGRP
acknowledgment packet informing R2 that it has received the update.
3. R1 sends an EIGRP update to R2 advertising the routes that it is aware of,
except those learned from R2 (split horizon).
4. R2 receives the EIGRP update from neighbor R1 and adds this information to its
own topology table.
5. R2 responds to R1’s EIGRP update packet with an EIGRP acknowledgment.
Interactive
Activity 7.3.1.4: Identify the Steps in Establishing EIGRP Neighbor Adjacencies
Graphic Go to the course online to perform this practice activity.
Metrics (7.3.2)
Although EIGRP can use five different inputs to calculate a metric, it defaults to
bandwidth and delay.
The following values can be used, but are not recommended, because they typically
result in frequent recalculation of the topology table:
Q Reliability: Represents the worst reliability between the source and destination,
which is based on keepalives.
Q Load: Represents the worst load on a link between the source and destination,
which is computed based on the packet rate and the configured bandwidth of
the interface.
Note
Although the MTU is included in the routing table updates, it is not a routing metric used by
EIGRP.
The formula consists of values K1 to K5, known as EIGRP metric weights. K1 and
K3 represent bandwidth and delay, respectively. K2 represents load, and K4 and K5
represent reliability. By default, K1 and K3 are set to 1, and K2, K4, and K5 are set
404 Scaling Networks Companion Guide
to 0. The result is that only the bandwidth and delay values are used in the computa-
tion of the default composite metric. EIGRP for IPv4 and EIGRP for IPv6 use the
same formula for the composite metric.
The metric calculation method (k values) and the EIGRP autonomous system num-
ber must match between EIGRP neighbors. If they do not match, the routers do not
form an adjacency.
The default k values can be changed with the metric weights router configuration
mode command:
Router(config-router)# metric weights tos k1 k2 k3 k4 k5
Note
Modifying the metric weights value is generally not recommended and is beyond the scope
of this course. However, its relevance is important in establishing neighbor adjacencies. If one
router has modified the metric weights and another router has not, an adjacency does not
form.
Note
Throughout this course, bandwidth is referenced as kb/s. However, router output displays
bandwidth using the Kbit/sec abbreviation. Router output also displays delay as μsec. In this
course, delay is referenced as microseconds.
406 Scaling Networks Companion Guide
The types of serial interfaces and their associated bandwidths might not necessarily
reflect the more common types of connections found in networks today.
Always verify bandwidth with the show interfaces command.
The default value of the bandwidth might or might not reflect the actual physi-
cal bandwidth of the interface. If the actual bandwidth of the link differs from the
default bandwidth value, the bandwidth value should be modified.
Use the following interface configuration mode command to modify the bandwidth
metric:
Router(config-if)# bandwidth kilobits-bandwidth-value
It is important to modify the bandwidth metric on both sides of the link to ensure
proper routing in both directions.
Modifying the bandwidth value does not change the actual bandwidth of the link.
The bandwidth command only modifies the bandwidth metric used by routing pro-
tocols, such as EIGRP and OSPF.
Media Delay
Ethernet 1000
Gigabit Ethernet 10
FDDI 100
56 kbps 20,000
Chapter 7: EIGRP 409
Notice that the default value is 20,000 microseconds for serial interfaces and 10
microseconds for Gigabit Ethernet interfaces.
Use the show interface command to verify the delay value on an interface, as shown
in Example 7-14.
Although an interface with various bandwidths can have the same delay value, by
default, Cisco recommends not modifying the delay parameter, unless the network
administrator has a specific reason to do so.
In other words, by examining the bandwidth and delay values for all the outgoing
interfaces of the route, we can determine the EIGRP metric as follows:
Step 1. Determine the link with the slowest bandwidth. Use that value to calculate
bandwidth (10,000,000/bandwidth).
Step 2. Determine the delay value for each outgoing interface on the way to the
destination. Add the delay values and divide by 10 (sum of delay/10).
Step 3. Add the computed values for bandwidth and delay, and multiply the sum
by 256 to obtain the EIGRP metric.
The routing table output for R2 shows that the route to 192.168.1.0/24 has an
EIGRP metric of 3,012,096.
Bandwidth
EIGRP uses the slowest bandwidth in its metric calculation. The slowest bandwidth
can be determined by examining each interface between R2 and the destination
network 192.168.1.0. The Serial 0/0/1 interface on R2 has a bandwidth of 1024 kb/s.
Chapter 7: EIGRP 411
Delay
The same outgoing interfaces are used to determine the delay value, as shown in
Figure 7-28.
EIGRP uses the sum of all delays to the destination. The Serial 0/0/1 interface
on R2 has a delay of 20,000 microseconds. The Gigabit 0/0 interface on R3 has
a delay of 10 microseconds. The sum of these delays is divided by 10. In the
example, (20,000+10)/10 results in a value of 2001 for the delay portion of the
composite metric.
412 Scaling Networks Companion Guide
Calculate Metric
Use the calculated values for bandwidth and delay in the metric formula. This results
in a metric of 3,012,096, as shown in Figure 7-29.
This value matches the value shown in the routing table for R2.
Interactive
Activity 7.3.2.7: Calculate the EIGRP Metric
Graphic Go to the course online to perform this practice activity.
These terms and concepts are at the center of the loop avoidance mechanism of
DUAL.
The decision process for all route computations is done by the DUAL Finite State
Machine (FSM). An FSM is a workflow model, similar to a flowchart that is com-
prised of the following:
Q A finite number of stages (states)
Q Transitions between those stages
Q Operations
The DUAL FSM tracks all routes; uses EIGRP metrics to select efficient, loop-
free paths; and identifies the routes with the least-cost path to be inserted into the
routing table.
Recomputation of the DUAL algorithm can be processor intensive. EIGRP avoids
recomputation whenever possible by maintaining a list of backup routes that DUAL
has already determined to be loop-free. If the primary route in the routing table
fails, the best backup route is immediately added to the routing table.
A successor is a neighboring router that is used for packet forwarding and is the
least-cost route to the destination network. The IP address of a successor is shown in
a routing table entry right after the word via.
Chapter 7: EIGRP 415
FD is the lowest calculated metric to reach the destination network. FD is the metric
listed in the routing table entry as the second number inside the brackets. As with
other routing protocols, this is also known as the metric for the route.
Examining the routing table for R2 in Figure 7-31, notice that EIGRP’s best path for
the 192.168.1.0/24 network is through Router R3 and that the feasible distance is
3,012,096. This is the metric that was calculated in the previous topic.
R2 uses this information to determine whether R1 meets the FC and, therefore, can
be an FS.
As shown in Figure 7-33, because the RD of R1 (2,170,112) is less than R2’s own FD
(3,012,096), R1 meets the FC.
R2#
The topology table lists all successors and FSs that DUAL has calculated to destina-
tion networks. Only the successor is installed into the IP routing table.
Q P: Route in the passive state. When DUAL is not performing its diffusing com-
putations to determine a path for a network, the route is in a stable mode,
known as the passive state. If DUAL recalculates or searches for a new path,
the route is in an active state and displays an A. All routes in the topology table
should be in the passive state for a stable routing domain.
Q 192.168.1.0/24: Destination network that is also found in the routing table.
Q 1 successors: Displays the number of successors for this network. If there are
multiple equal-cost paths to this network, there are multiple successors.
Q FD is 3012096: FD, the EIGRP metric to reach the destination network. This is
the metric displayed in the IP routing table.
As shown in Figure 7-36, the first subentry in the output shows the successor:
As shown in Figure 7-37, the second subentry shows the FS, R1 (if there is not a
second entry, there are no FSs):
The IP routing table only includes the best path, the successor. To see whether there
are any FSs, we must examine the EIGRP topology table. The topology table in
Figure 7-39 only shows the successor 192.168.10.6, which is R3. There are no FSs.
Interactive
Activity 7.3.3.8: Determine the Feasible Successor
Graphic Go to the course online to perform this practice activity.
An FSM is an abstract machine, not a mechanical device with moving parts. FSMs
define a set of possible states that something can go through, what events cause
those states, and what events result from those states. Designers use FSMs to
describe how a device, computer program, or routing algorithm reacts to a set of
input events.
FSMs are beyond the scope of this course. However, the concept is used to examine
some of the output from EIGRP’s FSM using the debug eigrp fsm command. Use
this command to examine what DUAL does when a route is removed from the rout-
ing table.
424 Scaling Networks Companion Guide
Figure 7-42 EIGRP for IPv4 Topology with Simulated Link Failure
The show ip eigrp topology output for R2 in Figure 7-43 verifies that R3 is the suc-
cessor and R1 is the FS for the 192.168.1.0/24 network.
To understand how DUAL can use an FS when the path using the successor is no
longer available, a link failure is simulated between R2 and R3. Before simulating the
failure, DUAL debugging must be enabled using the debug eigrp fsm command on
R2, as shown in Example 7-16.
A link failure is simulated using the shutdown command on the Serial 0/0/1 inter-
face on R2. The debug output displays the activity generated by DUAL when a link
goes down. R2 must inform all EIGRP neighbors of the lost link, as well as update its
own routing and topology tables. This example only shows selected debug output.
In particular, notice that the DUAL FSM searches for and finds an FS for the route
in the EIGRP topology table.
The FS R1 now becomes the successor and is installed in the routing table as the new
best path to 192.168.1.0/24, as shown in Figure 7-44.
With an FS, this change in the routing table happens almost immediately.
As shown in Figure 7-45, the topology table for R2 now shows R1 as the successor
and there are no new FSs.
If the link between R2 and R3 is made active again, R3 returns as the successor and
R1 once again becomes the FS.
However, R1 does not have R2 listed as an FS, because R2 does not satisfy the FC.
To understand how DUAL searches for a new successor when there is no FS, a link
failure is simulated between R1 and R3.
Before the link failure is simulated, DUAL debugging is enabled with the debug
eigrp fsm command on R1, as shown in Example 7-17.
A link failure is simulated using the shutdown command on the Serial 0/0/1
interface on R1.
When the successor is no longer available and there is no feasible successor, DUAL
puts the route into an active state. DUAL sends EIGRP queries, asking other routers
for a path to the network. Other routers return EIGRP replies, letting the sender of
the EIGRP query know whether they have a path to the requested network. If none
of the EIGRP replies have a path to this network, the sender of the query does not
have a route to this network.
The highlighted debug output in Example 7-17 shows the 192.168.1.0/24 network
put into the active state and EIGRP queries sent to other neighbors. R2 replies with
a path to this network, which becomes the new successor and is installed into the
routing table.
If the sender of the EIGRP queries receives EIGRP replies that include a path to the
requested network, the preferred path is added as the new successor and added to
428 Scaling Networks Companion Guide
the routing table. This process takes longer than if DUAL had an FS in its topology
table and was able to quickly add the new route to the routing table. In Figure 7-47,
notice that R1 has a new route to the 192.168.1.0/24 network. The new EIGRP suc-
cessor is Router R2.
Figure 7-48 shows that the topology table for R1 now has R2 as the successor with
no new FSs.
If the link between R1 and R3 is made active again, R3 returns as the successor.
However, R2 is still not the FS, because it does not meet the FC.
Note
In IPv6, the network address is referred to as the prefix and the subnet mask is called the
prefix length.
EIGRP for IPv4 runs over the IPv4 network layer, communicating with other EIGRP
IPv4 peers, and advertising only IPv4 routes. EIGRP for IPv6 has the same function-
ality as EIGRP for IPv4 but uses IPv6 as the network layer transport, communicating
with EIGRP for IPv6 peers and advertising IPv6 routes.
EIGRP for IPv6 also uses DUAL as the computation engine to guarantee loop-free
paths and backup paths throughout the routing domain.
As with all IPv6 routing protocols, EIGRP for IPv6 has separate processes from its
IPv4 counterpart. The processes and operations are basically the same as in the IPv4
routing protocol; however, they run independently. EIGRP for IPv4 and EIGRP for
IPv6 each have separate EIGRP neighbor tables, EIGRP topology tables, and IP rout-
ing tables, as shown in Figure 7-49. EIGRP for IPv6 is a separate protocol-dependent
module (PDM).
The EIGRP for IPv6 configuration and verification commands are very similar to
those used in EIGRP for IPv4. These commands are described later in this section.
430 Scaling Networks Companion Guide
Figure 7-49 Comparing EIGRP for IPv4 and EIGRP for IPv6
Source and destination IPv4 source address and IPv6 link-local source address
addresses 224.0.0.10 IPv4 multicast and FF02::10 IPv6 multicast
destination address destination address
The following is a detailed explanation of the similarities and differences in the main
features of EIGRP for IPv4 and EIGRP for IPv6:
Q Advertised routes: EIGRP for IPv4 advertises IPv4 networks. EIGRP for IPv6
advertises IPv6 prefixes.
Q Distance vector: Both EIGRP for IPv4 and IPv6 are advanced distance vector
routing protocols. Both protocols use the same administrative distances.
Q Convergence technology: EIGRP for IPv4 and IPv6 both use the DUAL algo-
rithm. Both protocols use the same DUAL techniques and processes, including
successor, FS, FD, and RD.
Q Metric: Both EIGRP for IPv4 and IPv6 use bandwidth, delay, reliability, and
load for their composite metric. Both routing protocols use the same composite
metric and use only bandwidth and delay, by default.
Q Transport protocol: The Reliable Transport Protocol (RTP) is responsible for
guaranteed delivery of EIGRP packets to all neighbors for both protocols,
EIGRP for IPv4 and IPv6.
Q Update messages: Both EIGRP for IPv4 and IPv6 send incremental updates
when the state of a destination changes. The terms partial and bounded are used
when referring to updates for both protocols.
Q Neighbor discovery mechanism: EIGRP for IPv4 and EIGRP for IPv6 use a sim-
ple Hello mechanism to learn about neighboring routers and form adjacencies.
Q Source and destination addresses: EIGRP for IPv4 sends messages to the mul-
ticast address 224.0.0.10. These messages use the source IPv4 address of the
outbound interface. EIGRP for IPv6 sends its messages to the multicast address
FF02::A. EIGRP for IPv6 messages are sourced using the IPv6 link-local address
of the exit interface.
Q Authentication: EIGRP for IPv4 can use either plain text authentication or
Message Digest 5 (MD5) authentication. EIGRP for IPv6 uses MD5.
Q Router ID: Both EIGRP for IPv4 and EIGRP for IPv6 use a 32-bit number for
the EIGRP router ID. The 32-bit router ID is represented in dotted-decimal
notation and is commonly referred to as an IPv4 address. If the EIGRP for IPv6
router has not been configured with an IPv4 address, the eigrp router-id com-
mand must be used to configure a 32-bit router ID. The process for determining
the router ID is the same for both EIGRP for IPv4 and IPv6.
432 Scaling Networks Companion Guide
Note
IPv6 link-local addresses are in the FE80::/10 range. The /10 indicates that the first 10 bits
are 1111 1110 10xx xxxx, which results in the first hextet having a range of 1111 1110 1000
0000 (FE80) to 1111 1110 1011 1111 (FEBF).
Interactive
Activity 7.4.1.4: Compare EIGRPv4 and EIGRPv6
Graphic Go to the course online to perform this practice activity.
Notice the interface bandwidth values from the previous EIGRP for IPv4 configura-
tion. Because EIGRP for IPv4 and IPv6 use the same metrics, modifying the band-
width parameters influences both routing protocols.
A link-local address has a prefix within the range of FE80 to FEBF. When an address
begins with this hextet (16-bit segment), the link-local keyword must follow the
address.
Example 7-19 shows the configuration of a link-local address using the ipv6 address
interface configuration mode command.
Similar to EIGRP for IPv4, the autonomous-system value must be the same on all
routers in the routing domain, as shown in Example 7-20.
Notice in the example that the EIGRP for IPv6 routing process could not be
configured until IPv6 routing was enabled with the ipv6 unicast-routing global
configuration mode command.
Router ID
The eigrp router-id command is used to configure the router ID. EIGRP for IPv6
uses a 32-bit value for the router ID. To obtain that value, EIGRP for IPv6 uses the
same process as EIGRP for IPv4. The eigrp router-id command takes precedence
over any loopback or physical interface IPv4 addresses. If an EIGRP for IPv6 router
does not have any active interfaces with an IPv4 address, the eigrp router-id com-
mand is required.
The router ID should be a unique 32-bit number in the EIGRP for IP routing
domain; otherwise, routing inconsistencies can occur.
Note
The eigrp router-id command is used to configure the router ID for EIGRP. Some versions
of IOS will accept the command router-id, without first specifying eigrp. The running config,
however, will display eigrp router-id, regardless of which command is used.
By default, the EIGRP for IPv6 process is in a shutdown state. The no shutdown
command is required to activate the EIGRP for IPv6 process, as shown in Example
7-20. This command is not required for EIGRP for IPv4. Although EIGRP for IPv6 is
enabled, neighbor adjacencies and routing updates cannot be sent and received until
EIGRP is activated on the appropriate interfaces.
Both the no shutdown command and a router ID are required for the router to form
neighbor adjacencies.
Use the following interface configuration mode command to enable EIGRP for IPv6
on an interface:
Router(config-if)# ipv6 eigrp autonomous-system
The autonomous-system value must be the same as the autonomous system number
used to enable the EIGRP routing process. Similar to the network command used in
EIGRP for IPv4, the ipv6 eigrp interface command
Q Enables the interface to form adjacencies and send or receive EIGRP for IPv6
updates
Q Includes the prefix (network) of this interface in EIGRP for IPv6 routing updates
Example 7-21 shows the configuration to enable EIGRP for IPv6 on the interfaces
for all three routers.
This message indicates that R2 has now formed an EIGRP-IPv6 adjacency with the
neighbor at link-local address FE80::1. Because static link-local addresses were con-
figured on all three routers, it is easy to determine that this adjacency is with Router
R1 (FE80::1).
Example 7-22 Configuring and Verifying EIGRP for IPv6 Passive Interfaces
Interfaces:
Serial0/0/0
Serial0/0/1
GigabitEthernet0/0 (passive)
Redistribution:
None
R1#
440 Scaling Networks Companion Guide
Q Hold: Current hold time. When a Hello packet is received, this value is reset
to the maximum hold time for that interface and then counts down to 0. If 0 is
reached, the neighbor is considered down.
Q Uptime: Amount of time since this neighbor was added to the neighbor table.
Q SRTT and RTO: Used by RTP to manage reliable EIGRP packets.
Q Queue Count: Should always be 0. If it is more than 0, EIGRP packets are
waiting to be sent.
Q Sequence Number: Used to track updates, queries, and reply packets.
The show ipv6 eigrp neighbors command is useful for verifying and troubleshoot-
ing EIGRP for IPv6. If an expected neighbor is not listed, ensure that both ends of
the link are up/up using the show ipv6 interface brief command. The same require-
ments exist for establishing neighbor adjacencies with EIGRP for IPv6 as they do for
IPv4. If both sides of the link have active interfaces, check to see
Q Are both routers configured with the same EIGRP autonomous system number?
Q Is the interface enabled for EIGRP for IPv6 with the correct autonomous system
number?
4. Same as EIGRP for IPv4, EIGRP for IPv6 administrative distances have an inter-
nal AD of 90 and an external AD of 170 (default values).
5. The interfaces are enabled for EIGRP for IPv6.
442 Scaling Networks Companion Guide
The output from the show ipv6 protocols command is useful in debugging routing
operations. The Interfaces section shows on which interfaces EIGRP for IPv6 has
been enabled. This is useful in verifying that EIGRP is enabled on all the appropriate
interfaces with the correct autonomous system number.
Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (7.4.3.3)
As with any routing protocol, the goal is to populate the IP routing table with routes
to remote networks and the best paths to reaching those networks. As with IPv4, it is
important to examine the IPv6 routing table and determine whether it is populated
with the correct routes.
The IPv6 routing table is examined using the show ipv6 route command. EIGRP
for IPv6 routes are denoted in the routing table with a D, similar to its counterpart
for IPv4.
Example 7-23 displays the EIGRP for IPv6 routes on all three routers.
D 2001:DB8:CAFE:2::/64 [90/3524096]
Chapter 7: EIGRP 443
D 2001:DB8:CAFE:1::/64 [90/3524096]
via FE80::3, Serial0/0/1
D 2001:DB8:CAFE:3::/64 [90/3012096]
via FE80::3, Serial0/0/1
D 2001:DB8:CAFE:A003::/64 [90/3523840]
via FE80::3, Serial0/0/1
R2#
D 2001:DB8:CAFE:1::/64 [90/2170112]
via FE80::1, Serial0/0/0
D 2001:DB8:CAFE:2::/64 [90/3012096]
via FE80::2, Serial0/0/1
D 2001:DB8:CAFE:A001::/64 [90/41024000]
via FE80::1, Serial0/0/0
via FE80::2, Serial0/0/1
R3#
The output in Example 7-23 shows that R1 has installed three EIGRP routes to
remote IPv6 networks in its IPv6 routing table:
Q 2001:DB8:CAFE:2::/64 through R3 (FE80::3) using its Serial 0/0/1 interface
Q 2001:DB8:CAFE:3::/64 through R3 (FE80::3) using its Serial 0/0/1 interface
Q 2001:DB8:CAFE:A002::/64 through R3 (FE80::3) using its Serial 0/0/1 interface
All three routes are using Router R3 as the next-hop router (successor). Notice
that the routing table uses the link-local address as the next-hop address.
Because each router has had all its interfaces configured with a unique and dis-
tinguishable link-local address, it is easy to recognize that the next-hop router
through FE80::3 is Router R3. Also, notice that R3 has two equal-cost paths to
444 Scaling Networks Companion Guide
Summary (7.5)
Class Activity 7.5.1.1: Portfolio RIP and EIGRP
You are preparing a portfolio file for comparison of RIP and EIGRP routing
protocols.
Think of a network with three interconnected routers with each router providing a
LAN for PCs, printers, and other end devices. The graphic on this page depicts one
example of a topology like this.
In this modeling activity scenario, you will be creating, addressing, and configuring a
topology, using verification commands, and comparing/contrasting RIP and EIGRP
routing protocol outputs.
Complete the PDF reflection questions accompanying this activity. Save your work
and be prepared to share your answers with the class. Also save a copy of your work
for later use within this course or for portfolio reference.
match for two routers to become neighbors. The show ip eigrp neighbors command
is used to view the neighbor table and verify that EIGRP has established an adja-
cency with its neighbors.
EIGRP does not send periodic updates like RIP. EIGRP sends partial or bounded
updates, which include only the route changes and only to those routers that are
affected by the change. The EIGRP composite metric uses bandwidth, delay, reli-
ability, and load to determine the best path. By default, only bandwidth and delay
are used.
At the center of EIGRP is DUAL (Diffusing Update Algorithm). The DUAL Finite
State Machine is used to determine the best path and potential backup paths to
every destination network. The successor is a neighboring router that is used to for-
ward the packet using the least-cost route to the destination network. Feasible dis-
tance (FD) is the lowest calculated metric to reach the destination network through
the successor. A feasible successor (FS) is a neighbor that has a loop-free backup
path to the same network as the successor, and also meets the feasibility condition.
The feasibility condition (FC) is met when a neighbor’s reported distance (RD) to a
network is less than the local router’s feasible distance to the same destination net-
work. The reported distance is simply an EIGRP neighbor’s feasible distance to the
destination network.
EIGRP is configured with the router eigrp autonomous-system command. The
autonomous-system value is actually a process ID and must be the same on all rout-
ers in the EIGRP routing domain. The network command is similar to that used with
RIP. The network is the classful network address of the directly connected interfaces
on the router. A wildcard mask is an optional parameter that can be used to include
only specific interfaces.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 7.0.1.2: Classless EIGRP
Q Class Activity 7.5.1.1: Portfolio RIP and EIGRP
Chapter 7: EIGRP 447
Labs
Q Lab 7.2.2.5: Configuring Basic EIGRP with IPv4
Q Lab 7.4.3.5: Configuring Basic EIGRP for IPv6
2. Which IPv4 multicast address does an EIGRP-enabled router use to send query
packets?
A. 224.0.0.5
B. 224.0.0.9
C. 224.0.0.12
D. 224.0.0.10
4. In the router eigrp 100 command, what does the value 100 represent?
A. The router ID
B. The metric
C. The autonomous system number
D. The administrative distance
5. What address and wildcard mask can be used to enable EIGRP for only the
subnet 192.168.100.192 255.255.255.192?
A. 192.168.100.192 0.0.0.7
B. 192.168.100.192 0.0.0.15
C. 192.168.100.192 0.0.0.63
D. 192.168.100.192 0.0.0.127
8. Which bandwidth value is used when calculating the EIGRP metric of a route?
A. The fastest bandwidth of all outgoing interfaces between the source and
destination
B. The slowest bandwidth of all outgoing interfaces between the source and
destination
C. The slowest bandwidth of all interfaces on the router
D. The fastest bandwidth of all interfaces on the router
9. Refer to Example 7-25. What does the value 2816 represent in the output
display?
A. Shortest distance
B. Reported distance
C. Feasible distance
D. Administrative distance
11. What operational feature is different for EIGRP for IPv6 compared to EIGRP
for IPv4?
A. Router ID configuration
B. Neighbor discovery mechanisms
C. The source and destination addresses used within the EIGRP messages
D. DUAL algorithm calculations
12. Which address will EIGRP for IPv6 use as the router ID?
14. Fill in the blank. What EIGRP packet type is described by the function?
15. What are the default administrative distances for each of the following types
of EIGRP route?
Internal
External
Summary
This page intentionally left blank
CHAPTER 8
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the commands to configure EIGRP Q What are the commands to configure EIGRP
automatic summarization? authentication to secure routing updates?
Q What are the commands to configure EIGRP Q What processes and tools are available to
manual summarization? troubleshoot an EIGRP network?
Q What are the commands to configure EIGRP Q What are the steps to troubleshoot a neigh-
to propagate a default route? bor adjacency issue in an EIGRP network?
Q What are the commands to configure EIGRP Q What are the steps to troubleshoot missing
interface settings to improve network route entries in an EIGRP routing table?
performance?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Route summarization page 457 Cisco Express Forwarding (CEF) page 484
automatic summarization page 458 unequal-cost load balancing page 485
Null0 page 465 key page 488
quad zero page 474 keychain page 488
equal-cost load balancing page 482
454 Scaling Networks Companion Guide
Introduction (8.0.1.1)
EIGRP is a versatile routing protocol that can be fine-tuned in many ways. Two of
the most important tuning capabilities are the ability to summarize routes and the
ability to implement load balancing. Other tuning capabilities include being able to
propagate a default, fine-tune timers, and implement authentication between EIGRP
neighbors to increase security.
This chapter discusses these additional tuning features and the configuration mode
commands to implement these features for both IPv4 and IPv6.
With a partner, write ten EIGRP review questions based on the previous chapter’s
curriculum content. Three of the questions must focus on the previous bulleted
items. Ideally, Multiple Choice, True/False, or Fill-in-the-Blank question types will
be designed. As you design your questions, ensure that you record the curriculum
section and page numbers of the supporting content in case you need to refer back
for answer verification.
Save your work and then meet with another group, or the entire class, and quiz them
using the questions you developed.
Examples 8-1, 8-2, and 8-3 show the IPv4 interface configurations and the EIGRP
implementations on R1, R2, and R3, respectively.
Example 8-1 Starting IPv4 Interface and EIGRP for IPv4 Configuration for R1
bandwidth 64
ip address 172.16.3.1 255.255.255.252
clock rate 64000
!
interface Serial0/0/1
ip address 192.168.10.5 255.255.255.252
!
router eigrp 1
network 172.16.0.0
network 192.168.10.0
eigrp router-id 1.1.1.1
Example 8-2 Starting IPv4 Interface and EIGRP for IPv4 Configuration for R2
Example 8-3 Starting IPv4 Interface and EIGRP for IPv4 Configuration for R3
!
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
!
interface Serial0/0/0
ip address 192.168.10.6 255.255.255.252
clock rate 64000
!
interface Serial0/0/1
bandwidth 1024
ip address 192.168.10.10 255.255.255.252
!
router eigrp 1
network 192.168.1.0
network 192.168.10.4 0.0.0.3
network 192.168.10.8 0.0.0.3
eigrp router-id 3.3.3.3
The types of serial interfaces and their associated bandwidths might not necessarily
reflect the more common types of connections found in networks today. The band-
widths of the serial links used in this topology help explain the calculation of the
routing protocol metrics and the process of best path selection.
Notice that the bandwidth commands on the serial interfaces were used to modify
the default bandwidth of 1544 kb/s.
In this chapter, the ISP router is used as the routing domain’s gateway to the Inter-
net. All three routers are running Cisco IOS Release 15.2.
Summarization decreases the number of entries in routing updates and reduces the
number of entries in local routing tables. It also reduces bandwidth utilization for
routing updates and results in faster routing table lookups.
To limit the number of routing advertisements and the size of routing tables, routing
protocols such as EIGRP use automatic summarization at classful boundaries. This
means that EIGRP recognizes subnets as a single Class A, B, or C network, and cre-
ates only one entry in the routing table for the summary route. As a result, all traffic
destined for the subnets travels across that one path. Figure 8-2 shows an example
of how automatic summarization works.
Routers R1 and R2 are both configured using EIGRP for IPv4 with automatic sum-
marization. R1 has three subnets in its routing table: 172.16.1.0/24, 172.16.2.0/24,
and 172.16.3.0/24. In the classful network addressing architecture, these subnets
are all considered part of a larger Class B network, 172.16.0.0/16. Because EIGRP
on Router R1 is configured for automatic summarization, when it sends its rout-
ing update to R2, it summarizes the three /24 subnets as a single network of
172.16.0.0/16, which reduces the number of routing updates sent and the number of
entries in R2’s IPv4 routing table.
All traffic destined for the three subnets travels across the one path. R2 does not
maintain routes to individual subnets, and no subnet information is learned. In an
enterprise network, the path chosen to reach the summary route might not be the best
choice for the traffic that is trying to reach each individual subnet. The only way that
all routers can find the best routes for each individual subnet is for neighbors to send
subnet information. In this situation, automatic summarization should be disabled.
When automatic summarization is disabled, updates include subnet information.
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 459
This router is running IOS Release 15.2; therefore, EIGRP automatic summarization
is disabled by default. Example 8-5 shows the current routing table for R3.
Notice that the IPv4 routing table for R3 contains all the networks and subnets
within the EIGRP routing domain.
To enable automatic summarization for EIGRP, use the auto-summary command
in router configuration mode, as shown in Example 8-6, for all three routers in the
topology.
The output from R1’s show ip protocols command in Example 8-7 shows that auto-
matic summarization is now enabled.
The output also indicates the networks that are summarized and on which interfaces.
Notice that R1 summarizes two networks in its EIGRP routing updates:
Q 192.168.10.0/24 sent out the GigabitEthernet 0/0 and Serial 0/0/0 interfaces
Q 172.16.0.0/16 sent out the Serial 0/0/1 interface
R1 has the subnets 192.168.10.4/30 and 192.168.10.8/30 in its IPv4 routing table.
As indicated in Figure 8-3, R1 summarizes the 192.168.10.4/30 and 192.168.10.8/30
subnet.
Example 8-8 shows the output from the show ip eigrp topology all-links command
used to view R3’s complete EIGRP topology table.
This verifies that R3 has received the 172.16.0.0/16 summary route from both R1
at 192.168.10.5 and R2 at 192.168.10.9. The first entry through 192.168.10.5 is the
successor, and the second entry through 192.168.10.9 is the feasible successor. R1
is the successor because its 1544-kb/s link with R3 gives R3 a better EIGRP cost to
172.16.0.0/16 than R2, which is using a slower 1024-kb/s link.
The all-links option shows all received updates, whether the route qualifies as a
feasible successor (FS) or not. In this instance, R2 does qualify as an FS. R2 is con-
sidered an FS because its reported distance (RD) of 2816 is less than the feasible
distance (FD) of 2,170,112 through R1.
464 Scaling Networks Companion Guide
Notice that with automatic summarization enabled, R3’s routing table now only con-
tains the single Class B network address 172.16.0.0/16. The successor or next-hop
router is R1 through 192.168.10.5.
Note
Automatic summarization is only an option with EIGRP for IPv4. Classful addressing does
not exist in IPv6; therefore, there is no need for automatic summarization with EIGRP for
IPv6.
Notice that the two entries highlighted are using an exit interface of Null0. EIGRP
has automatically included a summary route to Null0 for two classful networks
192.168.10.0/24 and 172.16.0.0/16.
The Null0 interface is a virtual IOS interface that is a route to nowhere, commonly
known as “the bit bucket.” Packets that match a route with a Null0 exit interface are
discarded.
EIGRP for IPv4 automatically includes a Null0 summary route whenever the follow-
ing conditions exist:
Q There is at least one subnet that was learned through EIGRP.
Q There are two or more network EIGRP router configuration mode commands.
Q Automatic summarization is enabled.
The purpose of the Null0 summary route is to prevent routing loops for destinations
that are included in the summary, but do not actually exist in the routing table.
Note
The Null0 summary route is removed when auto-summary is disabled using the no
auto-summary router configuration mode command.
Interactive
Activity 8.1.1.9: Determine the Classful Summarization
Graphic Go to the course online to perform this practice activity.
468 Scaling Networks Companion Guide
Interactive
Activity 8.1.1.10: Determine the Exit Interface for a Given Packet
Graphic Go to the course online to perform this practice activity.
Example 8-11 shows the commands on R3 to configure the two loopback interfaces
and the configuration to enable both interfaces for EIGRP.
To verify that R3 sent EIGRP update packets to R1 and R2, the routing tables are
examined on both routers.
In Example 8-12, only the pertinent routes are shown.
These summary routes are sent out of the Serial 0/0/0 and Serial 0/0/1 interfaces to
R3’s EIGRP neighbors.
To determine the summary of these three networks, the same method is used to
determine summary static routes, as shown in Figure 8-10:
The result is the summary network address and mask for 192.168.0.0/22.
These virtual addresses are used to represent physical networks in R3’s IPv6 routing
table. These networks can be manually summarized in EIGRP for IPv6.
Example 8-15 shows the configuration of the IPv6 loopback addresses on R3.
Only four loopback addresses are shown in the topology and configured on R3;
however, for this example, it is assumed that all 2001:DB8:ACAD::/48 subnets can
be reachable through R3.
To configure EIGRP for IPv6 manual summarization on a specific EIGRP interface,
use the following interface configuration mode command:
Router(config-if)# ipv6 summary-address eigrp as-number prefix/prefix-length
Example 8-16 shows the configuration to propagate an EIGRP for IPv6 manual sum-
mary route to R1 and R2 for the 2001:DB8:ACAD::/48 prefix.
Example 8-16 Configuration and Verification of EIGRP for IPv6 Manual Summary Route
Packet Tracer Activity 8.1.2.5: Configuring EIGRP Manual Summary Routes for IPv4
Packet Tracer
Activity and IPv6
In this activity, you will calculate and configure summary routes for the IPv4 and
IPv6 networks. EIGRP is already configured; however, you are required to configure
IPv4 and IPv6 summary routes on the specified interfaces. EIGRP will replace the
current routes with a more specific summary route, thereby reducing the size of the
routing tables.
When the static default route is configured, it is necessary to propagate that route
throughout the EIGRP domain. One method of propagating a static default route
within the EIGRP routing domain is by using the redistribute static command.
The redistribute static command tells EIGRP to include static routes in its EIGRP
updates to other routers. Example 8-18 shows the configuration of the static default
route and the redistribute static command on Router R2.
Example 8-19 verifies that the default route has been received by Router R2 and
installed in its IPv4 routing table.
In the routing tables for R1 and R3, notice the routing source and administrative
distance for the new default route learned using EIGRP. The entry for the EIGRP-
learned default route is identified by the following:
Q D: This route was learned from an EIGRP routing update.
Q *: The route is a candidate for a default route.
Q EX: The route is an external EIGRP route, in this case a static route outside of
the EIGRP routing domain.
Q 170: This is the administrative distance of an external EIGRP route.
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 477
Notice that R1 selects R3 as the successor to the default route because it has a
lower feasible distance. Default routes provide a default path to outside the rout-
ing domain and, like summary routes, minimize the number of entries in the
routing table.
Similar to EIGRP for IPv4, a default static route is configured on the gateway router
(R2), as shown in Example 8-22.
The ::/0 prefix and prefix length are equivalent to the 0.0.0.0 0.0.0.0 address and
subnet mask used in IPv4. Both are all-zero addresses with a /0 prefix length.
The IPv6 default static route is redistributed into the EIGRP for IPv6 domain using
the same redistribute static command used in EIGRP for IPv4.
478 Scaling Networks Companion Guide
Note
Some IOSs might require that the redistribute static command include the EIGRP metric
parameters before the static route can be redistributed.
Notice that the successor or next-hop address is not R2, but R3. This is because R3
provides a better path to R2, at a lower cost metric than R1.
Packet Tracer Activity 8.1.3.4: Propagating a Default Route in EIGRP for IPv4
Packet Tracer
Activity and IPv6
In this activity, you will configure and propagate a default route in EIGRP for IPv4
and IPv6 networks. EIGRP is already configured. However, you are required to
configure an IPv4 and an IPv6 default route. Then, you will configure the EIGRP
routing process to propagate the default route to downstream EIGRP neighbors.
Finally, you will verify the default routes by pinging hosts outside the EIGRP rout-
ing domain.
R2(config-if)#
R2(config)# interface serial 0/0/1
R2(config-if)# ip bandwidth-percent eigrp 1 75
Example 8-25 shows the configuration of the interfaces between R1 and R2 to limit
the bandwidth used by EIGRP for IPv6.
status of its neighbor. The Hold time tells the router the maximum time that the
router should wait to receive the next Hello before declaring that neighbor as
unreachable. The default values are shown in Table 8-1.
Table 8-1 Default Hello Intervals and Hold Times for EIGRP
Hello intervals and Hold times are configurable on a per-interface basis and do not
have to match with other EIGRP routers to establish or maintain adjacencies. The
command to configure a different Hello interval is
Router(config-if)# ip hello-interval eigrp as-number seconds
If the Hello interval is changed, ensure that the Hold time value is equal to, or
greater than, the Hello interval. Otherwise, neighbor adjacency goes down after the
Hold time expires and before the next Hello interval. Use the following command to
configure a different Hold time:
Router(config-if)# ip hold-time eigrp as-number seconds
The seconds value for both Hello and Hold time intervals can range from 1 to
65,535.
Example 8-26 shows the configuration of R1 to use a 50-second Hello interval and
150-second Hold time.
Example 8-26 Configuring EIGRP for IPv4 Hello and Hold Times
The no form can be used on both of these commands to restore the default values.
The Hello interval time and Hold time do not need to match for two routers to form
an EIGRP adjacency.
482 Scaling Networks Companion Guide
Example 8-27 shows the Hello interval and Hold time configurations for R1 and R2
with EIGRP for IPv6.
Example 8-27 Configuring EIGRP for IPv6 Hello and Hold Times
In this topology, R3 has two EIGRP equal-cost routes for the network between R1
and R2, 172.16.3.0/30. One route is through R1 at 192.168.10.4/30, and the other
route is through R2 at 192.168.10.8/30.
The show ip protocols command can be used to verify the number of equal-cost
paths currently configured on the router. The output in Example 8-28 shows that R3
is using the default of four equal-cost paths.
The routing table maintains both routes. Example 8-29 shows that R3 has two
EIGRP equal-cost routes for the 172.16.3.0/30 network.
The value argument refers to the number of paths that should be maintained for
load balancing. If the value is set to 1, load balancing is disabled.
EX ::/0 [170/3011840]
via FE80::2, Serial0/0/1
D 2001:DB8:ACAD::/48 [5/128256]
via Null0, directly connected
D 2001:DB8:CAFE:1::/64 [90/2170112]
via FE80::1, Serial0/0/0
D 2001:DB8:CAFE:2::/64 [90/3012096]
via FE80::2, Serial0/0/1
D 2001:DB8:CAFE:A001::/64 [90/41024000]
via FE80::2, Serial0/0/1
via FE80::1, Serial0/0/0
R3#
A route learned through EIGRP must meet two criteria to be installed in the local
routing table:
Q The route must be loop-free, being either a feasible successor or having a
reported distance that is less than the total distance.
Q The metric of the route must be lower than the metric of the best route (the suc-
cessor) multiplied by the variance configured on the router.
For example, if the variance is set to 1, only routes with the same metric as the suc-
cessor are installed in the local routing table. If the variance is set to 2, any EIGRP-
learned route with a metric less than 2 times the successor metric will be installed in
the local routing table.
To control how traffic is distributed among routes when there are multiple routes
for the same destination network that have different costs, use the traffic-share bal-
anced command. Traffic is then distributed proportionately to the ratio of the costs.
Interactive
Activity 8.1.4.5: Determine the EIGRP Fine-Tuning Commands
Graphic Go to the course online to perform this practice activity.
Generally, the originator of the routing information produces a signature using the
key and routing data it is about to send as inputs to the encryption algorithm. The
router receiving the routing data can then repeat the process using the same key and
the same routing data it has received. If the signature the receiver computes is the
same as the signature the sender computes, the update is authenticated and consid-
ered reliable.
Routing protocols such as RIPv2, EIGRP, OSPF, IS-IS, and BGP all support various
forms of MD5 authentication.
488 Scaling Networks Companion Guide
b. Specify the key ID. The key ID is the number used to identify an
authentication key within a keychain. The range of keys is from 0 to
2,147,483,647. It is recommended that the key number be the same
on all routers in the configuration.
Router(config-keychain)# key key-id
c. Specify the key string for the key. The key string is similar to a pass-
word. Routers exchanging authentication keys must be configured
using the same key string.
Router(config-keychain-key )# key-string key-string-text
Example 8-32 Step 2: Configure EIGRP Authentication Using a Keychain and Key
Each key has its own key ID, which is stored locally. The combination of the key ID
and the interface associated with the message uniquely identifies the authentication
algorithm and MD5 authentication key in use. The keychain and the routing update
are processed using the MD5 algorithm to produce a unique signature.
Notice that the same key string, cisco123, is used to authenticate information with
R1 and ultimately R3.
Example 8-36 shows the commands to configure EIGRP for IPv6 authentication on
Router R1 using the EIGRP_IPV6_KEY keychain and the cisco123 key string. Simi-
lar configurations would be entered on R2 and R3.
To verify the neighbor adjacencies for EIGRP for IPv6, use the show ipv6 eigrp
neighbors command.
In Example 8-39, the show ip route eigrp command verifies that the router learned
the route to a remote network through EIGRP. The output shows that R1 has
learned about four remote networks through EIGRP.
Example 8-40 shows the output from the show ip protocols command.
R1#
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 495
This command verifies that EIGRP displays the currently configured values for vari-
ous properties of any enabled routing protocols.
Components (8.2.1.2)
Figure 8-18 shows a flowchart for diagnosing EIGRP connectivity issues.
After configuring EIGRP, the first step is to test connectivity to the remote network.
If the ping fails, confirm the EIGRP neighbor adjacencies. Neighbor adjacency might
not be formed for a number of reasons, including the following:
Q The interface between the devices is down.
Q The two routers have mismatching EIGRP autonomous system numbers
(process IDs).
496 Scaling Networks Companion Guide
Aside from these issues, there are a number of other, more advanced issues that
can cause neighbor adjacencies to not be formed. Two examples are misconfigured
EIGRP authentication or mismatched K values, which EIGRP uses to calculate its
metric.
If the EIGRP neighbor adjacency is formed between the two routers, but there is still
a connection issue, there might be a routing problem. Some issues that can cause a
connectivity problem for EIGRP include
Q Proper networks are not being advertised on remote routers.
Q An incorrectly configured passive interface, or an ACL, is blocking advertise-
ments of remote networks.
Q Automatic summarization is causing inconsistent routing in a discontiguous
network.
If all the required routes are in the routing table, but the path that traffic takes is not
correct, verify the interface bandwidth values.
Interactive
Activity 8.2.1.3: Identify the Troubleshooting Command
Graphic Go to the course online to perform this practice activity.
If the ping is unsuccessful, check the cabling and verify that the interfaces on con-
nected devices are on a common subnet. A log message that states that EIGRP neigh-
bors are “not on common subnet” indicates that there is an incorrect IPv4 address on
one of the two EIGRP neighbor interfaces.
Note
At the top of the output, “IP Routing is NSF aware” refers to Nonstop Forwarding (NSF).
This capability allows the EIGRP peers of a failing router to retain the routing informa-
tion that it has advertised, and to continue using this information until the failed router
resumes normal operation and is able to exchange routing information. For more informa-
tion refer to: www.cisco.com/en/US/docs/ios-xml/ios/iproute_eigrp/configuration/15-mt/
eigrp-nsf-awa.html.
In Example 8-44, the “Routing for Networks” section of the show ip protocols
command indicates which networks have been configured; any interfaces in those
networks participate in EIGRP.
R1#
If the network is not present in this section, use show running-config to ensure that
the proper network command was configured.
In Example 8-45, the output from the show running-config command confirms
that any interfaces with these addresses, or a subnet of these addresses, are enabled
for EIGRP.
500 Scaling Networks Companion Guide
Interactive
Activity 8.2.2.4: Troubleshoot EIGRP Neighbor Issues
Graphic Go to the course online to perform this practice activity.
R1 and R3 still have their neighbor adjacency, but a ping test from the R3 router to
R1’s G0/1 interface of 10.10.10.1 is unsuccessful. Example 8-49 shows a failed con-
nectivity test from R3 to the destination network of 10.10.10.0/24.
In Example 8-50, using the show ip protocols command on the R1 router shows that
the network 10.10.10.0/24 is not advertised to EIGRP neighbors.
R1#
As shown in Example 8-51, R1’s EIGRP process is configured to include the adver-
tisement of the 10.10.10.0/24 network.
Example 8-52 shows that there is now a route in R3’s routing table for the
10.10.10.0/24 network, and reachability is verified by pinging R1’s GigabitEthernet
0/1 interface.
504 Scaling Networks Companion Guide
Note
Another form of missing route can result from the router filtering inbound or outbound rout-
ing updates. ACLs provide filtering for different protocols, and these ACLs can affect the
exchange of the routing protocol messages that cause routes to be absent from the routing
table. The show ip protocols command shows whether there are any ACLs that are applied
to EIGRP.
The result is that R2 has two equal-cost routes to 10.0.0.0/8 in the routing table,
which can result in inaccurate routing and packet loss. Depending upon whether per-
packet, per-destination, or CEF load balancing is being used, packets might or might
not be forwarded out the proper interface.
In Example 8-55, the show ip protocols command verifies that automatic summari-
zation is performed on both R1 and R3.
<Output omitted>
Notice that both routers summarize the 10.0.0.0/8 network using the same metric.
The auto-summary command is disabled by default in Cisco IOS Software ver-
sions of 15 and newer versions of 12.2(33). By default, older software has auto-
matic summarization enabled. To disable automatic summarization, enter the no
auto-summary command in router EIGRP configuration mode.
To correct this problem, R1 and R3 have automatic summarization disabled, as
shown in Example 8-56.
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 507
After automatic summarization has been disabled on R1 and R3, R2’s routing table
now indicates that it receives the individual 10.10.10.0/24 and 10.20.20.0/24 subnets
from R1 and R3, respectively, as shown in Example 8-57.
Interactive
Activity 8.2.3.4: Troubleshoot EIGRP Routing Table Issues
Graphic Go to the course online to perform this practice activity.
Summary (8.3)
Class Activity 8.3.1.1: Tweaking EIGRP
The purpose of this activity is to review EIGRP routing protocol fine-tuning
concepts.
You will work with a partner to design one EIGRP topology. This topology is the
basis for two parts of the activity. The first uses default settings for all configura-
tions and the second incorporates at least three of the following fine-tuning EIGRP
options:
Q Manual summary route
Q Default routes
Q Default route propagation
Q Hello interval timer settings
Refer to the labs, Packet Tracer activities, and interactive activities to help you as
you progress through this modeling activity.
Directions are listed in the PDF file for this activity. Share your completed work
with another group. You might want to save a copy of this activity to a portfolio.
EIGRP is one of the routing protocols commonly used in large enterprise networks.
Modifying EIGRP features and troubleshooting problems are two of the most essen-
tial skills for a network engineer involved in the implementation and maintenance of
large routed enterprise networks that use EIGRP.
Summarization decreases the number of entries in routing updates and reduces the
number of entries in local routing tables. It also reduces bandwidth utilization for
routing updates and results in faster routing table lookups. EIGRP for IPv4 auto-
matic summarization is disabled by default beginning with Cisco IOS Release 15.0(1)
M and 12.2(33). Prior to this, automatic summarization was enabled by default. To
enable automatic summarization for EIGRP, use the auto-summary command in
router configuration mode. Use the show ip protocols command to verify the status
510 Scaling Networks Companion Guide
of automatic summarization. Examine the routing table to verify that automatic sum-
marization is working.
EIGRP automatically includes summary routes to Null0 to prevent routing loops that
are included in the summary but do not actually exist in the routing table. The Null0
interface is a virtual IOS interface that is a route to nowhere, commonly known as
“the bit bucket.” Packets that match a route with a Null0 exit interface are discarded.
To establish EIGRP manual summarization on a specific EIGRP interface, use the fol-
lowing interface configuration mode command:
Router(config-if)# ip summary-address eigrp as-number network-address subnet-mask
One method of propagating a default route within the EIGRP routing domain is to
use the redistribute static command. This command tells EIGRP to include this static
route in its EIGRP updates to other routers. The show ip protocols command veri-
fies that static routes within the EIGRP routing domain are being redistributed.
Use the ip bandwidth-percent eigrp as-number percent interface configuration
mode command to configure the percentage of bandwidth that can be used by
EIGRP on an interface.
To configure the percentage of bandwidth that can be used by EIGRP for IPv6 on an
interface, use the ipv6 bandwidth-percent eigrp command in interface configuration
mode. To restore the default value, use the no form of this command.
Hello intervals and Hold times are configurable on a per-interface basis in EIGRP and
do not have to match with other EIGRP routers to establish or maintain adjacencies.
For IP in EIGRP, Cisco IOS Software applies load balancing using up to four equal-
cost paths by default. With the maximum-paths router configuration mode com-
mand, up to 32 equal-cost routes can be kept in the routing table.
EIGRP supports routing protocol authentication using MD5. The algorithms and the
configuration to authenticate EIGRP for IPv4 messages are the same as EIGRP for
IPv6. The only difference is that the interface configuration mode commands use ip
instead of ipv6.
Router(config-if)# ipv6 authentication mode eigrp as-number md5
Router(config-if)# ipv6 authentication key-chain eigrp as-number name-of-chain
To verify that the correct EIGRP adjacencies were formed after being configured for
authentication, use the show ip eigrp neighbors command on each router.
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 511
The show ip route command verifies that the router learned EIGRP routes. The
show ip protocols command is used to verify that EIGRP displays the currently
configured values.
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 8.0.1.2: EIGRP — Back to the Future
Q Class Activity 8.3.1.1: Tweaking EIGRP
Labs
Q Lab 8.1.5.5: Configuring Advanced EIGRP for IPv4 Features
Q Lab 8.2.3.6: Troubleshooting Basic EIGRP for IPv4 and IPv6
Q Lab 8.2.3.7: Troubleshooting Advanced EIGRP
Packet Tracer
Packet Tracer Activities
Activity Q Packet Tracer Activity 8.1.2.5: Configuring EIGRP Manual Summary Routes for
IPv4 and IPv6
Q Packet Tracer Activity 8.1.3.4: Propagating a Default Route in EIGRP for IPv4
and IPv6
Q Packet Tracer Activity 8.2.3.5: Troubleshooting EIGRP for IPv4
Q Packet Tracer Activity 8.3.1.2: Skills Integration Challenge
512 Scaling Networks Companion Guide
A. show ip protocols
B. show ip eigrp topology all-links
C. show ip eigrp traffic
D. show ip eigrp neighbors
A. To prevent routing loops for destination networks that do not actually exist
but are included in a summary route
B. To ensure that all traffic destined for individual subnets uses one single best
path
C. To reduce bandwidth consumption for traffic that is leaving the network
D. To enhance security by hiding all internal networks that are included in a
summary route
Chapter 8: EIGRP Advanced Configurations and Troubleshooting 513
3. Refer to Example 8-59. EIGRP has been configured on all routers in the net-
work. What is the reason for the route in the last line of the routing table to be
marked as D EX?
6. Refer to Figure 8-21 and Example 8-60. Routers R1 and R2 were configured
with EIGRP message authentication, but the routers cannot exchange EIGRP
messages. Which of the following problems are causing the EIGRP authentica-
tion failure between R1 and R2 in this configuration? (Choose two.)
S0/0/0 S0/0/1
R2 S0/0/0 R1 S0/0/1 R3
10. Fill in the blank. Router R1 has three Fast Ethernet interfaces directly con-
nected to LANs with network addresses 192.168.10.0/27, 192.168.10.32/27,
and 192.168.10.64/27. To configure EIGRP manual summarization on a serial
interface that will be sent to the EIGRP neighbor of R1, the ip summary-address
eigrp 100 command has to be issued within interface configuration
mode.
11. Fill in the blank. An IPv6 default route is represented by .
CHAPTER 9
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Q What are the IOS image-naming conventions Q What is the licensing process for Cisco IOS
implemented by Cisco? Software in a small- to medium-sized busi-
ness network?
Q How do you manage Cisco IOS system
image files to support network require- Q What are the commands used to install a
ments in small- to medium-sized business Cisco IOS Software image license?
networks?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
software release families page 519 extended maintenance release page 524
software trains page 519 standard maintenance release page 524
mainline train page 519 Product Activation Key (PAK) page 527
technology train page 520 technology packages page 536
caveat page 521 Unique Device Identifier (UDI) page 540
518 Scaling Networks Companion Guide
Introduction (9.0.1.1)
Cisco IOS (originally Internetwork Operating System) is software used on most
Cisco routers and switches. IOS is a package of routing, switching, security, and
other internetworking technologies integrated into a single multitasking operating
system.
The Cisco IOS portfolio supports a broad range of technologies and features.
Customers choose an IOS based on a set of protocols and features supported by
a particular image. Understanding the Cisco portfolio of feature sets is helpful in
selecting the proper IOS to meet the needs of an organization.
Cisco made significant changes in the packaging and licensing of its IOS when transi-
tioning from IOS Release 12.4 to 15.0. This chapter explains the naming conventions
and packaging of IOS Release 12.4 and 15. Beginning with IOS Release 15, Cisco
also implemented a new packaging format and licensing process for IOS. This chap-
ter discusses the process of obtaining, installing, and managing Cisco IOS Release 15
software licenses.
Note
The release of IOS after 12.4 is 15.0. There is no IOS Software Release 13 or 14.
A single set of individual release numbers is used for all Cisco IOS Software Release
12.4 trains. Cisco IOS Software Maintenance Release 12.4 and Cisco IOS Software
Release 12.4T use a pool of individual release numbers that are shared across the
entire Cisco IOS Software Release 12.4 family. Cisco IOS Software Release 12.4(6)
T was followed by 12.4(7)T and 12.4(8)T. This permits the administrator to track
changes introduced in the code.
Note
Any caveat that is fixed in a T train release should be implemented in the next mainline
release.
Note
Starting with the Cisco IOS Software Release 12.4 family, SSH is available in all images.
Chapter 9: IOS Images and Licensing 523
Three other premium packages offer additional IOS Software feature combina-
tions that address more complex network requirements. All features merge in the
Advanced Enterprise Services package. This package integrates support for all rout-
ing protocols with Voice, Security, and VPN capabilities:
Q Advanced Enterprise Services: Full Cisco IOS Software features
Q Enterprise Services: Enterprise Base and Service Provider Services
Q Advanced IP Services: Advanced Security, Service Provider Services, and
support for IPv6
Note
The Cisco Feature Navigator is a tool used to find the right Cisco operating system depend-
ing on the features and technologies needed.
IOS Release 15.0 provides several enhancements to the operating system including
Q New feature and hardware support
Q Broadened feature consistency with other major IOS releases
Q More predictable new feature release and rebuild schedules
Q Proactive individual release support policies
Q Simplified release numbering
Q Clearer software deployment and migration guidelines
As shown in Figure 9-4, Cisco IOS Release 15.0 uses a different release model from
the traditional separate mainline and T trains of 12.4. Instead of diverging into sepa-
rate trains, Cisco IOS Software Release 15 mainline and T will have extended main-
tenance releases (EM releases) and standard maintenance releases (T releases).
With the new IOS release model, Cisco IOS Release 15 mainline releases are
referred to as M trains.
Beginning with Release 15.0, new releases in the form of a T train are available
approximately two to three times per year. EM releases are available approximately
every 16 to 20 months. T releases enable faster Cisco feature delivery before the
next EM release becomes available.
An EM release incorporates the features and hardware support of all the previous T
releases. This makes newer EM releases available that contain the full functionality
of the train at the time of release.
In summary, the benefits of the new Cisco IOS release model include
Q Feature inheritance from Cisco IOS Software Releases 12.4T and 12.4 mainline.
Q New feature releases approximately two to three times a year, delivered sequen-
tially from a single train.
Chapter 9: IOS Images and Licensing 525
With the ISR G2 devices, IOS image selection has been made easier because all fea-
tures are included within the universal image. Features are activated through licens-
ing. Each device ships with a universal image. The technology packages IP Base,
Data, UC (Unified Communications), and SEC (Security) are enabled in the universal
image using Cisco Software Activation licensing keys. Each licensing key is unique
to a particular device and is obtained from Cisco by providing the product ID and
serial number of the router and a Product Activation Key (PAK). The PAK is pro-
vided by Cisco at the time of software purchase. The IP Base is installed by default.
Table 9-1 shows the suggested migration for the next-generation ISRs from the IOS
Release 12 (IOS Reformation Packaging) to IOS Release 15 (Simplified Packaging).
IP Base IP Base
<Output omitted>
R1#
An example of an IOS Release 12.4 software image name is shown in Figure 9-7.
Figure 9-7 Example of a Cisco IOS Release 12.4 Software Image Name
Chapter 9: IOS Images and Licensing 529
Q Image Name (c2800nm): Identifies the platform on which the image runs. In
this example, the platform is a Cisco 2800 router with a network module.
Q advipservicesk9: Specifies the feature set. In this example, advipservicesk9
refers to the advanced IP services feature set, which includes both the Advanced
Security and Service Provider packages, along with IPv6.
Q mz: Indicates where the image runs and whether the file is compressed. In this
example, mz indicates that the file runs from RAM and is compressed.
Q 124-6.T: The filename format for image 12.4(6)T. This is the train number, main-
tenance release number, and train identifier.
Q bin: The file extension. This extension indicates that this file is a binary execut-
able file.
Figure 9-8 illustrates the different parts of an IOS Release 15 system image file on an
ISR G2 device:
Figure 9-8 Example of a Cisco IOS Release 15.2 Software Image Name
Q Image Name (c1900): Identifies the platform on which the image runs. In this
example, the platform is a Cisco 1900 router.
Q universalk9: Specifies the image designation. The two designations for an ISR
G2 are universalk9 and universalk9_npe. Universalk9_npe does not contain
strong encryption and is meant for countries with encryption restrictions. Fea-
tures are controlled by licensing and can be divided into four technology pack-
ages. These are IP Base, Security, Unified Communications, and Data.
530 Scaling Networks Companion Guide
Q mz: Indicates where the image runs and whether the file is compressed. In this
example, mz indicates that the file runs from RAM and is compressed.
Q SPA: Designates that the file is digitally signed by Cisco.
Q 152-4.M3: Specifies the filename format for the image 15.2(4)M3. This is the
version of IOS, which includes the major release, minor release, maintenance
release, and maintenance rebuild numbers. The M indicates that this is an
extended maintenance release.
Q bin: The file extension. This extension indicates that this file is a binary
executable file.
The most common designation for memory location and compression format is mz.
The first letter indicates the location where the image is executed on the router. The
locations can include
Q f: Flash
Q m: RAM
Q r: ROM
Q l: Relocatable
The compression format can be either z for zip or x for mzip. Zipping is a method
Cisco uses to compress some run-from-RAM images that is effective in reducing the
size of the image. It is self-unzipping, so when the image is loaded into RAM for
execution, the first action is to unzip.
Note
The Cisco IOS Software naming conventions, field meaning, image content, and other details
are subject to change.
Memory Requirements
On most Cisco routers, including the integrated services routers, the IOS is stored in
compact flash as a compressed image and loaded into DRAM during boot-up. The
Cisco IOS Software Release 15.0 images available for the Cisco 1900 and 2900 ISR
require 256 MB of flash and 512 MB of RAM. The 3900 ISR requires 256 MB of
flash and 1 GB of RAM. This does not include additional management tools such as
Cisco Configuration Professional (Cisco CP). For complete details, refer to the prod-
uct data sheet for the specific router.
Chapter 9: IOS Images and Licensing 531
To create a backup of the Cisco IOS image to a TFTP server, perform the following
three steps:
Step 1. Ensure that there is access to the network TFTP server. Ping the TFTP
server to test connectivity, as shown in Example 9-2.
Step 2. Verify that the TFTP server has sufficient disk space to accommodate the
Cisco IOS Software image. Use the show flash0: command on the router
to determine the size of the Cisco IOS image file. The file in the example
is 68,831,808 bytes long.
Step 3. Copy the image to the TFTP server using the copy source-url destination-
url command, as shown in Example 9-3.
After issuing the command using the specified source and destination URLs, the user
is prompted for the source filename, IP address of the remote host, and destination
filename. The transfer will then begin.
Step 4. Copy the IOS image file from the TFTP server to the router using the
copy command shown in Example 9-6. After issuing this command with
the specified source and destination URLs, the user will be prompted for
the IP address of the remote host, source filename, and destination file-
name. The transfer of the file will begin.
Example 9-6 Copy the IOS Image from the TFTP Server
During startup, the bootstrap code parses the startup configuration file in NVRAM
for the boot system commands that specify the name and location of the Cisco IOS
Software image to load. Several boot system commands can be entered in sequence
to provide a fault-tolerant boot plan.
The boot system command is a global configuration command that allows the user
to specify the source for the Cisco IOS Software image to load. Some of the syntax
options available include
Q Specify the flash device as the source of the Cisco IOS image.
Router(config)# boot system flash0://c1900-universalk9-mz.SPA.152-4.M3.bin
Q Specify the TFTP server as the source of the Cisco IOS image, with ROMMON
as backup.
Router(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin
Router(config)# boot system rom
If there are no boot system commands in the configuration, the router defaults to
loading the first valid Cisco IOS image in flash memory and running it.
As shown in Example 9-7, the show version command can be used to verify the
software image file.
Packet Tracer Activity 9.1.2.5: Using a TFTP Server to Upgrade a Cisco IOS Image
Packet Tracer
Activity A TFTP server can help manage the storage of IOS images and revisions to IOS
images. For any network, it is good practice to keep a backup copy of the Cisco IOS
Software image in case the system image in the router becomes corrupted or acci-
dentally erased. A TFTP server can also be used to store new upgrades to the IOS
536 Scaling Networks Companion Guide
and then deployed throughout the network where it is needed. In this activity, you
will upgrade the IOS images on Cisco devices by using a TFTP server. You will also
back up an IOS image with the use of a TFTP server.
SNMP, STP, VLAN, DTP, IGMP, Snooping, SPAN, WCCP, ISDN, ADSL over
ISDN, NAT-Basic X.25, RSVP, NTP, Flexible Netflow, and so on.
Q Data: Data features found in SP Services and Enterprise Services IOS image on
ISR 1900, 2900, and 3900; for example, MPLS, BFD, RSVP, L2VPN, L2TPv3,
Layer 2 Local Switching, Mobile IP, Multicast Authentication, FHRP-GLBP, IP
SLAs, PfR, DECnet, ALPS, RSRB, BIP, DLSw+, FRAS, Token Ring, ISL, IPX,
STUN, SNTP, SDLC, QLLC, and so on.
Q Unified Communications (UC): Offers the UC features found in IPVoice IOS
image on ISR 1900, 2900, and 3900; for example, TDM/PSTN Gateway, Video
Gateway [H320/324], Voice Conferencing, Codec Transcoding, RSVP Agent
(voice), FAX T.37/38, CAC/QOS, Hoot-n-Holler, and so on.
Q Security (SEC): Offers the security features found in Advanced Security IOS
image on ISR 1900, 2900, and 3900; for example, IKE v1 / IPsec / PKI, IPsec/
GRE, Easy VPN w/ DVTI, DMVPN, Static VTI, Firewall, Network Foundation
Protection, GETVPN, and so on.
Note
The IP Base license is a prerequisite for installing the Data, Security, and Unified Communica-
tions licenses. For earlier router platforms that can support Cisco IOS Software Release 15.0,
a universal image is not available. It is necessary to download a separate image that contains
the desired features.
538 Scaling Networks Companion Guide
Note
Use the show license feature command to view the technology package licenses and feature
licenses that are supported on the router.
Cisco. The application provides a GUI that simplifies installation and helps auto-
mate license acquisition, as well as perform multiple licensing tasks from a cen-
tral location. CLM is free of charge and can be downloaded from Cisco.com.
Q Cisco License Registration Portal: This is the web-based portal for getting and
registering individual software licenses, available at www.cisco.com/go/license.
Figure 9-14 shows an example of the pull-out label on a Cisco 1941 router.
After entering the appropriate information, the customer receives an email contain-
ing the license information to install the license file. The license file is an XML text
file with a .lic extension.
Example 9-9 shows the configuration for installing the permanent license for the
Security package on the router.
Note
Unified Communications is not supported on 1941 routers.
the router is upgraded to a new IOS release. A permanent license is the most com-
mon license type used when a feature set is purchased for a device.
Note
Cisco manufacturing preinstalls the appropriate permanent license on the ordered device for
the purchased feature set. No customer interaction with the Cisco IOS Software Activation
processes is required to enable that license on new hardware.
The show license command in Example 9-11 is used to display additional informa-
tion about Cisco IOS Software licenses.
Chapter 9: IOS Images and Licensing 543
Note
Refer to the Cisco IOS Release 15 command reference guide for complete details on the
information displayed in the show license command.
Use the ? in place of the arguments to determine which module names and sup-
ported software packages are available on the router. Technology package names for
Cisco ISR G2 platforms are
Q ipbasek9: IP Base technology package
Q securityk9: Security technology package
Chapter 9: IOS Images and Licensing 545
Note
A reload using the reload command is required to activate the software package.
Evaluation licenses are temporary and are used to evaluate a feature set on new
hardware. Temporary licenses are limited to a specific usage period (for example,
60 days).
Reload the router after a license is successfully installed using the reload com-
mand. The show license command in Example 9-13 verifies that the license has
been installed.
Use the show flash0: command to verify that the licenses have been saved.
The license storage location can be a directory or a URL that points to a file system.
Use the ? command to see the storage locations supported by a device.
Q Reload the router using the reload command. A reload is required to
make the software package inactive.
Step 2. Clear the license.
Q Clear the technology package license from license storage:
Router# license clear feature-name
Note
Some licenses, such as built-in licenses, cannot be cleared. Only licenses that have been added
by using the license install command are removed. Evaluation licenses are not removed.
Summary (9.3)
Class Activity 9.3.1.1: Powerful Protocols
At the end of this course, you are asked to complete two Capstone Projects, where
you will create, configure, and verify two network topologies using the two main
routing protocols taught in this course, EIGRP and OSPF.
To make things easier, you decide to create a chart of configuration and verification
commands to use for these two design projects. To help devise the protocol charts,
ask another student in the class to help you.
Refer to the PDF for this chapter for directions on how to create a design for this
modeling project. When complete, share your work with another group or with the
class. You might also want to save the files created for this project in a network port-
folio for future reference.
Examples of Cisco IOS Software releases include 12.3, 12.4, 15.0, and 15.1. Along
with each software release, there are new versions of the software used to imple-
ment bug fixes and new features.
Cisco IOS Software Release 12.4 incorporates new software features and hardware
support that was introduced in the Cisco IOS Software Release 12.3T train and addi-
tional software fixes. Mainline releases (also called maintenance releases) contain
no uppercase letter in their release designation and inherit new Cisco IOS Software
functionality and hardware from lower-numbered T releases. Prior to and including
Release 12.4, the mainline “M” train received bug fixes only. The technology “T”
train includes fixes as well as new features and platforms. The Release 12.4T train
provides Cisco IOS Software functionality and hardware adoption that introduces
new technology, functionality, and hardware advances that are not available in the
Cisco IOS Software Release 12.4 mainline train.
In the Cisco IOS Software Release 15.0 family, a new strategy is in place. The Cisco
IOS Release 15.0 family does not diverge into separate M and T trains but into
M and T releases in the same train. For example, the first release in the Cisco IOS
Software Release 15.0 family is 15.0(1)M, where M indicates that it is an extended
maintenance release. An extended maintenance release is ideal for long-term main-
tenance. Not all releases in the Cisco IOS Software Release 15.0 family will be
extended maintenance releases; there will also be standard maintenance releases that
receive the latest features and hardware support. The standard maintenance releases
will have an uppercase T in their designation.
When selecting or upgrading a Cisco IOS router, it is important to choose the
proper IOS image with the correct feature set and version. The Cisco IOS image file
is based on a special naming convention. The name for the Cisco IOS image file con-
tains multiple parts, each with a specific meaning. Example: c1900-universalk9-mz.
SPA.152-4.M3.bin.
Commands are available for upgrading and verification of flash. The show flash
command displays the files stored in flash memory, including the system image files.
This command can also be used to verify free flash size. The boot system command
is a global configuration command that allows the user to specify the source for the
Cisco IOS.
550 Scaling Networks Companion Guide
Using a network TFTP server allows image and configuration uploads and downloads
over the network. The network TFTP server can be another router, a workstation, or
a host system.
Beginning with Cisco IOS Software Release 15.0, Cisco modified the process to
enable new technologies within the IOS feature sets. Each device ships with the
same universal image. Technology packages such as IP Base, Data, UC, and SEC are
enabled in the universal image through Cisco software activation licensing keys.
Each licensing key is unique to a particular device and is obtained from Cisco by
providing the product ID and serial number of the router and a Product Activation
Key (PAK).
License activation is not necessary for factory-ordered preconfigured licenses prior
to use. IP Base comes shipped as a permanent license on all ISR-G2 devices. The
other three technology packages—Data, Security, and Unified Communications—
come with an Evaluation license as the default, but a permanent license can be
purchased.
A permanent license is a license that never expires. For example, after a UC (Unified
Communications), Security, or Data license is installed on a router, the subsequent
features for that license will be activated, even if the router is upgraded to a new
IOS release.
Installing a License
The prerequisites for installing a license are as follows:
Q Obtain the necessary PAK, which is an 11-digit ID that can be delivered by mail
or electronically.
Q Obtain a valid Cisco username/password.
Q Retrieve the serial number and PID with the show license udi command or from
the router label tray.
The show version command is used after the router is reloaded to verify that the
license has been installed.
The show license command is used to display additional information about Cisco
IOS Software licenses.
The license accept end user agreement global configuration command is used to
configure a one-time acceptance of the EULA for all Cisco IOS Software packages
and features.
Use the Cisco.com website to research other benefits and information on IOS
Release 15.
Chapter 9: IOS Images and Licensing 551
Practice
The following activities provide practice with the topics introduced in this chapter.
The Labs and Class Activities are available in the companion Scaling Networks Lab
Manual (ISBN 978-1-58713-325-1). The Packet Tracer Activities PKA files are found
in the online course.
Class Activities
Q Class Activity 9.0.1.2: IOS Detection
Q Class Activity 9.3.1.1: Powerful Protocols
Packet Tracer
Packet Tracer Activities
Activity Q Packet Tracer Activity 9.1.1.9: Decode IOS Image Names
Q Packet Tracer Activity 9.1.2.5: Using a TFTP Server to Upgrade a Cisco IOS
Image
Q Packet Tracer Activity 9.3.1.2: EIGRP Capstone Project
Q Packet Tracer Activity 9.3.1.3: OSPF Capstone Project
Q Packet Tracer Activity 9.3.1.4: Skills Integration Challenge
A. 12.5
B. 13
C. 14
D. 15
3. If a router had the appropriate hardware, which Cisco IOS version should an
administrator install to ensure that the router receives the latest technologies?
A. 12.2
B. 12.4T
C. 12.2(28)
D. 12.4(15)T1
E. 12.4(21a)
4. Which Cisco Release 12.4 IOS image package offers the most feature sets?
A. Advanced IP Services
B. Advanced Enterprise Services
C. securityk9
D. Unified Communications k9
E. Advanced Security
5. Which command would a network engineer use to restore the IOS image
c1900-universalk9-mz.SPA.152-4.M3.bin to a router?
A. copy tftp: flash0:
B. copy flash0: tftp:
C. copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp:
D. copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin
6. Which Cisco IOS Release 15.0 technology package contains the IPsec
framework components required to support the ISR G2 platforms?
A. Data
B. Security
C. Unified Communications
D. IP Base
Chapter 9: IOS Images and Licensing 553
8. A network administrator is asked to provide the UDI to obtain a license for the
Data technology package for the IOS Release 15.0 on a Cisco 1900 router. What
is a UDI?
A. A combination of the PAK number and the serial number
B. A combination of the serial number and the MAC address of Gi0/0
C. A combination of the product ID and the PAK number
D. A combination of the product ID, the serial number, and the hardware
version
9. Which Cisco IOS Release 15 package would be needed to implement voice over
IP in a building where documents important to national defense are stored?
A. data9
B. uck9
C. ipbasek9
D. securityk9
10. A network engineer purchases, installs, and activates a license key on a Cisco
2911 ISR G2 router. What is the next step in the installation process?
A. Reload the router.
B. Register the license with Cisco.
C. Back up the IOS to a TFTP server.
D. Back up the license key stored in flash memory.
APPENDIX A
Answers to the
“Check Your Understanding” Questions
Chapter 1
1. Correct answers: C, E. Explanation: All modern enterprise networks are
expected to support critical applications, converged network traffic, and diverse
business needs and provide centralized administrative control. Users expect
enterprise networks to be up 99.999 percent of the time (not 90 percent). Sup-
port for limited growth is not a usual network design criterion.
2. Correct answers: B, C. Explanation: Using duplicate equipment and using redun-
dant paths are two methods to help prevent network disruptions. The use of
VLANs would not affect network availability. Changing the routing protocol
could actually reduce availability during convergence. Loops, which are created
by the provision of redundant paths, are managed by protocols without remov-
ing devices.
3. Correct answer: C. Explanation: VLANs create several groups of users that use a
single physical link. Trunk ports are single physical links. Subinterfaces allow one
physical link to be used to create several logical links. EtherChannel provides the
ability to combine multiple physical links into a single logical link.
4. Correct answer: D. Explanation: EtherChannel allows more data to be moved at
the access layer but does not provide network expansion. Redundancy is used
to provide failover solutions but does not focus on network expansion. Rout-
ing protocols are not used to provide network expansion at the access layer.
Wireless connectivity provides network access to a large number of users at the
access layer.
5. Correct answer: B. Explanation: A switch operating at full wire speed is capable
of generating the cumulative amount of each port on the switch. A 48-port
gigabit switch could generate 48 x 1 Gb/s = 48 Gb/s of data. Forwarding rates
are determined based on the capabilities of each switch, but are not limited to
24 Gb/s.
6. Correct answer: B. Explanation: Service provider routers provide end-to-end
scalable solutions. Customers do not remotely access or connect directly to a
service provider router. Network edge routers provide customer interactivity,
personalization, and mobility. Wherever customers can access an Internet con-
nection, they can access their content. Branch routers provide simple network
configuration and management while maintaining highly available networks.
556 Scaling Networks Companion Guide
Modular routers are used to provide greater flexibility in which interfaces are
used during network design and installation.
7. Correct answer: A. Explanation: Out-of-band device management is used for
initial configuration or when a network connection is unavailable. Configuration
that uses out-of-band management requires a direct connection to a console or
AUX port and a terminal emulation client.
8. port density. Explanation: Port density is the number of ports on a switch.
distribution
core
Explanation: Each layer of the hierarchical design model performs important
functions. In general, the access layer is where end users connect, the distribu-
tion layer is responsible for routing between networks, and the core layer pro-
vides high-speed access to remote networks.
Chapter 2
1. Correct answer: B. Explanation: Redundancy attempts to remove any single
point of failure in a network by using multiple physically cabled paths between
switches in the network.
2. Correct answers: A, D. Explanation: During a broadcast storm, switches will
forward broadcast traffic through every interface except the original ingress
interface. New traffic arriving at the switch will be discarded by a switch in a
broadcast storm because the switch will be unable to process the new traffic.
During a broadcast storm, switches do not automatically adjust duplex settings.
However, communication will often fail between end devices because of the
heavy processing demands that are created by the broadcast traffic. Constant
changes to the MAC address table during a broadcast storm can prevent a switch
from forwarding frames.
3. Correct answer: D. Explanation: After a Cisco switch boots, it will send out
BPDUs containing its individual BID and the root ID for the network. By
default, the initial root ID at bootup will be the ID of that individual switch.
After a root bridge is elected, port states and paths are chosen.
Appendix A: Answers to the “Check Your Understanding” Questions 557
4. Correct answer: A. Explanation: After the election of a root bridge has occurred,
each switch will have to determine the best path to the root bridge from its loca-
tion. The path is determined by summing the individual port costs along the path
from each switch port to the root bridge.
5. Correct answer: C. Explanation: Ports in the blocking state are nondesignated
ports and do not participate in frame forwarding. Ports in the listening state can
participate in BPDU frame forwarding according to received BPDU frames, but
do not forward data frames. Ports in the forwarding state forward data frames
and send and receive BPDU frames. Ports in the disabled state are administra-
tively disabled.
6. Correct answer: D, E. Explanation: A port that is configured with PortFast will
immediately transition from the blocking to the forwarding state. PortFast
should only be configured on switch ports that support end devices, so no
BPDUs should ever be received through a port that is configured with PortFast.
Configuring a port with PortFast supports DHCP because PortFast will speed
up the transition from blocking to forwarding. Without PortFast, an end device
might begin to issue DHCP requests before the port has transitioned to the
forwarding state.
7. Correct answer: A, D, E. Explanation: The Rapid PVST+ port states are discard-
ing, learning, and forwarding. Listening is an STP and PVST+ port state. Trunking
is not a type of STP port state.
8. Correct answer: B. Explanation: Of all the commands that are listed, only the
correct option, show spanning-tree, displays STP root bridge information. The
show running-config and show startup-config commands will show the STP
configurations, but will not list the root bridge.
9. Correct answer: C. Explanation: The first step that should be taken when there
is a spanning tree failure in a Layer 2 network is to remove all redundant links in
the failed segment of the network. This will eliminate the loops in the topology,
allowing for a normalization of the traffic and CPU loads. The next step would
be to investigate the failure of STP on the redundant links and fix these issues
prior to restoring the links.
10. Correct answer: C, D. Explanation: In order for a set of routers to present the
illusion of being a single router, they must share both an IP address and a MAC
address. A static route, BID, or host name does not have to be shared in this
context.
11. Correct answer: B, D. Explanation: The first hop redundancy protocols
HSRP and GLBP are Cisco proprietary and will not function in a multivendor
environment.
558 Scaling Networks Companion Guide
12. STP
Rapid PVST+
MSTP
13. The standby router stops receiving hello messages from the forwarding router.
Chapter 3
1. Correct answer: A. Explanation: EtherChannel relies on existing switch ports, so
there is no need to upgrade the links. Configuration tasks are done on the Ether-
Channel interface, rather than individual ports. STP operates on EtherChannel in
the same manner as it does on other links.
2. Correct answers: D, E, F. Explanation: Most configuration tasks can be done on
the EtherChannel interface, rather than on individual ports. Existing ports can be
used, eliminating the need to upgrade ports to faster speeds. Spanning Tree Pro-
tocol runs on EtherChannel links in the same manner as it does on regular links,
but it does not recalculate when an individual link within the channel goes down.
EtherChannel also supports load balancing.
3. Correct answer: C. Explanation: Fast Ethernet and Gigabit Ethernet interfaces
cannot be combined into a single EtherChannel interface. The interfaces must
all be of the same type. EtherChannel links can be configured on Layer 2 and
Layer 3 switches.
4. Correct answer: C. Explanation: An EtherChannel will be formed through PAgP
when both switches are in on mode or when one of them is in auto or desirable
mode and the other is in desirable mode.
5. Correct answer: C. Explanation: The channel-group mode active command
enables LACP unconditionally, and the channel-group mode passive command
enables LACP only if the port receives an LACP packet from another device.
The channel-group mode desirable command enables PAgP unconditionally,
and the channel-group mode auto command enables PAgP only if the port
receives a PAgP packet from another device.
6. Correct answers: C, D. Explanation: Port Aggregation Protocol and Link Aggre-
gation Control Protocol are used to implement EtherChannel. Spanning Tree
and Rapid Spanning Tree Protocol are used to prevent switching loops. Cisco
Appendix A: Answers to the “Check Your Understanding” Questions 559
Chapter 4
1. Correct answer: B. Explanation: 900 MHz is an FCC wireless technology that
was used before the development of the 802.11 standards. 900-MHz devices
have a larger coverage range than the higher frequencies have and do not require
line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz.
802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at
60 GHz.
2. Correct answer: A. Explanation: Yagi antennas are a type of directional radio
antenna that can be used for long-distance Wi-Fi networking. They are typically
used to extend the range of outdoor hotspots in a specific direction, owing to
their high gain. Omnidirectional Wi-Fi antennas are also referred to as a “rubber
duck” design and provide 360-degree coverage.
3. Correct answer: B. Explanation: An ESS consists of two or more BSSs that are
interconnected by a wired DS. Bluetooth is an example of ad hoc mode.
4. Correct answer: D. Explanation: Beacon frames are broadcast periodically by the
AP to advertise its wireless networks to potential clients. Probing, association,
and authentication frames are only sent when a client is associating to the AP.
5. Correct answer: A. Explanation: Management frames include probes, associa-
tion frames, and authentication frames and are used to facilitate connectivity
between a client and an access point.
560 Scaling Networks Companion Guide
Q Position APs vertically near the ceiling in the center of each coverage area,
if possible.
Q Position APs in locations where users are expected to be. For example,
conference rooms are typically a better location for APs than a hallway.
Q Always consult the specifications for the AP when planning for coverage
areas.
Q A BSA represents the coverage area that is provided by a single channel. An
ESS should have a 10 to 15 percent overlap in coverage area between BSAs
in an ESS. With a 15 percent overlap between BSAs, an SSID, and nonover-
lapping channels (that is, one cell on channel 1 and the other on channel 6),
roaming capability can be created.
8. Correct answer: D. Explanation: Denial of service attacks can be the result of
improperly configured devices which can disable the WLAN. Accidental inter-
ference from devices such as microwave ovens and cordless phones can impact
both the security and performance of a WLAN. Man-in-the-middle attacks can
allow an attacker to intercept data. Rogue access points can allow unauthorized
users to access the wireless network.
9. Correct answer: C. Explanation: WPA2 is the Wi-Fi Alliance version of 802.11i,
the industry standard for authentication. Neither WEP nor WPA possess the
level of authentication provided by WPA2. AES aligns with WPA2 as an encryp-
tion standard, and is stronger than TKIP or RC4. PSK refers to preshared pass-
words, an authentication method that can be used by either WPA or WPA2.
EAP is intended for use with enterprise networks that use a RADIUS server.
10. Correct answer: A. Explanation: Bottom-up troubleshooting begins with the
physical layer. Cables and power would be a logical place to begin the process.
ICMP (ping) is a network layer utility. Channel settings are part of the client
software. Firmware is the operating system software used by the AP.
11. ad. Explanation: 802.11ad is the fastest standard to date. It supports backward
compatibility with all the previous standards.
12. man-in-the-middle. Explanation: A man-in-the-middle attack involves the
deployment of a rogue AP in a given network. User traffic is now sent to the
Appendix A: Answers to the “Check Your Understanding” Questions 561
rogue AP, which in turn captures the data and forwards it to the legitimate AP.
Return traffic from the legitimate AP is sent to the rogue AP, captured, and
then forwarded to the unsuspecting client. The attacker can steal the password
and personal information of the user, gain network access, and compromise the
system of the user.
13. WiMAX
Wi-Fi
Satellite broadband
Bluetooth
Chapter 5
1. Correct answer: B. Explanation: Priority is one way to influence the DR/BDR
election process. It will override the router with the highest router ID. However
to force an election, either the OSPF process needs to be cleared or all routers
need to be rebooted.
2. Correct answer: B. Explanation: The router with the highest priority is elected
as the designated router (DR). Because both R1 and R2 have the same priority
(20), the router ID must be used as the tie-breaker. R2 has the higher router ID
(2.2.2.2), so it is elected as the DR.
3. Correct answer: D. Explanation: OSPFv3 is used for IPv6 routing. When the
default route is redistributed, neighboring routers will display the route source
as OE2 in their IPv6 routing tables. The show ip route command is used to dis-
play the IPv4 routing table. The default-information originate command is used
in the source OSPFv3 router to initiate the static route redistribution. EIGRP
uses the redistribute static command.
4. Correct answer: B. Explanation: The R1(config-if)# ip ospf message-digest-key
1 md5 CISCO-123 command enables MD5 authentication for a given interface
on a router that is running OSPFv2. The CISCO-123 portion is the password.
5. Correct answers: B, D, F. Explanation: For a pair of routers that are running
OSPFv2 to form an adjacency, the following parameters must match: subnet
mask, network type, Hello and Dead timers, a corresponding network command,
and the authentication information.
6. Correct answer: D. Explanation: The routers need to be in the same subnet to
form an adjacency. The routing processes can be different on each router. The
router IDs must be different for routers that participate in the same routing
domain. The interfaces are not passive.
562 Scaling Networks Companion Guide
Two-Way
Exchange
Explanation: The Down state indicates that the router is down. No hellos are
sent. The ExStart state indicates negotiation of a master/slave relationship and
DBD packet sequence number. The Loading state indicates that additional LSRs
and LSUs are sent and that the SPF algorithm is calculated. The Full state indi-
cates that the routers in the domain have converged.
Chapter 6
1. Correct answers: A, B. Explanation: Because of the number of neighbor
adjacencies, SPF calculations, and resources, Cisco recommends no more than
50 routers per area.
2. Correct answer: B. Explanation: An internal router has all interfaces in the same
area. The Area Border Router and the Autonomous System Boundary Router
have interfaces in more than one area. Edge router is not an OSPF router type.
3. Correct answers: B, E. Explanation: OSPF routers within the same area will have
the same link-state databases. Without route summarization, OSPF routers can
have large routing tables. There is no automatic summarization of routes with
OSPF. OSPF does require many CPU cycles to calculate the shortest path by
using the SPF algorithm. DUAL is not used with OSPF.
4. Correct answer: B. Explanation: Routers first calculate the best path to destina-
tions within their own area, then to other areas within the internetwork, and
then to destinations external to the network.
Appendix A: Answers to the “Check Your Understanding” Questions 563
5
2
1
3
Explanation: OSPF uses link-state advertisement messages (LSAs) to build
the LSDB and maintain routing tables. OSPF routers use LSA types 1 to 5 to
564 Scaling Networks Companion Guide
describe the networks to which they are directly connected or networks that
they learned from other routers. These networks can be located in other areas or
can also be from non-OSPF networks. Some LSAs are used to identify an ASBR.
While most LSAs will be flooded across multiple areas, some LSAs are flooded
only within the area where they originated.
Chapter 7
1. Correct answers: C, D. Explanation: Protocol-dependent modules (PDM) allow
EIGRP to route for various Layer 3 protocol packets. TCP and UDP are Layer 4
protocols, and RTP is used by EIGRP to guarantee delivery of packets.
2. Correct answer: D. Explanation: 224.0.0.10 is the reserved IPv4 multicast address
that is used by EIGRP.
3. Correct answer: C. Explanation: In an IPv4 packet header, the Protocol field
number, and in an IPv6 packet header, the Next Header number, indicates which
protocol is used in the encapsulated PDU. For both IPv4 and IPv6, 6 is TCP, 17
is UDP, 88 is EIGRP, and 89 is OSPF.
4. Correct answer: C. Explanation: For the router eigrp command, the number that
follows represents the autonomous system to which the EIGRP process belongs.
All routers within the EIGRP routing domain must use this same autonomous
system number.
5. Correct answer: C. Explanation: The wildcard mask is essentially the inverse of
the subnet mask. Calculate the wildcard mask by subtracting the subnet mask
from 255.255.255.255. In this example, the subnet mask 255.255.255.192 is
subtracted from 255.255.255.255, which leaves a wildcard mask of 0.0.0.63.
6. Correct answer: C. Explanation: The entry “Automatic network summarization
is not in effect” indicates that the no auto-summary command is entered, which
means that subnetted networks (from a major network) are included in route
updates. The metric values keep the default values. The numbers 90 and 170
indicate the administrative distances. The routing table can contain up to four
equal-cost paths to a destination network because the maximum metric variance
parameter is 1.
7. Correct answers: C, D. Explanation: By default, only bandwidth and delay are
used in the calculation of an EIGRP metric. This is done by setting K1 and K3 to
1, while K2, K4, and K5 are set to 0, by default.
8. Correct answer: B. Explanation: The bandwidth factor that is used to calculate
the composite metric of the EIGRP is defined as the slowest bandwidth of all
outgoing interfaces between the source and destination.
Appendix A: Answers to the “Check Your Understanding” Questions 565
hello
query
reply
acknowledgment
Explanation: EIGRP update packets are used to propagate routing information
to other routers. EIGRP hello packets are used to form and maintain neighbor
relationships between EIGRP-enabled routers. EIGRP acknowledgment packets
are used when reliable delivery is used and a confirmation needs to be returned.
EIGRP reply packets are used in response to a query packet, which searches for
a route to a specific destination network.
15. 90
170
5
Explanation: EIGRP uses different administrative distances for each type of
source for the routing information. The default values used for summary, inter-
nal, and external routes are 5, 90, and 170, respectively.
566 Scaling Networks Companion Guide
Chapter 8
1. Correct answer: A. Explanation: The show ip protocols command is used to
verify which routing protocol is configured, the AS number, and whether auto-
matic summarization is enabled.
2. Correct answer: A. Explanation: The Null0 interface represents a route to
nowhere. Using a route to the Null0 interface prevents routing loops for any
destination networks present in the summary route that do not actually exist.
3. Correct answer: B. Explanation: In an EIGRP routing table, code D indicates that
the route was learned from an EIGRP routing update. Code EX indicates that
the route is an external EIGRP route; that is, a route outside of the EIGRP rout-
ing domain.
4. Correct answer: D. Explanation: EIGRP Hello intervals should be less than or
equal to EIGRP hold timers. A Hello should be received before the hold timer
has expired. When the EIGRP hold timer has expired, the neighbor adjacency
will go down. EIGRP Hello intervals and hold timers do not have to match for
two routers to form an EIGRP adjacency.
5. Correct answer: D. Explanation: By default, EIGRP will use only up to 50 per-
cent of an interface’s bandwidth for EIGRP information. This prevents the
EIGRP process from overutilizing a link and not allowing enough bandwidth for
the routing of normal traffic. However, if a connection is in low bandwidth, the
up to 50 percent bandwidth might not be able to keep up the EIGRP informa-
tion exchange. The ip bandwidth-percent eigrp command can be used to con-
figure the percentage of bandwidth that can be used by EIGRP on an interface
in such a scenario.
6. Correct answers: B, D. Explanation: The errors in the configuration are that the
key-string has a different value in each router. The key-string in R1 is cisco_123,
while in R2, it is cisco-123. Also, on router R2, the EIGRP authentication com-
mands were issued on the incorrect interface, as serial 0/0/1 is unused. The key
ID is a valid number. Its range is from 0 to 2147483647. The keychain name can
be in lowercase or uppercase, but the same case must be used on each router. A
single key can be created for each keychain.
7. Correct answers: A, D. Explanation: EIGRP message authentication ensures that
routers only accept routing messages from other connected routers that know
the same preshared key. EIGRP supports routing protocol authentication using
MD5.
8. Correct answer: B. Explanation: The output in the exhibit is the result of using
the show ip eigrp interfaces command.
Appendix A: Answers to the “Check Your Understanding” Questions 567
Chapter 9
1. Correct answer: A. Explanation: When new feature updates are developed, these
are applied to the T train of Cisco IOS Software Release 12.4. The Cisco IOS
Software Release 15 family has a 16- to 20-month timeline between extended
maintenance releases.
2. Correct answer: D. Explanation: The IOS release after 12.4 is 15.0. There is no
IOS Software Release 12.5, 13, or 14.
3. Correct answer: E. Explanation: Even though a “T” on the end of an IOS ver-
sion means the latest technologies are included as part of the version, any future
releases with numbers higher than that include the latest technologies that were
released in the “T” version.
4. Correct answer: B. Explanation: The two options of Unified Communications
k9 and securityk9 are Cisco IOS Release 15 technology packages. Advanced
Enterprise Services contains the full Cisco IOS set of features. Advanced IP Ser-
vices contains advanced security, service provider services, and support for IPv6.
Advanced Security has VPN and firewall features enabled including support
for IPsec.
568 Scaling Networks Companion Guide
2. Use the license accept end user agreement command to accept the EULA.
2.4 GHz (UHF) Part of the ultra-high fre- 802.11g The IEEE standard for wireless LANs
quency of the ITU radio frequency range allo- using the ISM spectrum, OFDM or DSSS encod-
cated to IEEE 802.11b, 802.11g, 802.11n, and ing, and speeds of up to 54 Mbps.
802.11ad.
802.11n The IEEE standard for wireless LANs
5 GHz (SHF) Part of the super-high frequency using the ISM spectrum, OFDM encoding, and
of the ITU radio frequency range allocated to multiple antennas for single-stream speeds up to
IEEE 802.11a, 802.11n, 802.11ac, and 802.11ad. 150 Mbps.
Area Border Router (ABR) In OSPF, this con- Basic Service Set (BSS) A WLAN infrastruc-
nects one or more nonbackbone areas to the ture mode whereby mobile clients use a single
backbone. access point for connectivity to each other or to
wired network resources.
Automatic summarization A routing protocol
feature in which a router that connects to more Basic Service Set Identifier (BSSID) The MAC
than one classful network advertises summarized address of the access point serving the BSS.
routes for each entire classful network when
sending updates out interfaces connected to beacon A wireless LAN packet that signals
other classful networks. the availability and presence of the wireless
device. Beacon packets are sent by access points
autonomous system boundary router (ASBR) and base stations; however, client radio cards
In OSPF, a router that exchanges routes between send beacons when operating in computer-to-
OSPF and another routing domain through route computer (ad hoc) mode.
redistribution. Routes are injected into OSPF
from an ASBR. An ASBR communicates the blocking state A port is in the blocking state if
OSPF routes into another routing domain. The it is a nondesignated port and does not partici-
ASBR runs OSPF and another routing protocol. pate in frame forwarding. The port continues to
process received BPDU frames to determine the
location and root ID of the root bridge and what
port role the switch port should assume in the
final active STP topology.
classless 571
Bluetooth Originally an IEEE 802.15 WPAN broadcast storm A condition where broadcasts
standard that uses a device-pairing process are flooded endlessly, often due to a looping at
to communicate over distances up to 0.05 Layer 2 (bridge loop).
mile (100m).
Broadcast multiaccess A type of network con- classless A concept in IPv4 addressing that
figuration where multiple routers are intercon- defines a subnetted IP address as having two
nected over an Ethernet network. parts: a prefix (or subnet) and a host.
572 cluster
cluster The ability to integrate multiple devices at least two attached routers has a designated
to act as one device to simplify management and router that is elected by the OSPF Hello pro-
configuration. tocol. The designated router enables a reduc-
tion in the number of adjacencies required on a
Common Spanning Tree (CST) The original multiaccess network, which in turn reduces the
IEEE 802.1D standard assumes one spanning tree amount of routing protocol traffic and the size
instance for the entire bridged network, regard- of the topological database.
less of the number of VLANs.
Diffusing Update Algorithm (DUAL) A con-
composite metric EIGRP’s metric that com- vergence algorithm used in Enhanced IGRP that
bines, by default, bandwidth and delay. provides loop-free operation at every instant
throughout a route computation. Allows routers
core layer The backbone of a switched LAN. involved in a topology change to synchronize at
All traffic to and from peripheral networks must the same time, while not involving routers that
pass through the core layer. It includes high- are unaffected by the change.
speed switching devices that can handle rela-
tively large amounts of traffic. Directional Wi-Fi Antenna Focuses the radio
signal in a given direction to enhance the signal
to and from the AP in the direction that the
antenna is pointing, providing a stronger signal
D strength in one direction and less signal strength
in all other directions.
default port cost The spanning-tree port cost
is a measure assigned on a per-link basis in a Direct-sequence spread spectrum (DSSS)
switched LAN. It is determined by the link band- Designed to spread a signal over a larger fre-
width, with a higher bandwidth giving a lower quency band, making it more resistant to inter-
port cost. ference. With DSSS, the signal is multiplied by a
“crafted noise” known as a spreading code.
designated port In spanning tree, a nonroot
switch port that is permitted to forward traffic disabled port A port that is administratively
on the network. For a trunk link connecting two shut down.
switches, one end connects to the designated
bridge through the designated port. One and disabled state A switch port is in the spanning-
only one end of every trunk link in a switched tree disabled state if it is administratively shut
LAN (with spanning tree enabled) connects down. A disabled port does not function in the
to a designated port. The selection of desig- spanning-tree process.
nated ports is the last step in the spanning-tree
algorithm. distance vector routing protocol A type of
routing protocol where a router’s routing table is
Designated Router (DR) An OSPF router based on hop-by-hop metrics and is only aware
that generates LSAs for a multiaccess network of the topology from a viewpoint of its directly
and has other special responsibilities in running connected neighbors. EIGRP and RIP are exam-
OSPF. Each multiaccess OSPF network that has ples of distance vector routing protocols.
extended system ID 573
Distributed Coordination Function (DCF) Enterprise Edge In the Cisco Enterprise Archi-
A collision avoidance mechanism in which a tecture, this module consists of the Internet,
wireless client transmits only if the channel VPN, and WAN modules connecting the enter-
is clear. All transmissions are acknowledged. prise with the service provider’s network.
Therefore, if a wireless client does not receive
an acknowledgment, it assumes that a collision enterprise network A large and diverse net-
occurred and retries after a random waiting work connecting most major points in a com-
interval. pany or other organization. Differs from a WAN
in that it is privately owned and maintained.
distribution layer In the three-layer hierarchi-
cal network design model, the distribution layer equal-cost load balancing When a router uti-
is the layer that invokes policy and routing con- lizes multiple paths with the same administrative
trol. Typically, VLANs are defined at this layer. distance and cost to a destination.
link aggregation A method of implementing LSA Type 3 Used by an ABR to advertise net-
multiple links between equipment to increase works from other areas.
bandwidth.
LSA Type 4 Generated by an ABR only when
Link Aggregation Control Protocol (LACP) an ASBR exists within an area. Identifies the
An industry-standard protocol that aids in the ASBR and provides a route to it.
automatic creation of EtherChannel links.
LSA Type 5 Originated by the ASBR and
link-state routing protocol A routing protocol describes routes to networks outside the OSPF
classification where each router has a topol- autonomous system.
ogy database based on an SPF tree through the
network, with knowledge of all nodes. OSPF
and IS-IS are examples of link-state routing
protocols. M
listening state The IEEE 802.1D listening state mainline train A release of the Cisco IOS that
is seen in both a stable active topology and dur- receives mostly software (bug) fixes with the
ing topology synchronization changes. In the lis- goal of increasing software quality. A mainline
tening state, the port cannot send or receive data train is always associated with a technology train.
frames; however, the port is allowed to receive
man-in-the-middle attack Carried out by an
and send BPDUs.
attacker who positions himself between two
load balancing The capability of a network- legitimate hosts. The attacker might allow the
ing device to distribute traffic over some of its normal transactions between hosts to occur, and
network ports on the path to the destination. only periodically manipulate the conversation
Load balancing increases the utilization of net- between the two.
work segments, thus increasing effective network
MD5 authentication An algorithm used for
bandwidth.
message authentication. MD5 verifies the integ-
LSA Type 1 Sent by all routers to advertise rity of the communication, authenticates the
their directly connected OSPF-enabled links origin, and checks for timeliness.
and forward their network information to OSPF
MIMO Multiple-input and multiple-output
neighbors.
antenna. Used in IEEE 802.11n wireless devices,
LSA Type 2 Only used by the DR in multi- splits a high-data-rate stream into multiple lower-
access and nonbroadcast multiaccess (NBMA) rate streams and broadcasts them simultaneously
networks to give other routers information about over the available radios and antennas. This
multiaccess networks within the same area. Con- allows for a theoretical maximum data rate of
tains the router ID and IP address of the DR, 248 Mbps.
along with the router ID of all other routers on
the multiaccess segment.
PAgP desirable 577
partial updates An update only includes infor- table for each routed protocol such as IP, IPX
mation about the route changes, such as a new RIP, AppleTalk Routing Table Maintenance
link or a link becoming unavailable. Protocol (RTMP), and IGRP.
point-to-multipoint Multiple devices intercon- PVST+ A Cisco enhancement of STP that pro-
nected in a hub-and-spoke topology over an vides a separate 802.1D spanning-tree instance
NBMA network. for each VLAN configured in the network.
port density The number of interfaces sup- Query packet In EIGRP, used to request spe-
ported on a switch. cific information from a neighbor router.
Reply packet In EIGRP, used to respond to a Server Farm and Data Center Module In the
query. Cisco Enterprise Architecture, this module pro-
vides high-speed connectivity and protection for
Reported Distance (RD) The total metric along servers. It is critical to provide security, redun-
a path to a destination network as advertised by dancy, and fault tolerance.
an upstream neighbor in EIGRP.
Service Provider Edge In the Cisco Enterprise
root bridge The root of a spanning-tree Architecture, this module provides Internet,
topology. A root bridge exchanges topology Public Switched Telephone Network (PSTN), and
information with other bridges in a spanning- WAN services.
tree topology to notify all other bridges in the
network when topology changes are required. service provider router Responsible for dif-
This prevents loops and provides a measure of ferentiating the service portfolio and increasing
defense against link failure. revenues by delivering end-to-end scalable solu-
tions and subscriber-aware services.
root port The unique port on a nonroot bridge
that has the lowest path cost to the root bridge. service set identifier (SSID) A code attached
Every nonroot bridge in an STP topology must to all packets on a wireless network to identify
elect a root port. The root port on a switch is each packet as part of that network. The code
used for communication between the switch and is a case-sensitive text string that consists of a
the root bridge. maximum of 32 alphanumeric characters. All
wireless devices attempting to communicate with
route redistribution The process of injecting each other must share the same SSID. Apart from
a route from one route source into the routing identifying each packet, the SSID also serves to
process of another route source. uniquely identify a group of wireless network
devices used in a given service set.
route summarization The process of aggregat-
ing multiple routes into one routing advertise- Services Module In the Cisco Enterprise
ment to reduce the size of routing tables. Architecture, this module provides access to all
services, such as IP telephony services, wireless
controller services, and unified services.
580 shared link
shared link In LAN environments, a port oper- stackable configuration Devices that are capa-
ating in half-duplex mode because the switch ble of being connected to other like devices to
is connected to a hub that attaches to multiple provide higher port density.
devices.
standard maintenance release A T release. See
Single-Area OSPF An OSPF configuration that technology train.
only uses one area, the backbone area 0.
Successor The path to a destination. The suc-
single-homed An Internet access design in cessor is chosen using DUAL from all the known
which the organization only has one connection paths or feasible successors to the end destina-
to a service provider. tion. Used in EIGRP.
Spanning Tree Protocol (STP) A protocol Temporal Key Integrity Protocol (TKIP) Also
defined by IEEE standard 802.1D. Allows referred to as Temporary Key Integrity Protocol,
switches and bridges to create a redundant LAN, TKIP was designed by the IEEE 802.11i task
with the protocol dynamically causing some group and the Wi-Fi Alliance as a solution to
ports to block traffic so that the bridge/switch replace WEP without requiring the replacement
forwarding logic will not cause frames to loop of legacy hardware. This was necessary because
indefinitely around the LAN. the breaking of WEP had left Wi-Fi networks
without viable link-layer security, and a solution
SSID See service set identifier. was required for already deployed hardware. The
Wi-Fi Alliance endorsed TKIP under the name
SSID cloaking A code attached to all packets Wi-Fi Protected Access (WPA). The IEEE also
on a wireless network to identify each packet as endorsed TKIP.
part of that network. The code is a case-sensitive
text string that consists of a maximum of 32 time to live (TTL) The field in an IP header that
alphanumeric characters. All wireless devices indicates how long a packet is considered valid.
attempting to communicate with each other must Each routing device that an IP packet passes
share the same SSID. Apart from identifying each through decrements the TTL by 1.
packet, the SSID also serves to uniquely identify
a group of wireless network devices used in a type, length, value (TLV) The data portion of
given service set. the EIGRP packet. All TLVs begin with a 16-bit
Type field and a 16-bit Length field. Different
wire speed 581
copying IOS images, 533-534 DSSS (Direct Sequence Spread Spectrum), 191
core layer (hierarchical network design), 6, 239 DTP (Dynamic Trunking Protocol), 136
CSMA/CA (Carrier Sense Multiple Access with DUAL, 364, 413
Collision Avoidance), 181 convergence
CST (Common Spanning Tree), 78 FS, 424-428
CTS floods, 200 FSM, 423
FC, 415
D FS, 415-417
DUAL convergence, 424-428
Dashboard (web-based), Cisco Meraki cloud, topology tables, 420-422
166 FSM, 414
data center switches, 18 convergence, 423
Data technology packages, 537 debugging, 425-427
DCF (Distributed Coordination Function), 181 RD, 415
Dead intervals, 273-278 successors and FD, 414-415
debugging FSM, 425-427 topology tables, 417-422
default gateways dynamic routing, 240-242
limitations of, 106
virtual routers, 107
default port costs, STP, 64
E
delay metrics and EIGRP, 408-409 edge ports, RSTP, 87-88
designated ports, STP, 63 EHF (Extremely High Frequency), 151
device lists (Smart Wi-Fi tools), 220 EIGRP (Enhanced Interior Gateway Routing
device modules as clusters, 11 Protocol), 17, 363-364, 454
directional Wi-Fi antennas, 168 ACK packets, 368-371
disabled ports ASN, troubleshooting, 497-498
PVST+, 82 authentication, 368
STP, 63 example of, 489-490
disconnect attacks (spoofed), 200 MD5 authentication, 487-492
distance vector routing protocols, EIGRP, 17 overview of, 486-487
distribution layer (hierarchical network design), bandwidth
6, 239 IPv4 bandwidth utilization, 479-480
DoS (Denial of Service) attacks, 199-202 IPv6 bandwidth utilization, 480
Down state (OSPF), 287 bounded updates, 365, 371
DR (Designated Routers), 255 default route propagation, 474-478
election process, 261-263 DUAL, 364, 413
OSPF interface prioritization, 265-267 convergence, 423-428
verifying FC, 415
adjacencies, 259-261 FS, 415-417, 420-428
roles, 256-258 FSM, 414
DROTHER, 255, 260-263 RD, 415
EIGRP (Enhanced Interior Gateway Routing Protocol) 587
OSPF, 15 MSTP, 61
redundancy, 12 planning for, 12
reliability, 5 RSTP, 61
scalability, 4, 11 STP, 52-67, 78-79
EtherChannel, 14 reliability, 5
failover domains, 9-10 remote networks
hierarchical network design routing, 239-240
access layer, 6, 14 switches, 239
bandwidth, 13 routers
core layer, 6 branch routers, 28
distribution layer, 6 CLI commands, 31-32
EtherChannel, 14 deploying, 10
failover domains, 9-10 fixed configuration routers, 29
link aggregation, 13 functions, 27
multilayer switches, 10 in-band management, 31
OSPF, 15 IOS files, 30
redundancy, 12, 52-57 IOS licenses, 30
routers, 10 managing, 30
scalability, 11 modular routers, 29
switch blocks, 10 network edge routers, 28
link aggregation, 13 out-of-band management, 31
multiaccess networks and OSPF requirements, 26
BDR, 255-267 service provider routers, 29
broadcast multiaccess networks, 251 show commands, 34-39
DR, 255-267 scalability, 4
DROTHER, 255, 260-263 designing for, 11
interface prioritization, 265-267 routing versus switching, 238
LSA floods, 253-255 switches, 21
NBMA networks, 252 switch blocks, deploying, 10
point-to-multipoint networks, 252 switches
point-to-point networks, 251 campus LAN switches, 18
virtual link networks, 253 CLI commands, 39-40
multilayer switches, deploying, 10 cloud-managed switches, 18
NBMA networks, 252 cost of, 21
OSPF, 15 data center switches, 18
point-to-multipoint networks, 252 fixed configuration switches, 19
point-to-point networks, 251 forwarding rates, 22
redundancy frame buffers, 21
blocking state, 60-61 height of, 20
FHRP, 51, 106-114 in-band management, 31
hierarchical network design, 52-57 IOS files, 30
596 networks
Wi-Fi Alliance, Wi-Fi certification, 153 Cisco Unified wireless network architecture,
wildcard masks, IPv4 EIGRP router 167
configuration, 387-389 mobility, support for, 148
WiMAX (Worldwide Interoperability for radio frequencies and, 150-151
Microwave Access), 150 satellite broadband, 150
wire speeds security, 198
Ethernet ports, 22 CTS floods, 200
switches, 22 DoS attacks, 199-202
wireless access points. See AP encryption, 208
wireless clients, 159 enterprise authentication, 210
wireless connectivity, 14 evil twin AP attacks, 203-204
wireless frames, 173 home user authentication, 208-209
Frame Control field, 174-177 interference, 199
Frame Type field, 177 MAC address filtering, 205
wireless NIC, 156-157 MITM attacks, 203-204
wireless routers, 15 open system authentication, 206
configuring, 211-212 rogue AP, 202-203
home routers, SSID, 157-158 shared key authentication, 206-207
wireless technologies spoofed disconnect attacks, 200
802.11 WLAN standard, 151 SSID cloaking, 205
802.11 WLAN topologies, 170-172 small wireless deployment solutions, 162-164
802.11a WLAN standard, 151 SPS, 164
802.11ac WLAN standard, 152 SSID, 158
802.11ad WLAN standard, 152 tethering, 171
802.11b WLAN standard, 152 Wi-Fi, 149
802.11g WLAN standard, 152 WiMAX, 150
802.11n WLAN standard, 152 wireless antennas, 168-169
AP wireless clients, 159
autonomous AP, 160-161 WLAN, 149
controller-based AP, 161 WPAN, 149
evil twin AP attacks, 203-204 WWAN, 149
rogue AP, 202-203 WLAN (Wireless Local Area Networks), 149
benefits of, 148-149 802.11 frame structure
Bluetooth, 149 control frames, 180
business wireless solutions, 159 management frames, 177-179, 200-202
cellular broadband, 150 wireless frames, 173-177
certification, 153 802.11 WLAN standard, 151
clients, configuring, 225 802.11 WLAN topologies
encryption, 208 ad hoc mode, 170
large wireless deployment solutions infrastructure mode, 170-172
Cisco Meraki cloud architecture, 165-166 802.11a WLAN standard, 151
Yagi antennas 607