CCNP Encore and Enarsi Portable Command Guide
CCNP Encore and Enarsi Portable Command Guide
1. Cover Page
4. Copyright Page
5. Reader Services
6. Contents at a Glance
7. Table of Contents
11. Acknowledgments
12. Command Syntax Conventions
13. Introduction
1. Who Should Read This Book?
1. Virtual LANs
2. Layer 2 Link Aggregation
7. EIGRP Router ID
6. BGP Timers
10. Attributes
1. Configuring Passwords
3. IPv6 ACLs
4. Implementing Authentication Methods
9. Configuring NetFlow
1. i
2. ii
3. iii
4. iv
5. v
6. vi
7. vii
8. viii
9. ix
10. x
11. xi
12. xii
13. xiii
14. xiv
15. xv
16. xvi
17. xvii
18. xviii
19. xix
20. xx
21. xxi
22. 1
23. 2
24. 3
25. 4
26. 5
27. 6
28. 7
29. 8
30. 9
31. 10
32. 11
33. 12
34. 13
35. 14
36. 15
37. 16
38. 17
39. 18
40. 19
41. 20
42. 21
43. 22
44. 23
45. 24
46. 25
47. 26
48. 27
49. 28
50. 29
51. 30
52. 31
53. 32
54. 33
55. 34
56. 35
57. 36
58. 37
59. 38
60. 39
61. 40
62. 41
63. 42
64. 43
65. 44
66. 45
67. 46
68. 47
69. 48
70. 49
71. 50
72. 51
73. 52
74. 53
75. 54
76. 55
77. 56
78. 57
79. 58
80. 59
81. 60
82. 61
83. 62
84. 63
85. 64
86. 65
87. 66
88. 67
89. 68
90. 69
91. 70
92. 71
93. 72
94. 73
95. 74
96. 75
97. 76
98. 77
99. 78
100. 79
101. 80
102. 81
103. 82
104. 83
105. 84
106. 85
107. 86
108. 87
109. 88
110. 89
111. 90
112. 91
113. 92
114. 93
115. 94
116. 95
117. 96
118. 97
119. 98
120. 99
121. 100
122. 101
123. 102
124. 103
125. 104
126. 105
127. 106
128. 107
129. 108
130. 109
131. 110
132. 111
133. 112
134. 113
135. 114
136. 115
137. 116
138. 117
139. 118
140. 119
141. 120
142. 121
143. 122
144. 123
145. 124
146. 125
147. 126
148. 127
149. 128
150. 129
151. 130
152. 131
153. 132
154. 133
155. 134
156. 135
157. 136
158. 137
159. 138
160. 139
161. 140
162. 141
163. 142
164. 143
165. 144
166. 145
167. 146
168. 147
169. 148
170. 149
171. 150
172. 151
173. 152
174. 153
175. 154
176. 155
177. 156
178. 157
179. 158
180. 159
181. 160
182. 161
183. 162
184. 163
185. 164
186. 165
187. 166
188. 167
189. 168
190. 169
191. 170
192. 171
193. 172
194. 173
195. 174
196. 175
197. 176
198. 177
199. 178
200. 179
201. 180
202. 181
203. 182
204. 183
205. 184
206. 185
207. 186
208. 187
209. 188
210. 189
211. 190
212. 191
213. 192
214. 193
215. 194
216. 195
217. 196
218. 197
219. 198
220. 199
221. 200
222. 201
223. 202
224. 203
225. 204
226. 205
227. 206
228. 207
229. 208
230. 209
231. 210
232. 211
233. 212
234. 213
235. 214
236. 215
237. 216
238. 217
239. 218
240. 219
241. 220
242. 221
243. 222
244. 223
245. 224
246. 225
247. 226
248. 227
249. 228
250. 229
251. 230
252. 231
253. 232
254. 233
255. 234
256. 235
257. 236
258. 237
259. 238
260. 239
261. 240
262. 241
263. 242
264. 243
265. 244
266. 245
267. 246
268. 247
269. 248
270. 249
271. 250
272. 251
273. 252
274. 253
275. 254
276. 255
277. 256
278. 257
279. 258
280. 259
281. 260
282. 261
283. 262
284. 263
285. 264
286. 265
287. 266
288. 267
289. 268
290. 269
291. 270
292. 271
293. 272
294. 273
295. 274
296. 275
297. 276
298. 277
299. 278
300. 279
301. 280
302. 281
303. 282
304. 283
305. 284
306. 285
307. 286
308. 287
309. 288
310. 289
311. 290
312. 291
313. 292
314. 293
315. 294
316. 295
317. 296
318. 297
319. 298
320. 299
321. 300
322. 301
323. 302
324. 303
325. 304
326. 305
327. 306
328. 307
329. 308
330. 309
331. 310
332. 311
333. 312
334. 313
335. 314
336. 315
337. 316
338. 317
339. 318
340. 319
341. 320
342. 321
343. 322
344. 323
345. 324
346. 325
347. 326
348. 327
349. 328
350. 329
351. 330
352. 331
353. 332
354. 333
355. 334
356. 335
357. 336
358. 337
359. 338
360. 339
361. 340
362. 341
363. 342
364. 343
365. 344
366. 345
367. 346
368. 347
369. 348
370. 349
371. 350
372. 351
373. 352
374. 353
375. 354
376. 355
377. 356
378. 357
379. 358
380. 359
381. 360
382. 361
383. 362
384. 363
385. 364
386. 365
387. 366
388. 367
389. 368
390. 369
391. 370
392. 371
393. 372
394. 373
395. 374
396. 375
397. 376
398. 377
399. 378
400. 379
401. 380
402. 381
403. 382
404. 383
405. 384
406. 385
407. 386
408. 387
409. 388
410. 389
411. 390
412. 391
413. 392
414. 393
415. 394
About This eBook
ePUB is an open, industry-standard format for eBooks.
However, support of ePUB and its many features varies
across reading devices and applications. Use your device
or app settings to customize the presentation to your
liking. Settings that you can customize often include
font, font size, single or double column, landscape or
portrait mode, and figures that you can click or tap to
enlarge. For additional information about the settings
and features on your reading device or app, visit the
device manufacturer’s Web site.
Scott Empson
Patrick Gargano
Cisco Press
CCNP and CCIE Enterprise Core &
CCNP Enterprise Advanced Routing
Portable Command Guide
Scott Empson, Patrick Gargano
Published by:
Cisco Press
ScoutAutomatedPrintCode
ISBN-13: 978-0-13-576816-7
ISBN-10: 0-13-576816-0
Warning and Disclaimer
This book is designed to provide information about the
CCNP and CCIE Enterprise Core (ENCOR 350-401) and
CCNP Enterprise Advanced Routing (ENARSI 300-410)
exams. Every effort has been made to make this book as
complete and as accurate as possible, but no warranty or
fitness is implied.
Trademark Acknowledgments
All terms mentioned in this book that are known to be
trademarks or service marks have been appropriately
capitalized. Cisco Press or Cisco Systems, Inc., cannot
attest to the accuracy of this information. Use of a term
in this book should not be regarded as affecting the
validity of any trademark or service mark.
Special Sales
For information about buying this title in bulk
quantities, or for special sales opportunities (which may
include electronic versions; custom cover designs; and
content particular to your business, training goals,
marketing focus, or branding interests), please contact
our corporate sales department at
corpsales@pearsoned.com or (800) 382-3419.
Editor-In-Chief
Mark Taub
Managing Editor
Sandra Schroeder
Development Editor
Eleanor Bru
Copy Editor
Bill McManus
Technical Editor
Bob Vachon
Editorial Assistant
Cindy Teeters
Cover Designer
Chuti Prasertsith
Production Manager
Vaishnavi Venkatesan/codeMantra
Composition
codeMantra
Indexer
Ken Johnson
Proofreader
Abigail Manheim
Feedback Information
At Cisco Press, our goal is to create in-depth technical
books of the highest quality and value. Each book is
crafted with care and precision, undergoing rigorous
development that involves the unique expertise of
members from the professional technical community.
*Be sure to check the box that you would like to hear
from us to receive exclusive discounts on future editions
of this product.
Contents at a Glance
About the Authors
Introduction
INDEX
Table of Contents
About the Authors
Introduction
INDEX
About the Authors
Scott Empson is an instructor in the Department of
Information Systems Technology at the Northern
Alberta Institute of Technology in Edmonton, Alberta,
Canada, where he has taught for over 21 years. He
teaches technical courses in Cisco routing and
switching, along with courses in professional
development and leadership. Scott created the CCNA
Command Quick Reference in 2004 as a companion
guide to the Cisco Networking Academy Program, and
this guide became the CCNA Portable Command Guide
in 2005. Other titles in the series in the areas of CCNP,
Wireless, Security, Microsoft, and Linux followed
beginning in 2006. Scott has a Master of Education
degree along with three undergraduate degrees: a
Bachelor of Arts, with a major in English; a Bachelor of
Education, again with a major in English/language arts;
and a Bachelor of Applied Information Systems
Technology, with a major in network management.
Scott lives in Edmonton, Alberta, with his wife, Trina,
and two university-attending-but-still-haven’t-moved-
out-yet-but-hope-to-move-out-as-soon-as-possible-
after-graduation-so-Dad-can-have-the-TV-room-back
children, Zachariah and Shaelyn.
—Patrick
Acknowledgments
Anyone who has ever had anything to do with the
publishing industry knows that it takes many, many
people to create a book. Our names may be on the cover,
but there is no way that we can take credit for all that
occurred to get this book from idea to publication.
Therefore, we must thank the following:
Virtual LANs
Verifying VTP
VIRTUAL LANS
A VLAN is a switched network that logically segments
by function, project teams, or applications, without
regard to the physical locations of the users. VLANs are
the Layer 2 (L2) partitioning of a physical switch into
two or more virtual switches. Ports assigned to one
VLAN are in a single broadcast domain and are L2
forwarded only within that broadcast domain. Each
VLAN is considered its own logical network where any
traffic destined for outside the logical network must be
forwarded by a router. Each VLAN can support its own
instance of spanning tree. VLANs can be extended
across multiple interconnected switches by tagging the
VLAN number on each Ethernet frame transmitted or
received between them. This tagging of frames is
supported by IEEE 802.1Q trunking.
Note
VLAN database mode has been deprecated in IOS Version 15.
Note
Switch(config
)#
Note
Use this method to add normal-range VLANs (1–1005) or extended-range VLANs (1006–
4094). Configuration information for normal-range VLANs is always saved in the VLAN
database, and you can display this information by entering the show vlan privileged EXEC
command.
Note
The VLAN Trunking Protocol (VTP) revision number is increased by one each time a VLAN
is created or changed.
Note
VTP Version 3 supports propagation of extended-range VLANs. VTP Versions 1 and 2
propagate only VLANs 1–1005.
Note
Transparent mode does not increment the VTP revision number.
Note
When the switchport voice command is used together with the switchport access
command, a pseudo-trunk is created allowing two VLANs on the port, one for voice traffic
and one for all other traffic. The voice traffic is forwarded in 802.1Q tagged frames and the
remaining nonvoice VLAN has no 802.1Q tagging (native VLAN). The internal mini-switch in
a Cisco VoIP phone will pass untagged frames to an attached PC and forward 802.1Q
tagged VoIP traffic with a differentiated services code point (DSCP) quality of service (QoS)
value of EF (or Expedited Forwarding) to the switch port. In this special case, the switch port
can belong to two VLANs, one for data and one for voice traffic.
Note
Note
Note
The default mode is dependent on the platform. For the 2960/9200 series, the default mode
is dynamic auto.
Note
On a 2960/9200 series switch, the default for all ports is to be an access port. However, with
the default DTP mode being dynamic auto, an access port can be converted into a trunk port
if that port receives DTP information from the other side of the link and that other side is set
to trunk or desirable. It is therefore recommended that you hard-code all access ports as
access ports with the switchport mode access command. This way, DTP information will
not inadvertently change an access port to a trunk port. Any port set with the switchport
mode access command ignores any DTP requests to convert the link.
Note
VLAN Trunking Protocol (VTP) domain names must match for a DTP to negotiate a trunk.
Caution
Cisco ISL has been deprecated. Depending on the age and model of your Cisco switch, you
may still be able to change the encapsulation type between dot1q and ISL.
Caution
The 2960, 2960-x, and 9200 series of switches support only dot1q trunking. Therefore, some
commands such as switchport trunk encapsulation {isl | dotq1} are not available.
negotiate
Switch(con Configures the list of VLANs allowed on
fig-if)# the trunk
switchport
trunk
allowed Note
vlan
All VLANs are allowed by default
10,12,18-
22
g)#
By default, all Catalyst switches are in server mode
vtp
mod
e
ser
ver
dom All switches operating in VTP server or client mode must have the same
domain name to ensure communication
ain
dom
ain
-
nam
e
pas
swo
rd Note
To communicate with each other, all switches must have the same VTP
pas password set
swo
rd
vtp VTP versions are not interoperable. All switches must use the same
ver version (with V1 and V2). The biggest difference between Versions 1
and 2 is that Version 2 has support for Token Ring VLANs. Version 3
sio has added new features such as the creation of a VTP primary server,
to prevent the accidental deletion of VLANs that occurred in V1 and V2.
n V3 also supports extended VLANs, private VLANs, Multiple Spanning
Tree Protocol (MSTP), and the ability to be disabled per interface as
num well as globally
ber
Note
Swi
tch
Note
#
vtp The vtp primary-server [vlan | mst | force] commands are only
available on older model switches. On newer switches running more
pri recent IOS/IOS-XE, use the vtp primary [vlan | mst | force] command
instead
mar
y-
ser
ver
g)#
By default, VTP pruning is disabled. You need to enable VTP pruning on
vtp only one switch in VTP server mode
pru
nin
g
Note
Only VLANs included in the pruning-eligible list can be pruned. VLANs 2 through 1001 are
pruning eligible by default on trunk ports. Reserved VLANs and extended-range VLANs
cannot be pruned. To change which eligible VLANs can be pruned, use the interface-specific
switchport trunk pruning vlan command:
Click here to view code image
Caution
Due to the inherent risk in having VTP servers overwrite each other and cause VLANs to
disappear, Cisco recommends as a best practice deploying VTP in transparent mode. If you
are going to use a client/server model, use Version 3 and the use of a VTPv3 primary server
to prevent accidental database overwrites.
Verifying VTP
Note
If trunking has been established before VTP is set up, VTP information is propagated
throughout the switch fabric almost immediately. However, because VTP information is
advertised only every 300 seconds (5 minutes), unless a change has been made to force an
update, it can take several minutes for VTP information to be propagated.
Switch#
Switch#
Note
When you delete a VLAN from a switch that is in VTP server mode, the VLAN is removed
from the VLAN database for all switches in the VTP domain. When you delete a VLAN from
a switch that is in VTP transparent mode, the VLAN is deleted only on that specific switch.
Note
You cannot delete the default VLANs for the different media types: Ethernet VLAN 1 and
FDDI or Token Ring VLANs 1002 to 1005.
Caution
When you delete a VLAN, any ports assigned to that VLAN become inactive. This “inactive”
state can be seen using the show interfaces switchport command for the port or ports in
question. The ports remain associated with the VLAN (and thus inactive) until you assign
those ports to a defined VLAN. Therefore, it is recommended that you reassign ports to a
new VLAN or the default VLAN before you delete a VLAN from the VLAN database.
3650 Switch
Note
2960 Switch
M P Description
o r
d o
e t
o
c
o
l
LACP 32768
system
priority
Auto-Desirable
Desirable-Desirable
Active-Active
Active-Passive
Allowed-VLAN list
desirable
active
Note
If you enter the channel-group command in the physical port interface mode without first
setting a port channel command in global configuration mode, the port channel will
automatically be created for you.
mode on
mode
desirable
dst-mixed-ip-port—Specifies
destination host IP address and the
TCP/UDP port
dst-port—Specifies destination
TCP/UDP port
src-dst-mixed-ip-port—Specifies
the source and destination host IP
address and TCP/UDP port
src-dst-port—Specifies the source
and destination TCP/UDP port
src-mixed-ip-port—Specifies the
source host IP address and the
TCP/UDP port
Port number
Note
Lower numbers are better.
Switch( Enters interface configuration mode for port
config) channel 2. The range for port channels is 1 to
# 128
interfa
ce
port-
channel
2
links 3
Switch( Returns to global configuration mode
config-
if)#
exit
DLSwitch (3650)
Switch> enable Moves to privileged EXEC
mode
ALSwitch1 (2960)
PortFast
BPDU Filter
UplinkFast
BackboneFast
Root Guard
Loop Guard
Verifying STP
Note
Default spanning-tree implementation for Catalyst 2950, 2960, 3550, 3560, and 3750
switches is PVST+. This is a per-VLAN implementation of 802.1D. Beginning from Cisco
IOS Release 15.2(4)E, the STP default mode is Rapid PVST+ on all switch platforms.
Note
Many access switches such as the Catalyst 2960, 3550, 3560, 3650, 9200, and 9300
support a maximum 128 spanning trees using any combination of PVST+ or Rapid PVST+.
The 2950 model supports only 64 instances. Any VLANs created in excess of 128 spanning
trees cannot have a spanning-tree instance running in them. There is a possibility of an L2
loop that could not be broken in the case where a VLAN without spanning tree is transported
across a trunk. It is recommended that you use MSTP if the number of VLANs in a common
topology is high.
Caution
Spanning tree is enabled by default on VLAN 1 and on all newly created VLANs up to the
spanning-tree limit. Disable spanning tree only if you are sure there are no loops in the
network topology. When spanning tree is disabled and loops are present in the topology,
excessive traffic and indefinite packet duplication can drastically reduce network
performance. Networks have been known to crash in seconds due to broadcast storms
created by loops.
configurati
Use the command no spanning-tree mst
on configuration to clear the MST configuration
Note
Tip
Note
Note
With the priority keyword, the range is 0 to 61440 in increments of 4096. The default is
32768. The lower the priority, the more likely the switch will be chosen as the root switch.
Only the following numbers can be used as priority values:
Caution
Cisco recommends caution when using this command. Cisco further recommends that the
spanning-tree vlan x root primary or the spanning-tree vlan x root secondary command
be used instead to modify the switch priority.
Note
For the hello-time command, the range is 1 to 10 seconds. The default is 2 seconds.
For the forward-time command, the range is 4 to 30 seconds. The default is 15 seconds.
PortFast
Note
By default, PortFast is disabled on all interfaces.
Note
Note
Note
Note
Enables BPDU
Switch(config)# spanning- Guard globally
tree portfast bpduguard
default
Note
By default, BPDU
Guard is disabled
BPDU Filter
Note
Caution
Note
Note
UplinkFast cannot be enabled on VLANs that have been configured for switch priority.
Note
UplinkFast is most useful in access layer switches, or switches at the edge of the network. It
is not appropriate for backbone devices.
Note
You can configure the UplinkFast feature for Rapid PVST+ or for the MSTP, but the feature
remains disabled (inactive) until you change the spanning-tree mode to PVST+.
BackboneFast
Switch(co Enables BackboneFast. BackboneFast is
nfig)# initiated when a root port or blocked port
spanning- receives an inferior BPDU from its
tree designated bridge
backbonef
ast
Note
You can configure the BackboneFast feature for Rapid PVST+ or for the MSTP, but the
feature remains disabled (inactive) until you change the spanning-tree mode to PVST+.
Note
If you use BackboneFast, you must enable it on all switches in the network.
Root Guard
You can use Root Guard to limit which switch can
become the root bridge. Root Guard should be enabled
on all ports where the root bridge is not anticipated,
such as access ports.
Note
You cannot enable both Root Guard and Loop Guard at the same time.
Note
Root Guard enabled on an interface applies to all VLANs to which the interface belongs.
Note
Do not enable Root Guard on interfaces to be used by the UplinkFast feature.
Loop Guard
Loop Guard is used to prevent alternate or root ports
from becoming designated ports due to a failure that
leads to a unidirectional link. Loop Guard operates only
on interfaces that are considered point to point by the
spanning tree. Spanning tree determines a port to be
point to point or shared from the port duplex setting.
You can use Loop Guard to prevent alternate or root
ports from becoming designated ports because of a
failure that leads to a unidirectional link. This feature is
most effective when it is enabled on the entire switched
network. When Loop Guard is enabled, spanning tree
does not send BPDUs on root or alternate ports.
Note
Both the port duplex and the spanning-tree link type can be set manually.
Note
You cannot enable both Loop Guard and Root Guard on the same port. The Loop Guard
feature is most effective when it is configured on the entire switched network.
Switch# show Shows which ports are alternate or
spanning-tree root ports
active
Note
By default, UDLD is disabled
gigabitethe
rnet 1/0/1
Note
Note
Lin Description
k
Ty
pe
spanning-tree
mode rapid-pvst
spanning-tree link-
type auto
spanning-tree link-
type point-to-point
spanning-tree link-
type shared
Note
Caution
Changing spanning-tree modes can disrupt
traffic because all spanning-tree instances are
stopped for the old mode and restarted in the
new mode
Note
Note
port-priority The priority range is 0 to 240 in increments of
0 16, where the lower the number, the higher the
priority. The default is 128. The range and
increment values are platform and IOS version
dependent
Note
VERIFYING STP
SPANNING-TREE MIGRATION
EXAMPLE: PVST+ TO RAPID-PVST+
The topology in Figure 2-1 is used for this migration
example and adds to the configuration of the previous
example.
Note
Because the VLAN networks are directly connected to the router, routing between these
networks does not require a dynamic routing protocol. However, if the router is configured
with a dynamic routing protocol, then these networks should be advertised or redistributed to
other routers.
Note
Routes to the networks associated with these VLANs appear in the routing table as directly
connected networks.
Note
In production environments, VLAN 1 should not be used as the management VLAN because
it poses a potential security risk; all ports are in VLAN 1 by default, and it is an easy mistake
to add a nonmanagement user to the management VLAN.
Note
Instead of creating a subinterface for the native VLAN (VLAN 1 in the preceding example), it
is possible to use the physical interface for native (untagged) traffic. In other words, the
physical interface (FastEthernet0/0) would get IP address 192.168.1.1 255.255.255 and it
would handle all VLAN 1 native untagged traffic. You would still create a subinterface for
VLAN 10 as previously described.
INTER-VLAN COMMUNICATION ON A
MULTILAYER SWITCH THROUGH A
SWITCH VIRTUAL INTERFACE
Note
Rather than using an external router to provide inter-VLAN communication, a multilayer
switch can perform the same task through the use of a switched virtual interface (SVI).
Note
For an SVI to go to up/up and be added to the routing table, the VLAN for the SVI must be
created, an IP address must be assigned, and at least one interface must support it (trunk or
access).
ISP Router
CORP Router
0/9 - 12
Note
This configuration uses traditional OSPFv3 for routing. For more information on OSPFv3,
see Chapter 5, “OSPF.”
ISP Router
Note
CORP Router
Note
EIGRP router ID
IP default network
Summarize to 0.0.0.0/0
Verifying EIGRP
Troubleshooting EIGRP
100 All routers must use the same AS number to communicate with
each other
Tip
The bandwidth command is used for metric calculations only. It
does not change interface performance
netwo
rk
10.0.
0.0
0.255
.255.
255
Tip
The use of a wildcard mask or network mask is optional. Wildcard masks should be used
when advertising subnetted networks.
Tip
If you do not use the wildcard mask, the EIGRP process assumes that all directly connected
networks that are part of the overall major network will participate in the EIGRP process and
that EIGRP will attempt to establish neighbor relationships from each interface that is part of
that Class A, B, or C major network.
Tip
If you use the network 172.16.1.0 0.0.0.255 command with a wildcard mask, the command
specifies that only interfaces on the 172.16.1.0/24 subnet will participate in EIGRP. EIGRP
automatically summarizes routes on the major network boundary when in a discontiguous IP
address network topology when the auto-summary command is enabled.
Tip
Since Cisco IOS Software Release 15.0, EIGRP no longer automatically summarizes
networks at the classful boundary by default.
Note
Note
Note
Note
Note
metric weights
network
authentication key-chain
Router(config-
router- af- authentication mode
interface)#
bandwidth-percent
hello-interval
hold-time
passive-interface
summary-address
maximum-paths
Router(config-
router- af- redistribute
topology)#
variance
traffic-share
Note
EIGRP ROUTER ID
Note
There is no IPv6 form of the router ID. Even if a router is using IPv6 exclusively, the router ID
will still be in the format of an IPv4 address.
Note
EIGRP for IPv4 and EIGRP for IPv6 use the same commands for authentication.
Note
Note
(Optional) Specifies
Router(config-keychain- the period during
key)# accept-lifetime which the key can be
[local] start-time received
{infinite | end-time |
duration seconds} local keyword
specifies time in local
time zone
Note
Note
local keyword
specifies time in local
time zone
Note
Note
Note
For the start time and the end time to have relevance, ensure that the router knows the
correct time. Recommended practice dictates that you run NTP or some other time-
synchronization method if you intend to set lifetimes on keys.
Note
EIGRP support for SHA was introduced in Cisco IOS 15 together with EIGRP using named
mode configuration.
Note
Both MD5 and SHA can be used in either IPv4 or IPv6. Not all permutations are shown in
the following example.
75
Note
There is an optional
administrative distance
parameter for this
command
Note
Note
EIGRP hello and hold timers do not have to match between neighbors to successfully
establish a neighbor relationship. However, the reciprocating hello interval should be within
the defined hold time.
Note
The AS number in these commands must match the AS number of EIGRP on the router for
these changes to take effect.
Tip
It is recommended that you match the timers between neighbors; otherwise, you may
experience flapping neighbor relationships or network instability.
serial 0/1/0
Note
Note
Use this method when you want to draw all traffic to unknown destinations to a default route
at the core of the network.
Note
This method is effective for advertising default connections to the Internet, but it will also
redistribute all static routes into EIGRP.
Note
For EIGRP to propagate the route, the network specified by the ip default-network
command must be known to EIGRP. This means that the network must be an EIGRP-
derived network in the routing table, or the static route used to generate the route to the
network must be redistributed into EIGRP, or advertised into these protocols using the
network command.
Tip
In a complex topology, many networks can be identified as candidate defaults. Without any
dynamic protocols running, you can configure your router to choose from several candidate
default routes based on whether the routing table has routes to networks other than
0.0.0.0/0. The ip default-network command enables you to configure robustness into the
selection of a gateway of last resort. Rather than configuring static routes to specific next
hops, you can have the router choose a default route to a particular network by checking in
the routing table.
Tip
The network 0.0.0.0 command enables EIGRP for all interfaces on the router.
0.0.0.0 75
Note
Summarizing to a default route is effective only when you want to provide remote sites with a
default route, and not propagate the default route toward the core of your network.
Note
Because summaries are configured per interface, you do not need to worry about using
distribute lists or other mechanisms to prevent the default route from being propagated
toward the core of your network.
Note
With the maximum-paths router configuration command, up to 32 equal-cost entries can be
in the routing table for the same destination. The default is 4.
Note
Setting maximum-path to 1 disables load balancing.
UNEQUAL-COST LOAD BALANCING:
VARIANCE
Note
If a path is not a feasible successor, it is not used in load balancing.
Note
EIGRP variance can be set to a number between 1 and 128.
topology)#
traffic-share min
across-interfaces
Note
The ip bandwidth-percent command relies on the value set by the bandwidth command.
Note
Tip
Tip
Note
Note
You can use the optional arguments (connected, redistributed, static, and summary) as
part of the same command on a single line:
Click here to view code image
Note
The same keywords in the eigrp stub command that work with EIGRP for IPv4 will also
work with EIGRP for IPv6: connected | summary | static | redistributed | receive-only
Note
The 64-bit metric calculations work only in EIGRP using named mode configurations. EIGRP
classic mode uses 32-bit metric calculations. With the calculation of larger bandwidths,
EIGRP can no longer fit the computed metric into a 4-byte unsigned long value that is
needed by the Cisco RIB. To set the RIB scaling factor for EIGRP, use the metric rib-scale
command. When you configure the metric rib-scale command, all EIGRP routes in the RIB
are cleared and replaced with the new metric values.
Note
The EIGRP Wide Metrics feature also introduces K6 as an additional K value for future use.
Note
tos is a reference to the original Interior Gateway Routing Protocol (IGRP) intention to have
IGRP perform type-of-service routing. Because this was never adopted into practice, the tos
field in this command is always set to zero (0).
Note
With default settings in place, the metric of EIGRP is reduced to the slowest bandwidth plus
the sum of all the delays of the exit interfaces from the local router to the destination
network.
Tip
For two routers to form a neighbor relationship in EIGRP, the K-values must match.
Caution
Unless you are very familiar with what is occurring in your network, it is recommended that
you do not change the K-values.
VERIFYING EIGRP
Tip
Tip
TROUBLESHOOTING EIGRP
Note
R1 Router
Note
The complete command is exit-address-
family
R3 Router
Note
Configuring OSPFv2
Loopback interfaces
Router ID
DR/BDR elections
Passive interfaces
Modifying cost metrics
Timers
IP MTU
Route summarization
Not-so-stubby areas
Totally NSSA
Virtual Links
Troubleshooting OSPF
CONFIGURING OSPF
Note
The process ID number of one router does not have to
match the process ID of any other router. Unlike
Enhanced Interior Gateway Routing Protocol (EIGRP),
matching this number across all routers does not ensure
that network adjacencies will form
0.0.0.255
area 0
Caution
Running two different OSPF processes does not create multiarea OSPF; it merely creates
two separate instances of OSPF that do not communicate with each other. To create
multiarea OSPF, you use two separate network statements and advertise two different links
into different areas. See the following section for examples.
172.16.0.0 =
10101100.00010000.00000000.00000000
0.0.255.255 = 00000000.00000000.11111111.11111111
Result = 10101100.00010000.xxxxxxxx.xxxxxxxx
172.16.x.x (anything between 172.16.0.0 and
172.16.255.255 matches the example statement)
Tip
An octet in the wildcard mask of all 0s means that the octet has to match the address
exactly. An octet in the wildcard mask of all 1s means that the octet can be ignored.
172.16.8.0 =
10101100.00010000.00001000.00000000
0.0.0.7.255 =
00000000.00000000.00000111.11111111
Result =
10101100.00010000.00001xxx.xxxxxxxx
00001xxx = 00001000 to 00001111 = 8–15
xxxxxxxx = 00000000 to 11111111 = 0–255
Anything between 172.16.8.0 and 172.16.15.255 matches
the example statement
Tip
If you have problems determining which wildcard mask to use to place your interfaces into
an OSPF area, use the ip ospf process ID area area number command directly on the
interface.
Tip
If you assign interfaces to OSPF areas without first using the router ospf x command, the
router creates the router process for you, and it shows up in show running-config output.
CONFIGURING TRADITIONAL OSPFV3
OSPFv3 is a routing protocol for IPv4 and IPv6. Much of
OSPFv3 is the same as in OSPFv2. OSPFv3, which is
described in RFC 5340, expands on OSPFv2 to provide
support for IPv6 routing prefixes and the larger size of
IPv6 addresses. OSPFv3 also supports IPv6 and IPv4
unicast address families.
Note
Note
Note
If a router ID has not been created first, the router may
return a “NORTRID” warning (no router ID) stating that
the process could not pick a router ID. It will then tell you
to manually configure a router ID
-id
In OSPFv3 for IPv6, it is possible that no IPv4 addresses will be
192.16 configured on any interface. In this case, the user must use the
router-id command to configure a router ID before the OSPFv3
8.254. process will be started. If an IPv4 address does exist when
OSPFv3 for IPv6 is enabled on an interface, that IPv4 address is
255 used for the router ID. If more than one IPv4 address is available,
a router ID is chosen using the same rules as for OSPF Version
2.
Caution
As with OSPFv2, clearing the OSPFv3 database and forcing a recalculation of the shortest
path first (SPF) algorithm is processor intensive and should be used with caution.
Note
Devices running OSPFv2 will not communicate with devices running OSPFv3 for IPv4.
Note
To use the IPv4 unicast address families (AFs) in OSPFv3, you must enable IPv6 on a link,
although the link may not be participating in IPv6 unicast AF.
Note
With the OSPFv3 address families feature, users may have two processes per interface, but
only one process per AF. If the AF is IPv4, an IPv4 address must first be configured on the
interface, but IPv6 must be enabled on the interface.
Configuring the IPv6 Address Family in OSPFv3
Note
Note
Other commands that are available in AF mode include the following:
area nssa
area stub
passive-interface
router-id
on-key
The password can be any continuous string of
cleartxt characters that can be entered from the keyboard,
up to eight characters in length. To be able to
exchange OSPF information, all neighboring
routers on the same network must have the same
password
Tip
It is recommended that you keep no more than one key per interface. Every time you add a
new key, you should remove the old key to prevent the local system from continuing to
communicate with a hostile system that knows the old key.
Note
If the service password-encryption command is not used when configuring OSPF
authentication, the key will be stored as plain text in the router configuration. If you use the
service password-encryption command, there will be an encryption type of 7 specified
before the encrypted key.
Tip
OSPFv3 requires the use of IPsec to enable authentication. Crypto images are therefore
needed for authentication, as they are the only images that include the IPsec application
programming interface (API) needed for use with OSPFv3.
Note
Authentication and encryption do not need to be done on both the interface and on the area,
but rather only in one location. The following section shows both methods.
Note
RFC 7166 adds non-IPsec cryptographic authentication to OSPFv3. It is now possible to use
the SHA encryption method previously described thanks to the addition of a new
Authentication Trailer (AT) to OSPFv3 packets. The command to apply the key chain to an
interface for use with OSPFv3 is ospfv3 x authentication key-chain. The key chain can
also be applied to an entire area with the area x authentication key-chain router
configuration command.
Note
Loopback Interfaces
Router ID
10.1.1.
1
Note
To choose the router ID at the time of OSPF process initialization, the router uses the
following criteria in this specific order:
2. Use the highest IP address of all active loopback interfaces on the router.
3. Use the highest IP address among all active nonloopback interfaces.
Note
To have the manually configured router ID take effect, you must clear the OSPF routing
process with the clear ip ospf process command.
Note
There is no IPv6 form of router ID. All router IDs are 32-bit numbers in the form of an IPv4
address. Even if a router is running IPv6 exclusively, the router ID is still in the form of an
IPv4 address.
DR/BDR Elections
ip
The assigned priority can be between 0 and 255. A priority of 0
ospf makes the router ineligible to become a designated router (DR) or
backup designated router (BDR). The highest priority wins the
prior election and becomes the DR; the second highest priority becomes
the BDR. A priority of 255 guarantees at least a tie in the election—
ity assuming another router is also set to 255. If all routers have the
same priority, regardless of the priority number, they tie. Ties are
50 broken by the highest router ID. The default priority setting is 1
Tip
Do not assign the same priority value to more than one router
Passive Interfaces
ernet 0/0
128
The cost of a link is determined by dividing the reference
bandwidth by the interface bandwidth
Or
Router
(confi Changes the cost to a value of 1564
g-if)#
ip The bandwidth of the interface is a number
ospf between 1 and 10 000 000. The unit of
cost measurement is kilobits per second (Kbps).
1564 The cost is a number between 1 and 65 535.
The cost has no unit of measurement; it is just
a number
Note
Tip
Note
If other routers are configured incorrectly, causing, for example, a redistribution of a large
number of prefixes, large numbers of LSAs can be generated. This can drain local CPU and
memory resources. With the max-lsa x feature enabled, the router keeps count of the
number of received (non-self-generated) LSAs that it keeps in its LSDB. An error message is
logged when this number reaches a configured threshold number, and a notification is sent
when it exceeds the threshold number.
Timers
Note
Note
The default hello timer is 10 seconds on multiaccess and point-to-point segments. The
default hello timer is 30 seconds on nonbroadcast multiaccess (NBMA) segments such as
Frame Relay, X.25, or ATM.
Note
The default dead interval timer is 40 seconds on multiaccess and point-to-point segments.
The default hello timer is 120 seconds on NBMA segments such as Frame Relay, X.25, or
ATM.
Note
If you change the hello interval timer, the dead interval timer will automatically be adjusted to
four times the new hello interval timer.
IP MTU
The IP maximum transmission unit (MTU) parameter
determines the maximum size of a packet that can be
forwarded without fragmentation.
Caution
The MTU size must match between all OSPF neighbors on a link. If OSPF routers have
mismatched MTU sizes, they will not form a neighbor adjacency.
PROPAGATING A DEFAULT ROUTE
Note
This works for either IPv4 or IPv6 address-family
configuration mode
ROUTE SUMMARIZATION
In OSPF, there are two different types of
summarization:
Note
Interarea route summarization is to be configured on an ABR only.
Note
By default, ABRs do not summarize routes between areas.
Note
External route summarization is to be configured on an ASBR only.
Note
By default, ASBRs do not summarize routes.
Note
Note
It is also possible to use a prefix list or a route map with the distribute-list command instead
of an ACL.
Note
Note
Recall that the summary-address command is replaced by the summary-prefix command
under OSPFv3.
OSPF SPECIAL AREA TYPES
This section covers four different special areas with
respect to OSPF:
Stub areas
Totally NSSA
Stub Areas
Note
Note
Note
Note
Note
Totally NSSA
Note
Note
VIRTUAL LINKS
In OSPF, all areas must be connected to a backbone
area. If there is a break in backbone continuity, or the
backbone is purposefully partitioned, you can establish
a virtual link. The two endpoints of a virtual link are
ABRs. The virtual link must be configured in both
routers. The configuration information in each router
consists of the other virtual endpoint (the other ABR)
and the non-backbone area that the two routers have in
common (called the transit area). A virtual link is a
temporary solution to a topology problem.
Note
Virtual links cannot be configured through stub areas.
Note
One of these two routers must be connected to the backbone.
Note
The routers establishing the virtual link do not have to be directly connected.
Note
According to RFC 5838, OSPFv3 only supports virtual links for the IPv6 address family.
Virtual links are not supported for the IPv4 address family.
database network
Router# show ip Displays locally generated
ospf database LSAs
router self-
originate
TROUBLESHOOTING OSPF
Austin Router
OR
Houston Router
OR
Galveston Router
OR
CONFIGURATION EXAMPLE:
MULTIAREA OSPF
Figure 5-3 shows the network topology for the
configuration that follows, which demonstrates how to
configure multiarea OSPF using the commands covered
in this chapter.
Figure 5-3 Network Topology for Multiarea OSPF
Configuration
ASBR Router
ABR-2 Router
CONFIGURATION EXAMPLE:
TRADITIONAL OSPFV3
Figure 5-4 shows the network topology for the
configuration that follows, which demonstrates how to
configure traditional OSPFv3 using the commands
covered in this chapter.
Figure 5-4 Network Topology for Traditional
OSPFv3 Configuration
R3 Router
R2 Router
R2(config)# Enables the forwarding of IPv6 unicast
ipv6 datagrams globally on the router. This
unicast- command is required before any IPv6
routing routing protocol can be configured
R1 Router
R4 Router
R4(config)# Enables the forwarding of IPv6 unicast
ipv6 datagrams globally on the router. This
unicast- command is required before any IPv6
routing routing protocol can be configured
R1 Router
R2 Router
Router(config-
router)# 255 = Reliability out of 255
redistribute
ospf 1 metric 1 = Load out of 255
1000 100 255 1
1500 1500 = Maximum transmission
unit (MTU) size
Note
The default seed metrics are as follows:
Connected: 1
Static: 1
RIP: Infinity
EIGRP: Infinity
Note
If both the metric keyword in the redistribute command and the default- metric command
are used, the value of the metric keyword in the redistribute command takes precedence.
Tip
If a value is not specified for the metric option, and no value is specified using the default-
metric command, the default metric value is 0, except for OSPF, where the default cost is
20. RIP and EIGRP must have the appropriate metrics assigned to any redistributed routes;
otherwise, redistribution will not work. BGP will use the IGP metric, while both connected
networks and static routes will receive an initial default value of 1.
Tip
The default-metric command is useful when routes are being redistributed from more than
one source because it eliminates the need for defining the metrics separately for each
redistribution.
Tip
Redistributed routes between EIGRP processes do not need metrics configured.
Redistributed routes are tagged as EIGRP external routes and will appear in the routing
table with a code of D EX.
REDISTRIBUTING CONNECTED
NETWORKS
ASSIGNING E1 OR E2 ROUTES IN
OSPF
Tip
Use external type 1 (E1) routes when there are multiple Autonomous System Border
Routers (ASBRs) advertising an external route to the same autonomous system to avoid
suboptimal routing (see Figure 6-1).
Tip
Use external type 2 (E2) routes if only one ASBR is advertising an external route to the AS
(see Figure 6-2).
Figure 6-2 Network Topology with One ASBR
Note
subnets
Note
1 subnets
Note
Router# show
ipv6 route
Router# show
ipv6 eigrp
topology
Router# show
ipv6
protocols
Router# show
ospfv3
database
Note
Note
Routing Protocol is
"eigrp 10"
Outgoing update
filter list for all
interfaces is 2
Redistributed
ospf 1 filtered by
5
Serial 0/2/0
filtered by 4
Incoming update
filter list for all
interfaces is 1
GigabitEthernet
0/0/0 filtered by 3
Note
For each interface and routing process, Cisco IOS permits the following:
Caution
For OSPF, route filters have no effect on LSAs or the LSDB. A basic requirement of link-
state routing protocols is that routers in an area must have identical LSDBs.
Note
OSPF routes cannot be filtered from entering the OSPF database. The distribute-list in
command filters routes only from entering the routing table, but it doesn’t prevent link-state
packets (LSPs) from being propagated.
Note
The command distribute-list out works only on the routes being redistributed by the ASBR
into OSPF. It can be applied to external type-2 and external type-1 routes but not to intra-
area and interarea routes.
Para Description
mete
r
Tip
You must define a prefix list before you can apply it as a route filter.
Tip
There is an implicit deny statement at the end of each prefix list.
Tip
The range of sequence numbers that can be entered is from 1 to 4 294 967 294.
If a sequence number is not entered when configuring this command, a default sequence
numbering is applied to the prefix list. The number 5 is applied to the first prefix entry, and
subsequent unnumbered entries are incremented by 5.
8 le 24
Note
show ipv6
prefix-list
[detail |
summary]
Note
When used to filter redistribution, route map permit or deny statements determine whether
the route will be redistributed. Routes without a match will not be redistributed. Like an
access list or prefix list, a route map stops processing at the first match and there is also an
implicit deny statement at the end.
Hull(config-
route-map)#
set metric-
type type-1
MANIPULATING REDISTRIBUTION
USING ROUTE TAGGING
There are several ways redistribution can be enabled,
including one-way one-point, two-way one-point, one-
way multipoint, and two-way multipoint redistribution.
Two-way multipoint redistribution can introduce
routing loops in the network. One option to prevent
redistribution of already redistributed routes is to use
route tagging. In two-way multipoint redistribution
scenarios, route tags must be applied and filtered in
both directions and on both routers performing
redistribution.
Hull(config-
route-map)#
match tag 11
Hull(config-
route-map)# set
tag 22
Hull(config-
route-map)# set
tag 11
CHANGING ADMINISTRATIVE
DISTANCE
The commands to change the administrative distance
(AD) for internal and external routes are as follows.
Note
Note
Note
Note
Note
Tip
Packets that are generated by the router are not normally policy routed. Using the ip local
policy route-map [map-name] command will make these packets adhere to a policy. For
example, you may want packets originating from the router to take a route other than the
best path according to the routing table.
Connection loss
Timeout
Round-trip time threshold
One-way jitter
One-way latency
DNS
HTTP
DHCP
FTP
Note
Cisco IOS IP SLAs are used to perform network performance measurements within Cisco
Systems devices using active traffic monitoring.
Tip
SLAs use time-stamp information to calculate performance metrics such as jitter, latency,
network and server response times, packet loss, and mean opinion score.
source- The ICMP echo operation does not require the IP SLA
responder to be enabled
ip
10.1.1.1
time now The start time for the SLA can be set to a particular time and
day, to be recurring, to be activated after a threshold is
life passed, and kept as an active process for a configurable
forever number of seconds
g start-
time
07:00
life
3600
Tip
When using udp-echo, udp-jitter, or tcp-connect IP SLA operations, you must configure
the target device as an IP SLA responder with either the udp-echo or tcp-connect
commands.
Note
Note
Customer requirements:
1. Define probe(s).
2. Define tracking object(s).
3a. Define the action on the tracking object(s).
or
3b. Define policy routing using the tracking object(s).
4. Verify IP SLA operations.
Note
Only the configuration on R1 for neighbor ISP 1 is shown. Typically, in a multihoming
scenario, R1 would be configured with two SLAs, two tracking objects, and two default
routes (one for each ISP) with different AD values.
Tip
OR
Note
Note
Effective with Cisco IOS Releases 12.4(4)T, 12.2(33)SB, and 12.2(33)SXI, the ip sla
monitor command is replaced by the ip sla command.
Note
Effective with Cisco IOS Releases 12.4(4)T, 12.2(33)SB, and 12.2(33)SXI, the type echo
protocol ipIcmpEcho command is replaced by the icmp-echo command.
Note
Effective with Cisco IOS Releases 12.4(20)T, 12.2(33)SXI1, and 12.2(33)SRE and Cisco
IOS XE Release 2.4, the track rtr command is replaced by the track ip sla command.
Note
Effective with Cisco IOS Releases 12.4(20)T, 12.2(33)SXI1, and 12.2(33)SRE and Cisco
IOS XE Release 2.4, the show ip sla monitor configuration command is replaced by the
show ip sla configuration command.
Note
Effective with Cisco IOS Releases 12.4(20)T, 12.2(33)SXI1, and 12.2(33)SRE and Cisco
IOS XE Release 2.4, the show ip sla monitor statistics command is replaced by the show
ip sla statistics command.
Chapter 7
BGP
BGP timers
EBGP multihop
Attributes
Route selection decision process—the BGP best
path algorithm
Weight attribute
Verifying BGP
Troubleshooting BGP
Default routes
Route aggregation
Route reflectors
Regular expressions
Tip
Tip
Note
Tip
Routes learned by the BGP process are propagated by default but are often filtered by a
routing policy.
Caution
If you misconfigure a network command, such as the example network 192.168.1.1 mask
255.255.255.0, BGP will look for exactly 192.168.1.1/24 in the routing table. It may find
192.168.1.0/24 or 192.168.1.1/32; however, it may never find 192.168.1.1/24. Because there
is no exact match for the 192.168.1.1/24 network, BGP does not announce it to any
neighbors.
Tip
If you issue the command network 192.168.0.0 mask 255.255.0.0 to advertise a CIDR
block, BGP will look for 192.168.0.0/16 in the routing table. It may find 192.168.1.0/24 or
192.168.1.1/32; however, it may never find 192.168.0.0/16. Because there is no exact match
for the 192.168.0.0/16 network, BGP does not announce it to any neighbors. In this case,
you can configure a static route towards the Null interface so BGP can find an exact match
in the routing table:
Click here to view code image
After finding this exact match in the routing table, BGP will announce the 192.168.0.0/16
network to any neighbors.
Note
When configuring BGP on a device that is enabled only for IPv6 (that is, the device does not
have an IPv4 address), you must manually configure the BGP router ID for the device. The
BGP router ID, which is represented as a 32-bit value using an IPv4 address syntax, must
be unique to the BGP peers of the device.
CONFIGURING BGP: ADDRESS
FAMILIES
Note
on dot
Note
BGP TIMERS
Note
Tip
Note
EBGP MULTIHOP
By default, EBGP neighbors exchange packets with a
TTL (Time To Live) set to 1. If you attempt to establish
an EBGP session between loopbacks, BGP packets will
be dropped due to an expired TTL.
Note
If redundant links exist between two EBGP neighbors and loopback addresses are used,
you must configure ebgp-multihop. Otherwise, the router decrements the TTL before giving
the packet to the loopback interface, meaning that the normal IP forwarding logic discards
the packet.
ATTRIBUTES
Routes learned via BGP have associated properties that
are used to determine the best route to a destination
when multiple paths exist to a particular destination.
These properties are referred to as BGP attributes, and
an understanding of how BGP attributes influence route
selection is required for the design of robust networks.
After describing the route selection process, this section
describes the attributes that BGP uses in the route
selection process.
1. Prefer the path with the highest weight (local to the router).
2. If the weights are the same, prefer the path with the highest
local preference (global within the AS).
3. If the local preferences are the same, prefer the path that
was originated by the local router (next hop = 0.0.0.0).
5. If all paths have the same AS path length, prefer the path
with the lowest origin code (where IGP is lower than EGP,
and EGP is lower than Incomplete).
6. If the origin codes are the same, prefer the path with the
lowest Multi-exit Discriminator (MED) attribute.
7. If the paths have the same MED, prefer the external path
(EBGP) over the internal path (IBGP).
8. If the paths are still the same, prefer the path through the
lowest IGP metric to the BGP next hop.
9. Determine if multiple paths require installation in the
routing table for BGP Multipath.
10. For EBGP paths, select the oldest route to minimize the
effects of route flapping.
11. Prefer the route with the lowest neighbor BGP router ID
value.
13. If the BGP router IDs are the same, prefer the router with
the lowest neighbor IP address.
Weight Attribute
Weight is a Cisco-specific parameter. The weight is
configured locally on a router and is not propagated to
any other routers. This attribute applies when one
router is used with multiple exit points out of an AS, as
opposed to the local preference attribute, which is used
when two or more routers provide multiple exit points.
Note
The weight attribute is local to the router and not propagated to other routers. By default, the
weight attribute is 32 768 for paths that the router originates, and 0 for other paths. Routes
with a higher weight are preferred when there are multiple routes to the same destination.
Using AS Path Access Lists to Manipulate the
Weight Attribute
Refer to Figure 7-4 for the configuration that follows,
which demonstrates how to configure the weight
attribute using AS path access lists.
Note
The local preference value can be a number between 0 and 429 496 729. Higher is
preferred. If a local-preference value is not set, the default is 100.
Note
The local preference attribute is local to the AS; it is exchanged between IBGP peers but not
advertised to EBGP peers. Use the local preference attribute to force BGP routers to prefer
one exit point over another.
Note
The remove-private-as
command is available for
EBGP neighbors only
Note
By default, BGP compares the MED attributes of routes coming from neighbors in the same
external AS (such as AS 300). Mazatlan can only compare the MED attribute coming from
Houston (120) to the MED attribute coming from Galveston (200) even though the update
coming from Acapulco has the lowest MED value. Mazatlan will choose Houston as the best
path for reaching network 192.168.100.0.
Note
The most recent IETF decision about BGP MED assigns a value of infinity to the missing
MED, making the route that is lacking the MED variable the least preferred. The default
behavior of BGP routers that are running Cisco IOS Software is to treat routes without the
MED attribute as having a MED of 0, making the route that is lacking the MED variable the
most preferred. To configure the router to conform to the IETF standard, use the bgp
bestpath missing-as-worst command.
VERIFYING BGP
TROUBLESHOOTING BGP
Whenever the routing policy changes due to a
configuration change, BGP peering sessions must be
reset by using the clear ip bgp command. Cisco IOS
Software supports the following three mechanisms to
reset BGP peering sessions:
Tip
Tip
Note
To determine whether a BGP router supports route refresh capability, use the show ip bgp
neighbors command. The following message is displayed in the output when route refresh
is supported:
Note
When a BGP session is reset and soft reconfiguration is used, several commands enable
you to monitor BGP routes that are received, sent, or filtered:
Click here to view code image
Caution
The clear ip bgp * command is both processor and memory intensive and should be used
only in smaller environments. A more reasonable approach is to clear only a specific
network or a specific session with a neighbor with the clear ip bgp specific-network
command. However, you can use this command whenever the following changes occur:
Additions or changes to the BGP-related access lists
DEFAULT ROUTES
ROUTE AGGREGATION
REGULAR EXPRESSIONS
A regular expression is a pattern to match against an
input string, such as those listed in the following table.
Ch Description
ara
cte
r
65005 i
*>i172.30.0.0 172.20.50.1 100 0
65005 65004 i
* i 192.168.28.1 100 0
65002 65003 65004 i
*>i192.168.3.3/32 0.0.0.0 0 32768 i
65005 i
* i172.30.0.0 192.168.28.1 100 0
65002 65003
65004 i
65003 i
*>i172.24.0.0 172.20.50.1 100 0
65005 i
* i 192.168.28.1 100 0
65002 65003 65004
65005 i
*>i172.30.0.0 172.20.50.1 100 0
65005 65004
To help overcome the confusing nature of this syntax, Cisco IOS Software introduced the ip
prefix-list command in Cisco IOS Release 12.0.
The result here is that all four IBGP neighbors have the
same basic BGP configuration assigned to them.
Tip
A peer group can be, among others, configured to do the following:
Configuring HSRP
Verifying HSRP
Preempt
Authentication
Interface tracking
Debugging HSRP
Configuring VRRP
Interface tracking
Verifying VRRP
Debugging VRRP
10.0.0.0– 10.0.0.0/8 A
10.255.255.255
172.16.0.0– 172.16.0.0/ B
172.31.255.255 12
192.168.0.0– 192.168.0.0 C
192.168.255.255 /16
Note
It is possible to overload a dynamic pool instead of an interface. This allows the inside private
devices to share multiple public IP address instead of only one. Use the command ip nat
inside source list acl pool pool overload to achieve this. Also, instead of a pool of multiple
addresses, the pool used for overloading could be a pool of only one public address. For
example, the command ip nat pool MyPool 203.0.113.1 203.0.113.1 netmask 255.255.255.0
creates a pool of one public address that can be overloaded.
Note
NAT virtual interfaces are not supported in the Cisco IOS XE software.
1.1.1.1 = Global IP
address
2.2.2.2 = Local IP
address
3.3.3.3 = Local IP
address
4.4.4.4 = Global IP
address
Note
The default timeout for a translation entry in a NAT table is 24 hours.
ISP Router
FIRST-HOP REDUNDANCY
PROTOCOLS
A first-hop redundancy protocol (FHRP) is a networking
protocol that is designed to protect the default gateway
by allowing two or more routers or Layer 3 switches to
provide backup for that address. If one first-hop device
fails, the backup router will take over the address, by
default, within a few seconds. FHRPs are equally at
home on routers as Layer 3 (L3) switches. Hot Standby
Router Protocol (HSRP) and Virtual Router
Redundancy Protocol (VRRP) are implemented for both
IPv4 and IPv6 environments. Platform IOS matrices
should be consulted for next-hop redundancy protocol
support.
HSRP Version 1
version
Note
Standby 100
priority
Standby 10
track
interface
priority
Standby 3 seconds
hello
time
Standby 10 seconds
holdtime
Configuring Basic HSRP
Note
Note
HSRP configuration commands for a router are the same as HSRP configuration commands
on a Layer 3 switch platform.
Verifying HSRP
Preempt
Note
Note
Note
Note
Interface Tracking
Tip
172.19.10.1
Note
All other relevant HSRP commands (preempt, priority, authentication, tracking, and so on)
are identical in HSRPv1 and HSRPv2.
Note
When configuring the IPv6 virtual address, if an IPv6 global address is used, it must include
an IPv6 prefix length. If a link-local address is used, it does not have a prefix.
Debugging HSRP
Note
HSRP is Cisco proprietary. Virtual Router Redundancy Protocol (VRRP) is an IEEE
standard.
Note
VRRP might not be completely supported on platforms such as the Catalyst 3750-E, 3750,
3560, or 3550. For example, the Catalyst 3560 supports VRRP for IPv4, but not for IPv6.
The IPv4 implementation supports text authentication, but not message digest 5 (MD5)
authentication key-chain implementation. Also, the Switch Database Management (SDM)
should prefer the routing option for IPv4 or the dual-ipv4-and-ipv6 option for dual-stack or
IPv6 implementations. Only VRRP Version 3 (VRRPv3) is supported on the Catalyst 3650
and Catalyst 9200/9300 platforms. Verify VRRP capabilities by platform datasheets and
appropriate Cisco IOS command and configuration guides.
Note
The VRRPv3 Protocol Support feature provides the capability to support IPv4 and IPv6
address families, while VRRPv2 only supports IPv4 addresses. To enable VRRPv3, use the
fhrp version vrrp v3 command in global configuration mode. When VRRPv3 is in use,
VRRPv2 is disabled by default.
Configuring VRRPv2
Note
Note
Note
Note
Note
Note
Configuring VRRPv3
Switch(confi Enables the ability to configure
g)# fhrp VRRPv3
version vrrp
v3
Interface Tracking
VRRP does not have a native interface tracking
mechanism. Instead, it has the ability to track objects.
This allows the VRRP master to lose its status if a
tracked object (interface, IP SLA, and so on) fails.
Switch(config)# Creates a tracked object, where
track 10 the status of the uplink
interface interface is tracked
gigabitethernet
1/0/1 line-
protocol
Verifying VRRP
Note
The VRRP verification commands are the same for IPv6 and IPv4.
Debugging VRRP
Switch# debug Displays all VRRP messages
vrrp all
Switch DLS1
interface
vlan 1
Switch DLS2
rnet 1/0/1
20
R1
frequency 5
Note
DLS-2
frequency 5
Note
When you enter the standby ipv6
command, a modified EUI-64 format
interface identifier is generated in which
the EUI-64 interface identifier is created
from the relevant HSRP virtual MAC
address
Note
Note
Note
DLS-2
Caution
This command requires a reload of the switch
to take effect and is not available on the
Catalyst 3650
Note
Note
Note
HSRP verification and debug commands are the same for IPv4 and IPv6.
netbios-
name-server
172.16.10.10
domain-name
fakedomainna
me.com
service dhcp
no service
dhcp
Configuring DHCP Manual IP Assignment
It is sometimes desirable to link a specific network
device with a specific IPv4 address using a Cisco device’s
DHCP service. The Cisco device uses a “client ID” to
identify a DHCP client device and is programmed into
the DHCP pool.
Note
The DHCP client device ID can be determined using the show ip dhcp binding command
after the client has successfully obtained the next available IP address from the DHCP pool.
Note
The ip helper-address command forwards broadcast packets as a unicast to eight different
UDP ports by default:
Boot Protocol (BOOTP) client and server datagrams (ports 67 and 68)
Note
Unlike DHCPv4, the DHCPv6 service does not give out IP addresses; instead, it gives out
prefixes. The client creates the remaining bits for a valid IPv6 address. The duplicate
address detection (DAD) mechanism ensures the uniqueness of the address. There is no
DHCPv6 excluded-address command.
Note
Note
Note
Note
Note
Edmonton Router
netbios-name-
server
10.0.0.2
Gibbons Router
Edmonton Router
Gibbons Router
Configuring passwords
Configuring SSH
Verifying SSH
CONFIGURING PASSWORDS
These commands work on both routers and switches.
Caution
The enable secret password is encrypted by default using the MD5 cryptographic hash function. The enable
password password is not; it is stored as cleartext. For this reason, recommended practice is that you never use the
enable password command. Use only the enable secret command in a router or switch configuration. The enable
secret command password takes precedence over the enable password command password. For instance, if
enable secret class and enable password cisco are both configured, Cisco IOS will only grant privileged EXEC
mode access when the enable secret password class is entered.
Tip
You can set both enable secret password and enable password password to the same password. However, doing
so defeats the use of encryption.
Caution
Line passwords are stored as cleartext. They should be encrypted using the service password-encryption
command as a bare minimum. However, this encryption method is weak and easily reversible.
Tip
The best place to store passwords is an external AAA (authentication, authorization, and accounting) server.
Caution
If you have turned on service password encryption, used it, and then turned it off, any passwords that you have
encrypted will stay encrypted. New passwords will remain unencrypted.
Tip
The service password-encryption command will work on the following cleartext passwords:
Username
Authentication key
Console
BGP neighbors
Edmonton# show run | include secret | line con 0 | password | line vty 0 | password 5
s
no service password-encryption
i
enable secret 5 g
n
Rv4kArhts7yA2xd8BD2YTVbts
i
line con 0 f
i
password 7 00271A5307542A02D22842
e
line vty 0 4 s
M
password 7 00271A5307542A02D22842
D
5
h
a
s
h
7
s
i
g
n
i
f
i
e
s
V
i
g
e
n
è
r
e
c
i
p
h
e
r
7
s
i
g
n
i
f
i
e
s
V
i
g
e
n
è
r
e
c
i
p
h
e
r
Tip
MD5 is no longer considered to be secure. Therefore, it is recommended that type 8 or type 9 always be configured.
Edmonton(config)# username Either option generates
demo5 secret cisco password encrypted with a
type 5 algorithm
OR
Edmonton(config)# username
demo5 algorithm-type md5
secret cisco
Note
Type 5, type 8, and type 9 passwords are not reversible.
Caution
If you configure type 8 or type 9 passwords and then downgrade to a Cisco IOS Software release that does not
support type 8 and type 9 passwords, you must configure the type 5 passwords before downgrading. If not, you will
be locked out of the device and a password recovery is required. Type 8 and type 9 passwords have been supported
since 15.3(3)M.
Configuring SSH
Telnet and Secure Shell (SSH) are two remote access methods to
connect to a device. Although popular, Telnet is not secure because
Telnet traffic is forwarded in cleartext. Therefore, its content can
easily be read if intercepted.
Caution
SSH Version 1 implementations have known security issues. It is recommended to use SSH Version 2 whenever
possible.
Note
SSH provides encryption services using private and public cryptographic keys that are created using the crypto key
generate rsa global configuration command. However, the crypto key command requires that a device host name
(i.e., hostname name) and a fully qualified domain name (i.e., ip domain-name name) first be configured. SSH
cannot use the default host names (e.g., Switch or Router).
Note
The Cisco implementation of SSH requires Cisco IOS Software to support Rivest, Shamir, Adleman (RSA)
authentication and minimum Data Encryption Standard (DES) encryption (a cryptographic software image).
Edmonton(c Sets the time interval that the router waits for the SSH
onfig)# ip client to respond to 90 seconds. The default is 120
ssh time-
out 90
Edmonton(c Moves to vty configuration mode for all five vty lines of
onfig)# the router
line vty 0
4
Note
Depending on the Cisco IOS Software release and platform, there may be more
than 5 vty lines
Verifying SSH
Tip
If you enter boot system flash first, that is the first place the router goes to look for the Cisco IOS Software. If you
want to go to a TFTP server first, make sure that the boot system tftp command is the first command you enter.
Tip
If the configuration has no boot system commands, the router defaults to loading the first valid Cisco IOS image in
flash memory and running it. If no valid Cisco IOS image is found in flash memory, the router attempts to boot from a
network TFTP server. After six unsuccessful attempts of locating a network TFTP server, the router loads into
ROMmon mode.
Note
The Cisco IOS File System uses a URL convention to specify files on network devices and the network. Many of the
most commonly used URL prefixes are also available in the Cisco IOS File System.
sftp:
Note
nvram: NVRAM
usbflash
1:,
usb0:,
usb1:
isr4300-universalk9.16.09.04.SPA.bin
. Represents the file extension. .bin shows that this file is a binary
b executable file
i
n
Note
The Cisco IOS naming conventions, meanings, content, and other details are subject to change.
BACKING UP CONFIGURATIONS TO A TFTP
SERVER
Note
You can also use the preceding sequence for a copy startup-config tftp command sequence.
192.168.119.20
Accessing
tftp://192.168.119.20/
Denver-confg...
!!!!!!!!!!!!!!
[OK-624 bytes]
Note
You can also use the preceding sequence for a copy tftp startup-config command sequence.
Note
When copying a file into a configuration file, the no shutdown command does not carry over into the configuration
file. You must enable the interfaces with the no shutdown command.
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!
!!!!!!!!
Denver#
RESTORING/UPGRADING THE CISCO IOS
SOFTWARE FROM A TFTP SERVER
192.168.119.20
universalk9.16.09.04.SPA.bin]?
Press Ctrl-C
Continue? [confirm]
if you want to
cancel
Loading isr4300-
universalk9.16.09.04.SPA.bin from
192.168.119.20
Denver# Success
...<output cut>...
...<output cut>...
Caution
Commands and environmental variables are case sensitive, so be sure that you do not accidentally add spaces
between variables and answers.
Note
Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the device and replace
Telnet with SSH on the vty ports. See the section “Configuring SSH” earlier in this chapter for the commands needed
to configure SSH.
Note
Because SCP relies on SSH for its secure transport, the device must have a Rivest, Shamir, and Adelman (RSA) key
pair.
Note
Your router does not need to be set up as an SCP server for this transfer to work. You only need to have SSH
configured.
192.168.119.20
Note
As with any use of the copy command, you can enter some of the specific details into the command itself:
Click here to view code image
Tip
If a service is off by default, disabling it does not appear in the running configuration.
Tip
Do not assume that a service is disabled by default; you should explicitly disable all unneeded services, even if you
think they are already disabled.
Tip
Depending on the Cisco IOS Software release, some services are on by default; some are off. Be sure to check the
IOS configuration guide for your specific software release to determine the default state of the service.
Table 9-2 lists the services that you should disable if you are not
using them.
Or
Edmonton(config)# no ip domain
lookup
IP redirects Edmonton(config-if)# no ip
redirects
HTTP service Edmonton(config)# no ip http
server
Perth (config)# Sets the base HTTP path for HTML files
ip http path
flash:/GUI
IPv6 ACLs
RADIUS authentication
TACACS+ authentication
Authorization
Accounting
Troubleshooting AAA
Verifying CoPP
Configuring uRPF
Caution
Your hardware platform or software release might not support all the commands
documented in this chapter. Please refer to the Cisco website for specific platform and
software release notes.
established
Note
You may add the log keyword at the end of any standard or extended access list entry.
Doing so causes an informational logging message about the packet matching the entry to
be sent to the console.
Note
Note
Note
The time period is based on the router’s clock. Either manually set the correct time on the
router or use a centralized NTP server to synchronize the router’s clock to the correct time
and date.
Note
IPV6 ACLS
In contrast to IPv4 ACLs, all IPv6 ACLs are named and
extended. Some commands are slightly different, but all
the basic concepts remain the same. Note that instead of
a wildcard mask, IPv6 access list entries use the prefix
length. Also, the implicit deny ipv6 any any at the end
of the ACL has changed to permit critical ICMPv6
Neighbor Discovery (ND) messages. IPv6 ACLs can
filter packets based on source and destination address,
as well as port and protocol information. Also note that
you can use IPv6 ACLs for time-based or vty ACL
filtering.
Tip
Sequence numbers are used to allow for easier editing of your ACLs. Each entry in an ACL
is automatically given a number, unless you specify one during configuration. Numbers start
at 10 and increment by 10 for each line. This allows for simple editing of ACLs. You can add
or remove an entry by referencing its line number. This applies to standard (numbered or
named) and extended (numbered or named) IPv4 ACLs, as well as to IPv6 ACLs.
IMPLEMENTING AUTHENTICATION
METHODS
Authentication, authorization, and accounting (AAA) is
a standards-based framework that you can implement
to control who is permitted to access a network
(authenticate), what they can do while they are there
(authorize), and audit what actions they performed
while accessing the network (accounting). AAA can be
deployed in two models: local database authentication
and sever-based authentication. Server-based
authentication utilizes either RADIUS or TACACS+
protocols and offers a more scalable approach to
network authentication.
Note
The preceding example demonstrates the use of a locally defined username database
without enabling AAA.
Note
A method list describes the sequence and authentication methods to be queried to
authenticate a user. The software uses the first method listed to authenticate users; if that
method fails to respond, the software selects the next authentication method in the method
list. This process continues until there is successful communication with a listed
authentication method or until all defined methods are exhausted. If authentication fails at
any point in this cycle, the authentication process stops, and no other authentication
methods are attempted.
RADIUS Authentication
RADIUS is a fully open standard protocol (RFCs 2865
and 2866). According to the RFCs, RADIUS uses UDP
port 1812 for the authentication and authorization, and
port 1813 for accounting. However, Cisco
implementations default to UDP ports 1645 and 1646
(authentication and accounting, respectively).
1813 key
S3CR3TKEY
Router(config) Sets login authentication for the
# aaa default method list to authenticate
authentication to the RADIUS server first, locally
login default defined users second, and use the
group radius line password as the last resort
local line
Note
RADSRVGRP
local
Note
The warning message produced by the router appears after you enter a cleartext RADIUS or
TACACS server key. This message says that at some point in the future Cisco IOS will no
longer store plaintext passwords in either the running-config or startup-config. Instead, it will
store only hashed passwords (MD5/SHA/scrypt) and securely encrypted passwords (AES).
This requires either that the password is already hashed/encrypted at the time you enter it at
the CLI or that the router is configured with strong password encryption so that after you
enter the password in plaintext, IOS is immediately able to encrypt and store it in the
configuration in the encrypted form. Although IOS will still accept plaintext passwords
entered at the CLI, it will not store them as plaintext in the configuration. To enable strong
password encryption using AES, you need to enter two commands. The first, key config-
key password-encryption [master key], allows you to configure a master key that will be
used to encrypt all other keys in the router configuration. The master key is not stored in the
router configuration and cannot be seen or obtained in any way while connected to the
router. The second command, password encryption aes, triggers the actual password
encryption process.
TACACS+ Authentication
TACACS+ is a Cisco proprietary protocol that is not
compatible with the older versions such as TACACS or
XTACACS, which are now deprecated. TACACS+ allows
for greater modularity, by total separation of all three
AAA functions. TACACS+ uses TCP port 49, and thus
reliability is ensured by the transport protocol itself.
Entire TACACS+ packets are encrypted, so
communication between Network Access Server (NAS)
and the TACACS+ server is completely secure.
Authorization
Configuring authorization is a two-step process. First
define a method list, and then apply it to a
corresponding interface or line.
local
Accounting
Configuring accounting is also a two-step process. First
define a method list, and then apply it to a
corresponding interface or line.
Verifying CoPP
Configuring uRPF
Note
Securing SNMPv3
Verifying SNMP
Implementing logging
Configuring syslog
Configuring NetFlow
Verifying NetFlow
NTP configuration
NTP design
Securing NTP
Verifying EEM
Cha Description
ract
er
? Unknown error
H Host unreachable
P Port unreachable
R Parameter problem
T Time exceeded
U No route to host
EXAMPLES OF USING THE PING AND
THE EXTENDED PING COMMANDS
Verbose is
automatically
selected along with
any other option
Record is a very
useful option
because it displays
the address(es) of
the hops (up to nine)
the packet goes
through
Strict is used to
specify the hop(s)
that you want the
packet to go through,
but no other hop(s)
are allowed to be
visited
Timestamp is used
to measure
roundtrip time to
particular hosts
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!
Success rate is 100 percent
(100/100) round-trip min/
avg/max = 1/1/4 ms
Tip
If you want to interrupt the ping operation, use the Ctrl-Shift-6 keystroke combination. This
ends the operation and returns you to the prompt.
Note
In Microsoft Windows operating systems, the command to allow observation between two
hosts is tracert:
Click here to view code image
C:\Windows\system32>tracert 172.16.20.1
C:\Windows\system32>tracert
2001:db8:c:18:2::1
Caution
Using the debug command may severely affect router performance and might even cause
the router to reboot. Always exercise caution when using the debug command, and do not
leave it on. Use debug long enough to gather needed information, and then disable
debugging with the undebug all or no debug all command.
Tip
Send your debug output to a syslog server to ensure that you have a copy of it in case your
router is overloaded and needs to reboot. Use the no logging console command to turn off
logging to the console if you have configured a syslog server to receive debug output.
(shor
t
form
of
undeb
ug
all)
Route Lists what debug commands are on
r#
show
debug
t 10
The debug ip packet command helps you to better understand the
IP packet forwarding process, but this command only produces
information on packets that are process-switched by the router.
Packets generated by a router or destined for a router are process-
switched and are therefore displayed with the debug ip packet
command
Tip
If SNMP is not required on a router, you should turn it off by using the no snmp-server
global configuration command:
Click here to view code image
Edmonton(config)# no snmp-server
Note
Beginning with SNMPv3, methods to ensure the secure transmission of data between
manager and agent were added. You can now define a security policy per group, or limit IP
addresses to which its members can belong. You now have to define encryption and
hashing algorithms and passwords for each user.
Table 11-2 shows the different SNMP security models.
MD5 or No
authNoPri SHA-1
v DES, 3DES,
MD5 or or AES
authPriv SHA-1
Tip
The SNMP security levels are as follows:
noAuthNoPriv: Authenticates SNMP messages using
a community string. No encryption provided.
Tip
SNMPv3 provides all three security level options. It should be used wherever possible.
Tip
If SNMPv3 cannot be used, then use SNMPv2c and secure it using uncommon, complex
community strings and by enabling read-only access.
Tip
If community strings are also used for SNMP traps, they must be different from community
strings for get and set methods. This is considered best practice.
0.3
AdminC0mp
l3x
Securing SNMPv3
security
IMPLEMENTING LOGGING
It is important for network administrators to implement
logging to get insight into what is occurring in their
network. When a router reloads, all local logs are lost, so
it is important to implement logging to an external
destination. The following sections deal with the
different mechanisms that you can use to configure
logging to a remote location.
Configuring Syslog
Item Definition
in
Syslog
Messa
ge
Edmonton(config)# exit
Edmonton#
*Oct 23:22:45:20.878: %SYS-5-CONFIG_I: Configured
from console by
console
Edmonton#
CONFIGURING NETFLOW
NetFlow is an application for collecting IP traffic
information. It is used for network accounting and
security auditing.
Caution
NetFlow consumes additional memory. If you have limited memory, you might want to preset
the size of the NetFlow cache to contain a smaller amount of entries. The default cache size
depends on the platform of the device.
udp_port information
Note
NetFlow exports data in UDP in one of five formats: 1, 5, 7, 8, 9. Version 9 is the most
versatile, but is not backward compatible with versions 5 or 8. The default is version 1.
Version 5 is the most commonly used format, but version 9 is the latest format and has some
advantages for key technologies such as security, traffic analysis, and multicast.
, | - (optional): To be used
to help specify a series or
ranges of interfaces. There
must be a space both
before and after the
comma or hyphen
rx (optional): Monitors
received traffic
tx (optional): Monitors
sent traffic
Note
Note
, | - (optional): To be used
to help specify a series or
ranges of interfaces. There
must be a space both
before and after the
comma or hyphen
replicate
untaggedvlan vlan-id
| vlan vlan-id}]} interface-id: Specifies the
destination port. This
must be a physical port; it
cannot be an
EtherChannel, and it
cannot be a VLAN
, | - (optional): To be used
to help specify a series or
ranges of interfaces. There
must be a space both
before and after the
comma or hyphen
encapsulation dot1q:
Specifies that the
destination interface use
the IEEE 802.1Q
encapsulation method
encapsulation
replicate: Specifies that
the destination interface
replicate the source
interface encapsulation
method
Note
If no encapsulation method is
selected, the default is to send
packets in native form
(untagged)
ingress dot1q vlan vlan-
id: Accept incoming
packets with IEEE 802.1Q
encapsulation with the
specified VLAN as the
default VLAN
Note
Note
You must create the RSPAN VLAN in all switches that will participate in RSPAN.
Note
If the RSPAN VLAN ID is in the normal range (lower than 1005) and VTP is enabled in the
network, you can create the RSPAN VLAN in one switch, and VTP propagates it to the other
switches in the VTP domain. For extended-range VLANs (greater than 1005), you must
configure the RSPAN VLAN on both source and destination switches and any intermediate
switches.
Tip
Use VTP pruning to get an efficient flow of RSPAN traffic, or manually delete the RSPAN
VLAN from all trunks that do not need to carry the RSPAN traffic.
Note
The commands to configure incoming traffic on a destination port and to filter VLAN traffic
are the same for remote SPAN as they are for local SPAN.
Note
ERSPAN is a Cisco proprietary feature and is available only to Catalyst 6500, 7600, 9200,
9300, Nexus, and ASR 1000 platforms to date. The ASR 1000 supports ERSPAN source
(monitoring) only on FastEthernet, GigabitEthernet, and port-channel interfaces.
Note
NTP Configuration
Note
Caution
Tip
Note
Note
When a local device is configured with the ntp master command, it can be identified by a
syntactically correct but invalid IP address. This address will be in the form of 127.127.x.x.
The master will synchronize with itself and uses the 127.127.x.x address to identify itself.
This address will be displayed with the show ntp associations command and must be
permitted via an access list if you are authenticating your NTP servers.
NTP Design
You have two different options in NTP design: flat and
hierarchical. In a flat design, all routers are peers to
each other. Each router is both a client and a server with
every other router. In a hierarchical model, there is a
preferred order of routers that are servers and others
that act as clients. You use the ntp peer command to
determine the hierarchy. Figure 11-3 is a topology
showing a hierarchical design.
Note
Although Cisco IOS recognizes three versions of NTP, versions 3 and 4 are most commonly
used. Version 4 introduces support for IPv6 and is backward compatible with version 3.
NTPv4 also adds DNS support for IPv6.
Note
NTPv4 has increased security support using public key cryptography and X.509 certificates.
Note
NTPv3 uses broadcast messages. NTPv4 uses multicast messages.
Edmonton(confi Configures an IOS device to
g)# ntp peer synchronize its software clock to a
172.16.21.1 peer at 172.16.21.1. The source IP
source loopback address is the address of interface
0 Loopback 0
Tip
Securing NTP
You can secure NTP operation using authentication and
access lists.
NTPpa55word = password
associated with this key
Note
You can configure the device to authenticate the time sources to which the local clock is
synchronized. When you enable NTP authentication, the device synchronizes to a time
source only if the source carries one of the authentication keys specified by the ntp trusted-
key command. The device drops any packets that fail the authentication check and prevents
them from updating the local clock. NTP authentication is disabled by default.
You can also control access to NTP services by using
access lists. Specifically, you can decide the types of
requests that the device allows and the servers from
which it accepts responses. If you do not configure any
ACLs, NTP access is granted to all devices. If you
configure ACLs, NTP access is granted only to the
remote device whose source IP address passes the
access list criteria.
Note
Once a device is synchronized to an NTP source, it becomes an NTP server to any device
that requests synchronization.
Note
NTP access group options are scanned from least restrictive to most restrictive in the
following order: peer, serve, serve-only, query-only. However, if NTP matches a deny ACL
rule in a configured peer, ACL processing stops and does not continue to the next access
group option.
Note
It is important to have your routers display the correct time for use with time stamps and
other logging features.
Note
Edmonton(config)#
clock summer-time
zone date date
Arguments for the command
month year hh:mm
are as follows:
date month year
hh:mm [offset]
zone: Name of the time zone
(see Tables 11-5 and 11-6 for
Edmonton(config)# alternative ways to specify the
clock summer-time time zone)
zone date month
date year hh:mm recurring: Indicates that
month date year summer time should start and
hh:mm [offset] end on the corresponding
specified days every year
minutes-offset: (Optional)
Minutes difference from UTC
Edmonton(config)# Configures the time zone to
clock timezone PST Pacific Standard Time, which
-8 is 8 hours behind UTC
Europe
United
States and
Canada
Australia
WST Western Standard Time, as UTC +8 hours
Core1 Router
Core1(config)# ntp Configures router to
server synchronize its clock to a
209.165.201.44 public NTP server at address
209.165.201.44
Core2 Router
DLSwitch1
DLSwitch2
ALSwitch1
ALSwitch2
Note
The following examples assume that the first command is typed in global configuration
mode.
EEM Example 1
The first EEM example shows an applet that monitors
the GigabitEthernet 0/0/0 interface. If a syslog message
indicates that its state has changed to administratively
down, the applet is triggered, the interface is re-enabled,
and an email is sent containing a list of users currently
logged into the router.
EEM Example 2
The second EEM example shows an applet that
monitors the CLI for the debug ip packet command.
When this pattern is matched, the applet will skip the
command so that it does not take effect. The action list
first enters the enabled mode and issues the show
users | append flash:Debug command. This
command will append the output from the show users
command to the end of a file in flash called Debug. The
next action will then append the current time stamp to
the end of the file in flash named Debug_clock. By
matching the order of the entries in both files you will
have a list of the users that tried to enter the debug
command and the date and time that the user attempted
it.
Click here to view code image
event manager applet Stop_Debug
event cli pattern "debug ip packet" sync no skip
yes
action 1.0 cli command "enable"
action 2.0 cli command "show users | append
flash:Debug"
action 3.0 cli command "show clock | append
flash:Debug_clock"
end
EEM Example 3
The third EEM example shows an applet that matches a
CLI pattern that starts with “wr”. When a match is
detected, the applet is triggered. Cisco IOS prompting is
disabled and a copy of the new startup-configuration file
is backed up to a TFTP server. A syslog message is
triggered confirming a successful TFTP file transfer.
Notice that two environment variables were created and
are used within the applet, one for the file name and one
for the IP address.
Click here to view code image
EEM Example 4
The final example is more complex but demonstrates
how powerful EEM applets can be. This example is
based on the latest version of EEM (version 4). In this
scenario, an IP SLA is configured to send an ICMP echo
request every 10 seconds to address 209.165.201.1. IP
SLA reaction alerts are enabled, which allows the IP SLA
to send an alert after three consecutive timeouts. This
triggers the EEM applet and a syslog message is
displayed. Notice the use of the $_ipsla_oper_id
variable. This is a built-in environment variable and
returns the IP SLA number, which in this case is 1.
Click here to view code image
ip sla 1
icmp-echo 209.165.201.1
frequency 10
ip sla schedule 1 life forever start-time now
ip sla reaction-configuration 1 react timeout
threshold-type consecutive 3
ip sla enable reaction-alerts
!
Verifying EEM
Open authentication
AUTHENTICATING WIRELESS
CLIENTS
Before a wireless client device can communicate on your
network through the access point, the client device must
authenticate to the access point by using open or
shared-key authentication. Networks can leverage many
technologies and protocols to protect information sent
wirelessly. This section explores different methods to
authenticate wireless clients before they are granted
access to the wireless network. Note that the figures
used throughout this client authentication section are
from the Cisco AireOS Advanced configuration GUI.
Open Authentication
Open authentication allows any device to authenticate
and then attempt to communicate with the access point.
Open authentication is true to its name; it offers open
access to a WLAN. The only requirement is that a client
must use an 802.11 authentication request before it
attempts to associate with an AP. No other credentials
are needed.
Note
If you do not enable the WLAN, you will not be able to join the Cisco Wireless LAN Controller
(WLC) from your wireless client.
802.1X
You can configure WPA2 Personal mode and the pre-
shared key in one step. Figures 12-7 and 12-8 show the
screen in which this can occur. Click the WLANs tab
and either click Go to create a new WLAN, or select the
WLAN ID of an existing WLAN to edit. Make sure that
the parameters on the General tab are set
appropriately. Click the Security tab followed by the
Layer 2 subtab. Here you can choose the Layer 2
security option you require. Figure 12-7 shows
WPA+WPA2 being selected for the WLAN named
CCNPPCG. In the WPA+WPA2 Parameters section,
WPA Policy is unchecked, leaving only WPA2 Policy and
WPA2 Encryption AES selected.
Figure 12-7 Selecting WPA2 Personal Security for a
WLAN
Tip
The controller will allow you to check both the WPA Policy and WPA2 Policy check boxes. You
should do this only if you have legacy equipment that requires WPA support.
Tip
Web authentication can be handled locally on the WLC for smaller environments through
local web authentication (LWA). When there are many controllers providing web
authentication, it makes sense to use LWA with an external database on a RADIUS server
such as Cisco ISE, keeping the user database centralized.
Numerical Statistics
The top section of the dashboard (see Figure 12-27) is
where you get a quick view of what is found on the
network:
Graphical Widgets
These graphical widgets (see Figure 12-28) present the
numbers in the form of graphs. You can select the
widgets to display from the available list:
Access Points
Operating Systems
Clients
Applications
Management tab
IOSXE# show
wireless
client summary
IOSXE# show
wireless
client mac-
address mac-
address detail
IOSXE# show
wireless
client ap name
ap-name dot11
{24ghz | 5ghz}
Logs
IOSXE# show ap
dot11 {24ghz |
5ghz} network
WLANs
IOSXE#
apgroups: Displays access point
group information
show wlan
{apgroups |
summary | summary: Displays a summary of
all WLANs
wlan-id |
foreignAp |
lobby- admin- wlan_id: Displays the
access} configuration of a WLAN. The
WLAN identifier range is from 1 to
512
lobby-admin-access: Displays
all WLANs that have lobby-admin-
access enabled
APs
IOSXE# show ap
dot11 {24ghz |
5ghz} summary
(Cisco Displays general AP configuration
Controller) > information
show ap config
general ap-
name
IOSXE# show ap
name ap-name
config general
IOSXE# show ap
mac-address
mac-
address join
stats
{detailed |
summary}
WLC# show ap
join stats
summary
IOSXE#
show ap
summary [ap-
name]
IOSXE# show ap
name ap-name
wlan dot11
{24ghz | 5ghz
}
Note
When logging output from the Wireless LAN Controller, enter the config paging disable
command first to stop page breaks.
TROUBLESHOOTING WIRELESS
CLIENT CONNECTIVITY
If clients are reporting problems, a good place to start
troubleshooting is at the Cisco Wireless LAN Controller.
This section shows the output from two different GUIs:
the Cisco AireOS Monitoring Dashboard GUI and the
Cisco IOS XE GUI.
Verifying GRE/IPsec
VRF-Lite
Configuring VRF-Lite
Verifying VRF-Lite
Caution
Your hardware platform or software release might not support all the commands
documented in this chapter. Please refer to Cisco.com for specific platform and software
release notes.
Note
Router(con
fig-if)#
tunnel
source
gigabiteth
ernet
0/0/0
Router(con Identifies the remote destination IPv6
fig-if)# address
tunnel
destinatio
n
2001:db8:1
98:51::1
Note
Even though crypto maps are no longer recommended for tunnels, they are still widely
deployed and should be understood.
Note
Verifying GRE/IPsec
CE1
CE2
Note
Running OSPF over a DMVPN network has some of the same challenges as running OSPF
over other types of networks. Because only the hub is in direct communication with all of the
branches, it should be configured as the designated router (DR) on the DMVPN subnet.
There is not typically a backup DR (BDR) for this type of configuration. A BDR is possible if a
second hub is placed on the same subnet.
In strict hub-and-spoke DMVPNs, you should include the tunnel interface in the OSPF
routing process and configure the tunnel interface as a point-to-multipoint OSPF network
type on the hub router, and as a point-to-point network type on the branch routers. In this
case, there is no need to elect a DR on the DMVPN subnet.
To create a partially meshed or fully meshed DMVPN, configure the mGRE tunnel on the
hub router as an OSPF broadcast network. Each spoke router should be configured with an
OSPF priority of 0 to prevent a spoke from becoming a DR or BDR.
VRF-LITE
Virtual routing and forwarding (VRF) is a technology
that creates separate virtual routers on a physical
router. Router interfaces, routing tables, and forwarding
tables are completely isolated between VRFs, preventing
traffic from one VRF from forwarding into another VRF.
All router interfaces belong to the global VRF until they
are specifically assigned to a user-defined VRF. The
global VRF is identical to the regular routing table of
non-VRF routers.
Configuring VRF-Lite
Follow these steps when configuring a Cisco router for
VRF-Lite support:
Note
Cisco IOS supports the old and new VRF CLI formats. Old Cisco IOS VRF configuration style
supports IPv4 only. New multiprotocol VRF CLI now supports both IPv4 and IPv6. Cisco IOS
offers a migration tool that upgrades a VRF instance or all VRFs configured on the router to
support multiple address families under the same VRF. The vrf upgrade-cli multi-af-mode
{common-policies | non-common-policies} [vrf vrf-name] command is issued in global
configuration mode.
Verifying VRF-Lite
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
______________________________________
____________________
Index
NUMBERS
0.0.0.0/0 summarization, EIGRP, 74–75
802.1Q (dot1q) trunking, 4–5
802.1x, 307–308
A
AAA (Authentication, Authorization,
Accounting)
accounting, configurations, 257
authentication, 251–252
AAA-based local database authentication, 252–
253
RADIUS authentication, 253–255
simple local database authentication, 252
TACACS+ authentication, 255–256
authorization, configurations, 256–257
servers, password storage, 232
troubleshooting, 257
access lists
BGP route filtering, 180–182
NTP security, 285
accounting, configurations, 257
ACL (Access Control Lists)
CoPP traffic flows (permitted), 258
IPv4
extended ACL configurations, 247–248
standard ACL configurations, 246–247
time-based ACL configurations, 248–249
verifying, 251
VTY ACL configurations, 249–250
IPv6
configurations, 250–251
verifying, 251
AD (Administrative Distance)
EIGRP IPv4 manual summarization, 71
internal/external routes, 143–144
AireOS
Advanced GUI, WLCs, troubleshooting, 318–319
CLI, WLCs, troubleshooting, 320–322
Monitoring Dashboard GUI, troubleshooting
wireless client connectivity, 322–326
WLCs, 316–318
AF (Address Families)
BGP, 158–160
configuration mode, 94–95
MP-BGP, 159–160
OSPFv3, 93
configurations, 120–125
IPv4, 94
IPv6, 94
aggregating routes, BGP, 177
AH (Authentication Headers), spi, 97
allowed VLANs, 4–5
applets, EEM, 295, 298
area range not-advertise command, OSPF route
filtering, 104
area x authentication key-chain router
configuration command, 97
AS (Autonomous Systems)
AS path attribute prepending (BGP), 169–170
path access lists, BGP, 181–182
local preference attribute manipulation, 167–169
weight attribute manipulation, 166
private AS removal, 171
ASBR (Autonomous System Border Routers)
network topologies, 130–131
OSPFv3 AF, 94
routers, multiarea OSPF configurations, 114–115
Asdot, 160
Asplain, 160
attributes (BGP), 164
local preference attribute, 167–169
MED attribute, 171–174
AS path attribute prepending, 169–170
weight attribute, 164–165
AS path access lists, 166
prefix lists, 166–167
route maps, 166–167
authentication, 251–252
802.1x, 307–308
AAA-based local databases, 252–253
AH, spi, 97
area x authentication key-chain router configuration
command, 97
authentication key-chain command, 66
authentication mode command, 66
BGP
between peers, 184
verifying, 184
EAP, 308–309
localEAP, 311–314
RADIUS servers (external), 308–309
EIGRP, 67
classic mode authentication, 67–68
named mode authentication, 68–70
troubleshooting, 70
verifying, 70
HSRP, 197
IP SLAs, 149–150
MD5, 97, 233
EIGRP named mode authentication, 68–70
OSPFv2 authentication, 95–96
NTP, 284–285
OSPFv2
cryptographic authentication, 95–96
ip ospf authentication message-digest command,
95
MD5, 95–96
service password-encryption command, 96
SHA-256, 96
simple password authentication, 95
verifying, 98
OSPFv3, 97–98
area x authentication key-chain router
configuration command, 97
ospfv3 x authentication key-chain command, 97
verifying, 98
pre-shared keys, 306–308
RADIUS, 253, 309–314
key config-key password-encryption command,
254–255
legacy authentication, 253
modular authentication, 253–255
password encryption aes command, 254–255
RSA, 234
SHA, 68–70, 97
simple local databases, 252
TACACS+, 255
legacy authentication, 255
modular authentication, 255–256
WebAuth, 314–316
wireless clients, 303
802.1x, 307–308
EAP, 308–314
LWA, 314
open authentication, 304–306
pre-shared keys, 306–308
WebAuth, 314–316
WPA2, 306–307
WLANs, open authentication, 304–306
WPA2, 306–307
MD5 authentication, 97, 233
EIGRP named mode authentication, 68–70
OSPFv2 authentication, 95–96
authNoPriv security level, SNMP, 267
authorization, configurations, 256–257
authPriv security level, SNMP, 267
auto-cost command, 101
auto-cost reference-bandwidth command, 101
AS (Autonomous System) numbers
4-byte AS numbers and BGP, 160–161
Asdot, 160
Asplain, 160
auto-summary command, 63, 70, 78
B
BackboneFast
PVST+, 44
Rapid PVST+, 31, 44
STP configurations, 31
backups
Cisco IFS
configurations, 238
to TFTP servers, 238
IOS software to TFTP servers, 239
bandwidth
bandwidth command, 77
bandwidth-percent command, 66, 77
EIGRP, 77
reference bandwidth
auto-cost command, 101
auto-cost reference-bandwidth command, 101
ip ospf cost command, 101
OSPF, 101
BDR (Backup Designated Routers)
OSPFv2, BDR elections, 99–100
OSPFv3
BDR elections, 99–100
enabling IPv6 on an interface, 92
BGP (Border Gateway Protocol)
4-byte AS numbers, 160–161
access lists, 180–182
AS path access lists, 181–182
attributes, 164
local preference attribute, 167–169
MED attribute, 171–174
AS path attribute prepending, 169–170
weight attribute, 164–167
authentication
between peers, 184
verifying, 184
best path algorithm, 164
bgp bestpath missing-as-worst command, 174
bgp default ipv4-unicast command, 157
bgp router-id command, 157
bgp-always-compare-med command, 173–174
clear ip bgp command, 175–176
configurations
AF, 158–159
classic configurations, 156–157
default routes, 177
distribute lists, 180–181
EBGP
multihop, 162–163
next-hop behavior, 162
IBGP, next-hop behavior, 162
ip as-path access-list command, 178
MP-BGP
AF, exchanging IPv4/IPv6 routes, 159–160
configurations, 157
neighbor remote-as command, 157
neighbor update-source command, 161–162
network command, 156–157, 177
peer groups, 182–183
prefix lists, 181–182
private AS removal, 171
redistribution, default metrics, defining, 128
regular expressions, 178–180
route aggregation, 177
route filtering, 180–181
route reflectors, 177–178
route refresh, 176
route selection process, 164
router bgp command, 156
router IDs, 157
show ip bgp command, 179–180
show ip bgp neighbor command, 176
soft-reconfiguration inbound command, 175
timers, 161
troubleshooting, 175–176
verifying, 174
boot system, SSH commands, 235–236
bootflash, 237
BPDUs (Bridge Protocol Data Units)
BPDU Filter, 30, 44
BPDU Guard, 29–30, 44
Rapid PVST+, 43
C
channel-group command, port channels, 14
Cisco AireOS
Advanced GUI, troubleshooting WLCs, 318–319
CLI, troubleshooting WLCs, 320–322
Monitoring Dashboard GUI
wireless client connectivity, troubleshooting,
322–326
WLCs, troubleshooting, 316–318
Cisco IFS (IOS File System), 236
configurations
backing up to TFTP servers, 238
copy startup-config tftp command, 238
copy tftp startup-config command, 239
no shutdown command, 239
restoring from TFTP servers, 238–239
IOS image filenames, 237–238
IOS software
backing up to TFTP servers, 239
restoring from TFTP servers, 239–240
restoring using ROM monitor environmental
variables, 240–241
upgrading from TFTP servers, 239–240
SCP, 241
configurations, 241–242
troubleshooting, 241
verifying, 241
show file systems command, 236
unneeded services, disabling, 242–243
URL prefixes (commonly-used), 236–237
viewing, 236
Cisco IOS
image filenames, 237–238
IP SLAs, 147–149
software
backing up to TFTP servers, 239
restoring, 239–241
upgrading, from TFTP servers, 239–240
XE CLI, WLCs, troubleshooting, 320–322
XE GUI, troubleshooting
wireless client connectivity, 326–327
WLCs, 319–320
class maps for matched traffic (CoPP), 258–259
classic mode (EIGRP)
authentication, 67–68
IPv4 configurations, 62–63
auto-summary command, 63
wildcard masks, 63
IPv6 configurations, 63–64
upgrading configurations to named mode, 66–67
clear ip bgp command, 175, 176
clear ip ospf process command, 99
cleartext password encryption, 232–233
client mode (VTP), 5
company routers, PAT configurations, 192–193
conditionally triggered debugs, 266
configuration mode
AF, 94–95
static VLANs, 2
configuring
accounting, 257
ACL
extended ACL configurations, 247–248
IPv4 configurations, 246–250
IPv6 configurations, 250–251
standard ACL configurations, 246–247
time-based ACL configurations, 248–249
VTY ACL configurations, 249–250
authorization, 256–257
BackboneFast, STP configurations, 31
BGP
AF, 158–159
classic configurations, 156–157
MP-BGP, 157, 159–160
BPDU Filter, STP configurations, 30
BPDU Guard, STP configurations, 29–30
DHCP, IPv4 configurations, 224–229
IOS router configurations, 217–218
IOS software Ethernet interfaces, 219–220
manual IP assignments, 218
relays, 219
troubleshooting, 220
verifying, 220
DHCP, IPv6 configurations
DHCPv6 clients, 223
DHCPv6 relay agents, 223
EdmontonPC Stateless DHCPv6 Client (IOS
routers), 229
GibbonsPC Stateful DHCPv6 Client (IOS routers),
229
no ipv6 nd managed-config-flag command, 223
routers as stateful DHCPv6 servers, 222–223
routers as stateless DHCPv6 servers, 221–222
SLAAC, 221–222
troubleshooting configurations, 223
verifying configurations, 224
dynamic NAT, 188
EEM, 296–297
EIGRP
IPv4 classic mode configurations, 62–63
IPv6 classic mode configurations, 63–64
named mode configurations, 64–65, 83
named mode subconfiguration modes, 66
upgrading classic mode configurations to named
mode, 66–67
ERSPANs
destination configuration, 281
source configuration, 280
EtherChannel configurations
configuration guidelines, 12–14
default configurations, 12
example of, 18
Layer 2 configurations, 14
Layer 3 configurations, 14–15
network topology, 18
Flexible NetFlow, 272–273
GRE
IPv4 configurations, 330, 331–335
IPv6 configurations, 330–335
overlay configurations, 333–334
underlay configurations, 332–333
verifying, IPv4, 331
HSRP
basic configurations, 195
settings, 195
IFS
backing up configurations to TFTP servers, 238
copy startup-config tftp command, 238
copy tftp startup-config command, 239
no shutdown command, 239
restoring configurations from TFTP servers,
238–239
inter-VLAN routing, 47–48
IP SLA authentication, 149–150
IPv4 configurations
EIGRP classic mode configurations, 62–63
GRE, 331–335
IPv6 configurations
EIGRP classic mode configurations, 63–64
GRE, 331–335
inter-VLAN routing, 55–60
ISAKMP policies, site-to-site GRE over IPsec, 336,
338
local SPANs configurations, 274–277
logging, 271
Loop Guard, STP configurations, 32–33
MP-BGP, 157, 159–160
multiarea OSPF configurations, 89–90, 114–117
NAT
troubleshooting, 191
verifying, 190
virtual interfaces, 190, 193–194
NTP, 281–282
network topologies, 290
OSPFv2, 89
log-adjacency-changes command, 89
multiarea OSPF, 89–90, 114–117
network area command, 89
single-area configurations, 111–114
verifying configurations, 109–110
virtual links, 108–109
OSPFv3, 89
with AF, 120–125
enabling IPv6 on an interface, 91–92
log-adjacency-changes command, 89
multiarea OSPF, 89–90, 114–117
network area command, 89
single-area configurations, 111–114
traditional configurations, 91, 117–120
verifying configurations, 109–110
virtual links, 108–109
passwords, 231–232
PAT, 189–190
company routers, 192–193
example of, 191–193
ISP routers, 191–192
troubleshooting, 191
verifying, 190
PBR with route maps, 146–147
port error conditions, STP configurations, 33–36
PortFast, STP configurations, 28–29
PSK, site-to-site GRE over IPsec, 337, 338
PVST+, 41–43
network topologies, 40
Rapid PVST+, 36
Root Guard, STP configurations, 31–32
route maps, 141–142
RSPANs
configuration examples, 278–280
configuration guidelines, 277–278
SCP, 241–242
single-area OSPF configurations, 111–114
SNMP, 267
no snmp-server global command, 267
security levels, 267
security models, 267
SNMPv1, 267–268
SNMPv2c, 267–268
SNMPv3, 267–269
SPANs
default configurations, 273–274
local SPANs, 274–277, 281
RSPANs, 277–281
SSH, 234–235
static NAT, 187, 193–194
STP configurations
BackboneFast, 31
BPDU Filter, 30
BPDU Guard, 29–30
changing modes, 25
Loop Guard, 32–33
path costs, 27
port error conditions, 33–36
port priority, 26
PortFast, 28–29
PVST+, 40–43
Rapid PVST+, 36
Root Guard, 31–32
root switches, 25–26
secondary root switches, 26
timers, 27–28
UDLD, 33
UplinkFast, 30–31
VLAN switch priority, 27
Syslog, 269
UDLD, STP configurations, 33
UplinkFast, STP configurations, 30–31
uRPF, 260
virtual links, OSPF, 108–109
VLAN configurations
2960 series switches, 10–11
3650 series switches, 9–10
erasing, 7–8
example of, 8
network topology, 8
saving, 7
VRF-Lite, 347–348
VRRPv2, 201–202, 209–212
VRRPv3, 202–203
connected networks, redistributing, 129
connectivity (wireless clients), troubleshooting
Cisco AireOS Monitoring Dashboard GUI, 322–326
Cisco IOS XE GUI, 326–327
CoPP (Control Plane Policing), 257
ACL and permitted CoPP traffic flows, 258
class maps for matched traffic, 258–259
policy maps
control plane assignments, 259
policing matched traffic, 259
verifying, 260
copy startup-config tftp command, 238
copy tftp startup-config command, 239
cost metrics, OSPF, 100
crypto key generate rsa global configuration
command, 234
crypto key zeroize rsa command, 234
crypto maps, GRE/IPsec, 336–337
cryptographic authentication, OSPFv2
MD5, 95–96
SHA-256, 96
CSRT (Cross-Stack Rapid Transition), 24
D
data VLAN port assignments, 2
default mode, 3–4
DTP, 3–4
interface range command, 3
range command, 3
switchport mode access command, 2–4
switchport mode dynamic auto command, 3
switchport mode dynamic desirable command, 3
switchport mode nonegotiate command, 3
switchport mode trunk command, 3
switchport voice command, 2–3
database mode (VLANs), 2
dead interval timers, 101–102
debugging
debug command, 111, 217, 265–266
debug condition command, 266
debug ip packet command, 266
HSRP, 200–201
VRRP, 204
default information-originate always command,
102
default information-originate command, 102
default-metric command, 129
default metrics (redistribution), defining, 128–
129
default routes
BGP, 177
propagating, OSPF, 102–103
DES (Data Encryption Standard), 234
device management
FTP options, 243
HTTP options, 243
HTTPS options, 243
IFS, 236
backing up configurations to TFTP servers, 238
copy startup-config tftp command, 238
copy tftp startup-config command, 239
disabling unneeded services, 242–243
IOS image filenames, 237–238
IOS software, backing up to TFTP servers, 239
IOS software, restoring from TFTP servers, 239–
240
IOS software, restoring using ROM monitor
environmental variables, 240–241
IOS software, upgrading from TFTP servers,
239–240
no shutdown command, 239
restoring configurations from TFTP servers,
238–239
SCP, 241–242
show file systems command, 236
URL prefixes (commonly-used), 236–237
viewing, 236
passwords
cleartext password encryption, 232–233
configurations, 231–232
enable secret password command, 232
encryption types, 233–234
MD5, 233
service password-encryption command, 232–233
storage, 232
SSH
boot system commands, 235–236
configurations, 234–235
crypto key generate rsa global configuration
command, 234
crypto key zeroize rsa command, 234
verifying, 235
Telnet, 234
unneeded services, disabling, 242–243
URL prefixes for Cisco network devices, 236–237
DHCP (Dynamic Host Configuration Protocol),
217
IPv4
configuration examples, 224–229
IOS router configurations, 217–218
IOS software Ethernet interfaces, 219–220
ip forward-protocol command, 219
ip helper-address command, 219
manual IP assignments, 218
network topologies, 224, 226–227
no ip forward-protocol udp x command, 219
relays, 219
show ip dhcp binding command, 218
troubleshooting configurations, 220
verifying configurations, 220
IPv6, 221
DHCPv6 clients, 223
DHCPv6 relay agents, 223
no ipv6 nd managed-config-flag command, 223
routers as stateful DHCPv6 servers, 222–223
routers as stateless DHCPv6 servers, 221–222
SLAAC, 221–222
troubleshooting configurations, 224
verifying configurations, 224
no ip dhcp client request router command, 220
disabling unneeded services, 242–243
distribute lists
BGP route filtering, 180–181
distribute-list command, 73, 105
distribute-list in command, OSPF route filtering,
104–105
inbound distribute list route filters, 134–135
outbound distribute list route filters, 134–136
prefix lists and redistribution, 139–140
DMVPNs (Dynamic Multipoint VPNs), 340
IPv4 configurations
hub routers, 341–343, 345–346
spoke1 routers, 343–346
OSPF, 346–347
verifying, 346
domain names, VTP, 4–5
DoS, (Denial of Service) attacks, CoPP, 257
dot1q
encapsulation dot1q, local SPANs, 277
ingress dot1q vlan, local SPANs, 277
trunking, 4–5, 46
DR (Designated Routers)
BDR, OSPFv3, enabling IPv6 on an interface, 92
OSPFv2, DR elections, 99–100
OSPFv3
DR elections, 99–100
enabling IPv6 on an interface, 92
dst-ip load distribution method, 15
dst-mac load distribution method, 15
dst-mixed-ip-port load distribution method, 15
dst-port load distribution method, 15
DTP (Dynamic Trunking Protocol)
VLAN port assignments, 3–4
VTP domain names, 4
DUAL (Diffusing Update Algorithm), 62
dynamic NAT, configurations, 188
E
E1 routes, OSPF assignments, 130–131
E2 routes, OSPF assignments, 130–131
EAP (Extensible Authentication Protocol), 308–
309
localEAP, 311–314
RADIUS servers (external), 309–311
EBGP (External Border Gateway Protocol)
multihop, 162–163
next-hop behavior, 162
edge ports, Rapid PVST+, 36
EEM (Embedded Event Manager), 295–296
applets, 295, 298
configurations, 296–297
event manager run command, 298
event none command, 298
scripts, 295
TCL scripting, 298
verifying, 298
EF (Expedited Forwarding), 2–3
EIGRP (Enhanced Interior Gateway Protocol)
0.0.0.0/0 summarization, 74–75
authentication, 67
authentication key-chain command, 66
authentication mode command, 66
classic mode authentication, 67–68
named mode authentication, 68–70
troubleshooting, 70
verifying, 70
auto-summarization, 70
auto-summary command, 63, 70, 78
bandwidth
bandwidth command, 77
usage, 77
bandwidth-percent command, 66, 77
ip bandwidth-percent command, 77
classic mode
authentication, 67–68
IPv4 configurations, 62–63
IPv6 configurations, 63–64
upgrading configurations to named mode, 66–67
distribute-list command, 73
DUAL, 62
eigrp router-id command, 66
eigrp router-id w.x.y.z. command, 64
eigrp stub command, 66, 77, 79
eigrp upgrade-cli command, 66–67
exit-address-family command, 84, 85
exterior routing, accepting information, 75
hello-interval command, 66
hold-time command, 66
injecting default routes
0.0.0.0/0 summarization, 74–75
ip-default networks, 74
static route redistribution, 73
ip bandwidth-percent command, 77
ip default-network command, 74
load balancing
equal-cost, maximum paths, 75
unequal-cost, variance, 76
manual summarization
administrative-distance, 71
IPv4 summarization, 70–71
IPv6 summarization, 71
maximum-paths command, 66, 75
metric weights command, 66
metrics
metric rib-scale command, 79
metric weights command, 80
weight adjustments, 80
Wide Metrics, 79
named mode
authentication, 68–70
configurations, 64–65, 83
subconfiguration modes, 66
neighbor command, 79
network 0.0.0.0 command, 74
network command, 66
network summaries, 63
network topologies, 83
passive interfaces, 72
passive-interface command, 66
“pseudo” passive interfaces, 72–73
redistribution
default metrics, defining, 128–129
IPv4 routes, 131–132
IPv4 routes, verifying, 134
IPv6 routes, 132–133
IPv6 routes, verifying, 134
redistribute command, 66, 78
redistribute connected command, 78
redistribute static command, 78
route filtering, 134
route tagging, 142–143
seed metrics, defining, 128–129
route tagging, 142–143
router IDs, 67
SHA and named mode authentication, 68–70
show ip eigrp neighbors detail command, 81
show ip eigrp topology command, 81
static route redistribution, 73
stub routing, 77–79
summary-address command, 66, 84
timers, 71
topology base command, 66
traffic sharing, 76–77
traffic-share command, 66, 76–77
troubleshooting, 82–83
unicast neighbors, 79
variance
load balancing, 76
variance command, 66, 76
verifying, 80–82
Wide Metrics, 79
wildcard masks, 63
enable secret password command, 232
encapsulation dot1q, local SPANs, 277
encapsulation isl x command, 46
encapsulation replicate, local SPANs, 277
encryption
cleartext password encryption, 232–233
DES, 234
key config-key password-encryption command, 254–
255
OSPFv3, 97–98
passwords
password encryption aes command, 254–255
types of encryption, 233–234
SSH
boot system commands, 235–236
configurations, 234–235
crypto key generate rsa global configuration
command, 234
crypto key zeroize rsa command, 234
verifying, 235
enterprise mode (WPA2), 307
equal-cost load balancing, EIGRP, 75
erasing VLAN configurations, 7–8
ERSPANs (Encapsulated RSPANs), 280
destination configuration, 281
source configuration, 280
EtherChannel, 11–12
configurations
default configurations, 12
example of, 18
guidelines, 12–14
Layer 2 configurations, 14
Layer 3 configurations, 14–15
network topology, 18
GBIC, 13
LACP, 12–13, 16–17
load balancing, 12, 15–16
monitoring, 17
PAgP, 12–13
port channel in Layer 3 mode, HSRP, 194
SPANs, 13
verifying, 17
VLANs, 13
Ethernet interfaces (IOS software), DHCP and
IPv4 configurations, 219–220
event manager run command, 298
event none command, 298
exit command, VLAN configurations, 7
exit-address-family command, 84–85
extended ACL configurations, 247–248
extended load distribution method, 15
extended ping commands, 263–264
extended system ID (STP), verifying, 39
extended-range VLANs, 2
external routers, inter-VLAN routing, 45–46
external routes
AD, changing, 143–144
OSPF
redistribution, 131
summarization, 103–104
F
FHRP (First-Hop Redundancy Protocol), 194
fhrp version vrrp v3 command, 201
HSRP, 194
authentication, 197
basic configurations, 195
configuration settings, 195
debugging, 200–201, 217
EtherChannel port channel in Layer 3 mode, 194
HSRPv2 for IPv6, 200, 212–217
interface port channel global configuration
command, 194
interface tracking, 197
interface vlan vlan_id global configuration
command, 194
IP SLA tracking, 199–200, 208–209
IPv4, Layer 3 switches, 204–209
message timers, 196
multiple HSRP groups, 197–199
no switchport interface configuration command,
194
optimization options, 196–197
preempt, 196
routed ports, 194
SVIs, 194
verifying, 195, 217
VRRP, 201
debugging, 204
fhrp version vrrp v3 command, 201
interface tracking, 203
optimization options, 203
verifying, 203
VRRPv2 configurations, 201–202, 209–212
VRRPv3, 201–203
filenames (image), Cisco IOS, 237–238
filtering (route)
BGP, 180–181
EIGRP, 134
inbound distribute list route filters, 134–135
LSAs, 137
LSDBs, 137
OSPF, 104, 137
distribute-list command, 105
distribute-list in command, 104–105
filter-list command, 104
summary-address not-advertise command, 105
outbound distribute list route filters, 134–136
prefix lists, 137–140
verifying, 136–137
flash, 237
Flexible NetFlow
configurations, 272–273
flow exporter, 272
flow monitors, 272–273
flow records, 272
flow exporter, Flexible NetFlow, 272
flow monitors, Flexible NetFlow, 272–273
flow records, Flexible NetFlow, 272
forwarding VRF-Lite, 347
configurations, 347–348
verifying, 349
forward-time command, 27, 28
FTP (File Transfer Protocol), 237, 243
G
GBIC (Gigabit Interface Converters),
EtherChannel, 13
GRE(Generic Route Encapsulation), 329
configurations
overlay configurations, 333–334
underlay configurations, 332–333
DMVPNs, 340
IPv4 configurations, 341–346
OSPF, 346–347
verifying, 346
IPv4
configurations, 330
configurations with OSPFv3, 331–335
verifying, 331
IPv6
configurations, 330–331
configurations with OSPFv3, 331–335
verifying, 331
site-to-site GRE over IPsec, 335
crypto maps, 336–337
IPsec profiles, 337–339
verifying, 339
site-to-site VTI over IPsec, 339
H
hello-interval command, 66
hello-time command, 27–28
hello timers
EIGRP, 71
OSPF, 101–102
hold-time command, 66
hold timers, EIGRP, 71
hot-standby ports, LACP, 16–17
HSRP (Hot Standby Router Protocol), 194
authentication, 197
configurations
basic configurations, 195
IPv4, Layer 3 switches, 204–209
settings, 195
debugging, 200–201, 217
EtherChannel port channel in Layer 3 mode, 194
HSRPv2 for IPv6, 200, 212–217
interface port channel global configuration
command, 194
interface tracking, 197
interface vlan vlan_id global configuration command,
194
IP SLA tracking, 199–200, 208–209
message timers, 196
multiple HSRP groups, 197–199
no switchport interface configuration command, 194
optimization options, 196–197
preempt, 196
routed ports, 194
SVIs, 194
verifying, 195, 217
HTTP (Hypertext Transfer Protocol), 237, 243
HTTPS (HTTP Secure), 237, 243
I
IBGP (Internal Border Gateway Protocol), next-
hop behavior, 162
ICMP (Internet Control Message Protocol)
icmp-echo command, 153
redirect messages, 262
IFS (IOS File System), 236
configurations
backing up to TFTP servers, 238
copy startup-config tftp command, 238
copy tftp startup-config command, 239
no shutdown command, 239
restoring from TFTP servers, 238–239
IOS image filenames, 237–238
IOS software
backing up to TFTP servers, 239
restoring from TFTP servers, 239–240
restoring using ROM monitor environmental
variables, 240–241
upgrading from TFTP servers, 239–240
SCP, 241
configurations, 241–242
troubleshooting, 241
verifying, 241
show file systems command, 236
unneeded services, disabling, 242–243
URL prefixes (commonly-used), 236–237
viewing, 236
ignore state, OSPF, 101
IGRP (Interior Gateway Routing Protocol), 80
IKE SAs (Internet Key Exchange, Security
Associations), ISAKMP policies and site-to-site
GRE over IPsec, 336, 338
image filenames, Cisco IOS, 237–238
inbound distribute list route filters, 134–135
infrastructure security
AAA
configurations, 256–257
troubleshooting, 257
accounting, configurations, 257
ACL
CoPP traffic flows (permitted), 258
extended ACL configurations, 247–248
IPv4, verifying, 251
IPv4 configurations, 246–250
IPv6, verifying, 251
IPv6 configurations, 250–251
standard ACL configurations, 246–247
time-based ACL configurations, 248–249
VTY ACL configurations, 249–250
authentication, 251–252
AAA-based local database authentication, 252–
253
RADIUS authentication, 253–255
simple local database authentication, 252
TACACS+ authentication, 255–256
authorization, configurations, 256–257
CoPP, 257
ACL and permitted CoPP traffic flows, 258
class maps for matched traffic, 258–259
policy maps, control plane assignments, 259
policy maps, policing matched traffic, 259
verifying, 260
uRPF
configurations, 260
loose mode, 260
strict mode, 260
troubleshooting, 260
verifying, 260
ingress dot1q vlan, local SPANs, 277
ingress untagged vlan, local SPANs, 277
ingress vlan, local SPANs, 277
interarea route summarization, OSPF, 103
interface modes, EtherChannel, 12
interface port channel global configuration
command, 194
interface range command, 3
interface tracking
HSRP, 197
VRRP, 203
interface vlan vlan_id global configuration
command, 194
internal routers, multiarea OSPF
configurations, 117
internal routes
AD, changing, 143–144
OSPF redistribution, 131
inter-VLAN routing
best practices, 46
configurations, 47–48
encapsulation isl x command, 46
IPv6 configurations, 55
Layer 3 switches, 46–47
multilayer switches, 46–47
network topologies, 47–48
routers-on-a-stick, 45–46
switch virtual interfaces, 46–47
IOS software
backing up to TFTP servers, 239
Ethernet interfaces, DHCP, IPv4 configurations, 219–
220
restoring
from TFTP servers, 239–240
using ROM monitor environmental variables,
240–241
upgrading, from TFTP servers, 239–240
IOS XE CLI, troubleshooting WLCs, 320–322
IOS XE GUI, troubleshooting
wireless client connectivity, 326–327
WLCs, 319–320
ip as-path access-list command, BGP regular
expressions, 178
ip bandwidth-percent command, 77
ip-default networks
EIGRP, 74
ip default-network command, 74
ip helper-address command, 219
ip local policy route-map command, 145
IP MTU (Internet Protocol Maximum
Transmission Units), OSPF, 102
ip ospf authentication message-digest
command, 95
ip ospf cost command, 101
ip ospf process id area area number command,
91
IPSec (IP Security)
DMVPNs, 340
IPv4 configurations, 341–346
OSPF, 346–347
verifying, 346
site-to-site GRE over IPsec, 335
crypto maps, 336–337
IPsec profiles, 337–339
verifying, 339
site-to-site VTI over IPsec, 339–340
IP SLAs (Internet Protocol Service Layer
Agreements)
authentication, 149–150
Cisco IOS IP SLAs, 147–149
HSRP IP SLA tracking, 199–200, 208–209
icmp-echo command, 153
ip sla command, 150
ip sla monitor command, 150
monitoring, 150
network topologies, 148
PBR with IP SLAs, 150–151
probes, 151
tracking objects, 152
verifying, 152–153
show ip sla application command, 150
show ip sla configuration command, 153
show ip sla monitor configuration command, 153
show ip sla monitor statistics command, 153
show ip sla statistics command, 153
tcp-connect command, 149
track ip sla command, 153
track rtr command, 153
type echo protocol ipIcmpEcho command, 153
upd-echo command, 149
verifying, 152–153
VRRPv2 IP SLA tracking, routers/L3 switches, 209–
212
ISAKMP (Internet Security Association and Key
Management Protocol) policies, site-to-site
GRE over IPsec, 336, 338
ISL (Inter-Switch Linking), 4
ISP (Internet Service Provider) routers
inter-VLAN routing, 48–49, 56
PAT configurations, 191–192
J-K
keepalive timers, BGP, 161
K-values, EIGRP metric weight adjustments, 80
L
LACP (Link Aggregation Control Protocol), 12–
13, 16–17
Layer 3 mode, EtherChannel port channel in,
194
Layer 3 switches
inter-VLAN routing, 46–47
L2 switchport capability, removing, 47
VRRPv2 IP SLA tracking, 209–212
legacy RADIUS authentication, 253
legacy TACACS+ authentication, 255
load balancing
EIGRP
equal-cost, maximum paths, 75
unequal-cost, variance, 76
EtherChannel, 12, 15–16
local database authentication
AAA-based authentication, 252–253
simple authentication, 252
local preference attribute (BGP), 167–169
local SPANs
configurations
example of, 274–277
guidelines, 274
encapsulation dot1q, 277
encapsulation replicate, 277
ingress dot1q vlan, 277
ingress untagged vlan, 277
ingress vlan, 277
monitor session destination command, 277
monitor session source command, 276–277
no monitor session global configuration command,
274
show ip cache flow command, 273
troubleshooting, 281
verifying, 281
localEAP, 311–314
log-adjacency-changes command, 89
logging
EEM, 295–296
applets, 295, 298
configurations, 296–297
event manager run command, 298
event none command, 298
TCL scripting, 295, 298
verifying, 298
Flexible NetFlow
flow exporter, 272
flow monitors, 272–273
flow records, 272
NetFlow
Flexible NetFlow configurations, 272–273
verifying, 273
NTP
configurations, 281–282, 290–294
design, 282–284
ntp authentication-key command, 284
ntp master command, 282
ntp peer command, 282
ntp trusted-key command, 285
NTPv3, 283–284
NTPv4, 283–284
security, 284–285
setting router clocks, 286–289
show ntp associations command, 282
time stamps, 290
troubleshooting, 286
verifying, 286
Syslog
configurations, 269
message example, 270–271
message format, 269–270
security levels, 270
TCL scripting, 294–295
Loop Guard
PVST+, 44
Rapid PVST+, 44
STP configurations, 32–33
loopback addresses, OSPF, 98
loose mode (uRPF), 260
loose option, ping command, 264
LSAs (Link-State Advertisements)
LSDB overload protection, 101
route filtering, 137
LSDBs (Link-State Databases)
overload protection, OSPF, 101
route filtering, 137
LWA (Local Web Authentication), 314
M
manual summarization, EIGRP
IPv4, 70–71
IPv6, 71
max-age command, 27, 28
maximum-paths command, 66, 75
MD5 authentication, 97, 233
EIGRP named mode authentication, 68–70
OSPFv2 authentication, 95–96
MED (Multi-Exit Discriminator) attribute, BGP,
171–174
message timers, HSRP, 196
metrics
default metrics (redistribution), defining, 128–129
default-metric command, 129
EIGRP
weight adjustments, 80
Wide Metrics, 79
metric command, MED attribute (BGP), 171
metric rib-scale command, 79
metric weights command, 66, 80
seed metrics (redistribution), defining, 128–129
migrating from PVST+ to Rapid PVST+, 43–44
modular RADIUS authentication, 253–255
modular TACACS+ authentication, 255–256
monitor session destination command, 277
monitor session source command, 276–277
monitoring
EtherChannel, 17
IP SLAs, 150
MP-BGP (Multiprotocol-BGP), 157, 159–160
MST (Multiple Spanning Tree), 6
MSTP (Multiple Spanning Tree Protocol), 24–25
BackboneFast, 31
enabling, 37–38
UplinkFast, 31
multiarea OSPF configurations, 89–90 114
multicast addressing
IPv4, 64
IPv6, 64
multihop, EBGP, 162–163
multilayer switches, inter-VLAN routing, 46–47
N
named mode (EIGRP)
authentication, 68–70
configurations, 64–66, 83
NAT (Network Address Translation)
configurations
troubleshooting, 191
verifying, 190
dynamic NAT, 188
RFC 1918 private address ranges, 186–187
static NAT, 187, 193–194
virtual interfaces, 190, 193–194
native VLANs, 2–3
NBMA (Nonbroadcast Multiaccess) networks
hello timers, 102
OSPFv3, enabling IPv6 on an interface, 92
neighbor command, 79
neighbor remote-as command, 157
neighbor update-source command, BGP, 161–
162
NetFlow
configurations, 271
Flexible NetFlow configurations, 272–273
verifying, 273
network 0.0.0.0 command, 74
network area command, 89–90
network assurance
conditionally triggered debugs, 266
debug command, 265–266
EEM, 295–296
applets, 295, 298
configurations, 296–297
event manager run command, 298
event none command, 298
TCL scripting, 295, 298
verifying, 298
Flexible NetFlow
flow exporter, 272
flow monitors, 272–273
flow records, 272
ICMP redirect messages, 262
logging, configurations, 271
NetFlow
Flexible NetFlow configurations, 272–273
verifying, 273
NTP
configurations, 281–282, 290–294
design, 282–284
ntp authentication-key command, 284
ntp master command, 282
ntp peer command, 282
ntp trusted-key command, 285
NTPv3, 283–284
NTPv4, 283–284
security, 284–285
setting router clocks, 286–289
show ntp associations command, 282
time stamps, 290
troubleshooting, 286
verifying, 286
ping command, 262
examples, 262
extended ping commands, 262
interrupting ping operations, 264
loose option, 264
output characters, 263
record option, 264
strict option, 264
timestamp option, 264
verbose option, 264
port mirroring
ERSPANs, 280–281
local SPANs, 274–277, 281
RSPANs, 273–274, 277–281
SPANs, 273–277
SNMP
no snmp-server global command, 267
security levels, 267
security models, 267
SNMPv1, 267–268
SNMPv2c, 267–268
SNMPv3, 267–269
verifying, 269
Syslog
configurations, 269
message example, 270–271
message format, 269–270
security levels, 270
TCL scripting, 294–295
traceroute command, 265
network command
BGP
configurations, 156–157
default routes, 177
EIGRP named mode configurations, 66
network topologies
ASBR, 130–131
DHCP, IPv4, 224, 226–227
EIGRP, 83
EtherChannel configurations, 18
inbound distribute list route filters, 134–135
inter-VLAN routing configurations, 47–48, 55
IP SLAs, 148
IPv4 route redistribution, 131–132
IPv6 route redistribution, 132–133
NTP configurations, 290
OSPF
with AF, 120–121
multiarea OSPF configurations, 114
single-area OSPF configurations, 108
traditional OSPF configurations, 117–118
virtual links, 108
outbound distribute list route filters, 134–136
PBR with route maps, 146
PVST+, 40
route tagging and redistribution, 142
VLAN configurations, 8
networks
connected networks, redistributing, 129
DMVPNs, 340
IPv4 configurations, 341–346
OSPF, 346–347
verifying, 346
ip-default networks, EIGRP, 74
NBMA networks
hello timers, 102
OSPFv3, enabling IPv6 on an interface, 92
summaries, EIGRP, IPv4 classic mode
configurations, 63
timers, BGP, 161
WLANs
EAP, 312–314
open authentication, 304–306
WebAuth, 314–316
next-hop behavior
EBGP, 162
IBGP, 162
no debug all command, 265
no ip dhcp client request router command, 220
no ip forward-protocol udp x command, 219
no ipv6 nd managed-config-flag command, 223
no logging console command, 265
no monitor session global configuration
command, 274
no shutdown command, 33, 239
no snmp-server global command, 267
no switchport interface configuration
command, 194
noAuthNoPriv security level, SNMP, 267
non-edge link types, Rapid PVST+, 37
non-edge ports, Rapid PVST+, 36
normal-range VLANs, 2
NORTRID (No Router ID) warnings, 92
NSSA (Not-So-Stubby-Areas)
OSPF, 106–107
OSPFv3, 92
totally NSSA, 107–108
NTP (Network Time Protocol)
configurations, 281–282
network topologies, 290
design, 282–284
ntp authentication-key command, 284
ntp master command, 282
ntp peer command, 282
ntp trusted-key command, 285
NTPv3, 283–284
NTPv4, 283–284
router clocks, setting, 286–287
time zone acronyms, 288–289
time zone designators, 289
security
access lists, 285
authentication, 284–285
show ntp associations command, 282
time stamps, 290
troubleshooting, 286
verifying, 286
O
OSPFv2 (Open Shortest Path First version 2)
authentication
cryptographic authentication, 95–96
ip ospf authentication message-digest command,
95
MD5, 95–96
service password-encryption command, 96
SHA-256, 96
simple password authentication, 95
verifying, 98
auto-cost command, 101
auto-cost reference-bandwidth command, 101
BDR elections, 99–100
configurations, 89
log-adjacency-changes command, 89
multiarea OSPF, 89–90
multiarea OSPF configurations, 114–117
network area command, 89–90
single-area configurations, 111–114
verifying, 109–110
virtual links, 108–109
cost metrics, 100
DMVPNs, 346–347
DR elections, 99–100
E1 route assignments, 130–131
E2 route assignments, 130–131
ignore state, 101
IP MTU, 102
ip ospf cost command, 101
ip ospf process id area area number command, 91
IPv4, 89
IPv6, 89
loopback addresses, 98
LSDB overload protection, 101
multiarea OSPF, 89–90
network topologies
multiarea OSPF configurations, 114
single-area OSPF configurations, 108
traditional OSPF configurations, 117–118
virtual links, 108
OSPFv3 comparisons, 88–89
passive interfaces, 100
redistribution
connected networks, 129
default metrics, defining, 128–129
external routes, 131
internal routes, 131
IPv4 routes, 131–132, 134
IPv6 routes, 132–134
route tagging, 142–143
seed metrics, defining, 128–129
subnets, 130
reference bandwidth, 101
route filtering, 104, 137, 142–143
area range not-advertise command, 104
distribute-list command, 105
distribute-list in command, 104–105
filter-list command, 104
summary-address not-advertise command, 105
route summarization
external route summarization, 103–104
interarea route summarization, 103
router IDs, 99
router ospf x command, 91
router-id w.x.y.z. command, 99
routing, propagating default routes, 102–103
stub areas, 105–106
NSSA, 106–107
totally NSSA, 107–108
totally stubby areas, 106
timers, 101–102
troubleshooting, 111
virtual links, 108–109
wildcard masks, 90–91
OSPFv3 (Open Shortest Path First version 3)
AF, 93
IPv4, 94
IPv6, 94
parameters in configuration mode, 94–95
authentication, 97–98
area x authentication key-chain router
configuration command, 97
ospfv3 x authentication key-chain command, 97
verifying, 98
auto-cost command, 101
auto-cost reference-bandwidth command, 101
BDR elections, 99–100
configurations, 89
with AF, 120–125
enabling IPv6 on an interface, 91–92
log-adjacency-changes command, 89
multiarea OSPF, 89–90
multiarea OSPF configurations, 114–117
network area command, 89–90
single-area configurations, 111–114
traditional configurations, 91, 117–120
verifying, 109–110
virtual links, 108–109
cost metrics, 100
DMVPNs, 346–347
DR elections, 99–100
E1 route assignments, 130–131
E2 route assignments, 130–131
encryption, 97–98
ignore state, 101
interarea route summarization, 92
IP MTU, 102
ip ospf cost command, 101
ip ospf process id area area number command, 91
IPv4, 89
AF, 94
router IDs, 93
tunneling configurations, 331–335
IPv6, 88–89
AF, 94
ipv6 ospf x area y command, 92
traditional configurations, 91–92
tunneling configurations, 331–335
loopback addresses, 98
LSDB overload protection, 101
multiarea OSPF, 89–90
network topologies
multiarea OSPF configurations, 114
OSPF with AF, 120–121
single-area OSPF configurations, 108
traditional OSPF configurations, 117–118
virtual links, 108
NSSA areas, 92
OSPFv2 comparisons, 88–89
ospfv3 x authentication key-chain command, 97
passive interfaces, 100
redistribution
connected networks, 129
default metrics, defining, 128–129
external routes, 131
internal routes, 131
IPv4 routes, 131–132
IPv4 routes, verifying, 134
IPv6 routes, 132–133
IPv6 routes, verifying, 134
route tagging, 142–143
seed metrics, defining, 128–129
subnets, 130
reference bandwidth, 101
RFC 5838, 109
route filtering, 104, 137
area range not-advertise command, 104
distribute-list command, 105
distribute-list in command, 104–105
filter-list command, 104
summary-address not-advertise command, 105
route summarization
external route summarization, 103–104
interarea route summarization, 103
route tagging, 142–143
router IDs, 99
router ospf x command, 91
router-id w.x.y.z. command, 99
routing, propagating default routes, 102–103
SPF calculations, 93
stub areas, 92, 105–106
NSSA, 106–107
totally NSSA, 107–108
totally stubby areas, 106
summary-address command, 105
summary-prefix command, 105
timers, 101–102
troubleshooting, 111
virtual links, 108–109
wildcard masks, 90–91
outbound distribute list route filters, 134–136
overlay tunnels
GRE, 329
DMVPNs, 340–347
IPv4 configurations, 330–335
IPv6 configurations, 330–335
overlay configurations, 333–334
site-to-site GRE over IPsec, 335–339
site-to-site VTI over IPsec, 339–340
underlay configurations, 332–333
verifying, IPv4, 331
VTI, site-to-site VTI over IPsec, 339–340
overload protection (LSDBs), OSPF, 101
P
PAgP (Port Aggregation Protocol), 12, 13
passive interfaces
EIGRP, 72
OSPF, 100
passive interface default command, 100
passive-interface command, 66, 100
passwords
cleartext password encryption, 232–233
configurations, 231–232
enable secret password command, 232
encryption types, 233–234
key config-key password-encryption command, 254–
255
MD5, 233
OSPFv2 authentication, 95
password encryption aes command, 254–255
service password-encryption command, 232–233
storage, 232
VTP, 5, 6
PAT (Port Address Translation), configurations,
189–190
example of, 191–193
troubleshooting, 191
verifying, 190
path access lists (AS), BGP, 181–182
local preference attribute manipulation, 167–169
weight attribute manipulation, 166
path control
defined, 144
PBR, 144–145
IP SLAs, 150–153
route maps, 146–147
verifying, 145–146
set interface command, 145
path costs, STP configurations, 27
PBR (Policy-Based Routing)
IP SLAs, 150–151
probes, 151
tracking objects, 152
verifying, 152–153
path control, 144–145
configurations, 146–147
network topologies, 146
route maps, 146–147
verifying, 145–146
peer groups, BGP, 182–183
personal mode (WPA2), 306
ping command, 262
examples, 262
extended ping commands, 262
interrupting ping operations, 264
loose option, 264
output characters, 263
record option, 264
strict option, 264
TCL scripting, 295
timestamp option, 264
verbose option, 264
point-to-point links, Rapid PVST+, 37
policy maps (CoPP)
control plane assignments, 259
policing matched traffic, 259
port mirroring
ERSPANs, 280
destination configuration, 281
source configuration, 280
local SPANs, 273–277, 281
RSPANs, default configurations, 273–274, 277–281
PortFast
PVST+, 44
Rapid PVST+, 44
STP configurations, 28–29
ports
channel-group command, 14
edge ports, Rapid PVST+, 36
EF values, 2–3
error conditions, STP configurations, 33–36
EtherChannel port channel in Layer 3 mode, 194
LACP, hot-standby ports, 16–17
non-edge ports, Rapid PVST+, 36
PAgP, 12–13
port channel command, 14
priority, STP configurations, 26
routed ports, HSRP, 194
SPANs, EtherChannel, 13
VLANs
data VLAN port assignments, 2–4
voice VLAN port assignments, 2–4
preempt, HSRP, 196
prefix lists
BGP, 166–167, 181–182
route filtering, 137–140
verifying, 140
pre-shared keys, authentication, wireless
clients, 306–308
primary servers, VTP, 6
priv security level, SNMP, 267
private AS (Autonomous Systems), removing,
171
private IP addresses, 186–187
probes, PBR with IP SLAs, 151
pruning VTP, 6
“pseudo” passive interfaces, EIGRP, 72–73
PSK (Pre-Shared Key) configurations, site-to-
site GRE over IPsec, 337–338
PVST+(Per VLAN Spanning Tree Plus), 24–25
BackboneFast, 44
BPDU Filter, 44
BPDU Guard, 44
configurations
network topologies, 40
Loop Guard, 44
migrating to Rapid PVST+, 43–44
PortFast, 44
Rapid PVST+, 24, 25
Root Guard, 44
UplinkFast, 44
Q-R
RADIUS authentication, 253, 309–314
key config-key password-encryption command, 254–
255
legacy authentication, 253
modular RADIUS authentication, 253–255
password encryption aes command, 254–255
range command, 3
Rapid PVST+, 24–25
BackboneFast, 31, 44
BPDUs, 43
BPDU Filter, 44
BPDU Guard, 44
edge ports, 36
enabling, 36
Loop Guard, 44
non-edge link types, 37
non-edge ports, 36
point-to-point links, 37
PortFast, 44
PVST+ migration to, 43–44
Root Guard, 44
shared links, 37
UplinkFast, 31, 44
rcp (Remote Copy Protocol), 237
record option, ping command, 264
redirect messages (ICMP), 262
redistribution
AD, changing, 143–144
BGP, default metrics, defining, 128
connected networks, 129
default metrics, defining, 128–129
distribute lists, route filtering, 139–140
E1 routes, OSPF assignments, 130–131
E2 routes, OSPF assignments, 130–131
EIGRP
default metrics, defining, 128–129
IPv4 routes, 131–132
IPv4 routes, verifying, 134
IPv6 routes, 132–133
IPv6 routes, verifying, 134
route filtering, 134
seed metrics, defining, 128–129
IPv4 routes, 131–132, 134
IPv6 routes, 132–134
OSPF
connected networks, 129
default metrics, defining, 128–129
E1 route assignments, 130–131
E2 route assignments, 130–131
external routes, 131
internal routes, 131
IPv4 routes, 131–132, 134
IPv4 routes, verifying,
IPv6 routes, 132–134
seed metrics, defining, 128–129
subnets, 130
prefix lists
route filtering, 137–140
verifying, 140
redistribute command, 66, 78, 129
redistribute connected command, 78, 129
redistribute static command, 78
RIP, default metrics, defining, 128
route filtering
EIGRP, 134
inbound distribute list route filters, 134–135
outbound distribute list route filters, 134–136
prefix lists, 137–140
verifying, 136–137
route maps, 140–142
route tagging, 142–143
seed metrics, defining, 128–129
static routes, 129
subnets into OSPF, 130
reference bandwidth
auto-cost command, 101
auto-cost reference-bandwidth command, 101
ip ospf cost command, 101
OSPF, 101
regular expressions, BGP, 178–180
relays (DHCP), 219
remove-private-as command, 171
restoring
IFS configurations from TFTP servers, 238–239
IOS software
from TFTP servers, 239–240
using ROM monitor environmental variables,
240–241
RFC 1918, 186–187
RFC 2784, 329
RFC 5340, 88
RFC 5838, 109
RIP (Routing Information Protocol),
redistribution, 128
ROM monitor environmental variables,
restoring IO software, 240–241
Root Guard
PVST+, 44
Rapid PVST+, 44
STP configurations, 31–32
UplinkFast, 32
VLANs, 32
root switches, STP configurations, 25–26
RSA authentication, 234
RSPANs (Remote SPANs)
configurations
default configurations, 273–274
example of, 278–280
guidelines, 277–278
ERSPANs, 280
destination configuration, 281
source configuration, 280
show monitor command, 281
troubleshooting, 281
verifying, 281
RSTP (Rapid Spanning Tree Protocol), 24
S
saving VLAN configurations, 7
SCP (Secure Copy Protocol), 237, 241
configurations, 241–242
troubleshooting, 241
verifying, 241
seed metrics (redistribution), defining, 128–129
sequence numbers, route maps, 144
server mode (VTP), 5
servers
AAA servers, password storage, 232
primary servers, VTP, 6
RADIUS server authentication, 253
key config-key password-encryption command,
254–255
legacy authentication, 253
modular authentication, 253–255
password encryption aes command, 254–255
SCP servers, configurations, 241, 242
TACACS+ server authentication, 255
legacy authentication, 255
modular authentication, 255–256
TFTP servers
backing up IFS configurations to TFTP servers,
238
backing up IOS software, 239
copy startup-config tftp command, 238
copy tftp startup-config command, 239
restoring IFS configurations from TFTP servers,
238–239
restoring IOS software, 239–240
upgrading IOS software, 239–240
VTP servers, overwriting, 6
service password-encryption command, 96,
232–233
set interface command, 145
sftp (Secure FTP), 237
SHA (Secure Hash Algorithm)
EIGRP named mode authentication, 68–70
SHA1, 97
SHA-256, OSPFv2 authentication, 96
shared links, Rapid PVST+, 37
show debug condition command, 266
show file systems command, 236
show ip bgp command, BGP regular
expressions, 179–180
show ip bgp neighbor command, 176
show ip cache flow command, 273
show ip dhcp binding command, 218
show ip eigrp neighbors detail command, 81
show ip eigrp topology command, 81
show ip sla application command, 150
show ip sla configuration command, 153
show ip sla monitor configuration command,
153
show ip sla monitor statistics command, 153
show ip sla statistics command, 153
show monitor command, 281
show ntp associations command, 282
show vlan privileged EXEC command, 2
shutdown command, UDLD, 33
simple local database authentication, 252
simple password authentication, OSPFv2, 95
single-area OSPF configurations, 111–112
site-to-site GRE over IPsec, IPSec, 335–337
site-to-site VTI over IPsec, 339–340
SLAAC (Stateless Autoconfiguration), DHCP
and IPv6 configurations, 221–222
SLAs (Service Level Agreements), IP SLAs
authentication, 149–150
Cisco IOS IP SLAs, 147–149
icmp-echo command, 153
ip sla command, 150
ip sla monitor command, 150
monitoring, 150
PBR with IP SLAs, 150–153
show ip sla application command, 150
show ip sla configuration command, 153
show ip sla monitor configuration command, 153
show ip sla monitor statistics command, 153
show ip sla statistics command, 153
tcp-connect command, 149
track ip sla command, 153
track rtr command, 153
type echo protocol ipIcmpEcho command, 153
upd-echo command, 149
verifying, 152–153
SNMP (Simple Network Management Protocol),
267
no snmp-server global command, 267
security levels, 267
security models, 267
SNMPv1, 267–268
SNMPv2c, 267–268
SNMPv3, 267–269
verifying, 269
soft-reconfiguration inbound command, 175
software (IOS)
ROM monitor environmental variables, restoring
using, 240–241
TFTP servers
backing up to, 239
restoring from, 239–240
upgrading from, 239–240
source flash:ping.tcl command, 294
SPANs (Switched Port Analyzers)
configurations
default configurations, 273–274
local SPANs, 274–277, 281
RSPANs, 277–281
ERSPANs, 280
destination configuration, 281
source configuration, 280
EtherChannel, 13
local SPANs
configuration examples, 274–277
configuration guidelines, 274
encapsulation dot1q, 277
encapsulation replicate, 277
ingress dot1q vlan, 277
ingress untagged vlan, 277
ingress vlan, 277
monitor session destination command, 277
monitor session source command, 276, 277
no monitor session global configuration
command, 274
show ip cache flow command, 273
troubleshooting, 281
verifying, 281
RSPANs
configuration example, 278–280
configuration guidelines, 277–278
show monitor command, 281
troubleshooting, 281
verifying, 281
SPF (Shortest Path First) calculations, OSPFv3,
93
spi (Security Policy Index), 97
src-dst-ip load distribution method, 16
src-dst-mac load distribution method, 16
src-dst-mixed-ip-port load distribution method,
16
src-dst-port load distribution method, 16
src-ip load distribution method, 16
src-mac load distribution method, 16
src-mixed-ip-port load distribution method, 16
src-port load distribution method, 16
SSH (Secure Shell)
boot system commands, 235–236
configurations, 234–235
crypto key generate rsa global configuration
command, 234
crypto key zeroize rsa command, 234
verifying, 235
standard ACL configurations, 246–247
static NAT configurations, 187, 193–194
static route redistribution, 73, 129
static VLANs, creating, 2
storage, passwords, 232
STP (Spanning Tree Protocol)
changing modes, 25
configurations
BackboneFast, 31
BPDU Filter, 30
BPDU Guard, 29–30
changing modes, 25
Loop Guard, 32–33
path costs, 27
port error conditions, 33–36
port priority, 26
PortFast, 28–29
Rapid PVST+, 36
Root Guard, 31–32
root switches, 25–26
secondary root switches, 26
timers, 27–28
UDLD, 33
UplinkFast, 30–31
VLAN switch priority, 27
defined, 24
enabling, 24–25
extended system ID, verifying, 39
forward-time command, 27–28
hello-time command, 27–28
max-age command, 27–28
MSTP, 24–25
BackboneFast, 31
enabling, 37–38
UplinkFast, 31
PVST+, 24–25
BackboneFast, 44
BPDU Filter, 44
BPDU Guard, 44
configurations, 40–43
Loop Guard, 44
migrating to Rapid PVST+, 43–44
PortFast, 44
Root Guard, 44
UplinkFast, 44
Rapid PVST+, 24–25
BackboneFast, 31, 44
BPDUs, 43
BPDU Filter, 44
BPDU Guard, 44
edge ports, 36
enabling, 36
Loop Guard, 44
non-edge link types, 37
non-edge ports, 36
point-to-point links, 37
PortFast, 44
PVST+ migration to, 43–44
Root Guard, 44
shared links, 37
UplinkFast, 31, 44
RSTP, 24
timers, 27–28
troubleshooting, 40
verifying, 39
VLANs, 25
strict mode (uRPF), 260
strict option, ping command, 264
stub areas, 105–106
NSSA, 106–107
OSPFv3, 92
totally NSSA 107–108
totally stubby areas, OSPF, 106
stub routing, EIGRP, 77–79
subnets, redistribution into OSPF, 130
summarization
EIGRP
auto-summarization, 70
manual summarization, 70–71
OSPF
external route summarization, 103–104
interarea route summarization, 103
summary-address command, 66, 84, 105
summary-address not-advertise command,
OSPF route filtering, 105
summary-prefix command, 105
SVIs (Switch Virtual Interfaces), HSRP, 194
switchport mode access command, 2–4
switchport mode dynamic auto command, 3
switchport mode dynamic desirable command,
3
switchport mode nonegotiate command, 3
switchport mode trunk command, 3
switchport mode trunk encapsulation
command, 4
switchport voice command, 2–3
Syslog
configurations, 269
logging, configurations, 271
message example, 270–271
message format, 269–270
security levels, 270
system (URL prefix), 237
T
TACACS+ authentication, 255
legacy authentication, 255
modular authentication, 255–256
tar, 237
TCL scripting, 294–295, 298
tclquit command, 295
tclsh command, 295
tcp-connect command, 149
Telnet, 234
tftp, 237
TFTP servers
Cisco IFS
backing up configurations to TFTP servers, 238
restoring configurations from TFTP servers,
238–239
copy startup-config tftp command, 238
copy tftp startup-config command, 239
IOS software
backing up, 239
restoring, 239–240
upgrading, 239–240
time stamps
NTP, 290
timestamp option, ping command, 264
time zones, router clock setups
time zone acronyms, 288–289
time zone designators, 289
time-based ACL configurations, 248–249
timers
BGP, 161
dead interval timers, 101–102
EIGRP, 71
forward-time command, 27–28
hello timers, 101–102
hello-time command, 27–28
keepalive timers, BGP, 161
max-age command, 27–28
message timers, HSRP, 196
network timers, BGP, 161
OSPF, 101–102
STP configurations, 27–28
tos, EIGRP metric weight adjustments, 80
totally NSSA, OSPF, 107–108
totally stubby areas, OSPF, 106
traceroute command, 265
track ip sla command, 153
track rtr command, 153
tracking
interface tracking
HSRP, 197
VRRP, 203
IP SLA tracking, HSRP, 199–200
objects, PBR with IP SLAs, 152
traffic-share command, 66, 76–77
transform sets, site-to-site GRE over IPsec, 337,
338
transparent mode
VLANs, 2
VTP, 5, 6, 7
troubleshooting
AAA, 256–257
BGP, 175–176
debug commands, 111
DHCP
IPv4 configurations, 220
IPv6 configurations, 223
EIGRP, 70, 82–83
local SPANs, 281
NAT configurations, 191
NTP, 286
OSPF, 111
PAT configurations, 191
RSPANs, 281
SCP, 241
STP, 40
uRPF, 260
wireless client connectivity
Cisco AireOS Monitoring Dashboard GUI, 322–
326
Cisco IOS XE GUI, 326–327
WLCs, 316
Cisco AireOS Advanced GUI, 318–319
Cisco AireOS CLI, 320–322
Cisco AireOS Monitoring Dashboard GUI, 316–
318
Cisco IOS XE CLI, 320–322
Cisco IOS XE GUI, 319–320
trunking
dot1q trunking, 4–5, 46
DTP
VLAN port assignments, 3–4
VTP domain names, 4
VLANs
dot1q trunking, 4–5
DTP, 3–4
port assignments, 3–4
trunk encapsulation, 4–5
VTP, 2, 4, 5–6
VTP, 2
client mode, 5
domain names, 4–5
DTP trunk negotiations, 4
overwriting servers, 6
passwords, 5–6
primary servers, 6
pruning, 6
server mode, 5
transparent mode, 5
verifying, 6
versions, 5
VLAN configuration, 5–6
VTP primary server command, 6
tunneling
GRE, 329
DMVPNs, 340–347
IPv4 configurations, 330
IPv4 configurations with OSPFv3, 331–335
IPv6 configurations, 330–331
IPv6 configurations with OSPFv3, 331–335
overlay configurations, 333–334
site-to-site GRE over IPsec, 335–339
site-to-site VTI over IPsec, 339–340
underlay configurations, 332–333
verifying, IPv4, 331
VTI, site-to-site VTI over IPsec, 339–340
U
UDLD (Unidirectional Link Detection)
no shutdown command, 33
shutdown command, 33
STP configurations, 33
undebug all command, 265
underlay configurations, GRE, 332–333
unequal-cost load balancing, EIGRP, 76
unicast addressing
EIGRP unicast neighbors, 79
IPv4, 64
IPv6, 64
universal IOS image filename, 237
unneeded IFS services, disabling, 242–243
upd-echo command, 149
upgrading
EIGRP
eigrp upgrade-cli command, 66–67
upgrading classic mode configurations to named
mode, 66–67
IOS software from TFTP servers, 239–240
UplinkFast
PVST+, 44
Rapid PVST+, 31, 44
Root Guard, 32
STP configurations, 30–31
URL prefixes for Cisco network devices, 236–
237
uRPF (Unicast Reverse Path Forwarding)
configurations, 260
loose mode, 260
strict mode, 260
troubleshooting, 260
verifying, 260
V
variance
EIGRP load balancing, 76
variance command, 66, 76
verbose option, ping command, 264
verifying
ACL
IPv4, 251
IPv6, 251
BGP, 174, 184
CoPP, 260
DHCP
IPv4 configurations, 220
IPv6 configurations, 224
DMVPNs, 346
EEM, 298
EIGRP, 70, 80–82
EtherChannel, 17
extended system ID (STP), 39
GRE, 331, 339
HSRP, 195, 217
IP SLAs, 152–153
IPSec, site-to-site GRE over IPsec, 339
IPv4 route redistribution, 134
IPv6 route redistribution, 134
local SPANs, 281
NAT configurations, 190
NetFlow, 273
NTP, 286
OSPF, 109–110
OSPFv2 authentication, 98
OSPFv3 authentication, 98
PAT configurations, 190
PBR, path control, 145–146
port error conditions, STP configurations, 33–36
prefix lists, 140
route filtering, 136–137
RSPANs, 281
SCP, 241
SNMP, 269
SPANs
local SPANs, 281
RSPANs, 281
STP, 39
uRPF, 260
VLAN information, 7
VRF-Lite, 349
VRRP, 203
VTP, 6
virtual interfaces
NAT interfaces, configurations, 190, 193–194
switch virtual interfaces, inter-VLAN routing, 46–47
virtual links, OSPF, 108–109
VLANs (Virtual Local Area Networks)
2960 series switches, 10–11
3650 series switches, 9–10
allowed VLANs, 4–5
configuration mode, static VLANs, 2
configurations
2960 series switches, 10–11
3650 series switches, 9–10
erasing, 7–8
example of, 8
network topology, 8
saving, 7
copy running-config startup-config command, 7
creating, 2
data VLANs, port assignments, 2–4
database mode, 2
defined, 1–2
dot1q trunking, 4–5
DTP, 3–4
EtherChannel configurations, 13
exit command, 7
extended-range VLANs, 2
ingress dot1q vlan, local SPANs, 277
ingress untagged vlan, local SPANs, 277
ingress vlan, local SPANs, 277
interface range command, 3
inter-VLAN routing
best practices, 46
configurations, 47–48
encapsulation isl x command, 46
external routers, 45–46
IPv6 configurations, 55–60
multilayer switches, 46–47
network topologies, 47–48
routers-on-a-stick, 45–46
switch virtual interfaces, 46–47
MSTP, 24
native VLANs, 2–3
normal-range VLANs, 2
port assignments
data VLANs, 2–4
voice VLANs, 2–4
PVST+, 24
range command, 3
Root Guard, 32
show vlan privileged EXEC command, 2
SPANs
local SPANs, 274–277
RSPANs, 278–280
static VLANs, creating, 2
STP, 25
path costs, 27
switch priority, 27
timers, 27–28
switchport mode access command, 2–4
switchport mode dynamic auto command, 3
switchport mode dynamic desirable command, 3
switchport mode nonegotiate command, 3
switchport mode trunk command, 3
switchport mode trunk encapsulation command, 4
switchport voice command, 2–3
transparent mode, 2
trunk encapsulation, 4–5
verifying information, 7
voice VLANs
port assignments, 2–4
switchport voice command, 2–3
VTP, 2, 5–6
client mode, 5
domain names, 4–5
DTP trunk negotiations, 4
overwriting servers, 6
passwords, 5–6
primary servers, 6
pruning, 6
server mode, 5
transparent mode, 5–7
verifying, 6
versions, 5
VTP primary server command, 6
VPNs (Virtual Private Networks), DMVPNs, 340
IPv4 configurations, 341–346
OSPF, 346–347
verifying, 346
vrf upgrade-cli multi-af-mode command, 348
VRF-Lite, 347
configurations, 347–348
verifying, 349
VRF
creating, 347–348
interface assignments, 347–348
routing, 348
VRRP (Virtual Router Redundancy Protocol),
201
debugging, 204
fhrp version vrrp v3 command, 201
interface tracking, 203
optimization options, 203
verifying, 203
VRRPv2
configurations, 201–202
routers/L3 switches with IP SLA tracking, 209–
212
VRRPv3, 201, 202–203
VTI (Virtual Tunnel Interface), site-to-site VTI
over IPsec, 339–340
VTY ACL configurations, 249–250
W
WebAuth, 314–316
weight attribute (BGP), 164–165
AS path access lists, 166
prefix lists, 166–167
route maps, 166–167
WEP (Wired Equivalent Privacy) standard, 306
Wide Metrics (EIGRP), 79
wildcard masks
EIGRP IPv4 classic mode configurations, 63
OSPF, 90–91
wireless clients
authentication, 303
802.1x, 307–308
EAP, 308–314
LWA, 314
open authentication, 304–306
pre-shared keys, 306–308
WebAuth, 314–316
WPA2, 306–307
connectivity, troubleshooting
Cisco AireOS Monitoring Dashboard GUI, 322–
326
Cisco IOS XE GUI, 326–327
WLCs, troubleshooting, 316
Cisco AireOS Advanced GUI, 318–319
Cisco AireOS CLI, 320–322
Cisco AireOS Monitoring Dashboard GUI, 316–
318
Cisco IOS XE CLI, 320–322
Cisco IOS XE GUI, 319–320
wireless security, 307–308
WEP standard, 306
wireless client authentication, 303
802.1x, 307–308
EAP, 308–314
LWA, 314
open authentication, 304–306
pre-shared keys, 306–308
WebAuth, 314–316
WPA2, 306–307
WLANs (Wireless Local Area Networks)
EAP, 312–314
open authentication, 304–306
WebAuth, 314–316
WLCs (Wireless LAN Controllers),
troubleshooting, 316
Cisco AireOS
Advanced GUI, 318–319
CLI, 320–322
Monitoring Dashboard GUI, 316–318
Cisco IOS XE
CLI, 320–322
GUI, 319–320
WPA2 (Wired Protected Access 2), 306
enterprise mode, 307
personal mode, 306
X-Y-Z
xmodem, 237
ymodem, 237
Code Snippets
Many titles include programming code or configuration
examples. To optimize the presentation of these
elements, view the eBook in single-column, landscape
mode and adjust the font size to the smallest setting. In
addition to presenting code and configurations in the
reflowable text format, we have included images of the
code that mimic the presentation found in the print
book; therefore, where the reflowable format may
compromise the presentation of the code listing, you
will see a “Click here to view code image” link. Click the
link to view the print-fidelity code image. To return to
the previous page viewed, click the Back button on your
device or app.