278
ICND Interconnecting Cisco Network Devices Volume 1 Version 2.3 Student Guide Text Part Number: 97-2321-02

Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

  • Upload
    nashoni

  • View
    769

  • Download
    8

Embed Size (px)

Citation preview

Page 1: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

ICND

Interconnecting Cisco Network Devices Volume 1 Version 2.3

Student Guide

Text Part Number: 97-2321-02

Page 2: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. All rights reserved.

Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica

Croatia • Cyprus • Czech Republic • Denmark • Dubai, UAE • Finland • France • Germany • Greece Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy • Japan • Korea • Luxembourg • Malaysia

Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal • Puerto Rico • Romania Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland

Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe

© 2006 Cisco Systems, Inc. All rights reserved. CCSP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play,

and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0501R)

DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED “AS IS.” CISCO MAKES AND YOU RECEIVE NO WARRANTIES IN CONNECTION WITH THE CONTENT PROVIDED HEREUNDER, EXPRESS, IMPLIED, STATUTORY OR IN ANY OTHER PROVISION OF THIS CONTENT OR COMMUNICATION BETWEEN CISCO AND YOU. CISCO SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. This learning product may contain early release content, and while Cisco believes it to be accurate, it falls subject to the disclaimer above.

Page 3: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Students, this letter describes important course evaluation access information!

Welcome to Cisco Systems Learning. Through the Cisco Learning Partner Program, Cisco Systems is committed to bringing you the highest-quality training in the industry. Cisco learning products are designed to advance your professional goals and give you the expertise you need to build and maintain strategic networks. Cisco relies on customer feedback to guide business decisions; therefore, your valuable input will help shape future Cisco course curricula, products, and training offerings. We would appreciate a few minutes of your time to complete a brief Cisco online course evaluation of your instructor and the course materials in this student kit. On the final day of class, your instructor will provide you with a URL directing you to a short post-course evaluation. If there is no Internet access in the classroom, please complete the evaluation within the next 48 hours or as soon as you can access the web. On behalf of Cisco, thank you for choosing Cisco Learning Partners for your Internet technology training. Sincerely, Cisco Systems Learning

Page 4: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1
Page 5: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Table of Contents Volume 1 Course Introduction 1

Overview 1 Learner Skills and Knowledge 2

Course Goal and Objectives 3 Course Flow 4 Additional References 5

Cisco Glossary of Terms 5 Your Training Curriculum 6

Configuring Catalyst Switch Operations 1-1 Overview 1-1

Module Objectives 1-1 Introducing Basic Layer 2 Switching and Bridging Functions 1-3

Overview 1-3 Objectives 1-3

Functions of Ethernet Switches and Bridges 1-4 Frame Transmission Modes 1-5 How Switches and Bridges Learn Source MAC Addresses 1-7

Example: MAC Address Learning 1-8 Example: MAC Address Learning (Cont.) 1-9

How Switches and Bridges Forward and Filter Frames 1-10 Example: Filtering Frames 1-10 Example: Filtering Frames Through a Hub 1-11

Summary 1-13 Identifying Problems that Occur in Redundant Switched Topologies 1-15

Overview 1-15 Objectives 1-15

Redundant Switched and Bridged Topologies 1-16 Broadcast Storms 1-18

Example: Broadcast Storms 1-18 Multiple Frame Transmissions 1-20

Example: Multiple Transmissions 1-20 MAC Database Instability 1-22

Example: Instability of the MAC Database 1-22 Summary 1-23

Introducing Spanning Tree Protocol 1-25 Overview 1-25

Objectives 1-25 Spanning Tree Protocol 1-26 Spanning-Tree Operation 1-27

Example: Spanning-Tree Operation 1-27 Root Bridge Selection 1-29

Example: Selecting the Root Bridge 1-29 Spanning-Tree Port States 1-30

Example: Spanning-Tree Port States 1-32 Example: Spanning-Tree Operation 1-33

Spanning-Tree Path Cost 1-34 Example: Spanning-Tree Path Cost 1-34

Spanning-Tree Recalculation 1-35 Example: Spanning-Tree Recalculation 1-35

Rapid Spanning Tree Protocol 1-37 RSTP Port States 1-38

Summary 1-40

Page 6: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

ii Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Configuring a Catalyst Switch 1-41 Overview 1-41

Objectives 1-41 Catalyst Switch Default Configuration Verification 1-42 Catalyst Switch IP Address and Default Gateway Configuration 1-44 Duplexing and Speed 1-47 Duplex Interface Configuration 1-48

Example: Showing Duplex Options 1-49 MAC Address Table Management 1-50

Example: Setting a Static MAC Address 1-51 Port Security Configuration 1-52 Adds, Moves, and Changes for Access Layer Catalyst Switches 1-56 Catalyst Switch Configuration File Management 1-59 Summary 1-61 Module Summary 1-63 Module Self-Check 1-64

Module Self-Check Answer Key 1-68 Extending Switched Networks with Virtual LANs 2-1

Overview 2-1 Module Objectives 2-1

Introducing VLAN Operations 2-3 Overview 2-3

Objectives 2-3 VLANs Defined 2-4 VLAN Operation 2-5 VLAN Membership Modes 2-6 802.1Q Trunking 2-7

Example: Per VLAN Spanning Tree + 2-10 Inter-Switch Link Protocol and Encapsulation 2-12 VLAN Trunking Protocol Features 2-14 VTP Modes 2-15 VTP Operations 2-16 VTP Pruning 2-18

Example: VTP Pruning 2-18 Summary 2-19

Configuring VLANs 2-21 Overview 2-21

Objectives 2-21 VTP Configuration 2-22

Example: VTP Configuration 2-24 802.1Q Trunking Configuration 2-25 ISL Trunking Configuration 2-29 VLAN Creation 2-31 VLAN Name Modification 2-33 VLAN Port Assignment 2-34 VLAN Configuration Verification 2-35

Example: Verifying STP for a VLAN 2-39 Adds, Moves, and Changes for VLANs 2-40

Adding VLANs and Port Membership 2-40 Changing VLANs and Port Membership 2-41 Deleting VLANs and Port Membership 2-41

VLAN Troubleshooting 2-42 Summary 2-48 Module Summary 2-51 Module Self-Check 2-52

Module Self Check Answer Key 2-55

Page 7: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Interconnecting Cisco Network Devices (ICND) v2.3 iii

Determining IP Routes 3-1 Overview 3-1

Module Objectives 3-1 Introducing Routing 3-3

Overview 3-3 Objectives 3-3

Routing Overview 3-4 Static and Dynamic Route Comparison 3-6 Static Route Configuration 3-7

Example: Static Routes 3-7 Example: Configuring Static Routes 3-9

Default Route Forwarding Configuration 3-10 Static Route Configuration Verification 3-11

Example: Verifying the Static Route Configuration 3-11 Dynamic Routing Protocol Overview 3-12 Features of Dynamic Routing Protocols 3-15

Example: Administrative Distance 3-15 Example: Routing Protocol Comparison 3-19

The ip classless Command 3-20 InterVLAN Routing 3-21

Example: Router on a Stick 3-21 Example: Subinterfaces 3-22

Summary 3-25 Introducing Distance Vector Routing 3-27

Overview 3-27 Objectives 3-27

Distance Vector Route Selection 3-28 Example: Distance Vector Routing Protocols 3-28 Example: Sources of Information and Discovering Routes 3-29

Routing Information Maintenance 3-31 Example: Maintaining Routing Information 3-31

Routing Inconsistencies with Distance Vector Routing Protocols 3-32 Example: Inconsistent Routing Entries 3-33

Count to Infinity Prevention 3-36 Example: Count to Infinity 3-36 Example: Defining a Maximum to Prevent Count to Infinity 3-37

Techniques to Eliminate Routing Loops 3-38 Example: Routing Loops 3-38 Example: Split Horizon 3-39 Example: Route Poisoning 3-40 Example: Poison Reverse 3-41

Implementation of Techniques to Eliminate Routing Loops 3-44 Example: Techniques to Eliminate Routing Loops 3-44

Summary 3-50

Page 8: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

iv Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Introducing Link-State and Balanced Hybrid Routing 3-53 Overview 3-53

Objectives 3-53 How Routing Information Is Maintained with Link State 3-54 Link-State Routing Protocol Algorithms 3-58

Example: Link-State Routing Protocol Algorithms 3-59 Benefits and Limitations of Link-State Routing 3-60 When to Use Link-State Routing Protocols 3-61 Balanced Hybrid Routing 3-64 Summary 3-65

Enabling RIP 3-67 Overview 3-67

Objectives 3-67 RIP Features 3-68 RIPv1 and RIPv2 Comparison 3-69 Dynamic Routing Configuration Tasks 3-70 Dynamic Routing Configuration 3-71 RIP Configuration 3-72

Example: RIP Configuration 3-73 RIP Configuration Verification 3-74

Example: Verifying the RIP Configuration 3-75 RIP Configuration Troubleshooting 3-77

Example: debug ip rip Command 3-78 Summary 3-79

Enabling EIGRP 3-81 Overview 3-81

Objectives 3-81 EIGRP Features 3-82 EIGRP and IGRP Comparison 3-84 EIGRP Configuration 3-85

Example: EIGRP Configuration 3-86 EIGRP Configuration Verification 3-87

show ip eigrp neighbors Example 3-89 show ip eigrp neighbors detail Example 3-90

EIGRP Configuration Troubleshooting 3-94 Summary 3-95

Enabling OSPF 3-97 Overview 3-97

Objectives 3-97 OSPF Features 3-98 OSPF and Distance Vector Routing Protocol Comparison 3-99 Hierarchical Routing 3-101

Example: OSPF Hierarchical Routing 3-101 Shortest Path First Algorithm 3-102 Single-Area OSPF Configuration 3-103

Example: OSPF Configuration 3-104 Loopback Interfaces 3-105 OSPF Configuration Verification 3-106 OSPF Configuration Troubleshooting 3-111 Summary 3-113

Page 9: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Interconnecting Cisco Network Devices (ICND) v2.3 v

Implementing Variable-Length Subnet Masks 3-115 Overview 3-115

Objectives 3-115 VLSM Benefits 3-116 VLSM Calculations 3-118

Example: A Working VLSM 3-120 Route Summarization with VLSM 3-121

Example: Route Summarization 3-121 Example: Summarizing with an Octet 3-123

Route Summarization Implementation Considerations 3-125 Route Summarization Management 3-126

Example: Summarizing Routes in a Discontiguous Network 3-127 Summary 3-128 Module Summary 3-129 Module Self-Check 3-131

Module Self-Check Answer Key 3-137

Page 10: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

vi Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 11: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

ICND

Course Introduction

Overview Interconnecting Cisco Network Devices (ICND) v2.3 is an instructor-led course presented by Cisco Systems training partners to their end-user customers. This five-day course focuses on using Cisco Catalyst switches and Cisco routers connected in LANs and WANs typically found at small- to medium-sized network sites.

Upon completion of this training course, you will be able to configure, verify, and troubleshoot the various Cisco networking devices.

Page 12: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Learner Skills and Knowledge This subtopic lists the skills and knowledge that learners must possess to benefit fully from the course. The subtopic also includes recommended Cisco learning offerings that learners should complete in order to benefit fully from this course.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3

Learner Skills and Knowledge

• Network Components• Network Cabling• LAN Topologies and Technologies• WAN Topologies and Technologies• Remote Access Technologies• OSI Reference Model• TCP/IP Protocols and Applications• IP Addressing

Page 13: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Course Introduction 3

Course Goal and Objectives This topic describes the course goal and objectives.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4

“To implement and operate a simple Cisco network that includes switches, routers, and remote access routers”Interconnecting Cisco Network Devices

Course Goal

Upon completing this course, you will be able to meet these objectives:

Configure a Catalyst switch for basic operations

Improve the scalability, interoperability, and throughput by implementing VLANs

Configure and troubleshoot RIP, EIGRP, and OSPF

Configure different types of IP ACLs in order to manage IP traffic

Establish a serial point-to-point connection using PPP and HDLC

Configure Frame Relay

Configure DDR between two routers with BRI or PRI

Page 14: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

4 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Course Flow This topic presents the suggested flow of the course materials.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5

CourseIntroduction

Module 1: Configuring

Catalyst Switch Operations

Module 2: Extending Switched

Networks with VLANs

Module 5: Establishing

Serial Point-to-Point Connections

Module 3: Determining IP

Routes

Module 6: Establishing Frame Relay Connections

AM

PM

Module 7: Completing ISDN

Calls

Day 1 Day 2 Day 3 Day 4 Day 5

Module 3: Determining IP Routes (Cont.)

Module 1: Configuring

Catalyst Switch Operations

(Cont.)

Module 2: Extending Switched

Networks with VLANs (Cont.)

Module 3: Determining IPRoutes (Cont.)

Module 3: Determining IP Routes (Cont.)

Module 4: Managing IP Traffic with ACLs

Module 4: Managing IP Traffic

with Access Control Lists

(Cont.)

AM

PM

Lunch

Course Flow

The schedule reflects the recommended structure for this course. This structure allows enough time for the instructor to present the course information and for you to work through the lab activities. The exact timing of the subject materials and labs depends on the pace of your specific class.

Page 15: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Course Introduction 5

Additional References This topic presents the Cisco icons and symbols used in this course, as well as information on where to find additional technical references.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—6

Cisco Icons and Symbols

Cisco Glossary of Terms For additional information on Cisco terminology, refer to the Cisco Internetworking Terms and Acronyms glossary of terms at http://www.cisco.com/univercd/cc/td/doc/cisintwk/ita/index.htm.

Page 16: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

6 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Your Training Curriculum This topic presents the training curriculum for this course.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—7

Cisco Career Certifications

Expand Your Professional Options and Advance Your Career

Cisco Certified Network Associate (CCNA)

Professional

CCIE

CCNPCCNP

CCNACCNA Associatehttp://www.cisco.com/go/certifications

Recommended Training Through Cisco Learning Partners

Required Exam

CCNA

INTRO and ICND

Cisco Certified Network Associate

Introduction to Cisco Networking Technologies & Interconnecting Cisco Network Devices

Expert

You are encouraged to join the Cisco Certification Community, a discussion forum open to anyone holding a valid Cisco Career Certification (such as Cisco CCIE®, CCNA®, CCDA®, CCNP®, CCDP®, CCIP™, or CCSP®). It provides a gathering place for Cisco certified professionals to ask questions and share suggestions and information about Cisco Career Certification programs and other certification-related topics. For more information, visit the website at http://www.cisco.com/en/US/learning/le3/le2/le41/learning_certification_level_home.html.

Page 17: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Module 1

Configuring Catalyst Switch Operations

Overview The Cisco Catalyst 2950 series switches are designed for plug-and-play operation: You need only to assign basic IP information to the switch and connect it to the other devices in your network. If you have specific network needs, you can configure and monitor the switch on an individual basis or as part of a switch cluster through its various management interfaces. This module shows you how to configure a Catalyst switch for basic operations.

Module Objectives Upon completing this module, you will be able to configure a Catalyst switch for basic operations. This ability includes being able to meet these objectives:

Describe the basic operation of LAN switches and bridges

Describe how problems occur when using a redundant topology in a switched or bridged network

Describe the functionality of STP

Configure a Catalyst switch

Page 18: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-2 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 19: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 1

Introducing Basic Layer 2 Switching and Bridging Functions

Overview Layer 2 LAN switches and bridges operate at Layer 2 of the Open System Interconnection (OSI) reference model, whereas hubs operate at Layer 1. LAN switches and bridges are more intelligent than hubs because they can actually listen in on the traffic and can examine the source and destination MAC addresses. LAN switches and bridges can also build a MAC address table that enables them to make intelligent forwarding decisions at Layer 2.

You need to be familiar with general LAN switching and bridging functions before configuring a Catalyst switch. This lesson explains the basic functions provided by LAN switches and bridges.

Objectives Upon completing this lesson, you will be able to describe the basic operation of LAN switches and bridges. This ability includes being able to meet these objectives:

Describe the function of Layer 2 switches and bridges

Describe the primary LAN switch and bridge frame transmission modes

Explain how a LAN switch or bridge associates a MAC address with a port

Describe how switches and bridges forward and filter frames

Page 20: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-4 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Functions of Ethernet Switches and Bridges This topic describes the basic functions of Ethernet switches and bridges.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-3

• Address learning• Forwarding based on the learned addresses• Loop avoidance

Ethernet Switches and Bridges

Ethernet switches and bridges increase the available bandwidth by reducing the number of devices contending for the segment bandwidth. Ethernet switches and bridges also make intelligent frame-forwarding decisions by examining the source and destination MAC addresses of incoming frames.

Ethernet switches and bridges operate at Layer 2 of the OSI reference model. Because of their high-speed internal architecture and large number of ports, Ethernet switches offer much higher throughput than a traditional bridge.

The following describes the functions performed by switches and bridges:

An Ethernet switch or bridge learns the source MAC addresses of the devices that are attached to each of its ports by listening in on the incoming traffic. The MAC address-to-port mappings are stored in a MAC database, often called the MAC address table or the content-addressable memory (CAM) table.

When an Ethernet switch or bridge receives a frame, the switch or bridge consults the MAC database to determine which port can reach the station identified as the destination in the frame. If the destination MAC address is found in the MAC database, the frame is transmitted on only that port identified as the destination in the frame. If the destination MAC address is not found in the MAC database, the frame is transmitted on all outgoing ports except the incoming port.

Page 21: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-5

Frame Transmission Modes This topic describes the three primary LAN switch and bridge frame transmission modes.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-4

Cut-Through• Switch checks destination

address and immediately begins forwarding frame

Fragment-Free• Switch checks the first 64 bytes,

then immediately begins forwarding frame

Store and Forward• Complete frame is received and

checked before forwarding

Transmitting Frames

The following three primary operating modes are used to handle frame switching:

Store-and-forward: In the store-and-forward mode, the switch or bridge receives the complete frame, then forwards it. The destination and source addresses are read, the cyclic redundancy check (CRC) is performed, the relevant filters are applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. Latency through the switch or bridge varies with frame length.

Cut-through: In the cut-through mode, the switch or bridge checks the destination address (DA) as soon as the header is received and immediately begins forwarding the frame. There is a significant decrease in latency compared with the store-and-forward mode. The delay in cut-through switching remains constant regardless of frame size, because this switching mode starts to forward the frame as soon as the switch or bridge reads the destination addresses. In some switches and bridges, only the destination addresses are read. Some switches and bridges continue to read the CRC and keep a count of errors. Although the switch or bridge will not stop an errored frame, if the error rate is too high, the switch or bridge can be set, either manually or automatically, to use the store-and-forward mode instead. This is known as adaptive cut-through. It combines the low-latency advantage of cut-through and the error protection offered by store-and-forward.

Page 22: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-6 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Fragment-free (modified cut-through): In the fragment-free mode, the switch or bridge will read the first 64 bytes (the minimum Ethernet frame size) before forwarding the frame. Usually, collisions happen within the first 64 bytes of a frame. When a collision occurs, a fragment (a frame less than 64 bytes) is created. By reading 64 bytes, the switch or bridge can filter out collision (fragment) frames. The fragment-free mode has higher latency than the cut-through mode. Fragment-free can detect fragment frames and discard them rather than forwarding them, in contrast to cut-through, which forwards fragment frames if the destination address exists.

Page 23: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-7

How Switches and Bridges Learn Source MAC Addresses

This topic describes how a LAN switch or bridge associates a MAC address with a port.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-5

MAC Address Table

• The initial MAC address table is empty.

A switch or bridge maintains a MAC address table to track the locations of devices that are connected to the switch or bridge. The size of the MAC address table varies depending on the switch or bridge. For example, the Catalyst 2950 series can hold up to 8192 entries.

When a switch or bridge is first initialized, the MAC address table is empty. With an empty MAC address table, the switch or bridge must forward each frame to all connected ports other than the one on which the frame arrived. Forwarding a frame to all connected ports except the incoming port is called flooding the frame. Flooding is the least efficient way to transmit data across a switch or bridge because it wastes bandwidth.

Switches and bridges implement buffering memory so that they can receive and transmit frames independently on each port.

Page 24: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-8 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-6

Learning Addresses

• Station A sends a frame to station C.• The switch caches the MAC address of station A to port E0

by learning the source address of data frames.• The frame from station A to station C is flooded out to all

ports except port E0 (unknown unicasts are flooded).

Example: MAC Address Learning In the example, station A, with MAC address 0260.8c01.1111, wants to send traffic to station C, with MAC address 0260.8c01.2222. The following describes the actions performed when the switch receives this frame:

The frame is received from the physical Ethernet 0 port and stored in temporary buffer space, assuming store-and-forward frame transmission.

Because the switch does not yet know which interface connects it to the destination station, the switch will flood the frame through all other ports.

While flooding the frame from station A, the switch notes the source address of the frame and associates it with port E0 in a new MAC address table entry.

A MAC address table entry is created, which stays in the MAC address table up to the age time. If station A does not transmit another frame to the switch before the age time expires, that entry will not be refreshed and will be removed from the MAC address table. Because the MAC address table has a limited size, the age time helps to limit flooding by remembering the most active stations in the network. The age time also accommodates station moves. Aging allows the switch or bridge to forget an entry about a station that has been removed. If a station is moved from one port to another port, the switch or bridge will immediately learn the new location of the station as soon as that station begins to transmit frames to the switch or bridge on the new port.

Page 25: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-9

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-7

Learning Addresses (Cont.)

• Station D sends a frame to station C.• The switch caches the MAC address of station D to port E3 by

learning the source address of data frames.• The frame from station D to station C is flooded out to all ports

except port E3 (unknown unicasts are flooded).

Example: MAC Address Learning (Cont.) The learning process continues when each station sends frames to the others.

In the figure, station D, with MAC address 0260.8c01.4444, sends traffic to station C, with MAC address 0260.8c01.2222. The following describes the actions performed by the switch.

The source address, 0260.8c01.4444, is added to the MAC address table.

The destination address from the transmitted frame, station C, is compared with entries in the MAC address table.

When the switch or bridge determines that no port-to-MAC address mapping yet exists for this destination, the frame is flooded to all ports other than the one on which the frame arrived.

When station C sends a frame back to station A, the switch can also learn the station C MAC address at port E2.

As long as all stations send data frames within the MAC address table entry lifetime, a complete MAC address table is built. These entries are then used to make intelligent Layer 2 forwarding and filtering decisions.

Page 26: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-10 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

How Switches and Bridges Forward and Filter Frames

When a frame arrives with a known destination address, the frame is forwarded only on the specific port connected to the destination station. This topic describes how switches and bridges determine where to forward incoming frames.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-8

Filtering Frames

• Station A sends a frame to station C.• The destination is known; the frame is not flooded.

Example: Filtering Frames In the figure, station A sends a frame to station C. When the destination station C MAC address exists in the MAC address table, the switch transmits the frame only on the port listed. The following lists the steps that the switches and bridges perform when forwarding and filtering frames.

Step 1 The destination MAC address from the transmitted frame, 0260.8c01.2222, is compared with entries in the MAC address table.

Step 2 When the switch or bridge determines that the destination MAC address can be reached through port E2, it transmits the frame to port E2 only.

Note The switch does not transmit the frame on ports E1 or E3 to preserve bandwidth on these links. This action is known as frame filtering.

Step 3 The switch refreshes the MAC address table entry for the source MAC address.

Page 27: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-11

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-9

Filtering Frames (Cont.)

• Station A sends a frame to station B.• The switch has the address for station B in the MAC

address table.

Example: Filtering Frames Through a Hub The figure shows station A and station B connected to the same switch port through a hub. In this case, station A is sending a frame to station B. The switch has learned the addresses of station A and B. The switch will not forward the frame from station A to any ports.

Page 28: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-12 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-10

• Station D sends a broadcast or multicast frame.

• Broadcast and multicast frames are flooded to all ports other than the originating port.

Broadcast and Multicast Frames

Broadcast and multicast frames constitute a special case. Because broadcast and multicast frames may be of interest to all stations, the switch or bridge normally floods broadcast and multicast to all ports other than the originating port. A switch or bridge never learns a broadcast or multicast address because broadcast and multicast addresses never appear as the source address of a frame.

Page 29: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-13

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-11

Summary

• Ethernet switches and bridges increase the available bandwidth of a network by creating dedicated network segments and interconnecting the segments.

• Switches and bridges use one of three operating modes to transmit frames: store and forward, cut-through, and fragment-free.

• Switches and bridges maintain a MAC address table to store address-to-port mappings so that they can determine the locations of connected devices.

• When a frame arrives with a known destination address, the frame is forwarded only on the specific port connected to the destination station.

Page 30: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-14 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 31: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 2

Identifying Problems that Occur in Redundant Switched Topologies

Overview Most complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some problems, it can introduce other problems.

You need to know what problems can arise from a redundant switched topology so that you can recognize them when they occur. This lesson describes the problems that can be caused by using a redundant topology in a switched or bridged network.

Objectives Upon completing this lesson, you will be able to describe how problems occur when a redundant topology is used in a switched or bridged network. This ability includes being able to meet these objectives:

Identify the problems that can occur with redundant switched and bridged topologies

Explain how broadcast storms are created

Explain how multiple frame transmissions occur

Describe how MAC database instability occurs

Page 32: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-16 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Redundant Switched and Bridged Topologies This topic describes the problems that can occur with redundant links and devices in switched or bridged networks.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-3

• Redundant topology eliminates single points of failure.• Redundant topology causes broadcast storms, multiple frame copies,

and MAC address table instability problems.

Redundant Topology

While redundant designs may eliminate the possibility that a single point of failure problem will result in loss of function for the entire switched or bridged network, you must consider problems that redundant designs can cause. Some of the problems that can occur with redundant links and devices in switched or bridged networks are as follows:

Broadcast storms: Without some loop avoidance process in operation, each switch or bridge will flood broadcasts endlessly. This situation is commonly called a broadcast storm.

Multiple frame transmission: Multiple copies of unicast frames may be delivered to destination stations. Many protocols expect to receive only a single copy of each transmission. Multiple copies of the same frame may cause unrecoverable errors.

MAC database instability: Instability in the MAC address table content results from copies of the same frame being received on different ports of the switch. Data forwarding may be impaired when the switch consumes the resources that are coping with instability in the MAC address table.

Page 33: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-17

Layer 2 LAN protocols, such as Ethernet, lack a mechanism to recognize and eliminate endlessly looping frames. Some Layer 3 protocols implement a Time to Live (TTL) mechanism that limits the number of times a packet can be retransmitted by a Layer 3 networking device. Lacking such a mechanism, Layer 2 devices will continue to retransmit looping traffic indefinitely.

A loop avoidance mechanism is required to solve each of these problems.

Page 34: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-18 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Broadcast Storms This topic describes how broadcast storms are created.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-4

• Host X sends a broadcast. • Switches continue to propagate broadcast traffic

over and over.

Broadcast Storms

A broadcast storm occurs when each switch on a redundant network floods broadcast frames endlessly. Switches flood broadcast frames to all ports except the one on which the frame was received.

Example: Broadcast Storms The figure illustrates the problem of a broadcast storm. The following describes the sequence of events that start a broadcast storm:

1. When host X sends a broadcast frame, such as an Address Resolution Protocol (ARP) for its default gateway (router Y), the frame will be received by switch A.

2. Switch A examines the destination address field in the frame and determines that the frame must be flooded onto the bottom Ethernet link, segment 2.

3. When this copy of the frame arrives at switch B, the process repeats and a copy of the frame is transmitted onto the top Ethernet, segment 1 near switch B.

4. Because the original copy of the frame also arrives at switch B via the top Ethernet, these frames travel around the loop in both directions, even after the destination station has received a copy of the frame.

Page 35: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-19

A broadcast storm can disrupt normal traffic flow. It can also disrupt all the devices on the switched or bridged network because broadcasts must be processed by the CPU in each device on the segment; thus, a broadcast storm can lock up the user PCs and servers that are trying to process all of the broadcast frames.

A loop avoidance mechanism eliminates this problem by preventing one of the four interfaces from transmitting frames during normal operation, therefore breaking the loop.

Page 36: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-20 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Multiple Frame Transmissions This topic explains how multiple frame transmissions occur and the problems that can result.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-5

• Host X sends a unicast frame to router Y.• The MAC address of router Y has not been learned by

either switch.• Router Y will receive two copies of the same frame.

Multiple Frame Copies

In a redundant topology, multiple copies of the same frame can arrive at the intended host, potentially causing problems with the receiving protocol. Most protocols are designed not to recognize or cope with duplicate transmissions. In general, protocols that make use of a sequence numbering mechanism will assume that many transmissions have failed and that the sequence number has recycled. Other protocols attempt to hand the duplicate transmission to the appropriate upper-layer protocol, with unpredictable results.

Example: Multiple Transmissions The figure illustrates how multiple transmissions can occur. The following lists the sequence of events describing how multiple copies of the same frame can arrive at the intended host:

1. When host X sends a unicast frame to router Y, one copy is received over the direct Ethernet connection, segment 1. At more or less the same time, switch A receives a copy of the frame and puts it into the switch A buffers.

2. If switch A examines the destination address field in the frame and finds no entry in the MAC address table for router Y, switch A floods the frame on all ports except the originating port.

3. When switch B receives a copy of the frame through switch A on segment 2, switch B also forwards a copy of the frame onto segment 1 if there is no entry in the MAC address table for router Y.

4. Router Y receives a copy of the same frame for the second time.

Page 37: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-21

A loop avoidance mechanism eliminates this problem by preventing one of the four interfaces from transmitting frames during normal operation, therefore breaking the loop.

Page 38: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-22 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

MAC Database Instability MAC database instability results when multiple copies of a frame arrive on different ports of a switch. This topic describes how MAC database instability can arise and the problems that can result.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-6

• Host X sends a unicast frame to router Y.• The MAC address of router Y has not been learned by either switch.• Switches A and B learn the MAC address of host X on port 0.• The frame to router Y is flooded.• Switches A and B incorrectly learn the MAC address of host X on port 1.

MAC Database Instability

Example: Instability of the MAC Database In the figure, switch B installs a database entry, mapping the MAC address of host X to port 0. Port 0 connects to segment 1 when the first frame arrives. Sometime later, when the copy of the frame transmitted through switch A arrives at port 1 of switch B, switch B removes the first entry and installs an entry that incorrectly maps the MAC address of host X to port 1, which connects to segment 2.

Depending on its internal architecture, the switch in question may or may not cope well with rapid changes in its MAC database.

Again, a loop avoidance mechanism eliminates this problem by preventing one of the four interfaces from transmitting frames during normal operation, therefore breaking the loop.

Page 39: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-23

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-7

Summary

• Bridged and switched networks are commonly designed with redundant links and devices, which can introduce problems such as broadcast storms, multiple frame transmission, and MAC database instability.

• A broadcast storm is created when each switch on a redundant network floods broadcast frames endlessly.

• Multiple frame transmissions occur when multiple copies of the same frame arrive at the intended host, potentially causing problems with the receiving protocol.

• MAC database instability occurs when multiple copies of a frame arrive on different ports of a switch.

Page 40: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-24 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 41: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 3

Introducing Spanning Tree Protocol

Overview Spanning Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in switched or bridged networks. STP operation is transparent to end stations. STP runs on Layer 2 switches, bridges, and routers that are configured to operate as bridges.

You need to know how STP can address the problems that are caused by redundant topologies in switched or bridged networks. This lesson describes the functionality of STP.

Objectives Upon completing this lesson, you will be able to describe the functionality of STP. This ability includes being able to meet these objectives:

Describe the purpose of STP

Explain the process STP follows when maintaining a loop-free network topology

Describe how STP selects the root bridge

Describe how spanning-tree port states function when STP is enabled

Describe spanning-tree path costs

Explain how STP recalculates the port states to accommodate topology changes

Describe the function of RSTP

Page 42: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-26 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Spanning Tree Protocol This topic describes the purpose and history of STP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-3

• Provides a loop-free redundant network topology by placing certain ports in the blocking state

Spanning Tree Protocol

STP was originally developed by the Digital Equipment Corporation. The Digital Equipment spanning-tree algorithm was subsequently revised by the IEEE 802 committee and published in the IEEE 802.1d specification. The Digital Equipment algorithm and the IEEE 802.1d algorithm are not the same and are not compatible. Cisco switches, such as the Catalyst 2950 series, use the IEEE 802.1d STP.

The purpose of STP is to maintain a loop-free network topology. A loop-free topology is accomplished when the switch or bridge recognizes a loop in the topology and logically blocks one or more redundant ports automatically.

STP continually probes the network so that the failure or addition of a link, switch, or bridge is detected. When the network topology changes, the switches and bridges that are running STP automatically reconfigure their ports to avoid the creation of loops or the loss of connectivity.

Note STP is enabled by default in Catalyst switches.

Page 43: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-27

Spanning-Tree Operation This topic describes the process that STP follows when maintaining a loop-free network topology.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-4

Spanning-Tree Operation

• One root bridge per broadcast domain• One root port per nonroot bridge• One designated port per segment• Nondesignated ports are unused

STP uses two key concepts when creating a loop-free logical topology: bridge ID (BID) and path cost.

Example: Spanning-Tree Operation There are three steps that STP performs when it initially converges on a logically loop-free network topology:

1. Elects one root bridge: STP has a process to elect a root bridge. Only one bridge can act as the root bridge in a given network. On the root bridge, all ports are designated ports. Designated ports are normally in the forwarding state. When in the forwarding state, a port can send and receive traffic. In the figure, switch X is elected as the root bridge.

2. Selects the root port on the nonroot bridge: STP establishes one root port on the nonroot bridge. The root port is the lowest-cost path from the nonroot bridge to the root bridge. Root ports are normally in the forwarding state. Spanning-tree path cost is an accumulated cost calculated on the bandwidth. In the figure, the lowest-cost path to the root bridge is from switch Y through the 100BaseT Fast Ethernet link.

Page 44: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-28 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

3. Selects the designated port on each segment: On each segment, STP establishes one designated port. The designated port is selected on the bridge that has the lowest-cost path to the root bridge. Designated ports are normally in the forwarding state, forwarding traffic for the segment. In the figure, the designated port for both segments is on the root bridge because the root bridge is directly connected to both segments. The 10BaseT Ethernet port on switch Y is a nondesignated port because there is only one designated port per segment. Nondesignated ports are normally in the blocking state to logically break the loop topology. When a port is in the blocking state, it is not forwarding traffic but can still receive traffic.

Page 45: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-29

Root Bridge Selection This topic describes how STP selects the root bridge.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-5

• BPDU (default = sent every two seconds)• Root bridge = bridge with the lowest bridge ID• Bridge ID =

In this example, which switch has the lowest bridge ID?

Spanning Tree Protocol Root Bridge Selection

Switches and bridges running the spanning-tree algorithm exchange configuration messages with other switches and bridges at regular intervals (every two seconds by default). Switches and bridges exchange these messages using a multicast frame called the bridge protocol data unit (BPDU). One of the pieces of information included in the BPDU is the BID.

STP calls for each switch or bridge to be assigned a unique BID. Typically, the BID is made up of a priority value (two bytes) and the bridge MAC address (six bytes). The default priority, in accordance with IEEE 802.1d, is 32,768 (1000 0000 0000 0000 in binary, or 0x8000 in hex), which is the midrange value. The root bridge is the bridge with the lowest BID.

Note A Cisco Catalyst switch uses one of its MAC addresses from a pool of MAC addresses that are assigned to either the backplane or to the supervisory module, depending on the switch model.

Example: Selecting the Root Bridge In the figure, both switches are using the same default priority. The switch with the lowest MAC address will be the root bridge. In this example, switch X is the root bridge with a BID of 0x8000 (0c00.1111.1111).

Page 46: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-30 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Spanning-Tree Port States This topic describes the spanning-tree port states.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-6

• Spanning tree transits each port through several different states:

Spanning-Tree Port States

With STP, ports transition through these four states:

Blocking

Listening

Learning

Forwarding

When STP is enabled, every bridge in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state. Forwarding ports provide the lowest-cost path to the root bridge. During a topology change, a port temporarily implements the listening and learning states.

Initially, all bridge ports start in the blocking state, from which they listen for BPDUs. When the bridge first boots up, the bridge thinks that it is the root bridge and will transition to the listening state. An absence of BPDUs for a certain period of time is called the max_age, which has a default of 20 seconds. If a port is in the blocking state and does not receive a new BPDU within the max_age, the bridge will transition from the blocking state to the listening state. When a port is in the transitional listening state, it is able to send and receive BPDUs to determine the active topology. At this point, no user data is being passed. During the listening state, the bridge performs these three steps:

Selects the root bridge

Selects the root ports on the nonroot bridges

Selects the designated ports on each segment

Page 47: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-31

The time it takes for a port to transition from the listening state to the learning state or from the learning state to the forwarding state is called the forward delay. The forward delay has a default value of 15 seconds.

The learning state reduces the amount of flooding required when data forwarding begins. If a port is still a designated or root port at the end of the learning state, the port will transition to the forwarding state. In the forwarding state, a port is capable of sending and receiving user data. Ports that are not the designated or root ports will transition back to the blocking state.

Normally, a port transitions from the learning state to the forwarding state in 30 to 50 seconds. Spanning-tree timers can be tuned to adjust the timing, but these timers should be set to the default value. The default values are put in place to give the network enough time to gather all the correct information about the network topology.

Note If a switch port is connected only to end-user stations (not connected to another switch or bridge), a Catalyst switch feature called PortFast should be enabled on those end-user ports. With PortFast, when such an end-user port first comes up, it automatically transitions from the blocking state to the forwarding state. This is acceptable because no loops can be formed through the port, because there are no other switches or bridges connected to it.

Page 48: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-32 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-7

Spanning-Tree Port States (Cont.)

Example: Spanning-Tree Port States The figure illustrates a sample topology with STP enabled. The following describes the actions that occur in this example:

The ports on switch X, the root bridge, are the designated ports (forwarding).

The Fast Ethernet port on switch Y is the root port (forwarding). The Fast Ethernet port has a lower-cost path to the root bridge than the Ethernet port.

The Ethernet port on switch Y is the nondesignated port (blocking). There is only one designated port per segment.

Page 49: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-33

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-8

Spanning-Tree Operation

Example: Spanning-Tree Operation The following describes the STP port states in the figure:

The root bridge is switch Z, which has the lowest BID.

The root port is port 0 on switches X and Y. Port 0 is the lowest-cost path to the root on both switches.

The designated port is port 0 of switch Z. All ports on the root are designated ports. Port 1 of switch X is a designated port. Because both switch X and switch Y have the same path cost to the root bridge, the designated port is selected to be on switch X because it has a lower BID than switch Y.

Port 1 on switch Y is the nondesignated port on the segment and is in the blocking state.

All designated and root ports are in the forwarding state.

Page 50: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-34 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Spanning-Tree Path Cost This topic describes the spanning-tree path cost.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-9

Spanning-Tree Path Cost

Example: Spanning-Tree Path Cost The spanning-tree path cost is an accumulated total path cost based on the bandwidth of all the links in the path. In the figure, some of the path costs specified in the IEEE 802.1d specification are shown. The IEEE 802.1d specification has been revised; in the older specification, the cost was calculated based on a bandwidth of 1000 Mbps. The calculation of the new specification uses a nonlinear scale, to accommodate higher-speed interfaces.

Note Most Catalyst switches incorporate the revised cost calculations. A key point to remember about STP cost is that lower costs are better.

Page 51: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-35

Spanning-Tree Recalculation This topic describes how STP adjusts the port states to accommodate topology changes.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-10

Spanning-Tree Recalculation

When there is a topology change because of a bridge or link failure, the spanning tree ensures connectivity by adjusting the network topology, placing blocked ports in the forwarding state.

Example: Spanning-Tree Recalculation In the figure, if switch X (the root bridge) fails and does not send a BPDU to switch Y within the max_age (default is 20 seconds, which equals 10 missed BPDUs), switch Y will detect the missing BPDU from the root bridge. When the max_age timer on switch Y expires before a new BPDU has been received from switch X, a new spanning-tree recalculation is initiated. Switch Y will transition its blocking port (port 1) from the blocking state to the listening state to the learning state, then to the forwarding state.

After all the switch and bridge ports have transitioned to either a forwarding or a blocking state, switch Y becomes the root bridge and will forward traffic between the two segments.

Page 52: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-36 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-11

Spanning-Tree Convergence

• Convergence occurs when all the switch and bridge ports have transitioned to either the forwarding or the blocking state.

• When the network topology changes, switches and bridges must recompute STP, which disrupts user traffic.

Convergence in STP is a state in which all the switch and bridge ports have transitioned to either the forwarding or the blocking state. Convergence is necessary for normal network operations. For a switched or bridged network, a key issue is the amount of time required for convergence when the network topology changes.

Fast convergence is a desirable network feature because it reduces the period of time that bridges and switches have ports in transitional states and therefore not sending any user traffic. The normal convergence time is 30 to 50 seconds.

Page 53: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-37

Rapid Spanning Tree Protocol This topic describes the function of Rapid Spanning-Tree Protocol (RSTP).

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-12

Rapid Spanning-Tree Protocol

RSTP significantly reduces the time to reconverge the active topology of the network when changes to the physical topology or its configuration parameters occur. RSTP defines the additional port roles of alternate and backup, and it defines port states as discarding, learning, or forwarding.

RSTP selects one switch as the root of a spanning-tree active topology, and assigns port roles to individual ports on the switch, depending on whether the ports are part of the active topology.

RSTP provides rapid connectivity following the failure of a switch, a switch port, or a LAN. A new root port and the designated port on the other side of the bridge transition to forwarding through an explicit handshake between them. RSTP allows switch port configuration so that the ports can transition to forwarding directly when the switch reinitializes.

RSTP, specified in IEEE 802.1w, supersedes STP as specified in IEEE 802.1d, while remaining compatible with STP.

Note The Cisco implementation of 802.1d includes some features that are standard in 802.1w. For example, the Cisco implementation of 802.1d determines an alternate root port if it exists.

Page 54: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-38 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The port roles are defined by RSTP as follows:

Root: A forwarding port elected for the spanning-tree topology.

Designated: A forwarding port elected for every switched LAN segment.

Alternate: An alternate path to the root bridge different than the path root port takes.

Backup: A backup path that provides a redundant (but less desirable) connection to a segment to which another switch port already connects. Backup ports can exist only where two ports are connected together in a loopback by a point-to-point link or bridge with two or more connections to a shared LAN segment.

Disabled: A port that has no role within the operation of spanning tree.

Root and designated port roles include the port in the active topology. Alternate and backup port roles exclude the port from the active topology.

RSTP Port States The port state controls the forwarding and learning processes and provides the values of discarding, learning, and forwarding. The table compares STP port states with RSTP port states.

Operational Status STP Port State RSTP Port State Port Included in Active Topology

Enabled Blocking Discarding No

Enabled Listening Discarding No

Enabled Learning Learning Yes

Enabled Forwarding Forwarding Yes

Disabled Disabled Discarding No

In a stable topology, RSTP ensures that every root port and designated port transitions to forwarding while all alternate ports and backup ports are always in the discarding state.

Page 55: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-39

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-13

Rapid Transition to Forwarding

Rapid transition is the most important feature introduced with IEEE 802.1w. Prior to the introduction of 802.1w, the spanning-tree algorithm waited passively for the network to converge before transitioning a port to the forwarding state. The new RSTP actively confirms that a port can safely transition to forwarding without relying on a timer configuration. To achieve fast convergence on a port, the protocol relies upon two new variables: the edge-type port and the link-type port.

With edge ports, all ports directly connected to end stations cannot create bridging loops in the network. Edge ports can go directly to forwarding, skipping the listening and learning stages. An edge port does not generate topology changes when its link toggles.

Note RSTP is able to achieve rapid transition to forwarding only on edge ports and point-to-point links. Rapid transition to forwarding is not a major constraint on the switched networks of today.

The link-type variable is automatically derived from the duplex mode of a port. A port operating in full-duplex mode is point-to-point, whereas a port operating in half-duplex mode is considered shared by default. You can override the automatic link-type setting with an explicit configuration.

Note The figure does not represent a preferred design. It is simply an example of link types.

Page 56: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-40 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-14

Summary

• STP is a bridge-to-bridge protocol used to maintain a loop-free network.

• To maintain a loop-free network topology, STP establishes a root bridge, a root port, and designated ports.

• With STP, the root bridge has the lowest BID, which is made up of the bridge priority and the MAC address.

• When STP is enabled, every bridge in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state.

• If the network topology changes, STP maintains connectivity by transitioning some blocked ports to the forwarding state.

• RSTP significantly speeds the recalculation of the spanning treewhen the network topology changes.

Page 57: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 4

Configuring a Catalyst Switch

Overview A Cisco Catalyst switch comes with factory default settings. The default configuration will essentially set up the switch to function as a transparent bridge, with no management IP address, default gateway, or VLANs configured. Because every network is unique, you may need to modify some of the configuration parameters on your Catalyst switch. This lesson describes how to configure a Catalyst switch.

Objectives Upon completing this lesson, you will be able to configure a Catalyst switch. This ability includes being able to meet these objectives:

Describe the default setting for a Cisco Catalyst switch

Configure the Catalyst switch IP address and default gateway

Describe the two duplex modes used with Catalyst switches

Configure the duplex options in Catalyst switches

Set permanent and static addresses in the MAC address table

Configure port security

Add, move, and change MAC addresses on access layer Catalyst switches

Manage Catalyst switch configuration files

Page 58: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-42 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Catalyst Switch Default Configuration Verification

This topic describes the default settings for a Cisco Catalyst switch and how to display them.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-3

• IP address: 0.0.0.0• CDP: enabled• 100BaseT port: autonegotiate duplex mode• Spanning tree: enabled• Console password: none

Catalyst 2950 Series Default Configuration

A Cisco Catalyst switch comes with factory default settings that can be displayed with the show command. For many parameters, the default configuration will suit your needs. However, you may want to change some of the default values to meet your specific network needs. The default values vary according to the features of the switch.

The figure lists some of the default settings on the Catalyst 2950 series switches. Not all of the defaults are shown in the figure.

Page 59: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-43

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-4

wg_sw_2950#show run

Building configuration...Current configuration:!!interface FastEthernet0/1!interface FastEthernet0/2

wg_sw_2950#show spanning-tree detail

Port 11 (FastEthernet0/11) of VLAN0001 is forwardingPort path cost 19, Port priority 128, Port Identifier 128.11.Designated root has priority 1, address 0008.20fc.a840Designated bridge has priority 1, address 0008.20fc.a840Designated port id is 128.11, designated path cost 0Timers: message age 2, forward delay 0, hold 0Number of transitions to forwarding state: 1Link type is point-to-point by defaultBPDU: sent 5, received 1181993

wg_sw_2950#show vlan

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4,

Fa0/5, Fa0/6, Fa0/7, Fa0/8,Fa0/9, Fa0/10, Fa0/11, Fa0/12,Fa0/13, Fa0/14, Fa0/15, Fa0/16,Fa0/17, Fa0/18, Fa0/19, Fa0/20,Fa0/21, Fa0/22, Fa0/23, Fa0/24

Port Names on Catalyst 2950 Series Switches

Ports on the Catalyst switches are referred to as either port or interface, depending on the context. The commands that describe the port and interface conventions for the Catalyst 2950 series switches are as follows:

The show run output refers to fa0/1 as interface FastEthernet0/1.

The show spanning-tree detail output refers to fa0/11 as port 11.

The show vlan output refers to fa0/1 as port Fa0/1.

Page 60: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-44 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Catalyst Switch IP Address and Default Gateway Configuration

This topic describes how to set and reset the IP address, subnet mask, and default gateway for a Catalyst switch.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-5

wg_sw_2950(config)#interface vlan 1wg_sw_2950(config-if)#ip address 10.5.5.11 255.255.255.0

wg_sw_2950(config-if)#ip address {ip_address} {mask}

• Configures an IP address and subnet mask for the switch VLAN1 interface

Catalyst 2950 Series

Configuring the Switch IP Address

If the switch is to be a manageable entity on the network, it must have a basic IP configuration. On the Catalyst 2950 series switch, you must configure an IP address and subnet mask.

To configure an IP address and subnet mask on the switch, use the ip address interface configuration command. Use the no ip address interface configuration command to remove an IP address or disable IP processing.

The Cisco Virtual Switch Manager (CVSM) is used for managing a switch. With the CVSM, you can configure a switch via a graphical user interface and monitor live images of the switch. For example, the CVSM requires the switch to have an IP address configured and IP connectivity to communicate with a web browser, such as Netscape Communicator or Microsoft Internet Explorer. An IP address must also be assigned if you plan to connect to the switch via Telnet or if you plan to use Simple Network Management Protocol (SNMP) to manage the switch.

Page 61: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-45

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-6

wg_sw_a(config)# ip default-gateway {ip address}

• Configures the switch default gateway for the Catalyst 2950 series switches

wg_sw_a(config)#ip default-gateway 10.5.5.3

Configuring the Switch Default Gateway

Use the ip default-gateway global configuration command to configure the default gateway on the Catalyst 2950 series switches. Use the no ip default-gateway command to delete a configured default gateway.

An IP address is assigned to the switch for management purposes. If the switch needs to send traffic to a different IP network, the switch sends the traffic to the default gateway. The default gateway is the router IP address. A router is used to route traffic between different networks. Once the default gateway is configured, the switch has connectivity to the remote networks with which a host needs to communicate.

Page 62: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-46 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-7

Catalyst 2950 Series

wg_sw_2950#show interfaces vlan 1Vlan1 is up, line protocol is up

Hardware is CPU Interface, address is 0008.a445.9b40 (bia 0008.a445.9b40)Internet address is 10.2.2.11/24

. . .wg_sw_2950#

Showing the Switch IP Address

On the Catalyst 2950 series, use the show interfaces vlan command to verify the IP address for each interface.

Page 63: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-47

Duplexing and Speed This topic describes the two duplex modes.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-8

Half Duplex (CSMA/CD)• Unidirectional data flow• Higher potential for collision• Hub connectivity

Full Duplex• Point-to-point only• Attached to dedicated switched port• Requires full-duplex support on both ends• Collision-free • Collision detect circuit disabled

Duplex Overview

Half-duplex transmission mode implements Ethernet carrier sense multiple access collision detect (CSMA/CD). The traditional shared LAN operates in half-duplex mode and is susceptible to transmission collisions across the wire.

Full-duplex Ethernet significantly improves network performance without the expense of installing new media. Full-duplex transmission between stations is achieved by using point-to-point Ethernet, Fast Ethernet, and Gigabit Ethernet connections. This arrangement is collision-free. Frames sent by the two connected end nodes cannot collide because the end nodes use two separate circuits in the Category 5 or Category 3 cable. Each full-duplex connection uses only one port.

Full-duplex port connections are point-to-point links between switches or end nodes, but not between shared hubs. Nodes that are directly attached to a dedicated switch port with Network Interface Cards (NICs) that support full duplex should be connected to switch ports that are configured to operate in full-duplex mode. Most Ethernet, Fast Ethernet, and Gigabit Ethernet NICs sold today offer full-duplex capability. In full-duplex mode, the collision detect circuit is disabled.

Nodes that are attached to hubs that share their connection to a switch port must operate in half-duplex mode because the end stations must be able to detect collisions.

Standard shared Ethernet configuration efficiency is typically rated at 50 to 60 percent of the 10-Mbps bandwidth. Full-duplex Ethernet offers 100 percent efficiency in both directions (10-Mbps transmit and 10-Mbps receive).

Page 64: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-48 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Duplex Interface Configuration This topic describes how to set and view duplex options.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-9

Catalyst 2950 Series

wg_sw_2950(config)#interface fa0/1wg_sw_2950(config-if)#duplex {auto | full | half}

Setting Duplex Options

Use the duplex interface configuration command to specify the duplex mode of operation for switch ports.

The duplex parameters on the Catalyst 2950 series are as follows:

auto sets autonegotiation of duplex mode

full sets full-duplex mode

half sets half-duplex mode

For Fast Ethernet and 10/100/1000 ports, the default is auto. For 100BaseFX ports, the default is full. The 10/100/1000 ports operate in either half- or full-duplex mode when they are set to 10 or 100 Mbps, but when set to 1000 Mbps, they operate only in full-duplex mode.

100BaseFX ports operate only at 100 Mbps in full-duplex mode.

Note To determine the default duplex mode settings for the Gigabit Interface Converter (GBIC) module ports, refer to the documentation that came with your GBIC module.

Page 65: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-49

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-10

Switch#show interfaces fastethernet0/2FastEthernet0/2 is up, line protocol is up (connected)

Hardware is Fast Ethernet, address is 0008.a445.9b42 (bia 0008.a445.9b42)MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,

reliability 255/255, txload 1/255, rxload 1/255Encapsulation ARPA, loopback not setKeepalive set (10 sec)Half-duplex, 10Mb/sinput flow-control is unsupported output flow-control is unsupportedARP type: ARPA, ARP Timeout 04:00:00Last input 00:00:57, output 00:00:01, output hang neverLast clearing of "show interface" counters neverInput queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0Queueing strategy: fifoOutput queue: 0/40 (size/max)5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec

323479 packets input, 44931071 bytes, 0 no bufferReceived 98960 broadcasts (0 multicast)1 runts, 0 giants, 0 throttles1 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored0 watchdog, 36374 multicast, 0 pause input0 input packets with dribble condition detected1284934 packets output, 103121707 bytes, 0 underruns0 output errors, 2 collisions, 6 interface resets0 babbles, 0 late collision, 29 deferred0 lost carrier, 0 no carrier, 0 PAUSE output0 output buffer failures, 0 output buffers swapped out

Showing Duplex Options

Example: Showing Duplex Options Verify the duplex settings by using the show interfaces command on the Catalyst 2950 series. The show interfaces privileged EXEC command displays statistics and status for all or specified interfaces. The figure shows the duplex setting of an interface.

Autonegotiation can at times produce unpredictable results. Autonegotiation can happen when an attached device, which does not support autonegotiation, is operating in full duplex and by default the Catalyst switch sets the corresponding switch port to half-duplex mode. This configuration, half-duplex on one end and full-duplex on the other, causes late collision errors at the half-duplex end. To avoid this situation, manually set the duplex parameters of the switch to match the attached device.

If the switch port is in full-duplex mode and the attached device is in half-duplex mode, check for frame check sequence (FCS) errors on the switch full-duplex port.

You can use the show interfaces command to check for FCS late collision errors.

Page 66: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-50 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

MAC Address Table Management This topic describes how to set permanent and static addresses in the MAC address table.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-11

Catalyst 2950 Series

wg_sw_2950#show mac-address-tableMac Address Table

-------------------------------------------Vlan Mac Address Type Ports---- ----------- -------- -----All 0008.a445.9b40 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPUAll 0100.0cdd.dddd STATIC CPU1 0008.e3e8.0440 DYNAMIC Fa0/2

Total Mac Addresses for this criterion: 5wg_sw_2950#

Managing the MAC Address Table

Switches use the MAC address tables to forward traffic between ports. These MAC tables include dynamic, permanent, and static addresses.

Dynamic addresses are source MAC addresses that are learned by the switch, then dropped when they are not refreshed and aged out. The switch provides dynamic addressing by learning the source MAC address of each frame that it receives on each port, then adding the source MAC address and its associated port number to the MAC address table. As stations are added or removed from the network, the switch updates the MAC address table, adding new entries and aging out those that are currently not in use.

An administrator can specifically assign permanent addresses to certain ports. Unlike dynamic addresses, permanent addresses are not aged out.

The maximum size of the MAC address table varies with different switches. For example, the Catalyst 2950 series switch can store up to 8192 MAC addresses. When the MAC address table is full, traffic for all new unknown addresses is flooded.

Page 67: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-51

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-12

wg_sw_2950(config)#mac-address-table static mac-addr vlan vlan-id interface interface-id

Catalyst 2950 Series

wg_sw_2950(config)# mac-address-table static 0004.5600.67ab vlan 1 interface fastethernet0/2

Setting a Static MAC Address

On the Catalyst 2950 series, use the mac-address-table static global configuration command to add static addresses to the MAC address table. Use the no form of this command to remove static entries from the MAC address table.

A static address in the MAC address table does not age out, and all interfaces can send traffic to it.

Example: Setting a Static MAC Address In the figure above, when a packet is received in VLAN 1 with this MAC address as its destination, the packet is forwarded to a specified interface.

Page 68: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-52 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Port Security Configuration This topic describes how to configure port security.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-13

Catalyst 2950 Series

wg_sw_2950(config-if)#switchport port-security [mac-address mac-address] | [maximum value] | [violation {protect |restrict | shutdown}]

wg_sw_2950(config)#interface fa0/1wg_sw_2950(config-if)#switchport mode accesswg_sw_2950(config-if)#switchport port-securitywg_sw_2950(config-if)#switchport port-security maximum 1wg_sw_2950(config-if)#switchport port-security mac-address 0008.eeee.eeeewg_sw_2950(config-if)#switchport port-security violation shutdown

Configuring Port Security

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses.

On the Catalyst 2950 series, use the switchport port-security interface command without keywords to enable port security on an interface. Use the switchport port-security interface command with keywords to configure a secure MAC address, a maximum number of secure MAC addresses, or the violation mode. Use the no form of this command to disable port security or set the parameters to their default state.

Note A port must be in access mode to enable port security.

You can add secure addresses to the address table after you set the maximum number of secure MAC addresses allowed on a port in these ways:

Manually configure all of the addresses

Allow the port to dynamically configure all of the addresses

Configure a number of MAC addresses and allow the rest of the addresses to be dynamically configured

Page 69: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-53

You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.

The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration that is used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, the MAC addresses are lost. If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration. A secure port can have from 1 to 132 associated secure addresses. The total number of available secure addresses on the switch is 1024.

Security violation situations are as follows:

The maximum number of secure MAC addresses have been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface.

An address learned or configured on one secure interface is seen on another secure interface in the same VLAN.

Note Port security is disabled by default.

The table lists the security violation commands.

Command Description

mac-address mac-address

(Optional) Specifies a secure MAC address for the port when you enter a 48-bit MAC address. You can add additional secure MAC addresses up to the maximum value configured.

maximum value (Optional) Sets the maximum number of secure MAC addresses for the interface. The range is from 1 to 132. The default is 1.

violation (Optional) Sets the security violation mode or the action to be taken if port security is violated. The default is shutdown.

protect Sets the security violation protect mode. When port secure MAC addresses reach the limit that is allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value.

restrict Sets the security violation restrict mode. In this mode, a port security violation causes a trap notification to be sent to the network management station.

shutdown Sets the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error-disabled, and an SNMP trap notification is sent. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually reenable it by entering the shutdown and no shutdown interface configuration commands.

Page 70: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-54 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-14

wg_sw_2950#show port-security [interface interface-id] [address] [ | {begin | exclude | include} expression]

wg_sw_2950#show port-security interface fastethernet 0/5Port Security : EnabledPort Status : Secure-upViolation Mode : ShutdownAging Time : 20 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 0Last Source Address : 0000.0000.0000Security Violation Count : 0

Verifying Port Security on the Catalyst 2950 Series

On the Catalyst 2950 series, use the show port-security interface privileged EXEC command to display the port security settings defined for an interface.

An address violation occurs when a secured port receives a source address that has been assigned to another secured port or when a port tries to learn an address that exceeds its address table size limit, which is set with the switchport port-security maximum command.

The table lists the address violation commands.

Command Description

interface interface-id (Optional) Displays the port security settings for the specified interface.

address (Optional) Displays all the secure addresses on all ports.

begin (Optional) Sets the display to begin with the line that matches the specified expression.

exclude (Optional) Sets the display to exclude lines that match the specified expression.

include (Optional) Sets the display to include lines that match the specified expression.

expression Enters the expression that will be used as a reference point in the output.

Page 71: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-55

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-15

wg_sw_2950#sh port-securitySecure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action

(Count) (Count) (Count)--------------------------------------------------------------------------

Fa0/2 1 1 0 Shutdown---------------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024

wg_sw_2950#sh port-security addressSecure Mac Address Table

-------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age

(mins)---- ----------- ---- ----- -------------1 0008.dddd.eeee SecureConfigured Fa0/5 -

-------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024

Verifying Port Security on the Catalyst 2950 Series (Cont.)

Use the show port-security address command to display the secure MAC addresses for all ports. Use the show port-security command without keywords to display the port security settings for the switch.

Page 72: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-56 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Adds, Moves, and Changes for Access Layer Catalyst Switches

This topic describes how to handle adds, moves, and changes for access layer Catalyst switches.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-16

Executing Adds, Moves, and Changesfor MAC Addresses

Adding a MAC Address1. Configure port security.2. Configure the MAC address.

Changing a MAC Address1. Remove MAC address restrictions.

Moving a MAC Address1. Add the address to a new port.2. Configure port security on the

new switch.3. Configure the MAC address to the

port allocated for the new user.4. Remove the old port configuration.

To add a new MAC address on an access switch that connects a workstation to the network, follow these steps:

Step 1 Configure port security.

Step 2 Configure the MAC address to the port allocated for the new interface so that the first MAC address that is seen on the port is the only address permitted.

To delete a MAC address on an access switch that connects a workstation to the network, remove the MAC address restrictions from the port.

To move a MAC address from one access switch to another, delete the MAC address from one physical segment or logical network and assign it to a new physical segment, as follows:

Step 1 Add the address to the new physical port.

Step 2 On the new access switch, configure port security.

Step 3 On the new access switch, configure the MAC address to the port allocated for the new user.

Step 4 When all security is in place for the new location, shut down the old port and remove any MAC restrictions. Remove any old access lists from the original access switch.

Page 73: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-57

If an Ethernet NIC fails, that MAC address is no longer valid because MAC addresses are unique. Installing a new Ethernet NIC will not permit the affected workstation to have access to the network because the security policy is based on the old MAC address. In this case, the only changes that need to be made are to the switch itself to remove the old MAC address from the security on the port and to add the new MAC address to the security on the port.

Page 74: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-58 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-17

Adding a New Switch to the Network

1. Determine the IP address for management purposes.

2. Configure administrative access for the console, auxiliary, and vty interfaces.

3. Configure security for the device. 4. Configure the access switch

ports as necessary.

To add a new access switch to the network, follow these steps:

Step 1 Configure the switch IP address and the default gateway to be used for management purposes.

Step 2 Configure administrative access for the console, auxiliary, and vty interfaces, as appropriate.

Step 3 Configure security for the device. There are two levels of security that need to be considered: the user EXEC level and the privileged EXEC level.

Step 4 Configure the access switch ports as necessary to support single workstations, IP phones, and trunking to upstream and downstream switches.

To ensure that the new switch does not become the root of the spanning tree, increase the priority value. Connect the switch into the existing infrastructure only after you have completed all of the switch configuration steps.

To move equipment from one location to another, treat the process as both a removal and an addition of equipment, depending on the number of configuration changes required. If there are few administrative and interface changes, you can overwrite those specific configuration parameters. If the equipment is being moved to a site with few or no similar configuration settings, you should erase the configuration and proceed as if you are adding a new network device.

Page 75: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-59

Catalyst Switch Configuration File Management This topic describes how to manage Catalyst switch configuration files.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-18

wg_sw_2950#copy nvram:startup-config tftp:[[[//location]/directory]/filename]

Catalyst 2950 Series

wg_sw_2950# copy nvram:startup-config tftp://172.16.2.155/wg_sw_a.cfgAddress or name of remote host [172.16.2.155]?Destination filename [wg_sw_a.cfg]?!!1189 bytes copied in 0.068 secs (17485 bytes/sec)wg_sw_2950#

• Uploads the system running configuration to a TFTP server

wg_sw_2950#copy system:running-config tftp:[[[//location]/directory]/filename]

• Uploads the startup configuration in NVRAM to a TFTP server

Managing the Configuration File

The copy command can be used to copy a configuration from or to a file server. On the Catalyst 2950 series, use the copy nvram:startup-config tftp: command to upload the startup configuration in NVRAM to a TFTP server.

To upload a configuration file from a switch to a TFTP server for storage, follow these steps:

Step 1 Verify that the TFTP server is accessible and properly configured.

Step 2 Log into the switch through the console port or a Telnet session.

Step 3 Upload the switch configuration to the TFTP server. Specify the IP address or host name of the TFTP server and the destination filename.

Use one of these privileged EXEC commands:

copy system:running-config tftp:[[[//location]/directory]/filename]

copy nvram:startup-config tftp:[[[//location]/directory]/filename]

Page 76: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-60 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-19

• Resets the system configuration to factory defaults

wg_sw_2950#erase nvram:-or-

wg_sw_2950#erase startup-config

Catalyst 2950 Series

wg_sw_2950#erase nvram:Erasing the nvram filesystem will remove all configuration files! Continue? [confirm][OK]Erase of nvram: completewg_sw_2950#

Clearing NVRAM

On the Catalyst 2950 series, use the erase nvram: or the erase startup-config privileged EXEC commands to reset the switch configuration to the factory defaults.

Page 77: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-61

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-20

Summary

• A Catalyst switch comes with factory default settings that can be displayed with the show command.

• The ip address command is used to configure an IP address and subnet mask on a switch. The ip default-gatewaycommand is used to configure a default gateway.

• The duplex command is used to configure switch duplex options.

• MAC address tables include dynamic and static addresses. The switchport port-security mac-address command is used to set static MAC addresses.

Page 78: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-62 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-21

Summary (Cont.)

• The port security feature can be used to restrict input to an interface by limiting and identifying MAC addresses of the stations that are allowed to access the port.

• As network endpoint topology changes because of added, moved, and changed devices and interfaces, the switch configuration may need to be modified.

• The copy command can be used to copy a configuration from or to a file server. The erase nvram: command resets the switch configuration to the factory default settings.

Page 79: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-63

Module Summary This topic summarizes the key points discussed in this module.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1

Module Summary

• LAN switches and bridges have the ability to listen to traffic and make intelligent forwarding decisions at Layer 2.

• Most complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some problems, it can introduce others.

• STP provides path redundancy while preventing undesirable loops in switched or bridged networks.

• A Cisco Catalyst switch comes with factory default settings, which set up the switch to function as a transparent bridge.

Ethernet switches and bridges make intelligent frame-forwarding decisions by examining the source and destination MAC address of incoming frames. Redundant links and devices eliminate the possibility that a single point of failure will result in loss of function for the entire switched or bridged network, but redundant links and devices can also cause problems. STP is a Layer 2 link management protocol that is used to maintain a loop-free network. A Cisco Catalyst switch comes with factory default settings, but you may need to modify some of the configuration parameters on your Catalyst switch.

Page 80: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-64 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Module Self-Check Use the questions here to review what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) Which two functions can LAN switches and bridges provide? (Choose two.) (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) packet routing B) jitter avoidance C) address learning D) store and forward decision E) loop avoidance using the Spanning Tree Protocol

Q2) Ethernet switching or bridging _____ the available bandwidth of a network by creating _____ network segments. (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) increases, shared B) decreases, shared C) increases, dedicated D) decreases, dedicated

Q3) Which frame transmission mode reads the destination address of a frame before forwarding it? (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) cut-through B) fragment-free C) store and forward D) all transmission modes

Q4) Which feature do switches and bridges implement so that they can receive and transmit frames independently on each port? (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) loop avoidance B) buffering memory C) store and forward mode D) Spanning Tree Protocol

Q5) What information in a frame does a switch or bridge use to make frame-forwarding decisions? (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) source port B) source address C) destination port D) destination address

Page 81: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-65

Q6) When a frame arrives with a known destination address, where does the switch or bridge forward it? (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) source port B) broadcast port C) destination port D) all ports except the source port

Q7) Which three frame types are flooded to all ports except the source port on a switch? (Choose three.) (Source: Introducing Basic Layer 2 Switching and Bridging Functions) A) unicast frames B) multicast frames C) broadcast frames D) frames with a known destination address E) frames with an unknown destination address

Q8) Which term commonly describes the endless flooding or looping of frames? (Source: Identifying Problems that Occur in Redundant Switched Topologies) A) flood storm B) loop overload C) broadcast storm D) broadcast overload

Q9) Which term describes multiple copies of a frame arriving on different ports of a switch? (Source: Identifying Problems that Occur in Redundant Switched Topologies) A) flood storm B) multiple frame transmission C) MAC database instability D) loop overload

Q10) When does the STP automatically reconfigure switch or bridge ports? (Source: Introducing Spanning Tree Protocol) A) when the network topology changes B) when the forward delay timer expires C) when an administrator specifies a recalculation D) when a new BPDU is not received within the forward delay

Q11) How does the STP provide a loop-free network? (Source: Introducing Spanning Tree Protocol) A) by placing all ports in the blocking state B) by placing all bridges in the blocking state C) by placing some ports in the blocking state D) by placing some bridges in the blocking state

Page 82: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-66 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Q12) Which port is the lowest-cost path from the nonroot bridge to the root bridge? (Source: Introducing Spanning Tree Protocol) A) root B) blocking C) designated D) nondesignated

Q13) With STP, how is the designated port selected on a segment? (Source: Introducing Spanning Tree Protocol) A) lowest-cost path to the root bridge B) highest-cost path to the root bridge C) lowest-cost path to the closest nonroot bridge D) highest-cost path to the closest nonroot bridge

Q14) Which statement is true of a port in the listening state? (Source: Introducing Spanning Tree Protocol) A) The port is able to check for BPDUs and populate the MAC table. B) The port is able to check for BPDUs, but not yet populate its MAC table. C) The port is able to populate its MAC table, but not yet forward user frames. D) The port is able to forward user frames, but not yet populate its MAC table.

Q15) In which state is a nondesignated port, typically? (Source: Introducing Spanning Tree Protocol) A) blocking B) learning C) listening D) forwarding

Q16) In which state is a root port, typically? (Source: Introducing Spanning Tree Protocol) A) blocking B) learning C) listening D) forwarding

Q17) On which STP bridge are all ports designated ports? (Source: Introducing Spanning Tree Protocol) A) root bridge B) nonroot bridge C) bridge with the lowest priority D) bridge with the highest bridge ID

Q18) Which event is required for STP to detect a topology change? (Source: Introducing Spanning Tree Protocol) A) when a BPDU is not received within two seconds B) when a device does not respond to a handshake message C) when the max_age timer has expired without receiving a BPDU D) when a device does not respond quickly enough to a handshake request

Page 83: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Configuring Catalyst Switch Operations 1-67

Q19) Which switched network issue does RSTP address? (Source: Introducing Spanning Tree Protocol) A) network security B) size of the network C) redundant topology D) speed of convergence

Q20) What is the RSTP equivalent to the STP listening state? (Source: Introducing Spanning Tree Protocol) A) blocking B) listening C) discarding D) forwarding

Q21) With RSTP, which two port roles are included in the active topology? (Source: Introducing Spanning Tree Protocol) A) root and alternate B) root and designated C) alternate and backup D) designated and backup

Q22) What does the duplex full command do? (Source: Configuring a Catalyst Switch) A) sets full-duplex mode for the switch B) sets full-duplex mode for an interface C) sets full-duplex mode with flow control for the switch D) sets full-duplex mode with flow control for an interface

Q23) Which command restricts port usage to no more than ten devices? (Source: Configuring a Catalyst Switch) A) switchport secure 10 B) switchport max-mac-count 10 C) switchport port-security maximum 10 D) switchport port-security 10 max-mac

Q24) What does the erase startup-config command do on a Catalyst 2950 series switch? (Source: Configuring a Catalyst Switch) A) deletes the MAC address table on the switch B) resets the switch configuration to the factory defaults C) resets the switch configuration to the last-saved version D) deletes all configuration information on the switch, including all the defaults

Page 84: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

1-68 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Module Self-Check Answer Key Q1) C, E

Q2) C

Q3) A

Q4) B

Q5) D

Q6) C

Q7) B, C, E

Q8) C

Q9) C

Q10) A

Q11) C

Q12) A

Q13) A

Q14) B

Q15) A

Q16) D

Q17) A

Q18) C

Q19) D

Q20) C

Q21) B

Q22) B

Q23) C

Q24) B

Page 85: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Module 2

Extending Switched Networks with Virtual LANs

Overview Cisco Systems provides VLAN-capable solutions across its suite of internetworking switches and routers. Not only do VLANs solve many of the immediate problems associated with administrative changes, they also provide scalability, interoperability, and increased dedicated throughput.

Module Objectives Upon completing this module, you will be able to improve scalability, interoperability, and throughput by implementing VLANs in your network. This ability includes being able to meet these objectives:

Describe VLAN operations and protocols

Configure a VLAN on a large switched network

Page 86: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-2 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 87: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 1

Introducing VLAN Operations

Overview A VLAN is a group of end stations with a common set of requirements, independent of their physical location. A VLAN has the same attributes as a physical LAN, but allows you to group end stations even if they are not physically located on the same LAN segment. A VLAN allows you to group ports on a switch to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic that originates from a particular VLAN floods only ports belonging to that VLAN.

You should understand how VLANs operate and the important VLAN protocols in order to configure, verify, and troubleshoot VLANs on Cisco access switches. This lesson describes VLAN operations and associated protocols.

Objectives Upon completing this lesson, you will be able to describe VLAN operations and protocols. This ability includes being able to meet these objectives:

Describe the basic features of a VLAN

Explain how Catalyst switches support VLAN functionality

Describe the VLAN membership modes

Explain the functionality provided by 802.1Q trunking

Describe the ISL protocol and encapsulation

Describe the features of VTP

Describe the modes in which VTP operates

Explain how VTP operates in a management domain

Describe how VTP pruning supports VLANs

Page 88: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-4 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLANs Defined This topic describes the basic features of VLANs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-3

VLAN = Broadcast Domain = Logical Network (Subnet)

VLAN Overview

• Segmentation

• Flexibility

• Security

A VLAN is a logical broadcast domain that can span multiple physical LAN segments. Within the switched internetwork, VLANs provide segmentation and organizational flexibility. You can design a VLAN to establish stations that are segmented logically by functions, project teams, and applications without regard to the physical location of users. You can assign each switch port to only one VLAN, thereby adding a layer of security. Ports in a VLAN share broadcasts; ports in different VLANs do not share broadcasts. Containing broadcasts within a VLAN improves the overall performance of the network.

Within the switched internetwork, VLANs provide segmentation and organizational flexibility. Using VLAN technology, you can group switch ports and their connected users into logically defined communities, such as coworkers in the same department, a cross-functional product team, or diverse user groups sharing the same network application.

A VLAN can exist on a single switch or span multiple switches. VLANs can include stations in a single building or multiple-building infrastructures. VLANs can also connect across WANs.

Page 89: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-5

VLAN Operation This topic describes how Catalyst switches support VLAN functionality.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-4

• Each logical VLAN is like a separate physical bridge.• VLANs can span across multiple switches.• Trunks carry traffic for multiple VLANs.• Trunks use special encapsulation to distinguish between

different VLANs.

VLAN Operation

A Cisco Catalyst switch operates in a network like a traditional bridge. Each VLAN that is configured on the switch implements address learning, forwarding and filtering decisions, and loop avoidance mechanisms as if the VLAN were a separate physical bridge.

Internally, the Catalyst switch implements VLANs by restricting data forwarding to destination ports that are in the same VLAN as originating ports. That is, when a frame arrives on a switch port, the Catalyst must retransmit the frame only to ports that belong to the same VLAN. The implication is that a VLAN that is operating on a Catalyst switch limits transmission of unicast, multicast, and broadcast traffic. Traffic originating from a particular VLAN floods only other ports in that VLAN.

Normally, a port carries traffic only for the single VLAN to which it belongs. For a VLAN to span across multiple switches, a trunk is required to connect two switches. A trunk can carry traffic for multiple VLANs.

Page 90: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-6 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLAN Membership Modes This topic describes the two VLAN membership modes.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-5

VLAN Membership Modes

Ports belonging to a VLAN are configured with a membership mode that determines to which VLAN they belong. Catalyst switch ports can belong to one of these VLAN membership modes:

Static VLAN: An administrator statically configures the assignment of VLANs to ports.

Dynamic VLAN: The Catalyst switches support dynamic VLANs by using a VLAN Management Policy Server (VMPS). The VMPS can be a Catalyst 5000 series switch or an external server. The Catalyst 2950 series cannot operate as the VMPS. The VMPS contains a database that maps MAC addresses to VLAN assignments. When a frame arrives on a dynamic port at the Catalyst access switch, the Catalyst switch queries the VMPS for the VLAN assignment based on the source MAC address of the arriving frame.

A dynamic port can belong to only one VLAN at a time. Multiple hosts can be active on a dynamic port only if they all belong to the same VLAN.

Page 91: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-7

802.1Q Trunking This topic describes the basic functionality provided by 802.1Q trunking.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-6

802.1Q Trunking

The IEEE 802.1Q protocol is used to interconnect multiple switches and routers and define VLAN topologies. Cisco supports IEEE 802.1Q for Fast Ethernet and Gigabit Ethernet interfaces.

Trunking is a way to carry traffic from several VLANs over a point-to-point link between the two devices. You can implement Ethernet trunking in these two ways:

Inter-Switch Link ( ISL), a Cisco proprietary protocol

802.1Q, an IEEE standard

IEEE 802.1Q extends IP routing capabilities to include support for routing IP frame types in VLAN configurations using the IEEE 802.1Q encapsulation.

Every 802.1Q port is assigned to a trunk. All ports on a trunk are in a native VLAN. Every 802.1Q port is assigned an identifier value that is based on the port’s native VLAN ID (the default is VLAN 1). All untagged frames are assigned to the LAN specified in the ID parameter.

Page 92: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-8 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-7

Importance of Native VLANs

An 802.1Q trunk and its associated trunk ports have a native VLAN value. 802.1Q does not tag frames for the native VLAN. Therefore, ordinary stations will be able to read the native untagged frames, but will not be able to read any other frame because the frames are tagged.

Page 93: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-9

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-8

802.1Q Frame

The figure shows how adding a tag in a frame results in recomputation of the frame check sequence (FCS). 802.1p and 802.1Q share the same tag.

Page 94: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-10 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-9

Per VLAN Spanning Tree +

The 802.1Q standard defines a unique spanning-tree instance running on the native VLAN for all of the VLANs in the network. An 802.1Q mono spanning tree (MST) network lacks some flexibility compared with a Per VLAN Spanning Tree + (PVST+) network that runs one instance of Spanning Tree Protocol (STP) per VLAN.

Example: Per VLAN Spanning Tree + Cisco developed PVST+ to enable the running of several STP instances. PVST+ uses a Cisco device to connect an MST zone, typically the 802.1Q-based network of another vendor, to a PVST+ zone, typically a Cisco ISL–based network. There is no specific configuration needed to achieve this connection. Ideally, a mixed environment should look like the one shown in the figure.

PVST+ provides support for 802.1Q trunks and the mapping of multiple spanning trees to the single spanning tree of 802.1Q switches. PVST+ networks must be in a treelike structure for proper STP operation. Providing different STP root switches per VLAN creates a more redundant network.

The PVST+ architecture distinguishes three types of regions: a PVST region, a PVST+ region, and an MST region. Each region consists of a homogeneous switch. You can connect a PVST region to a PVST+ region by connecting two ISL ports. Similarly, you can connect a PVST+ region to an MST region by connecting two 802.1Q ports.

Page 95: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-11

In order to support the IEEE 802.1Q standard, the Cisco STP implementation was extended to become PVST+ by adding support for tunneling across an IEEE 802.1Q MST region. Tunneling means that bridge protocol data units (BPDUs) are flooded through the MST region along the single spanning tree present in the MST region. PVST+ is therefore compatible with both the 802.1Q MST and Cisco PVST protocols without requiring extra commands for configuration. In addition, PVST+ adds verification mechanisms to ensure that there is no inconsistent configuration of port trunking and VLAN IDs across switches.

Page 96: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-12 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Inter-Switch Link Protocol and Encapsulation This topic describes ISL protocol and encapsulation.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-10

• Performed with ASIC• Not intrusive to client stations; ISL

header not seen by client• Effective between switches, and

between routers and switches

ISL trunks enable VLANs across a backbone.

ISL Tagging

ISL is a Cisco proprietary protocol for interconnecting multiple switches and maintaining VLAN information as traffic travels between switches. ISL provides VLAN capabilities while maintaining full wire-speed performance over Fast Ethernet links in full- or half-duplex mode.

Running a trunk in full-duplex mode is efficient and highly recommended. ISL operates in a point-to-point environment.

The ISL frame tagging that the Catalyst series of switches uses is a low-latency mechanism for multiplexing traffic from multiple VLANs on a single physical path. It has been implemented for connections among switches, routers, and Network Interface Cards (NICs) that are used on nodes such as servers. To support the ISL feature, each connecting device must be ISL-configured. A router that is ISL-configured is used to allow interVLAN communications. A non-ISL device that receives ISL-encapsulated Ethernet frames may consider them to be protocol errors if the size of the header plus data frame exceeds the maximum transmission unit (MTU) size.

ISL functions at the Open System Interconnection (OSI) Layer 2 reference model by encapsulating a data frame with a new header and a cyclic redundancy check (CRC). ISL is protocol-independent, because the data frame may carry any upper-layer protocol. Administrators use ISL to maintain redundant links and load-balance traffic between parallel links using the STP.

Page 97: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-13

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-11

ISL Encapsulation

Ports configured as ISL trunks encapsulate each frame with a 26-byte ISL header and a 4-byte CRC before sending it out the trunk port. Because ISL technology is implemented in application-specific integrated circuits (ASICs), frames are tagged at wire-speed performance. The number of VLANs supported by a switch depends on the switch hardware.

Information contained in the ISL frame header is as follows:

DA: 40-bit multicast destination address

Type: 4-bit descriptor of the encapsulated frame types: Ethernet (0000), Token Ring (0001), Fiber Distributed Data Interface (FDDI) (0010), and ATM (0011)

User: 4-bit descriptor used as the type field extension or used to define Ethernet priorities; a binary value from 0, the lowest priority, to 3, the highest priority

SA: 48-bit source MAC address of the transmitting Catalyst switch

LEN: 16-bit frame-length descriptor minus DA, Type, User, SA, LEN, and CRC

AAAA03: Standard Subnetwork Access Protocol (SNAP) 802.2 LLC header

HSA: First 3 bytes of the SA (manufacturer or unique organizational ID)

VLAN ID: 15-bit VLAN ID; only the lower 10 bits are used for 1024 VLANs

BPDU: 1-bit descriptor identifying whether the frame is a spanning-tree BPDU; also identifies if the encapsulated frame is a Cisco Discovery Protocol (CDP) frame

INDX: 16-bit descriptor identifying the transmitting port ID; used for diagnostics

RES: 16-bit reserved field used for additional information, such as the FDDI frame control field

Page 98: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-14 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLAN Trunking Protocol Features This topic describes the features that VLAN Trunking Protocol (VTP) offers to support VLANs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-12

• Has a messaging system that advertises VLAN configuration information• Maintains VLAN configuration consistency throughout a common

administrative domain• Sends advertisements on trunk ports only

VTP Protocol Features

VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the additions, deletions, and name changes of VLANs across networks. VTP minimizes misconfigurations and configuration inconsistencies that can cause problems, such as duplicate VLAN names or incorrect VLAN-type specifications.

A VTP domain is one switch or several interconnected switches sharing the same VTP environment. You can configure a switch to be in only one VTP domain.

By default, a Catalyst switch is in the no-management-domain state until it receives an advertisement for a domain over a trunk link or until you configure a management domain. Configurations made to a single VTP server are propagated across links to all connected switches in the network.

Page 99: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-15

VTP Modes This topic describes the modes in which VTP operates.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-13

• Cannot create, change, or delete VLANs

• Forwards advertisements

• Synchronizes• Not saved in

NVRAM

• Creates VLANs• Modifies VLANs• Deletes VLANs• Sends and forwards

advertisements• Synchronizes• Saved in NVRAM

• Creates local VLANs only• Modifies local VLANs only• Deletes local VLANs only• Sends and forwards

advertisements• Does not

synchronize• Saved in NVRAM

VTP Modes

VTP operates in one of three modes: server mode, transparent mode, or client mode. You can complete different tasks depending on the VTP operation mode. The characteristics of the three modes are as follows:

Server mode: The default VTP mode is server mode, but VLANs are not propagated over the network until a management domain name is specified or learned. When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain. VTP messages are transmitted out all trunk connections.

Transparent mode: When you make a change to the VLAN configuration in VTP transparent mode, the change affects the local switch only and does not propagate to other switches in the VTP domain. VTP transparent mode does forward VTP advertisements within the domain.

Client mode: You cannot make changes to the VLAN configuration when in VTP client mode. VTP advertisements are forwarded in VTP client mode.

Page 100: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-16 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VTP Operations This topic describes how VTP operates in a management domain.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-14

• VTP advertisements are sent as multicast frames. • VTP servers and clients are synchronized to the latest revision number.• VTP advertisements are sent every 5 minutes or when there is a change.

VTP Operation

VTP advertisements are flooded throughout the management domain. VTP advertisements are sent every 5 minutes or whenever there is a change in VLAN configurations. Advertisements are transmitted over the default VLAN (VLAN 1) using a multicast frame. A configuration revision number is included in each VTP advertisement. A higher configuration revision number indicates that the VLAN information being advertised is more current than the stored information.

One of the most critical components of VTP is the configuration revision number. Each time a VTP server modifies its VLAN information, the VTP server increments the configuration revision number by one. The server then sends out a VTP advertisement with the new configuration revision number. If the configuration revision number being advertised is higher than the number stored on the other switches in the VTP domain, the switches will overwrite their VLAN configurations with the new information being advertised.

The configuration revision number in VTP transparent mode is always 0.

Note In the overwrite process, if the VTP server deleted all VLANs and had the higher revision number, the other devices in the VTP domain would also delete their VLANs.

Page 101: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-17

A device that receives VTP advertisements must check various parameters before incorporating the received VLAN information. First, the management domain name and password in the advertisement must match those configured in the local switch. Next, if the configuration revision number indicates that the message was created after the configuration currently in use, the switch incorporates the advertised VLAN information.

To reset the configuration revision number on most Catalyst switches, use the delete vtp privileged EXEC command. On a Catalyst 2950, change the VTP domain to another name and then change it back to reset the configuration revision number.

Page 102: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-18 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VTP Pruning This topic describes how VTP pruning supports VLANs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-15

• Increases available bandwidth by reducing unnecessary flooded traffic• Example: Station A sends broadcast, and broadcast is flooded only toward

any switch with ports assigned to the red VLAN

VTP Pruning

VTP pruning uses VLAN advertisements to determine when a trunk connection is flooding traffic needlessly.

Example: VTP Pruning By default, a trunk connection carries traffic for all VLANs in the VTP management domain. Commonly, some switches in an enterprise network do not have local ports configured in each VLAN.

The figure shows a switched network with VTP pruning enabled. Only switches 1 and 4 support ports configured in the red VLAN. The broadcast traffic from station A is not forwarded to switches 3, 5, and 6 because traffic for the red VLAN has been pruned on the links indicated on switches 2 and 4.

VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices.

Note Pruning can be enabled only on VTP servers, not on clients.

Page 103: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-19

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-16

Summary

• A VLAN permits a group of users to share a common broadcast domain regardless of their physical location in the internetwork. VLANs improve performance and security in switched networks.

• In a network, a Catalyst switch operates in a network like a traditional bridge. Each VLAN configured on the switch implements address learning, forwarding and filtering decisions,and loop avoidance mechanisms.

• Ports belonging to a VLAN are configured with a membership mode that determines to which VLAN the ports belong. Catalyst switches support two VLAN membership modes: static and dynamic.

• The IEEE 802.1Q protocol is used to transport frames for multiple VLANs between switches and routers and for defining VLAN topologies.

Page 104: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-20 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-17

Summary (Cont.)

• ISL is a Cisco proprietary protocol to transport multiple VLANsbetween switches and routers. ISL provides VLAN tagging capabilities while maintaining full wire-speed performance.

• VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the additions, deletions, and name changes of VLANs across networks.

• VTP operates in one of three modes: server, client, or transparent. The default VTP mode is server mode, but VLANs are not propagated over the network until a management domain name is specified or learned.

• VTP advertisements are sent throughout the management domain every 5 minutes or when there is a change. The configuration revision number that is included in each advertisement identifies the most current information.

• VTP pruning uses VLAN advertisements to determine when a trunk connection is flooding traffic needlessly.

Page 105: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 2

Configuring VLANs

Overview When configuring VLANs, you have several configuration options. With VLAN Trunking Protocol (VTP), you can make changes on one switch and have those changes automatically communicated throughout the VTP domain. Trunks enable traffic for multiple VLANs to move over a single link.

As network topologies, business requirements, and individual assignments change, VLAN requirements also change. There are several methods that enable you to add, change, and delete VLANs.

You should understand how VLANs are configured in order to be able to verify and troubleshoot VLANs on Cisco access switches. This lesson shows you how to configure, verify, and troubleshoot VLANs on large switched networks.

Objectives Upon completing this lesson, you will be able to configure a VLAN on large switched networks. This ability includes being able to meet these objectives:

Configure VTP, ensuring that only one switch is the server

Configure 802.1Q trunking on a Catalyst 2950 series switch

Configure ISL trunking on a Catalyst 4000 series switch

Create a VLAN on the VTP server switch

Change the name on a VLAN

Assign switch ports to a VLAN

Describe the output for each of the show commands for the Catalyst 2950 series switches

Modify a VLAN

Troubleshoot common VLAN problems

Page 106: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-22 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VTP Configuration This topic describes how to configure VTP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-3

• VTP domain name • VTP mode (server, client, or transparent); server mode is

default• VTP pruning• VTP password• VTP version

Use caution when adding a new switch to an existing domain. Add a new switch in client mode to prevent the new switch from propagating incorrect VLAN information.Reset the VTP revision number to 0, but change the VTP mode to transparent.

VTP Configuration Guidelines

When creating VLANs, you must decide whether to use VTP in your network. With VTP, you can make configuration changes on one or more switches and those changes are automatically communicated to all other switches in the same VTP domain.

Default VTP configuration values depend on the switch model and the software version. The default values for the Catalyst 2950 series switches are as follows:

VTP domain name: None

VTP mode: Server

VTP password: None

VTP pruning: Disabled

VTP trap: Disabled

The VTP domain name can be specified or learned. By default, the domain name is not set. You may optionally set a password for the VTP management domain. However, if you do not assign the same password for each switch in the domain, VTP does not function properly.

VTP pruning eligibility is one VLAN parameter that the VTP protocol advertises. Enabling or disabling VTP pruning on a VTP server propagates the change throughout the management domain.

Page 107: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-23

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-4

Catalyst 2950 Series

wg_sw_2950# configure terminalwg_sw_2950(config)# vtp mode [ server | client | transparent ]wg_sw_2950(config)# vtp domain domain-namewg_sw_2950(config)# vtp password passwordwg_sw_2950(config)# vtp pruningwg_sw_2950(config)# end

Creating a VTP Domain

Use the vtp global configuration command to modify the VTP configuration, including the storage filename, domain name, interface, and mode. Use the no form of this command to remove the filename or to return to the default settings. When the VTP mode is transparent, you can save the VTP configuration in the switch configuration file by entering the copy running-config startup-config privileged EXEC command.

Alternately, you can use the vtp privileged EXEC command to configure the VTP password, pruning, and the administrative version. Use the no vtp form of this command to return to the default settings.

Switch# vtp {password password | pruning | version number}

Note The domain name and password are case sensitive. A domain name cannot be removed after it is assigned; it can only be reassigned.

Page 108: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-24 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-5

VTP Configuration Example

Switch(config)# vtp domain ICNDChanging VTP domain name to ICNDSwitch(config)# vtp mode transparentSetting device to VTP TRANSPARENT mode.Switch(config)# end

Switch#show vtp statusVTP Version : 2Configuration Revision : 0Maximum VLANs supported locally : 64Number of existing VLANs : 17VTP Operating Mode : TransparentVTP Domain Name : ICNDVTP Pruning Mode : DisabledVTP V2 Mode : DisabledVTP Traps Generation : DisabledMD5 digest : 0x7D 0x6E 0x5E 0x3D 0xAF 0xA0 0x2F 0xAAConfiguration last modified by 10.1.1.4 at 3-3-93 20:08:05Switch#

Example: VTP Configuration The figure demonstrates the commands that you would enter to configure VTP and show the VTP status. The characteristics of the switch in this example are as follows:

The switch is transparent in the VTP domain.

The VTP domain name is ICND.

Pruning is disabled.

The configuration revision is 0.

Page 109: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-25

802.1Q Trunking Configuration The IEEE 802.1Q protocol carries traffic for multiple VLANs over a single link on a multivendor network. This topic describes how to configure IEEE 802.1Q trunking on a Catalyst 2950 series switch.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-6

802.1Q Trunking Issues

• Make sure that the native VLAN for an 802.1Q trunk is the same on both ends of the trunk link.

• Make sure that your network is loop-free before disabling STP.

• Note that native VLAN frames are untagged.

There are several limitations that IEEE 802.1Q trunks impose on the trunking strategy for a network, and you should consider the following:

Make sure that the native VLAN for an 802.1Q trunk is the same on both ends of the trunk link. If they are different, spanning-tree loops might result.

Make sure that your network is loop-free before disabling Spanning Tree Protocol (STP).

Page 110: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-26 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The table shows how IEEE 802.1Q trunking interacts with other switch features.

Switch Feature Trunk Port Interaction

Secure ports A trunk port cannot be a secure port.

Port grouping 802.1Q trunks can be grouped into EtherChannel port groups, but all trunks in the group must have the same configuration.

When a group is first created, all ports follow the parameters that are set for the first port to be added to the group. If you change the configuration of one of these parameters, the switch propagates the setting that you enter to all ports in the group. The settings include the following:

■ Allowed-VLAN list

■ STP path cost for each VLAN

■ STP port priority for each VLAN

■ STP PortFast setting

■ Trunk status; if one port in a port group ceases to be a trunk, all ports cease to be trunks

Page 111: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-27

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-7

Configuring 802.1Q Trunking

wg_sw_a(config-if)# switchport mode trunk

• Configures the port as a VLAN trunk

Note: The Catalyst 2950 series switches support only 802.1Q encapsulation.

Use the switchport mode interface configuration command to set a Fast Ethernet or Gigabit Ethernet port to trunk mode. The Catalyst 2950 series switches support the Dynamic Trunk Protocol (DTP), which manages automatic trunk negotiation.

There are four options for the switchport mode command, as follows:

Trunk: Configures the port into permanent 802.1Q trunk mode and negotiates with the connected device to convert the link to trunk mode.

Access: Disables port trunk mode and negotiates with the connected device to convert the link to nontrunk.

Dynamic desirable: Triggers the port to negotiate the link from nontrunk to trunk mode. The port negotiates to a trunk port if the connected device is in either trunk state, desirable state, or auto state. Otherwise, the port becomes a nontrunk port, which is the default mode for all Ethernet interfaces.

Dynamic auto: Enables a port to become a trunk only if the connected device has the state set to trunk or desirable. Otherwise, the port becomes a nontrunk port.

The switchport nonnegotiate interface command specifies that DTP negotiation packets are not sent on the Layer 2 interface. The switch does not engage in DTP negotiation on this interface. This command is valid only when the interface switchport mode is access or trunk (configured by using the switchport mode access or the switchport mode trunk interface configuration command). This command returns an error if you attempt to execute it in dynamic (auto or desirable) mode. Use the no form of this command to return to the default setting.

Page 112: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-28 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The table shows the steps to configure a port as an 802.1Q trunk port, beginning in privileged EXEC mode.

Step Action Notes

1. Enter the interface configuration mode and the port to be configured for trunking.

wg_sw_a(config)# interface interface

After the interface configuration is entered, the CLI1 prompt will change from (config)# to (config-if)#.

2. Configure the port as a VLAN trunk.

wg_sw_a(config-if)# switchport mode trunk

Enable trunking on the selected interface.

1CLI = command-line interface

Note Catalyst 2950 series switches support only 802.1Q encapsulation, which is configured automatically when trunking is enabled on the interface by using the switchport mode trunk command.

Page 113: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-29

ISL Trunking Configuration ISL operates in a point-to-point environment to carry traffic for multiple VLANs over a single link. This topic describes how to configure ISL trunking on a Catalyst 4000 series switch.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-8

Configuring ISL Trunking

wg_sw_4000(config)# interface {fastethernet | gigabitethernet} slot/port

• Select the interface to configure.

wg_sw_4000(config-if)# shutdown

• (Optional) Shut down the interface to prevent traffic flow until configuration is complete.

wg_sw_4000(config-if)# switchport trunk encapsulation {isl | dot1q | negotiate}

• (Optional) Specify the encapsulation. Note: You must enter thiscommand with either the isl or dot1q keyword to support theswitchport mode trunk command, which is not supported by thedefault mode (negotiate).

wg_sw_4000(config-if)# switchport mode {dynamic {auto | desirable} | trunk}

• Configure the interface as a Layer 2 trunk (required only if the interface is a Layer 2 access port or to specify the trunking mode).

Use the switchport trunk encapsulation interface configuration command to set a Catalyst 4000 series port to encapsulate with ISL. Then use the switchport mode trunk interface configuration command to configure the interface as a Layer 2 trunk.

The figure illustrates the encapsulation types supported on the Catalyst 4000 series switch.

dot1q: The interface uses only 802.1Q trunking encapsulation when trunking.

ISL: The interface uses only ISL trunking encapsulation when trunking.

negotiate: The device negotiates trunking encapsulation with a peer on the interface.

Page 114: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-30 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-9

Configuring ISL Trunking (Cont.)

wg_sw_4000# configure terminalwg_sw_4000(config-if)# interface gigabitEthernet 2/24wg_sw_4000(config-if)# shutdownwg_sw_4000(config-if)# switchport trunk encapsulation islwg_sw_4000(config-if)# switchport mode trunkwg_sw_4000(config-if)# no shutdown

Note: Not all Catalyst series switches support ISL encapsulation.

The figure illustrates the steps for configuring ISL on a Catalyst 4000 series switch.

Note Catalyst 2950 series switches do not support ISL encapsulation. The Catalyst 1900 series switches support ISL but not dot1q. Check your device to determine which type of encapsulation it will support: ISL, dot1q, or both.

Page 115: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-31

VLAN Creation This topic describes how to create new VLANs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-10

VLAN Creation Guidelines

• The maximum number of VLANs is switch-dependent.• Most Catalyst desktop switches support 64 VLANs with a

separate spanning tree per VLAN. • VLAN 1 is the factory default Ethernet VLAN.• CDP and VTP advertisements are sent on VLAN 1.• The Catalyst switch IP address is in the management VLAN

(VLAN 1 by default).• To add or delete VLANs, the switch must be in VTP server or

transparent mode.

Before you create VLANs, you must decide whether to use VTP to maintain global VLAN configuration information for your network.

Most Catalyst desktop switches support a maximum of 64 active VLANs. Depending on the model, the 2950 series can support up to 250 VLANs.

Catalyst switches have a factory default configuration in which various default VLANs are preconfigured to support various media and protocol types. The default Ethernet VLAN is VLAN 1. CDP and VTP advertisements are sent on VLAN 1.

For you to be able to communicate with the Catalyst switch remotely for management purposes, the switch must have an IP address. This IP address must be in the management VLAN, which by default is VLAN 1. Before you can create a VLAN, the switch must be in VTP server mode or VTP transparent mode.

Page 116: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-32 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-11

Adding a VLAN

Catalyst 2950 Series

Switch# configure terminalSwitch(config)# vlan 2Switch(config-vlan)# name VLAN2

To allow VLANs to span across multiple switches, you must configure trunks to interconnect the switches.

The table lists the commands to use when adding a VLAN.

Command/variable Description

vlan vlan-id ID of the VLAN to be added and configured. For vlan-id, the range is 1 to 4094 when the enhanced software image is installed and 1 to 1005 when the standard software image is installed; do not enter leading zeros. You can enter a single VLAN ID, a series of VLAN IDs separated by commas, or a range of VLAN IDs separated by hyphens.

name vlan-name (Optional) Specify the VLAN name, an ASCII string from 1 to 32 characters that must be unique within the administrative domain.

By default, a switch is in VTP server mode so that you can add, change, or delete VLANs. If the switch is set to VTP client mode, you cannot add, change, or delete VLANs.

For the Catalyst 2950 series switch, use the vlan global configuration command to enter the config-vlan configuration mode. Use the no form of this command to delete the VLAN.

Each VLAN has a unique, four-digit ID that is a number from 0001 to 1005. To add a VLAN to the VLAN database, assign a number and name to the VLAN. VLAN 1 (including VLAN1002, VLAN1003, VLAN1004, and VLAN1005) is the factory default VLAN.

To add an Ethernet VLAN, you must specify at least a VLAN number. If no name is entered for the VLAN, the default is to append the VLAN number to the word vlan. For example, VLAN0004 could be a default name for VLAN 4 if no name is specified.

Page 117: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-33

VLAN Name Modification This topic describes how to change the name on a VLAN.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-12

wg_sw_a(config-vlan)# name vlan-name

wg_sw_a# configure terminal wg_sw_a(config)# vlan 2wg_sw_a(config-vlan)# name switchlab2

Modifying a VLAN Name

To modify an existing VLAN name or number, use the same command syntax that is used to add a VLAN. In the example, the VLAN name for VLAN 2 is changed to switchlab2.

Page 118: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-34 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLAN Port Assignment This topic describes how to assign switch ports to a VLAN.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-13

Assigning Switch Ports to a VLAN

Catalyst 2950 Series

wg_sw_2950(config-if)# switchport access [vlan vlan# | dynamic]

wg-sw_2950# configure terminalwg_sw_2950(config)# interface fastethernet 0/2wg_sw_2950(config-if)# switchport access vlan 2

wg_sw_2950# show vlan

VLAN Name Status Ports---- -------------------------------- --------- ----------------------1 default active Fa0/1, Fa0/3, Fa0/4

. . . . .2 vlan2 active Fa0/2

After creating a VLAN, you can manually assign a port or a number of ports to that VLAN. A port can belong to only one VLAN at a time. When you assign a switch port to a VLAN using this method, it is known as a static-access port.

On a Catalyst 2950 series switch, configure the VLAN port assignment from the interface configuration mode using the switchport access command. Use the vlan vlan# option to set static-access membership. Use the dynamic option to have the VLAN controlled and assigned by a VLAN Management Policy Server (VMPS).

Note By default, all ports are members of VLAN 1.

Page 119: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-35

VLAN Configuration Verification This topic describes the output for each show command on the Catalyst 2950 series switches.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-14

Verifying the VTP Configuration

wg_sw_2950# show vtp status

wg_sw_2950# show vtp status

VTP Version : 2

Configuration Revision : 0

Maximum VLANs supported locally : 64

Number of existing VLANs : 17

VTP Operating Mode : Server

VTP Domain Name : ICND_lab

VTP Pruning Mode : Disabled

VTP V2 Mode : Disabled

VTP Traps Generation : Disabled

MD5 digest : 0x7D 0x6E 0x5E 0x3D 0xAF 0xA0 0x2F 0xAA

Configuration last modified by 10.10.10.40 at 3-3-93 20:08:05

On a Catalyst 2950 series switch, use the show vtp status command to verify a recent configuration change or to view the VTP configuration information.

Page 120: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-36 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-15

Verifying a Trunk

wg_sw_2950# show interfaces interface [switchport | trunk]

wg_sw_2950# show interfaces fa0/11 switchportName: Fa0/11Switchport: EnabledAdministrative Mode: trunkOperational Mode: downAdministrative Trunking Encapsulation: dot1qNegotiation of Trunking: OnAccess Mode VLAN: 1 (default)Trunking Native Mode VLAN: 1 (default). . .

wg_sw_2950# show interfaces fa0/11 trunk

Port Mode Encapsulation Status Native vlanFa0/11 desirable 802.1q trunking 1

Port Vlans allowed on trunkFa0/11 1-4094

Port Vlans allowed and active in management domainFa0/11 1-13

To verify a trunk configuration on a Catalyst 2950 series switch, use the show interfaces interfaces switchport or the show interfaces interfaces trunk command to display the trunk parameters and VLAN information of the port. The Catalyst 2950 series switch supports trunking on each of its Fast Ethernet and Gigabit Ethernet ports.

Page 121: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-37

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-16

Verifying a VLAN

Catalyst 2950 Series

wg_sw_2950# show vlan id 2

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------2 switchlab99 active Fa0/2, Fa0/12

VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------2 enet 100002 1500 - - - - - 0 0

. . .wg_sw_2950#

wg_sw_2950# show vlan [brief | id vlan-id || name vlan-name]

After the VLAN is configured, you should validate the parameters for that VLAN.

Use the show vlan id vlan# or the name vlan-name command to display information about a particular VLAN.

Use the show vlan brief command to display one line for each VLAN that displays the VLAN name, the status, and the switch ports.

Use the show vlan command to display information on all configured VLANs. The show vlan command displays the switch ports assigned to each VLAN. Other VLAN parameters that are displayed include the type (the default is Ethernet); the security association ID (SAID), used for the Fiber Distributed Data Interface (FDDI) trunk; the maximum transmission unit (MTU) (the default is 1500 for Ethernet VLAN); the Spanning Tree Protocol (STP); and other parameters used for Token Ring or FDDI VLANs.

Page 122: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-38 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-17

wg_sw_2950# show vlan briefVLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 2 vlan2 active3 vlan3 active4 vlan4 active1002 fddi-default act/unsup1003 token-ring-default act/unsup

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1004 fddinet-default act/unsup1005 trnet-default act/unsup

wg_sw_2950# show vlan brief

Verifying VLAN Membership

wg_sw_2950# show interfaces interface switchport

On the Catalyst 2950 series switch, use the show vlan brief privileged EXEC command to display the VLAN assignment and membership type for all switch ports. Alternatively, use the show interfaces interface switchport privileged EXEC command to display the VLAN information for a particular interface.

Page 123: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-39

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-18

Verifying STP for a VLANwg_sw_2950# show spanning-tree [active | detail | vlan vlan-id | summary]

wg_sw_2950# show spanning-tree vlan 2

VLAN0002Spanning tree enabled protocol ieeeRoot ID Priority 2

Address 0008.20fc.a840Cost 31Port 12 (FastEthernet0/12)Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32770 (priority 32768 sys-id-ext 2)Address 0008.a445.9b40Hello Time 2 sec Max Age 20 sec Forward Delay 15 secAging Time 300

Interface Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- ------------------------Fa0/2 Desg FWD 100 128.2 ShrFa0/12 Root FWD 19 128.12 P2p

On the Catalyst 2950 series switch, use the show spanning-tree vlan privileged EXEC command to display the STP configuration for a particular VLAN.

Example: Verifying STP for a VLAN The figure shows spanning-tree information for VLAN 2 on a Catalyst 2950 series switch.

Port fa0/12 is the root port for VLAN 2.

The root bridge for VLAN 2 has a bridge priority of 2 with a MAC address of 0008.20fc.a840.

The switch is running the IEEE 802.1d STP.

Recall that a Catalyst switch can support a separate spanning tree per VLAN, allowing for load balancing between switches. For example, one switch can be the root for VLAN 1, while another switch can be the root for VLAN 2. (This idea is explained further in the course Building Cisco Multilayer Switched Networks [BCMSN]).

Page 124: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-40 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Adds, Moves, and Changes for VLANs As network topologies, business requirements, and individual assignments change, VLAN requirements also change. This topic describes how to add, move, and change VLANs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-19

Executing Adds, Moves, and Changes for VLANs

wg_sw_a(config)# vlan vlan-id

wg_sw_a(config-vlan)#

• Enters the privileged EXEC VLAN configuration mode

• Writes VLAN adds, moves, and changes to the vlan.dat file

wg_sw_a(config-if)# switchport access vlan vlan#

• Statically assigns a VLAN to a specific port

To add, change, or delete VLANs, the switch must be in VTP server or transparent mode. When you make VLAN changes from a switch that is in VTP server mode, the change is automatically propagated to other switches in the VTP domain. VLAN changes made from a switch in VTP transparent mode impact the local switch only; changes are not propagated to the domain.

Adding VLANs and Port Membership After a new VLAN is created, be sure to make the necessary changes to VLAN port assignments.

Separate VLANs typically imply separate IP networks. Be sure to plan the new IP addressing scheme and its deployment to stations before moving users to the new VLAN. Separate VLANs will also require interVLAN routing to permit users in the new VLAN to communicate with other VLANs. InterVLAN routing includes setting up the appropriate IP parameters and services, including default gateway and Dynamic Host Configuration Protocol (DHCP).

Page 125: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-41

Changing VLANs and Port Membership To modify VLAN attributes, such as VLAN name, use the vlan vlan-id global configuration command.

Note The VLAN number cannot be changed. To use a different VLAN number, create a new VLAN using a new number, then reassign all ports to this VLAN.

To move a port into a different VLAN, use the same commands that are used to make the original assignments. For the Catalyst 2950 series switch, use the switchport access interface configuration command to perform this function.

There is no need to first remove a port from a VLAN to make this change. After a port is reassigned to a new VLAN, that port is automatically removed from its previous VLAN.

Deleting VLANs and Port Membership When you delete a VLAN from a switch that is in VTP server mode, the VLAN is removed from all switches in the VTP domain. When you delete a VLAN from a switch that is in VTP transparent mode, the VLAN is deleted on that specific switch only. Use the no vlan vlan-id command to remove a VLAN that is in VLAN configuration mode.

Note Before deleting a VLAN, be sure to first reassign all member ports to a different VLAN. Any ports that are not moved to an active VLAN will be unable to communicate with other stations.

To reassign a port to the default VLAN (VLAN 1), use the no switchport access vlan command in interface configuration mode.

Page 126: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-42 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLAN Troubleshooting This topic describes the most common misconfiguration errors and suggests solutions to help you troubleshoot your switched network.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-20

Troubleshooting Switched LANs

Misconfiguration of a VLAN is one of the most common errors in switched networks. Recognizing the symptoms of the problem and identifying an action plan may help you identify and solve the problem.

Page 127: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-43

The table shows high-level VLAN problems that can occur with a router or switch.

Problem Facts Possible Problem Causes and Action Plans

Performance on the VLAN is slow or unreliable.

■ Bad adapter in a device. Check hardware.

■ Full-duplex or half-duplex Ethernet settings are incorrect.

■ Cabling problem. Check connected LED; check for correct cable and proper attachment; and check cable length to be sure it does not exceed maximum cable distance.

Attached terminal or modem connection cannot communicate with router or switch.

■ Misconfigured terminal and console port. Check that the baud rate and character format match.

■ Check to see if a default route is needed on router in order to reach a switch on a different IP subnet.

Local VLAN devices cannot communicate with remote devices on a VLAN beyond the router.

■ Misconfigured IP addressing or mask. Check using CDP and show interface commands.

■ Default gateway not specified or incorrect. Check router, switch, servers, and clients.

■ VLAN misconfigured. Check port assignments. Eliminate unnecessary connections between VLANs if a port belongs to multiple VLANs.

■ VLAN inconsistency problem. Make sure that the VLANs match on both sides of a trunk.

■ ISL problem. Make sure that there is proper trunking, that VLAN 1 is being used, and that no valid VTP server information update has occurred.

When faced with poor throughput problems, check to see what type of errors exist. There could be a bad adapter card. Combinations of frame check sequence (FCS) and alignment errors and runts generally point to a duplex mismatch. The usual culprit is the autonegotiation between devices or a mismatched setting between the two sides of a link. Consider these questions:

Is the problem on the local side or remote side of the link? Remember, a minimum number of switch ports is involved in a link.

What path is the packet taking? Is it going across trunks or nontrunks to other switches?

If you see from the output of a show interfaces command that the number of collisions is increasing rapidly, the problem may just be an overloaded link.

There is a myth that switched Ethernet eliminates collisions. The fact is that switches minimize the number of collisions, but if switches are running in half-duplex mode, the collisions will still occur because two devices can always attempt to communicate at the same time.

An example is a news server that has many clients attempting to communicate at the same time. The traffic comes through the router and switch to the directly connected server. At the same time, the server is attempting to communicate back to these clients. As the server is answering one client, another client sends a request. As a result, there is the potential for collision. The only cure for collisions on Ethernet is to run in full-duplex mode.

Page 128: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-44 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-21

Problem: One Device Cannot Communicate with Another

• Make sure that the IP address, subnet mask, and VLAN membership of the switch interface are correct.

• If the host is in the same subnet as the switch interface, make sure that the switch interface and the switch port to which the host is connected are assigned to the same VLAN.

• If the host is in a different subnet, make sure that the defaultgateway on the switch is configured with the address of a router that is in the same subnet as the switch interface.

Problem: One device cannot communicate with another device.

Some suggested solutions to the problem are as follows:

Make sure that the IP address, subnet mask, and VLAN membership of the switch interface are correct by using the show interfaces command. To prevent conflicts, make sure that the interfaces are configured with IP addresses and subnet masks in different subnets.

If the host is in the same subnet as the switch interface, make sure that the switch interface and the switch port to which the host is connected are assigned to the same VLAN. Use the show interfaces and show vlan commands.

If the host is in a different subnet, make sure that the default gateway (default route) on the switch is configured with the address of a router in the same subnet as the switch interface. Use the show ip route command.

Page 129: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-45

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-22

Problem: One Device Cannot Communicate with Another (Cont.)

• If the port is in listening or learning mode, wait until the port is in forwarding mode and try to connect to the host again.

• Make sure that the speed and duplex settings on the host and the appropriate switch ports are correct.

• If the connected device is an end station, enable spanning-tree PortFast and disable trunking on the port.

• Make sure that the switch is learning the MAC address of the host.

Check the spanning-tree state on the port using the show spanning-tree interface configuration command. If the port is in listening or learning mode, wait until the port is in forwarding mode and try to connect to the host again.

Make sure that the speed and duplex settings on the host and the appropriate switch ports are correct. Use the show interfaces command.

If the connected device is an end station:

— Enable spanning-tree PortFast on the port. Use the spanning-tree portfast interface configuration command. PortFast places the port in forwarding mode immediately, bypassing listening and learning modes (do not use this feature for connections to non-end station devices).

— Disable trunking on the port. Use the no switchport mode trunk interface command.

— Disable channeling on the port. Use the no channel-group interface configuration command.

Make sure that the switch is learning the MAC address of the host. Use the show mac-address-table dynamic command.

Page 130: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-46 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-23

Problem: A Device Cannot Establish a Connection Across a Trunk Link

• Make sure that the trunking mode that is configured on both ends of the link is valid. The trunking mode should be “on”or “desirable” on one end and “on,” “desirable,” or “auto” on the other end.

• Make sure that the trunk encapsulation type that is configured on both ends of the link is valid.

• On IEEE 802.1Q trunks, make sure that the native VLAN is the same on both ends of the trunk.

Problem: A device cannot establish a connection across a trunk link.

Some suggested solutions to the problem are as follows:

Make sure that the trunking mode that is configured on both ends of the link is valid. The trunking mode should be “on” or “desirable” on one end and “on,” “desirable,” or “auto” on the other end. Use the show interfaces trunk command.

Make sure that the trunk encapsulation type that is configured on both ends of the link is valid. Use the show interfaces interface-id [switchport | trunk] command.

On IEEE 802.1Q trunks, make sure that the native VLAN is the same on both ends of the trunk. Use the show interfaces interface-id [switchport | trunk] command.

Page 131: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-47

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-24

Problem: VTP Not Updating Configuration on Other Switches

• Make sure that the switches are connected through trunk links. VTP updates are exchanged only over trunk links.

• Make sure that the VTP domain name is the same on the appropriate switches. VTP updates are exchanged only between switches in the same VTP domain.

• Check to see if the switch is in VTP transparent mode. Only switches in VTP server or VTP client mode update their VLAN configuration based on VTP updates from other switches.

• If you are using VTP passwords, you must configure the same password on all switches in the VTP domain.

Problem: VTP is not updating the configuration on other switches when the VLAN configuration changes.

Some suggested solutions to the problem are as follows:

Make sure that the switches are connected through trunk links. VTP updates are exchanged only over trunk links. Use the show interfaces trunk command.

Make sure that the VTP domain name is the same on the appropriate switches. VTP updates are only exchanged between switches in the same VTP domain. Use the show vtp status command.

Check to see if the switch is in VTP transparent mode. Only switches in VTP server or VTP client mode update their VLAN configuration based on VTP updates from other switches. Use the show vtp status command.

If you are using VTP passwords, you must configure the same password on all switches in the VTP domain. To change or set the VTP password, use the vtp password global configuration command. To clear an existing VTP password, use the no vtp password global configuration command.

Page 132: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-48 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-25

Summary

• When creating VLANs, you must decide whether to use VTP in your network. With VTP, you can make configuration changes centrally on one or more switches and have those changes automatically communicated to all the other switches in the same VTP domain.

• The IEEE 802.1Q protocol carries traffic for multiple VLANsover a single link on a multivendor network. Use the switchport mode interface configuration command to set a Fast Ethernet or Gigabit Ethernet port to trunk mode.

• The ISL protocol operates in a point-to-point environment to carry traffic for multiple VLANs over a single link. ISL is a Cisco proprietary protocol. On switches that support ISL, such as the Catalyst 4000, use the switchport trunk encapsulation interface configuration command to set a port to encapsulate with ISL.

Page 133: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-49

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-26

Summary (Cont.)

• Catalyst switches have a factory default configuration in which various default VLANs are preconfigured to support various media and protocol types. The vlan global configuration command can be used to create a VLAN.

• An existing VLAN name or number can be modified using the vlan global configuration command syntax.

• After creating a VLAN, a port or a number of ports can be statically assigned to that VLAN. A port can belong to only one VLAN at a time.

• VLAN configurations can be verified using the showcommands.

Page 134: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-50 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-27

Summary (Cont.)

• To add, change, or delete VLANs, the switch must be in VTP server or transparent mode. When VLAN changes are made from a switch that is in VTP server mode, the change is automatically propagated to other switches in the same VTP domain. Changes made in VTP transparent mode affect only the local switch and are not propagated within the VTP domain. VLAN changes cannot be made in VTP client mode.

• Misconfiguration of a VLAN is one of the most common errors in switched networks.

Page 135: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-51

Module Summary This topic summarizes the key points discussed in this module.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1

Module Summary

• A VLAN is a group of end stations with a common set of requirements, independent of their physical location and with the same attributes as a physical LAN.

• When configuring VLANs, you can automatically communicate changes throughout the domain by using the VTP functionality. You can enable a single link to carry multiple VLANs by trunking them together.

VLANs solve many of the immediate problems associated with administrative changes. As network topologies, business requirements, and individual assignments change, VLAN requirements change accordingly. Implementing VLANs successfully in your switched network enables you to improve scalability and interoperability as well as increase dedicated throughput.

Page 136: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-52 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Module Self-Check Use the questions here to review what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) Which feature is required for a VLAN to span two switches? (Source: Introducing VLAN Operations) A) a trunk to connect the switches B) a router to connect the switches C) a bridge to connect the switches D) a VLAN configured between the switches

Q2) What does a VMPS map to VLAN assignments? (Source: Introducing VLAN Operations) A) host IDs B) usernames C) IP addresses D) MAC addresses

Q3) What are two reasons for using ISL? (Choose two.) (Source: Introducing VLAN Operations) A) to maintain redundant links B) to allow clients to see the ISL header C) to provide interVLAN communications over a bridge D) to provide trunking between Cisco switches and other vendor switches E) to load-balance traffic between parallel links using the Spanning Tree Protocol

Q4) Which is required to support the ISL feature between two devices? (Source: Introducing VLAN Operations) A) being ISL-capable B) running Cisco IOS C) being VLAN-capable D) being 802.1Q-capable

Q5) What primary benefit does VTP offer? (Source: Introducing VLAN Operations) A) allows trunking to provide redundancy B) minimizes redundancy on a switched network C) allows you to run several VLANs over a single trunk D) minimizes misconfigurations and configuration inconsistencies

Q6) How many VTP domains can you configure for a switch? (Source: Introducing VLAN Operations) A) one B) two C) four D) eight

Page 137: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-53

Q7) Which command correctly configures a switch for transparent mode in the VTP domain “switchlab”? (Source: Configuring VLANs) A) vtp mode trunk on B) vtp mode transparent C) vtp domain switchlab D) vtp domain switchlab transparent

Q8) Which is the default VTP mode on a Catalyst switch? (Source: Introducing VLAN Operations) A) off B) client C) server D) transparent

Q9) If you group 802.1Q trunks into EtherChannel port groups, what guideline must you follow? (Source: Configuring VLANs) A) Each port in the group must be a secure port. B) Each trunk in the group can have its own configuration. C) All ports must follow the parameters set for the first port that is added to the

group. D) All trunks must follow the parameters set for the first trunk that is added to the

group.

Q10) What is the logical sequence for configuring a Catalyst switch port to be in VLAN 3? (Source: Configuring VLANs) A) Create the VLAN, then assign the port to the VLAN. B) Assign the port to the VLAN; all VLANs are created by default. C) Create the VLAN, assign ports to the VLAN, then configure VTP. D) Assign the port to the VLAN; this also creates the VLAN with a default name.

Q11) How many VLANs can a port belong to at one time. (Source: Configuring VLANs) A) only one VLAN B) up to 64 VLANs C) up to 128 VLANs D) one or two VLANs

Q12) Which information does the show vlan command display? (Source: Configuring VLANs) A) VTP domain parameters B) VMPS server configuration parameters C) which ports are members of which VLANs D) names of the VLANs and the ports assigned to the VLANs

Q13) Which command displays the spanning-tree configuration status of the ports on a Catalyst 2950 series switch? (Source: Configuring VLANs) A) show vlan B) show trunk C) show spanning-tree D) show spantree config

Page 138: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-54 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Q14) When you delete a VLAN from a VTP domain, where should the change be performed? (Source: Configuring VLANs) A) on a switch in VTP server mode B) on every switch in VTP client mode C) on a switch in VTP transparent mode D) on every switch, regardless of VTP mode

Q15) What precaution should you take when redeploying a switch to a new VTP domain in the network? (Source: Configuring VLANs) A) Set a unique VTP password on the switch for security. B) Preconfigure all VLANs in the new VTP domain on the switch. C) Verify that the VTP revision number is lower than the existing domain. D) Configure the switch to VTP transparent mode to minimize impact.

Q16) If a device on a VLAN cannot establish a connection across a trunk link, which three actions should you take to resolve the problem? (Choose three.) (Source: Configuring VLANs) A) Make sure that the trunking mode that is configured on both ends of the link is

valid. B) Make sure that the trunk encapsulation type that is configured on both ends of

the link is valid. C) Make sure that the port is connected and is not receiving any physical-layer

(alignment or FCS) errors. D) Make sure that the port is trunking and that the allowed VLAN list permits the

desired VLAN range to pass through. E) If the host is on the same subnet as the switch interface, make sure that the

switch interface and the switch port to which the host is connected are assigned to the same VLAN.

Q17) Suppose that the VTP is not updating the configuration on other switches when the VLAN configuration changes. Which command would you use to determine if the switch is in VTP transparent mode? (Source: Configuring VLANs) A) show trunk B) show spantree C) show interfaces D) show vtp status

Page 139: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Extending Switched Networks with Virtual LANs 2-55

Module Self Check Answer Key Q1) A

Q2) D

Q3) A, E

Q4) A

Q5) D

Q6) A

Q7) B

Q8) C

Q9) C

Q10) A

Q11) A

Q12) D

Q13) C

Q14) A

Q15) C

Q16) A, B, D

Q17) D

Page 140: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

2-56 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 141: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Module 3

Determining IP Routes

Overview Routing is the process by which information gets from one location to another. It is important to understand how the various routing protocols determine IP routes.

This module describes the features and operation of five routing protocols—Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF)—and shows you how to configure and troubleshoot each.

Module Objectives Upon completing this module, you will be able to configure and troubleshoot RIP, IGRP, EIGRP, and OSPF. This ability includes being able to meet these objectives:

Describe the operation, benefits, and limitations of static and dynamic routing

Describe how distance vector routing protocols operate

Describe the link-state and balanced hybrid routing algorithms

Enable RIP on an IP network

Enable EIGRP on an IP network

Enable OSPF on an IP network

Explain the operation of VLSMs on Cisco routers

Page 142: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-2 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 143: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 1

Introducing Routing

Overview Routing is the process of determining where to send data packets destined for addresses outside the local network. Routers gather and maintain routing information to enable the transmission and receipt of such data packets.

Conceptually, routing information takes the form of entries in a routing table, with one entry for each identified route. The network administrator can statically (manually) configure the entries in the routing table, or the router can use a routing protocol to create and maintain the routing table dynamically to accommodate network changes whenever they occur.

To effectively manage an IP network, you must understand the operation of both static and dynamic routing protocols and the impact that they have on an IP network. This lesson introduces IP static and dynamic routing.

Objectives Upon completing this lesson, you will be able to describe the operation, benefits, and limitations of static and dynamic routing. This ability includes being able to meet these objectives:

Describe the basic characteristics of IP static and dynamic routing

Explain the differences between static and dynamic routing

Configure static routes on Cisco routers

Configure default route forwarding

Verify static route configurations

Describe the purpose, types, and classes of dynamic routing protocols

Describe the main characteristics of dynamic routing protocols

Describe the different classes of routing protocols

Explain how to use the ip classless commands

Describe the basics of interVLAN routing operations

Page 144: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-4 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Routing Overview This topic describes the basic characteristics of static and dynamic routing operations.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

To route, a router needs to do the following:• Know the destination address• Identify the sources from which the router can learn• Discover possible routes to the intended destination• Select the best route• Maintain and verify routing information

Router Operations

Routing is the process by which an item gets from one location to another. In networking, a router is the device used to route traffic.

To be able to route anything, a router, or any entity that performs routing, must do the following:

Identify the destination address: Determine the destination (or address) of the item that needs to be routed.

Identify sources of routing information: Determine from which sources (other routers) the router can learn the paths to given destinations.

Identify routes: Determine the initial possible routes, or paths, to the intended destination.

Select routes: Select the best path to the intended destination.

Maintain and verify routing information: Determine if the known paths to the destination are the most current.

Page 145: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-5

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

• Routers must learn destinations that are not directly connected.

Router Operations (Cont.)

The routing information that a router obtains from other routers is placed in its routing table. The router will rely on this table to tell it which interfaces to use when forwarding addressed packets.

If the destination network is directly connected, the router already knows which interface to use when forwarding packets. If destination networks are not directly attached, the router must learn the best route to use when forwarding packets.

There are two ways in which the destination information can be learned.

Routing information can be entered manually by the network administrator.

Routing information can be collected through the dynamic routing process that is running in the routers.

Page 146: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-6 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Static and Dynamic Route Comparison This topic describes the differences between static and dynamic routing.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

Static Route• Uses a route that a

network administrator enters into the router manually

Dynamic Route• Uses a route that a network

routing protocol adjusts automatically for topology or traffic changes

Identifying Static and Dynamic Routes

Routers can forward packets over static routes or dynamic routes, based on the router configuration. The two ways to tell the router where to forward packets that are not directly connected are as follows:

Static: The router learns routes when an administrator manually configures the static route. The administrator must manually update this static route entry whenever an internetwork topology change requires an update. Static routes are user-defined routes that specify the path that packets take when moving between a source and a destination. These administrator-defined routes allow very precise control over the routing behavior of the IP internetwork.

Dynamic: The router dynamically learns routes after an administrator configures a routing protocol that helps determine routes. Unlike the situation with static routes, after the network administrator enables dynamic routing, the routing process automatically updates route knowledge whenever new topology information is received. The router learns and maintains routes to the remote destinations by exchanging routing updates with other routers in the internetwork.

Page 147: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-7

Static Route Configuration This topic describes how to configure static routes on Cisco routers.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

Static Routes

• Configure unidirectional static routes to and from a stub network to allow communications to occur.

Static routes are commonly used when you are routing from a network to a stub network. A stub network (sometimes called a leaf node) is a network accessed by a single route. Static routes can also be useful for specifying a “gateway of last resort” to which all packets with an unknown destination address will be sent.

Example: Static Routes In the figure, router A will be configured with a static route to reach the 172.16.1.0 subnet via the serial interface of router A. Router B will be configured with a static or default route to reach the networks behind router A via the serial interface of router B.

Note The static route is configured for connectivity to remote networks that are not directly connected to your router. For end-to-end connectivity, a static route must be configured in both directions.

Page 148: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-8 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

• Defines a path to an IP destination network or subnet or host

Router(config)# ip route network [mask] {address | interface}[distance] [permanent]

Static Route Configuration

To configure a static route, enter the ip route command in global configuration mode. The parameters identified in the table further define the static route. A static route allows manual configuration of the routing table. No dynamic changes to the routing table entry will occur as long as the path is active.

The table lists the ip route command parameters and descriptions.

ip route Command Parameters Description

network Destination network or subnetwork or host.

mask Subnet mask.

address IP address of the next-hop router.

interface Name of the interface to use to get to the destination network. The interface should be a point-to-point interface. The command will not work properly if the interface is multi-access (for example, a shared media Ethernet interface).

distance (Optional) Defines the administrative distance. Administrative distance is covered in the Dynamic Routing Protocol Overview topic.

permanent (Optional) Specifies that the route will not be removed, even if the interface shuts down.

Page 149: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-9

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

Static Route Example

• This is a unidirectional route. You must have a route configured in the opposite direction.

Example: Configuring Static Routes In this example, the static route is configured as follows:

Router(config)#ip route 172.16.1.0 255.255.255.0 172.16.2.1

This table lists the ip route command parameters for this example.

ip route Command Parameters Description

ip route Identifies the static route command.

172.16.1.0 Specifies a static route to the destination subnetwork.

255.255.255.0 Indicates the subnet mask. There are eight bits of subnetting in effect.

172.16.2.1 IP address of the next-hop router in the path to the destination.

The assignment of a static route to reach the stub network 172.16.1.0 is proper for router A because there is only one way to reach that network.

Page 150: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-10 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Default Route Forwarding Configuration This topic describes how to configure default route forwarding.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

Default Routes

• This route allows the stub network to reach all known networks beyond Router A.

Use a default route in situations when the route from a source to a destination is not known or when it is not feasible for the router to maintain many routes in its routing table.

Use the ip route command to configure default route forwarding. In the figure, router B is configured to forward all packets that do not have the destination network listed in the router B routing table to router A.

In the default route example, the following applies:

Router(config)# ip route 0.0.0.0 0.0.0.0 172.16.2.2

The table lists the ip route command parameters for this example.

ip route Command Parameters Description

ip route Identifies the static route command.

0.0.0.0 Routes to nonexistent subnetworks. With a special mask, this parameter denotes the default network.

0.0.0.0 Special mask indicating the default route.

172.16.2.2 IP address of the next-hop router to be used as the default for packet forwarding.

Page 151: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-11

Static Route Configuration Verification This topic describes how to verify the static route configuration.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Verifying the Static Route Configuration

Router# show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP

D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaE1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route

Gateway of last resort is 0.0.0.0 to network 0.0.0.0

10.0.0.0/8 is subnetted, 1 subnetsC 10.1.1.0 is directly connected, Serial0S* 0.0.0.0/0 is directly connected, Serial0

Example: Verifying the Static Route Configuration To verify that you have properly configured static routing, enter the show ip route command and look for static routes signified by “S.” You should see a verification output as shown in the figure. The asterisk (*) indicates the last path used when a packet was forwarded.

Page 152: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-12 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Dynamic Routing Protocol Overview This topic describes the purpose, types, and classes of dynamic routing protocols.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

• Routing protocols are used between routers to determine paths and maintain routing tables.

• After the path is determined, a router can route a routedprotocol.

What Is a Routing Protocol?

A routing protocol defines the rules that are used by a router when it communicates with neighboring routers. Dynamic routing relies on a routing protocol to disseminate knowledge. In contrast, static routing defines the format and use of the fields within a packet. Packets generally are conveyed from end system to end system.

Further examples of the information that routing protocols describe are as follows:

How updates are conveyed

What knowledge is conveyed

When to convey knowledge

How to locate recipients of the updates

Page 153: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-13

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

• An autonomous system is a collection of networks under a common administrative domain.

• IGPs operate within an autonomous system.• EGPs connect different autonomous systems.

Autonomous Systems: Interior or Exterior Routing Protocols

The two types of routing protocols are as follows:

Interior Gateway Protocols (IGPs): These routing protocols are used to exchange routing information within an autonomous system. Routing Information Protocol version 1 (RIPv1, RIPv2, Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing (EIGRP), and Open Shortest Path First (OSPF) are examples of IGPs.

Exterior Gateway Protocols (EGPs): These routing protocols are used to connect between autonomous systems. An autonomous system is a collection of networks under a common administration and sharing a common routing strategy. Border Gateway Protocol (BGP) is an example of an EGP.

Note The Internet Assigned Numbers Authority (IANA) assigns autonomous system numbers for many jurisdictions. Use of IANA numbering is required if your organization plans to use an EGP, such as BGP. However, it is good practice to be aware of private versus public autonomous system numbering schema.

Page 154: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-14 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-13

Classes of Routing Protocols

Within an autonomous system, most IGP routing algorithms can be classified as conforming to one of the following algorithms:

Distance vector: The distance vector routing approach determines the direction (vector) and distance (hops) to any link in the internetwork.

Link state: The link-state approach, also known as the shortest path first (SPF) algorithm, creates an abstraction of the exact topology of the entire internetwork, or at least of the partition in which the router is situated.

Balanced hybrid: The balanced hybrid approach combines aspects of the link-state and distance vector algorithms.

There is no single best routing algorithm for all internetworks. All routing protocols provide the information differently.

Page 155: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-15

Features of Dynamic Routing Protocols This topic describes the features of dynamic routing protocols.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-14

Administrative Distance: Ranking Routes

Multiple routing protocols and static routes may be used at the same time. If there are several sources for routing information, an administrative distance value is used to rate the trustworthiness of each routing information source. By specifying administrative distance values, Cisco IOS software can discriminate between sources of routing information.

Example: Administrative Distance An administrative distance is an integer from 0 to 255. A routing protocol with a lower administrative distance is more trustworthy than one with a higher administrative distance. As shown in the figure, if router A receives a route to network E from IGRP and RIP at the same time, and because RIP and IGRP use incompatible routing metrics, router A would use the administrative distance to determine that IGRP is more trustworthy. Router A would then add the IGRP route to the routing table.

Page 156: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-16 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The table shows the default administrative distance for selected routing information sources.

Route Source Default Distance

Connected interface 0

Static route address 1

EIGRP 90

IGRP 100

OSPF 110

RIPv1, RIPv2 120

External EIGRP 170

Unknown or unbelievable 255 (will not be used to pass traffic)

If nondefault values are necessary, you can use Cisco IOS software to configure administrative distance values on a per-router, per-protocol, and per-route basis.

Page 157: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-17

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-15

Classful Routing Overview

• Classful routing protocols do not include the subnet mask with the route advertisement.

• Within the same network, consistency of the subnet masks is assumed.

• Summary routes are exchanged between foreign networks.• These are examples of classful routing protocols:

– RIP version 1 (RIPv1)– IGRP

Classful routing is a consequence of the fact that subnet masks are not advertised in the routing advertisements that are generated by most distance vector routing protocols.

When a classful routing protocol is used, all subnetworks of the same major network (class A, B, or C) must use the same subnet mask. Routers that are running a classful routing protocol perform automatic route summarization across network boundaries.

Upon receiving a routing update packet, a router that is running a classful routing protocol does one of the following things to determine the network portion of the route:

If the routing update information contains the same major network number as is configured on the receiving interface, the router applies the subnet mask that is configured on the receiving interface.

If the routing update information contains a major network that is different from that configured on the receiving interface, the router applies the default classful mask (by address class) as follows:

— For class A addresses, the default classful mask is 255.0.0.0.

— For class B addresses, the default classful mask is 255.255.0.0.

— For class C addresses, the default classful mask is 255.255.255.0.

Note The Cisco IOS software does not support IGRP. IGRP is introduced to provide an example of a classful routing protocol.

Page 158: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-18 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-16

Classless Routing Overview

• Classless routing protocols include the subnet mask with the route advertisement.

• Classless routing protocols support variable-length subnet mask (VLSM).

• Summary routes can be manually controlled within the network.

• These are examples of classless routing protocols:– RIP version 2 (RIPv2)– EIGRP– OSPF– IS-IS

Classless routing protocols can be considered second-generation protocols because they are designed to address some of the limitations of the earlier classful routing protocols. One of the most serious limitations in a classful network environment is that the subnet mask is not exchanged during the routing update process, thus requiring the same subnet mask to be used on all subnetworks within the same major network.

Another limitation of the classful approach is the need to automatically summarize to the classful network boundary at major network boundaries.

In the classless environment, the summarization process is controlled manually and can usually be invoked at any bit position within the address. Because subnet routes are propagated throughout the routing domain, manual summarization may be required to keep the size of the routing tables manageable. Classless routing protocols include RIPv2, EIGRP, OSPF, and Intermediate System-to-Intermediate System (IS-IS).

Page 159: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-19

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-17

Routing Protocol Comparison Chart

Example: Routing Protocol Comparison The figure compares some of the characteristics of the different routing protocols.

EIGRP generally has the fastest convergence time because it maintains a feasible successor (backup route) in its topology table. Therefore, if the best path goes down, EIGRP immediately switches to the feasible successor without a need to perform further best-path calculations.

Page 160: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-20 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The ip classless Command The ip classless command prevents a router from dropping a packet destined for an unknown subnetwork of a directly attached network if a default route is configured. This topic describes how to use the ip classless command.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-18

Using the ip classless Command

By default, a classful router assumes that all subnetworks of a directly attached network are present in the IP routing table. If a packet is received that has a destination address within an unknown subnetwork of a directly attached network, the router assumes that the subnetwork does not exist and drops the packet. This behavior holds true even if the IP routing table contains a default route. However, you can change this behavior with the ip classless global configuration command (the ip classless command is enabled by default).

With the ip classless command configured, if a packet is received that has a destination address within an unknown subnetwork of a directly attached network, the router matches it to the default route and forwards it to the next hop that is specified by the default route.

Page 161: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-21

InterVLAN Routing This topic describes the basics of interVLAN routing operations.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-19

VLAN-to-VLAN Overview

• Network layer devices combine multiple broadcast domains.

InterVLAN communication occurs between broadcast domains via a Layer 3 device. In a VLAN environment, frames are switched only between ports within the same broadcast domain. VLANs perform network partitioning and traffic separation at Layer 2. InterVLAN communication cannot occur without a Layer 3 device, such as a router. Use Inter-Switch Link (ISL) or 802.1Q to enable trunking on a router subinterface.

Example: Router on a Stick The figure illustrates a router attached to a core switch. The configuration between a router and a core switch is sometimes referred to as a “router on a stick.” The router can receive packets on one VLAN and forward them to another VLAN. To perform interVLAN routing functions, the router must know how to reach all VLANs being interconnected. There must be a separate physical connection on the router for each VLAN, and you must enable ISL or 802.1Q trunking on a single physical connection. The router already knows about directly connected networks. The router must learn routes to networks not connected directly to it.

Page 162: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-22 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-20

Dividing a Physical Interface into Subinterfaces

• Physical interfaces can be divided into multiple subinterfaces.

To support ISL or 802.1Q trunking, you must subdivide the physical Fast Ethernet interface of the router into multiple, logical, addressable interfaces, one per VLAN. The resulting logical interfaces are called subinterfaces. Without this subdivision, a separate physical interface would have to be dedicated to each VLAN.

Example: Subinterfaces In the figure, the FastEthernet0/0 interface is divided into multiple subinterfaces: FastEthernet0/0.1, FastEthernet0/0.2, and FastEthernet0/0.3.

Page 163: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-23

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-21

Routing Between VLANs with ISL Trunks

Use the encapsulation isl vlan identifier subinterface configuration command to enable ISL on a router subinterface (where vlan identifier is the VLAN number).

To configure the router on a stick for interVLAN routing, complete the following steps:

Step 1 Enable ISL on the switch port connecting to the router.

Step 2 Enable ISL encapsulation on the Fast Ethernet subinterface of the router.

Step 3 Assign a network layer address to each subinterface.

Note In this example, the VLANs are directly connected. Routing between networks not directly connected requires that the router learn the routes, either statically or dynamically (such as via a routing protocol).

Page 164: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-24 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-22

Routing Between VLANs with 802.1Q Trunks

Use the encapsulation dot1q vlan identifier subinterface configuration command to enable 802.1Q encapsulation trunking on a router subinterface (where vlan identifier is the VLAN number).

802.1Q is slightly different from ISL. The native VLAN frames in 802.1Q do not carry a tag. Therefore, the major interface of a trunk has an address. Any other configuration information for the native VLAN subinterfaces is configured with the dot1Q encapsulation and the IP address. The subinterface number need not equal the dot1Q VLAN number. However, management is easier when the two numbers are the same.

Page 165: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-25

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-23

Summary

• Routing is the process by which items get from one location to another. In networking, a router is the device used to route traffic. Routers can forward packets over static routes or dynamic routes, based on the router configuration.

• Static routers use a route that a network administrator enters into the router manually. Dynamic routes use a router that a network routing protocol adjusts automatically for topology or traffic changes.

• Unidirectional static routes must be configured to and from a stub network to allow communications to occur.

• The ip route command can be used to configure default route forwarding.

• The show ip route command is used to verify that static routing is properly configured. Static routes are signified in the command output by “S.”

Page 166: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-26 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-24

Summary (Cont.)

• Dynamic routing protocols determine how updates are conveyed, what knowledge is conveyed, when to convey knowledge, and how to locate recipients of the updates.

• A routing protocol that has a lower administrative value is more trustworthy than a protocol that has a higher administrative value.

• There are three classes of routing protocols: distance vector, link-state, and balanced hybrid.

• The ip classless command can be used to prevent a router from dropping a packet that is destined for an unknown subnetwork of a directly attached network if a default route is configured.

• For interVLAN routing to be performed, a single physical router interface must be separated into logical subinterfaces, and ISL or 802.1Q trunking must be enabled.

Page 167: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 2

Introducing Distance Vector Routing

Overview Distance vector routing algorithms call for each router to send all or some portion of its routing table to its neighbors. In essence, link-state algorithms send small updates everywhere, whereas distance vector algorithms send larger updates only to neighboring routers. Understanding the operation of distance vector routing is critical to being able to enable, verify, and troubleshoot a distance vector routing protocol. This lesson describes the operation of distance vector routing protocols.

Objectives Upon completing this lesson, you will be able to describe how distance vector routing protocols operate. This ability includes being able to meet these objectives:

Describe how distance vector routes are selected

Describe how distance vector routing protocols maintain routing information

Explain how routing inconsistencies occur with distance vector routing protocols

Explain how to prevent count to infinity

Describe some implementation techniques to eliminate routing loops

Explain how the split horizon, route poisoning, poison reverse, holddown timers, and triggered updates techniques work together to eliminate routing loops in networks

Page 168: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-28 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Distance Vector Route Selection This topic describes how distance vector routes are selected.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

• Routers pass periodic copies of their routing table to neighboring routers and accumulate distance vectors.

Distance Vector Routing Protocols

The periodic routing updates that most distance vector routing protocols generate are addressed only to directly connected routing devices. The addressing scheme that is most commonly used is a logical broadcast. Routers that are running a distance vector routing protocol send periodic updates even if there are no changes in the network.

In a pure distance vector environment, the periodic routing update includes a complete routing table. Upon receiving a full routing table from its neighbor, a router can verify all known routes and make changes to the local routing table based on updated information. This process is also known as “routing by rumor” because the router’s understanding of the network is based on the neighboring router’s perspective of the network topology.

Example: Distance Vector Routing Protocols Router B receives periodic routing updates from router A. Router B adds a distance vector metric (such as the hop count) to each route learned from router A, increasing the distance vector. Router B then passes its own routing table to its neighbor, router C. This step-by-step process occurs in all directions between directly connected neighbor routers.

Traditionally, distance vector protocols were also classful protocols. Routing Information Protocol version 2 (RIPv2) and Enhanced Interior Gateway Routing Protocol (EIGRP) are examples of more advanced distance vector protocols that exhibit classless behavior. EIGRP also exhibits some link-state characteristics.

Page 169: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-29

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

• Routers discover the best path to destinations from each neighbor.

Sources of Information and Discovering Routes

In the figure, the interface to each directly connected network is shown as having a distance of 0.

As the distance vector network discovery process continues, routers discover the best path to destination networks that are not directly connected, based on accumulated metrics from each neighbor. Neighboring routers provide information for routes that are not directly connected.

Example: Sources of Information and Discovering Routes Router A learns about networks that are not directly connected (10.3.0.0 and 10.4.0.0) based on information that it receives from router B. Each network entry in the routing table has an accumulated distance vector to show how far away that network is in a given direction.

Page 170: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-30 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

Selecting the Best Route with Metrics

Multiple routes to a destination can exist. When a routing protocol algorithm updates the routing table, the primary objective of the algorithm is to determine the best route to include in the table. Each distance vector routing protocol uses a different routing metric to determine the best route. The algorithm generates a number called the metric value for each path through the network. Typically, the smaller the metric, the better the path.

Metrics can be calculated based on a single characteristic of a path. More complex metrics can be calculated by combining several path characteristics. The metrics that distance vector routing protocols most commonly use are as follows:

Hop count: The number of times that a packet passes through the output port of one router.

Bandwidth: The data capacity of a link; for instance, normally, a 10-Mbps Ethernet link is preferable to a 64-kbps leased line.

Delay: The length of time that is required to move a packet from source to destination.

Load: The amount of activity on a network resource, such as a router or link.

Reliability: Usually refers to the bit error rate of each network link.

Maximum transmission unit (MTU): The maximum message length in octets that is acceptable to all links on the path.

For example, both RIP and Interior Gateway Routing Protocol (IGRP) are distance vector routing protocols. RIP uses hop count as the metric; IGRP uses a more advanced composite metric, which uses bandwidth and delay as the metric by default.

Page 171: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-31

Routing Information Maintenance This topic describes how distance vector routing protocols maintain routing information.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

• Updates proceed step by step from router to router.

Maintaining Routing Information

Routing tables must be updated when the topology of the internetwork changes. Similar to the network discovery process, topology change updates proceed step by step from router to router.

Distance vector algorithms call for each router to send its entire routing table to each of its neighbors. Distance vector routing updates are sent periodically at regular intervals. The routing table can also be sent immediately, using trigger updates, when the router detects a topology change.

When a router receives an update from a neighboring router, the router compares the update with its own routing table. To establish the new metric, the router adds the cost of reaching the neighbor router to the path cost reported by the neighbor. If the router learns from its neighbor of a better route (smaller total metric) to a network, it updates its own routing table. Each routing table entry includes information about the total path cost (defined by the routing table metric) and the logical address of the first router on the path to each network that the routing table knows about.

Example: Maintaining Routing Information Router B in the figure is one unit of cost from router A. Router B would add one unit of cost to all costs reported by router A when router B runs the distance vector processes to update its routing table.

Page 172: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-32 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Routing Inconsistencies with Distance Vector Routing Protocols

This topic describes how routing inconsistencies occur with distance vector routing protocols.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

• Each node maintains the distance from itself to each possible destination network.

Inconsistent Routing Entries

When distance vector routing protocols maintain routing information, inconsistencies can occur if slow internetwork convergence on a new configuration causes incorrect routing entries.

Page 173: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-33

Example: Inconsistent Routing Entries This example uses a simplistic network design to convey the concepts.

Just before the failure of network 10.4.0.0, all routers have consistent knowledge and correct routing tables. The network is said to have “converged.” Router C is directly connected to network 10.4.0.0 with a distance of 0 (hop). The router A path to network 10.4.0.0 is through router B, with a hop count of 2.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

• Slow convergence produces inconsistent routing.

Inconsistent Routing Entries (Cont.)

When network 10.4.0.0 fails, router C detects the failure and stops routing packets out its E0 interface. However, routers A and B have not yet received notification of the failure. Router A still believes it can access 10.4.0.0 through router B. The router A routing table still reflects a path to network 10.4.0.0 with a distance of 2.

Page 174: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-34 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

• Router C concludes that the best path to network 10.4.0.0 is through Router B.

Inconsistent Routing Entries (Cont.)

When router B sends its periodic copy of its routing table to router C, router C believes it now has a viable path to network 10.4.0.0 through router B. Router C updates its routing table to reflect a path to network 10.4.0.0 through router B with a hop count of 2.

Page 175: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-35

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

• Router A updates its table to reflect the new but erroneous hop count.

Inconsistent Routing Entries (Cont.)

Router B receives a new update from router C and updates its own table to reflect the new cost (3 hops). Router A receives the new routing table from router B, detects the modified distance vector to network 10.4.0.0, and recalculates its own distance vector to 10.4.0.0 as 4.

At this point, the routing tables of all three routers are incorrect, showing that network 10.4.0.0 can be reached by paths that do not exist, with hop counts that are meaningless. Routing table updates will continue to be sent out and the hop count will grow ever larger (a problem called “count to infinity”). Additionally, packets that are destined for network 10.4.0.0 will never reach their destination. Instead, they will move continuously between the routers (a routing loop).

Page 176: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-36 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Count to Infinity Prevention This topic describes the problem of count to infinity and presents the solution.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

• The hop count for network 10.4.0.0 counts to infinity.

Count to Infinity

The condition called count to infinity arises when routing table updates continue to increase the metric to a destination that cannot be reached, rather than marking the destination as unreachable.

Example: Count to Infinity Returning to the previous example, the invalid updates about network 10.4.0.0 will continue to be propagated. Until some other process can stop the looping, the routers update each other in an inappropriate way, failing to consider that network 10.4.0.0 is down.

This condition, count to infinity, continuously updates the hop count metric despite the fact that the destination network 10.4.0.0 is down. While the routers are counting to infinity, the information that there is a valid path to network 10.4.0.0 creates a routing loop.

Without countermeasures to stop the process, the hop count distance vector increments each time a routing table update is passed to another router. These updates continue to proliferate because the destination is never marked as unreachable.

Page 177: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-37

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

• A limit is set on the number of hops to prevent infinite loops.

Defining a Maximum

Distance vector protocols define infinity as some maximum number. This number refers to a routing metric, such as a hop count.

Example: Defining a Maximum to Prevent Count to Infinity The figure shows the defined maximum allowed value as 16 hops. When the metric exceeds the maximum allowed value, network 10.4.0.0 is considered unreachable, stopping the proliferation of routing updates that increase the metric.

Page 178: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-38 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Techniques to Eliminate Routing Loops This topic describes the various techniques that are used to eliminate routing loops on distance vector routing networks.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-13

• Packets for network 10.4.0.0 bounce (loop) between Routers B and C.

Routing Loops

A routing loop occurs when two or more routers have routing information that incorrectly indicates that a valid path to an unreachable destination exists through the other routers.

A number of techniques are available to eliminate routing loops, including split horizon, route poisoning, poison reverse, holddown timers, and triggered updates.

Example: Routing Loops In the example, a packet destined for network 10.4.0.0 arrives at router A. According to the router A routing table, router A forwards the packet out interface S0. The packet arrives at router B, which forwards it out its interface S1, as indicated in the router B routing table. Router C receives that packet and checks its routing table, which specifies that the packet should be forwarded out router C interface S0. The packet thus arrives back at router B, which again forwards the packet to router C over interface S1. The packet loops between routers B and C indefinitely.

Page 179: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-39

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-14

• It is never useful to send information about a route back in the direction from which the original information came.

Split Horizon

One way to eliminate routing loops and speed up convergence is through the technique called split horizon. The rule of split horizon is that it is never useful to send information about a route back in the direction from which the original information came.

Example: Split Horizon The figure describes how the split horizon technique eliminates routing loops, as follows:

Router B has access to network 10.4.0.0 through router C. It makes no sense for router B to announce to router C that router B has access to network 10.4.0.0 through router C.

Given that router B passed the announcement of its route to network 10.4.0.0 to router A, it makes no sense for router A to announce its distance from network 10.4.0.0 to router B.

When router C announces that its connection to network 10.4.0.0 is down, router B sees that it has no alternative path to network 10.4.0.0 and concludes that network 10.4.0.0 is inaccessible. Router C will not incorrectly use router B to try to reach network 10.4.0.0.

Page 180: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-40 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-15

• Routers advertise the distance of routes that have gone down to infinity.

Route Poisoning

Another form of split horizon employs a technique called route poisoning. Route poisoning attempts to eliminate routing loops that are caused by inconsistent updates. With this technique, the router sets a table entry that keeps the network state consistent while other routers gradually converge correctly on the topology change. Used with holddown timers, route poisoning is a solution to long loops.

Example: Route Poisoning The figure provides an example of route poisoning. When network 10.4.0.0 is no longer available, router C poisons its link to network 10.4.0.0 by sending an update for that link that indicates it has an infinite metric and a hop count of 16 (that is, it is unreachable). By poisoning the route of router C to network 10.4.0.0, router C is not susceptible to incorrect updates about network 10.4.0.0 coming from neighboring routers that might claim to have a valid alternate path.

Page 181: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-41

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-16

• Poison reverse overrides split horizon.

Poison Reverse

Example: Poison Reverse Split horizon with poison reverse improves convergence. When router B sees the metric to 10.4.0.0 jump to infinity, router B sends an update, called a poison reverse, back to router C. The poison reverse states that network 10.4.0.0 is inaccessible. Poison reverse is a specific circumstance that overrides split horizon. It occurs to ensure that router C is not susceptible to incorrect updates about network 10.4.0.0.

Page 182: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-42 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-17

• The router keeps an entry for the “possibly down state” in the network, allowing time for other routers to recompute for this topology change.

Holddown Timers

Holddown timers are used to prevent regular update messages from inappropriately reinstating a route that may have gone bad. Holddowns tell routers to hold any changes that might affect routes for some period of time. By default, the holddown period is set to three times the periodic update interval for RIP.

Holddown timers work as follows:

When a router receives an update from a neighbor that indicates that a previously accessible network is now inaccessible, the router marks the route as “possibly down” and starts a holddown timer.

If an update arrives from a neighboring router with a better metric than originally recorded for the network, the router marks the network as “accessible” and removes the holddown timer.

If, at any time before the holddown timer expires, an update is received from a different neighboring router with a poorer or the same metric, the update is ignored. Ignoring an update with a poorer or the same metric when a holddown is in effect allows more time for the knowledge of the change to propagate through the entire network.

During the holddown period, routes appear in the routing table as “possibly down.” The router will still attempt to route packets to the possibly down network (maybe the network is just having intermittent connectivity problems, “flapping” up and down).

Page 183: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-43

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-18

• The router sends updates when a change in its routing table occurs.

Triggered Updates

In the previous examples, routing loops were caused by erroneous information calculated as a result of inconsistent updates, slow convergence, and timing. Slow convergence problems can also occur if routers wait for their regularly scheduled updates before notifying neighboring routers of network changes.

Normally, routing table updates are sent to neighboring routers at regular intervals. A triggered update is a routing table update that is sent immediately in response to some change. The detecting router immediately sends an update message to adjacent routers, which, in turn, generate triggered updates notifying their neighbors of the change. This wave of notifications propagates throughout that portion of the network where routes went through the specific link that changed.

Triggered updates would be sufficient if there were a guarantee that the wave of updates would reach every appropriate router immediately. However, there are two problems, as follows:

Packets containing the update message can be dropped or corrupted by some link in the network.

The triggered updates do not happen instantaneously. It is possible that a router that has not yet received the triggered update will issue a regular update at just the wrong time, causing the bad route to be reinserted in a neighbor that had already received the triggered update.

Coupling triggered updates with holddowns is designed to prevent these problems. Because the holddown rule says that when a route is in holddown (possibly down), no new route with the same or a worse metric will be accepted for the same destination for some period of time. The triggered update has time to propagate throughout the network.

Page 184: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-44 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Implementation of Techniques to Eliminate Routing Loops

This topic describes examples of split horizon, route poisoning, poison reverse, holddown timers, and triggered updates to eliminate routing loops.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-19

Eliminating Routing Loops

Example: Techniques to Eliminate Routing Loops Routers A, B, D, and E have multiple routes to reach network 10.4.0.0. As soon as router B detects the failure of network 10.4.0.0, router B removes its route to that network. Router B sends a trigger update to routers A and D, poisoning the route to network 10.4.0.0 by indicating an infinite metric to that network.

Page 185: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-45

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-20

Eliminating Routing Loops (Cont.)

Routers D and A receive the triggered update and set their own holddown timers, marking the 10.4.0.0 network as possibly down. Routers D and A, in turn, send a triggered update to router E, indicating the possible inaccessibility of network 10.4.0.0. Router E also sets the route to 10.4.0.0 in the holddown state.

Page 186: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-46 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-21

Eliminating Routing Loops (Cont.)

Routers A and D send a poison reverse update to router B. The update states that network 10.4.0.0 is inaccessible.

Because router E received a triggered update from routers A and D, router E also sends a poison reverse update to routers A and D.

Page 187: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-47

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-22

Eliminating Routing Loops (Cont.)

Routers A, D, and E will remain in holddown until either of the following occurs:

The holddown timer expires.

An update is received that indicates a new route with a better metric.

A flush timer removes the route from the routing table.

During the holddown period, routers A, D, and E assume that the network status is only possibly down and will attempt to route packets to network 10.4.0.0. The figure illustrates router E attempting to forward a packet to network 10.4.0.0. This packet will reach router B; however, because router B has no route to network 10.4.0.0, router B will drop the packet and send back an Internet Control Message Protocol (ICMP) “network unreachable” message.

Page 188: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-48 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-23

Eliminating Routing Loops (Cont.)

When the 10.4.0.0 network comes back up, router B will send a triggered update to routers A and D that notifies them that the link is active. After the holddown timer expires, routers A and D change the route to 10.4.0.0 from the possibly down state to the up state.

Page 189: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-49

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-24

Eliminating Routing Loops (Cont.)

Routers A and D send router E a routing update that states that network 10.4.0.0 is up. Router E updates its routing table after the holddown timer expires.

Page 190: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-50 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-25

Summary

• Distance vector routing protocols generate periodic routing updates addressed to directly connected routing devices. Routers running a distance vector routing protocol send periodic updates even if there are no changes in the network.

• When a router receives an update from a neighbor’s router, the router compares the update with its own routing table. The router adds the cost of reaching the neighbor’s router to the path cost reported by the neighbor to establish a new metric.

• Routing inconsistencies occur if slow internetwork convergence or a new configuration causes incorrect routing entries.

Page 191: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-51

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-26

Summary (Cont.)

• Distance vector protocols define infinity as some maximum number. The routing protocol then permits the routing table update loop until the metric exceeds its maximum allowed value.

• There are five techniques for eliminating routing loops on distance vector routing networks: split horizon, route poisoning, poison reverse, holddown timers, and triggered updates.

• All five techniques can be used together to eliminate routing loops in area networks.

Page 192: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-52 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 193: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 3

Introducing Link-State and Balanced Hybrid Routing

Overview Link-state routing algorithms, also known as shortest path first (SPF) algorithms, maintain a complex database of topology information. Whereas the distance vector algorithm has nonspecific information about distant networks and no knowledge of distant routers, a link-state routing algorithm maintains full knowledge of distant routers and how they interconnect. Balanced hybrid routing algorithms combine aspects of both distance vector and link state. Understanding the operation of link-state routing protocols is critical to being able to enable, verify, and troubleshoot their operation. This lesson explains link-state and balanced hybrid routing algorithms.

Objectives Upon completing this lesson, you will be able to explain why link-state and balanced hybrid routing algorithms are used. This ability includes being able to meet these objectives:

Explain how link-state protocols maintain routing information

Describe the features of link-state algorithms

Describe the benefits and limitations of link-state routing

Describe the caveats to using link-state routing protocols

Describe the features of balanced hybrid routing

Page 194: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-54 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

How Routing Information Is Maintained with Link State

To maintain routing information, link-state routing uses link-state advertisements (LSAs), a topological database, the SPF algorithm, the resulting SPF tree, and a routing table of paths and ports to each network. This topic describes how link-state protocols maintain routing information.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

• After initial flood of LSAs, link-state routers pass small event-triggered link-state updates to all other routers.

Link-State Routing Protocols

Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS) protocols are classified as link-state routing protocols. RFC 2328 describes OSPF link-state concepts and operations. Link-state routing protocols collect routing information from all other routers in the network or within a defined area of the network. After all of the information is collected, each router, independent of the other routers, calculates the best paths to all destinations in the network. Because each router maintains its own view of the network, the router is less likely to propagate incorrect information that is provided by a neighboring router.

Link-state routing protocols were designed to overcome the limitations of distance vector routing protocols. Link-state routing protocols respond quickly to network changes, send trigger updates only when a network change has occurred, and send periodic updates (known as link-state refreshes) at long time intervals, such as every 30 minutes. A hello mechanism determines the reachability of neighbors.

Page 195: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-55

When a failure occurs in the network, for example, a neighbor becomes unreachable, link-state protocols flood LSAs using a special multicast address throughout an area. Each link-state router takes a copy of the LSA, updates its link-state (topological) database, and forwards the LSA to all neighboring devices. LSAs cause every router within the area to recalculate routes. Because LSAs must be flooded throughout an area and all routers within that area must recalculate their routing tables, the number of link-state routers that can be in an area should be limited.

A link is similar to an interface on a router. The state of the link is a description of that interface and of its relationship to its neighboring routers. A description of the interface would include, for example, the IP address of the interface, the mask, the type of network to which it is connected, the routers connected to that network, and so on. The collection of link states forms a link-state, or topological, database. The link-state database is used to calculate the best paths through the network. Link-state routers find the best paths to destinations by applying the Dijkstra SPF algorithm against the link-state database to build the SPF tree. The best paths are then selected from the SPF tree and placed in the routing table.

Page 196: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-56 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

• Minimizes routing table entries• Localizes impact of a topology change within an area

Link-State Network Hierarchy Example

Link-state protocols use a two-layer network hierarchy. There are two primary elements in the two-layer network hierarchy, as follows:

Area: An area is a grouping of contiguous networks. Areas are logical subdivisions of the autonomous system.

Autonomous system: An autonomous system consists of a collection of networks under a common administration that share a common routing strategy. An autonomous system, sometimes called a domain, can be logically subdivided into multiple areas.

Within each autonomous system, a contiguous backbone area must be defined. All other nonbackbone areas are connected off the backbone area. The backbone area is the transition area because all other areas communicate through it. For OSPF, the nonbackbone areas can be additionally configured as a stub area, a totally stubby area, or a not-so-stubby area (NSSA) to help reduce the link-state database and routing table size.

Routers operating within the two-layer network hierarchy have different routing entities. The terms used to refer to these entities are different for OSPF and IS-IS. The following are some examples based on the figure:

Router B is called the backbone router in OSPF and the L2 router in IS-IS. The backbone, or L2, router provides connectivity between different areas.

Routers C, D, and E are called Area Border Routers (ABRs) in OSPF and L1/L2 routers in IS-IS. ABRs, or L1/L2 routers, attach to multiple areas, maintain separate link-state databases for each area they are connected to, and route traffic destined for or arriving from other areas.

Routers F, G, and H are called nonbackbone internal routers in OSPF, or L1 routers in IS-IS. Nonbackbone internal, or L1, routers are aware of the topology within their respective areas and maintain identical link-state databases about the areas.

The ABR, or L1/L2 router, will advertise a default route to the nonbackbone internal, or L1, router. The nonbackbone internal, or L1, router will use the default route to forward all

Page 197: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-57

interarea or interdomain traffic to the ABR, or L1/L2 router. This behavior can be different for OSPF, depending on how the OSPF nonbackbone area is configured (stub area, totally stubby area, or NSSA).

Router A is the Autonomous System Boundary Router (ASBR) that connects to an external routing domain, or autonomous system.

Router I is a router that belongs to another routing domain, or autonomous system.

Page 198: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-58 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Link-State Routing Protocol Algorithms This topic describes the features of link-state routing algorithms.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

Link-State Routing Protocol Algorithms

Link-state routing algorithms, known collectively as SPF protocols, maintain a complex database of the network topology. Unlike distance vector protocols, link-state protocols develop and maintain a full knowledge of the network routers and how they interconnect. This knowledge is achieved through the exchange of LSAs with other routers in a network.

Each router that has exchanged LSAs constructs a topological database using all received LSAs. An SPF algorithm is then used to compute reachability to networked destinations. This information is used to update the routing table. This process can discover changes in the network topology caused by component failure or network growth.

Instead of using periodic updates, the LSA exchange is triggered by an event in the network. This can greatly speed up the convergence process because there is no need to wait for a series of timers to expire before the networked routers can begin to converge.

Page 199: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-59

Example: Link-State Routing Protocol Algorithms If the network shown in the figure uses a link-state routing protocol, there would be no concern about connectivity between New York City and San Francisco. Depending on the actual protocol employed and the metrics selected, it is highly likely that the routing protocol could discriminate between the two paths to the same destination and try to use the best one. The table summarizes the contents of the routing tables.

Router Destination Next Hop Cost

A 185.134.0.0 B 1

A 192.168.33.0 C 1

A 192.168.157.0 B 2

A 192.168.157.0 C 2

B 10.0.0.0 A 1

B 192.168.33.0 C 1

B 192.168.157.0 D 1

C 10.0.0.0 A 1

C 185.134.0.0 B 1

C 192.168.157.0 D 1

D 10.0.0.0 B 2

D 10.0.0.0 C 2

D 185.134.0.0 B 1

D 192.168.33.0 C 1

As shown in the table routing entries for the New York (router A) to Los Angeles (router D) routes, a link-state protocol would remember both routes. Some link-state protocols can even provide a way to assess the performance capabilities of these two routes and have a bias toward the better-performing path. If the better-performing path, such as the route through Boston (router C), experienced operational difficulties of any kind, including congestion or component failure, the link-state routing protocol would detect this change and begin forwarding packets through San Francisco (router B).

Page 200: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-60 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Benefits and Limitations of Link-State Routing This topic describes the benefits and limitations of link-state routing.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

Benefits of Link-State Routing

• Fast convergence: – Changes are reported immediately by the affected source.

• Robustness against routing loops:– Routers know the topology. – Link-state packets are sequenced and acknowledged.

• Through careful (hierarchical) network design, resources can be optimized.

Some of the many benefits of link-state routing protocols over the traditional distance vector algorithms, such as Routing Information Protocol version 1 (RIPv1) or Interior Gateway Routing Protocol (IGRP), are described as follows:

Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths.

Routing updates are more infrequent.

The network can be segmented into area hierarchies, limiting the scope of route changes.

Link-state protocols send only updates of a topology change. By using triggered, flooded updates, link-state protocols can immediately report changes in the network topology to all routers in the network. This immediate reporting generally leads to fast convergence times.

Because each router has a complete and synchronized picture of the network, it is very difficult for routing loops to occur.

Because LSAs are sequenced and aged, routers always base their routing decisions on the most recent set of information.

With careful network design, the link-state database sizes can be minimized, leading to smaller Dijkstra calculations and faster convergence.

Page 201: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-61

When to Use Link-State Routing Protocols This topic describes the caveats to using link-state routing protocols.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

Caveats to Link-State Routing

• Significant demands for resources:– Memory (three tables: adjacency, topology, forwarding)– CPU (Dijkstra’s algorithm can be intensive, especially when

many instabilities are present)• Requires very strict network design • Problems with partitioning of areas• Configuration generally simple, but can be complex

when tuning various parameters and when design is complex• Troubleshooting easier than in distance vector routing

The link-state approach to dynamic routing can be quite useful in networks of any size. In a well-designed network, a link-state routing protocol will enable your network to gracefully adapt to unexpected topological change. When events rather than fixed-interval timers drive updates, convergence begins more quickly after a topological change.

The overhead of the frequent, time-driven updates of a distance vector routing protocol are also avoided. This allows a network to have more bandwidth available for routing traffic rather than for network maintenance, provided the network is designed properly.

A side benefit of the bandwidth efficiency of link-state routing protocols is that they facilitate network scalability better than either static routes or distance vector protocols. When compared with the limitations of static routes or distance vector protocols, link-state routing is clearly best in larger, more complicated networks and in networks that must be highly scalable.

Link-state protocols have the following limitations:

In addition to the routing table, link-state protocols require a topology database, an adjacency database, and a forwarding database. Using all these databases can require a significant amount of memory in large or complex networks.

Dijkstra’s algorithm requires CPU cycles to calculate the best paths through the network. If the network is large or complex (that is, the Dijkstra calculation is complex) or if the network is unstable (that is, the Dijkstra calculation is running on a regular basis), link-state protocols can use a significant amount of CPU power.

To avoid an excessive use of memory or CPU power, a strict hierarchical network design is required, dividing the network into smaller areas to reduce the size of the topology tables and the length of the Dijkstra calculation. However, this division can cause problems

Page 202: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-62 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

because areas must remain contiguous at all times. The routers in an area must always be capable of contacting and receiving LSAs from all other routers in their area. In a multiarea design, an area router must always have a path to the backbone or the router will have no connectivity to the rest of the network. Additionally, the backbone area must remain contiguous at all times to avoid some areas becoming isolated (partitioned).

The configuration of link-state networks is usually simple, provided that the underlying network architecture has been soundly designed. If the network design is complex, the operation of the link-state protocol may have to be tuned to accommodate it. Configuring a link-state protocol in a large network can be challenging.

Troubleshooting is usually easier in link-state networks because every router has a complete copy of the network architecture, or at least a copy of its own area of the network. Nevertheless, interpreting the information that is stored in the topology, neighbor databases, and the routing table requires a good understanding of the concepts of link-state routing.

Link-state protocols usually scale to larger networks than distance vector protocols do, particularly the traditional distance vector protocols such as RIPv1 and IGRP.

Page 203: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-63

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

Drawbacks to Link-State Routing Protocols

• Initial discovery may cause flooding.• Link-state routing is memory- and processor-intensive.

Despite all of its features and flexibility, link-state routing raises the following two potential concerns:

During the initial discovery process, link-state routing protocols can flood the network with LSAs and thereby significantly decrease the capability of the network to transport data. This performance compromise is temporary, but it can be very noticeable. Whether this flooding process noticeably degrades network performance depends on the amount of available bandwidth and the number of routers that must exchange routing information. Flooding in large networks with relatively small links, such as low-bandwidth data-link connection identifiers (DLCIs) on a Frame Relay network, will be much more noticeable than a similar exercise on a small network with large-sized links.

Link-state routing is both memory- and processor-intensive. Consequently, routers that have more configurations are required to support link-state routing than are required to support distance vector routing. This increases the cost of the routers that are configured for link-state routing.

The potential impact on performance of both drawbacks can be addressed and resolved through foresight, planning, and engineering.

Page 204: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-64 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Balanced Hybrid Routing This topic describes the features of balanced hybrid routing.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

• Shares attributes of both distance vector and link-state routing

Balanced Hybrid Routing

Balanced hybrid routing protocols combine aspects of both distance vector and link-state protocols.

The balanced hybrid routing protocol uses distance vectors with more accurate metrics to determine the best paths to destination networks. However, the balanced hybrid routing protocol differs from most distance vector protocols in that it uses topology changes, as opposed to automatic periodic updates, to trigger the routing of database updates.

The balanced hybrid routing protocol converges more rapidly than distance vectors, more like the link-state protocols. However, the balanced hybrid differs from both of these protocols in that it emphasizes economy in the use of required resources, such as bandwidth, memory, and processor overhead.

An example of a balanced hybrid protocol is the Cisco Enhanced Interior Gateway Routing Protocol (EIGRP).

Page 205: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-65

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Summary

• Link-state routing protocols collect routing information from all other routers in the network. After all information is collected, each router calculates its own best path to all destinations in the network.

• Link-state algorithms maintain a complex database of the network topology. Knowledge of the network routers and of how they interconnect is achieved through the exchange of LSAs with other routes in a network.

• Using triggered, flooded updates, link-state protocols can immediately report changes in the network topology, leading to fast convergence times. In contrast, the use of many different databases can require a significant amount of memory.

Page 206: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-66 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

Summary (Cont.)

• To avoid an excessive use of memory, a strict hierarchical network design is required. The configuration of link-state networks should remain simple to avoid tuning.

• Balanced hybrid routing protocols combine aspects of both distance vector and link-state protocols.

Page 207: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 4

Enabling RIP

Overview Routing Information Protocol (RIP) is one of the most enduring of all routing protocols. RIP is a relatively old, but still commonly used, interior gateway protocol created for use in small, homogeneous networks. RIP is a classic distance vector routing protocol. This lesson describes the basic features and operation of RIP and explains how to enable RIP on an IP network.

Objectives Upon completing this lesson, you will be able to enable RIP on an IP network. This ability includes being able to meet these objectives:

Describe the features of RIP

Describe the differences between RIPv1 and RIPv2

Describe the tasks required to enable a dynamic routing protocol on a Cisco router

Configure a dynamic routing protocol on a Cisco router

Configure basic RIP routing

Use the show commands to verify the RIP configuration

Use the debug ip rip command to display RIP routing updates

Page 208: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-68 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

RIP Features This topic describes the features of RIP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

• Maximum is six paths (default = 4)• Hop-count metric selects the path• Routes update every 30 seconds

RIP Overview

The key characteristics of RIP include the following:

RIP is a distance vector routing protocol. Hop count is used as the metric for path selection. The maximum allowable hop count is 15. Routing updates are broadcast every 30 seconds by default. RIP is capable of load-balancing over as many as six equal-cost paths. (Four paths is the

default.)

Page 209: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-69

RIPv1 and RIPv2 Comparison This topic describes the differences between RIPv1 and RIPv2.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

RIPv1 and RIPv2 Comparison

MulticastBroadcastAddressing typeRFCs 1721,

1722, and 2453RFC 1058Defined in …

YesNoSupports manual route summarization?Yes

Yes

YesClassless

RIPv2

NoAuthentication support?

NoSends the subnet mask along with the routing update?

NoSupports variable-length subnet mask?ClassfulRouting protocol

RIPv1

Defining the maximum number of parallel paths allowed in a routing table enables RIP load balancing. With RIP, the paths must be equal-cost paths. If the maximum number of paths is set to one, load balancing is disabled.

Note Cisco routers support RIPv1 and RIPv2. This course focuses on configuring RIPv1 only.

Page 210: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-70 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Dynamic Routing Configuration Tasks This topic describes the tasks that are required to enable a dynamic routing protocol on a Cisco router.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

• Router configuration– Select routing protocols– Specify networks or interfaces

IP Routing Configuration Tasks

To enable a dynamic routing protocol, you must complete the following steps:

Step 1 Select a routing protocol: RIP, Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), or Open Shortest Path First (OSPF).

Step 2 Assign IP network numbers without specifying subnet values (except for OSPF).

Note You must also assign network or subnet addresses and the appropriate subnet mask to the interfaces.

Page 211: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-71

Dynamic Routing Configuration This topic describes the basic commands that are used to configure a dynamic routing protocol on a Cisco router.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

• Defines an IP routing protocol

Router(config)# router protocol [keyword]

• Mandatory configuration command for each IP routing process

• Identifies the physically connected network to which routing updates are forwarded

Router(config-router)# network network-number

Dynamic Routing Configuration

The router command starts a routing process. The following table describes the router command parameters.

router Command Parameters Description

protocol Either RIP, IGRP, OSPF, or EIGRP

keyword Such as autonomous system, which is used with those protocols that require an autonomous system (IGRP and EIGRP); can also identify a local process ID, which is used with OSPF

The network command is required because it allows the routing process to determine which interfaces will participate in the sending and receiving of the routing updates. The network command starts up the routing protocol on all interfaces that the router has in the specified network, and also allows the router to advertise that network. The table provides the description for the network command.

network Command Parameter Description

network-number Specifies a directly connected network

Page 212: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-72 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

RIP Configuration This topic describes how to configure basic RIP routing.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

• Starts the RIP routing process

Router(config)# router rip

Router(config-router)# network network-number

• Selects participating attached networks• Requires a major classful network number

RIP Configuration

The router rip command selects RIP as the routing protocol.

The network command assigns a major network number that the router is directly connected to. The RIP routing process associates interface addresses with the advertised network number and will begin RIP packet processing on the specified interfaces.

Page 213: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-73

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

RIP Configuration Example

Example: RIP Configuration In the example, the router A configuration includes the following:

Router rip: Selects RIP as the routing protocol

Network 172.16.0.0: Specifies a directly connected network

Network 10.0.0.0: Specifies a directly connected network

The router A interfaces that are connected to networks 172.16.0.0 and 10.0.0.0, or their subnets, will send and receive RIP updates. These routing updates allow the routers to learn the network topology.

Routers B and C have similar RIP configurations but with different network numbers specified.

Page 214: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-74 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

RIP Configuration Verification This topic describes how to use show commands to verify the RIP configuration.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

Verifying the RIP Configuration

The show ip protocols command displays values about routing protocols and the routing protocol timer information that is associated with the router.

The table describes the significant fields shown in the display.

Field Description

Routing Protocol is "rip"

Specifies the routing protocol used

Sending updates every 30 seconds

Specifies the time between sending updates

next due in 12 seconds Specifies when the next update is due to be sent

Invalid after 180 seconds

Specifies the value of the invalid parameter

hold down for 180 Specifies the current value of the holddown parameter

flushed after 240 Specifies the time (in seconds) after which the individual routing information will be thrown (flushed) out

Outgoing update Specifies whether the outgoing filtering list has been set

Incoming update Specifies whether the incoming filtering list has been set

Default version control:

Specifies the version of RIP packets that are sent and received

Redistributing Lists the protocol that is being redistributed

Routing Specifies the networks for which the routing process is currently

Page 215: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-75

Field Description

injecting routes

Routing Information Sources

Lists all the routing sources that the Cisco IOS software is using to build its routing table. For each source, you will see the following displayed:

■ IP address

■ Administrative distance

■ Time the last update was received from this source

Example: Verifying the RIP Configuration In the example, router A is configured with RIP and sends updated routing table information every 30 seconds. (This interval is configurable.) If a router running RIP does not receive an update from another router for 180 seconds or more, it marks the routes that are served by that router as being invalid. In the figure, the holddown timer is set to 180 seconds. As a result, an update to a route that was down and is now up will stay in the holddown (possibly down) state until 180 seconds have passed.

If there is still no update after 240 seconds (flush timer), the router removes the routing table entries from the router. In the figure, it has been 18 seconds since router A received an update from router B.

The router is injecting routes for the networks that are listed following the “Routing for Networks” line. The router is receiving routes from the neighboring RIP routers that are listed following the “Routing Information Sources” line.

The distance default of 120 refers to the administrative distance for an RIP route.

You can also use the show ip interface brief command to get a summary of the IP information and status of all interfaces.

Page 216: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-76 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Displaying the IP Routing Table

The show ip route command displays the contents of the IP routing table.

The routing table contains entries for all known networks and subnetworks, and a code that indicates how that information was learned. The output and function of key fields from the show ip route command are explained in the table.

Output Description

R or C Identifies the source of the route. For example, a “C” indicates that the route came from a direct connection of the route to a router interface. An “R” indicates that RIP is the protocol that determined the route.

192.168.1.0 10.2.2.0

Indicates the address of the remote network.

120/1 The first number in the brackets is the administrative distance of the information source; the second number is the metric for the route (here, 1 hop).

via 10.1.1.2 Specifies the address of the next-hop router to the remote network.

00:00:07 Specifies the amount of time since the route was updated (here, 7 seconds).

Serial2 Specifies the interface through which the specified network can be reached.

If routing information is not being exchanged (that is, if the output of the show ip route command shows no entries that were learned from a routing protocol), use the show running-config or show ip protocols privileged EXEC commands on the router to check for a possible misconfigured routing protocol.

Page 217: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-77

RIP Configuration Troubleshooting This topic describes the use of the debug ip rip command.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

debug ip rip Command

Use the debug ip rip command to display RIP routing updates as they are sent and received. The no debug all command turns off all debugging.

The following output indicates the source address from which updates were received:

RIP: received v1 update from 10.1.1.2 on Serial 2

The following output indicates the destination addresses to which updates were sent:

RIP: sending v1 update to 255.255.255.255 via Ethernet0 (172.16.1.1)

RIP: sending v1 update to 255.255.255.255 via Serial2 (10.1.1.1)

Page 218: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-78 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Example: debug ip rip Command The example shows that the router being debugged has received updates from one router at source address 10.1.1.2. That router sent information about two destinations in the routing table update. The router being debugged also sent updates, in both cases to broadcast address 255.255.255.255 as the destination. The number in parentheses is the source address that is encapsulated into the IP header.

Other output that you might see from the debug ip rip command includes entries such as the following:

RIP: broadcasting general request on Ethernet0

RIP: broadcasting general request on Ethernet1

Entries like these can appear at startup or when an event occurs, such as an interface transitioning or a user manually clearing the routing table. The following entry is most likely caused by a malformed packet from the transmitter:

RIP: bad version 128 from 160.89.80.43

Page 219: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-79

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

Summary

• RIP is a distance vector routing protocol that uses hop count as the matrix for route selection and broadcasts updates every 30 seconds.

• RIPv1 uses classful routing protocol; RIPv2 uses classless routing protocol. RIPv2 supports VLSM, manual route summarization, and authentication; RIPv1 does not.

• To enable a dynamic routing protocol, first a routing protocol is selected, then IP network numbers are assigned without values being specified (except OSPF).

• The router command starts the routing process. The networkcommand allows the routing process to determine which interfaces will participate in sending and receiving the routing updates.

Page 220: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-80 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-13

Summary (Cont.)

• The router RIP command selects RIP as the routing protocol. The network command identifies a participating attached network.

• The show ip commands display information about routing protocols and the routing table.

• The debug ip rip command displays information on RIP routing transactions.

Page 221: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 5

Enabling EIGRP

Overview Enhanced Interior Gateway Routing Protocol (EIGRP) is an enhanced version of Interior Gateway Routing Protocol (IGRP) developed by Cisco. EIGRP is suited for many different topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices. This lesson describes how to configure and monitor EIGRP.

Objectives Upon completing this lesson, you will be able to enable EIGRP on an IP network. This ability includes being able to meet these objectives:

Describe the features of EIGRP

Compare EIGRP with IGRP

Configure EIGRP

Verify the EIGRP configuration

Use the debug command to troubleshoot an EIGRP configuration

Page 222: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-82 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

EIGRP Features This topic describes the features of EIGRP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

Introducing EIGRP

EIGRP supports:• Rapid convergence• Reduced bandwidth usage• Multiple network-layer protocols

In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal network traffic. Some of the features of EIGRP are as follows:

EIGRP has rapid convergence times for changes in the network topology. In some situations, convergence can be almost instantaneous. EIGRP uses the Diffusing Update Algorithm (DUAL) to achieve rapid convergence. A router that is running EIGRP stores backup routes for destinations when they are available so that it can quickly adapt to alternate routes. If no appropriate route or backup route exists in the local routing table, EIGRP queries its neighbors to discover an alternate route. These queries are propagated until an alternate route is found.

EIGRP has very low usage of network resources during normal operation; only hello packets are transmitted on a stable network. Like other link-state routing protocols, EIGRP uses EIGRP hello packets to establish relationships with neighboring EIGRP routers. Each router builds a neighbor table from the hello packets that it receives from adjacent EIGRP routers. EIGRP does not send periodic routing updates like IGRP does. When a change occurs, only routing table changes are propagated, not the entire routing table. And when only changes are propagated, the bandwidth that is required for EIGRP packets is minimized, which reduces the load that the routing protocol itself places on the network.

EIGRP supports automatic (classful) route summarization at major network boundaries as the default. However, unlike other classful routing protocols, such as IGRP and Routing Information Protocol (RIP), manual route summarization can be configured on arbitrary network boundaries to reduce the size of the routing table.

Page 223: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-83

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

EIGRP Terminology

The table summarizes several terms related to EIGRP.

Term Definition

Neighbor table (AppleTalk, Internetwork Packet Exchange (IPX), IPv6, IPv4)

Each EIGRP router maintains a neighbor table that lists adjacent routers. This table is comparable to the adjacencies database used by OSPF, and it serves the same purpose (to ensure bidirectional communication between each of the directly connected neighbors). There is a neighbor table for each protocol that EIGRP supports.

Topology table (AppleTalk, IPX, IPv6, IPv4)

Each EIGRP router maintains a topology table for each configured routing protocol. This table includes route entries for all destinations that the router has learned. All learned routes to a destination are maintained in the topology table.

Routing table (AppleTalk, IPX, IPv6, IPv4)

EIGRP chooses the best (successor) routes to a destination from the topology table and places these routes in the routing table. The router maintains one routing table for each network protocol.

Successor A successor is a route selected as the primary route to reach a destination. Successors are the entries kept in the routing table.

Feasible successor A feasible successor is considered a backup route. Backup routes are selected at the same time that the successors are identified; however, these routes are kept in a topology table. Multiple feasible successors for a destination can be retained.

Page 224: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-84 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

EIGRP and IGRP Comparison This topic compares EIGRP with IGRP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

Comparing EIGRP and IGRP

• Same metric• Same load balancing• Improved convergence time (EIGRP)• Reduced network overhead (EIGRP)

EIGRP uses metric calculations and path load balancing similar to IGRP. However, EIGRP has substantially improved convergence properties and operating efficiency compared with IGRP. Although the metric (bandwidth and delay, by default) is the same for both IGRP and EIGRP, the weight assigned to the metric is 255 times greater for EIGRP.

The convergence technology, which is based on research conducted at SRI International, employs DUAL. This algorithm guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. The convergence time with DUAL rivals that of any other existing routing protocol.

Note The Cisco IOS software does not support IGRP. IGRP is discussed simply as a comparison to EIGRP.

Page 225: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-85

EIGRP Configuration This topic describes how to configure EIGRP.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

Configuring EIGRP

Router(config-router)# network network-number

• Selects participating attached networks

Router(config)# router eigrp autonomous-system

• Defines EIGRP as the IP routing protocol

Use the router eigrp and network commands to create an EIGRP routing process. Note that EIGRP requires an autonomous system number. The autonomous system number does not have to be registered. However, all routers within an autonomous system must use the same autonomous system number; otherwise, they will not exchange routing information.

The network command assigns a major network number that the router is directly connected to. The EIGRP routing process associates interface addresses with the advertised network number and will begin EIGRP packet processing on the specified interfaces.

Page 226: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-86 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

EIGRP Configuration Example

Example: EIGRP Configuration The following table applies to EIGRP configurations on router A in the EIGRP configuration example.

Command Description

router eigrp 100 Enables the EIGRP routing process for autonomous system 100

network 172.16.0.0 Associates network 172.16.0.0 with the EIGRP routing process

network 10.0.0.0 Associates network 10.0.0.0 with the EIGRP routing process

EIGRP sends updates out the interfaces in networks 10.0.0.0 and 172.16.0.0. The updates include information about networks 10.0.0.0 and 172.16.0.0 and any other networks that EIGRP learns about.

Page 227: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-87

EIGRP Configuration Verification This topic describes how to verify the EIGRP configuration.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

Verifying the EIGRP Configuration

Router# show ip eigrp interfaces

• Displays information about interfaces configured for EIGRP

Router# show ip eigrp interfacesIP EIGRP interfaces for process 109

Xmit Queue Mean Pacing Time Multicast Pending Interface Peers Un/Reliable SRTT Un/Reliable Flow Timer Routes Di0 0 0/0 0 11/434 0 0 Et0 1 0/0 337 0/10 0 0 SE0:1.16 1 0/0 10 1/63 103 0 Tu0 1 0/0 330 0/16 0 0

Router# show ip protocols

Router# show ip route eigrp

• Displays current EIGRP entries in the routing table

• Displays the parameters and current state of the active process

The show ip route eigrp command displays the current EIGRP entries in the routing table.

The show ip protocols command displays the parameters and current state of the active routing protocol process. This command shows the EIGRP autonomous system number. It also displays filtering and redistribution numbers and neighbors and distance information.

Use the show ip eigrp interfaces command to determine on which interfaces EIGRP is active, and to learn information about EIGRP relating to those interfaces. If you specify an interface, only that interface is displayed. Otherwise, all interfaces on which EIGRP is running are displayed. If you specify an autonomous system, only the routing process for the specified autonomous system is displayed. Otherwise, all EIGRP processes are displayed.

The table describes the significant fields shown in the example.

Field Description

Interface Interface over which EIGRP is configured

Peers Number of directly connected EIGRP neighbors

Xmit Queue Un/Reliable Number of packets remaining in the Unreliable and Reliable queues

Mean SRTT Mean smoothed round trip time (SRTT) interval (in milliseconds)

Pacing Time Un/Reliable Pacing time used to determine when EIGRP packets should be sent out the interface (unreliable and reliable packets)

Multicast Flow Timer Maximum number of seconds in which the router will send multicast EIGRP packets

Page 228: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-88 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Field Description

Pending Routes Number of routes in the packets in the transmit queue waiting to be sent

Page 229: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-89

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

Verifying the EIGRP Configuration (Cont.)

Router# show ip eigrp neighbors

• Displays the neighbors discovered by IP EIGRP

Router# show ip eigrp neighborsIP-EIGRP Neighbors for process 77Address Interface Holdtime Uptime Q Seq SRTT RTO

(secs) (h:m:s) Count Num (ms) (ms)172.16.81.28 Ethernet1 13 0:00:41 0 11 4 20172.16.80.28 Ethernet0 14 0:02:01 0 10 12 24172.16.80.31 Ethernet0 12 0:02:02 0 4 5 20

Router# show ip eigrp neighbors detailIP-EIGRP neighbors for process 101H Address Interface Hold Uptime SRTT RTO Q Seq Tye

(sec) (ms) Cnt Num3 1.1.1.3 Et0/0 12 00:04:48 1832 5000 0 14

Version 12.2/1.2, Retrans:0, Retries:0Restart time 00:01:05

0 10.4.9.5 Fa0/0 11 00:04:07 768 4608 0 4 SVersion 12.2/1.2, Retrans: 0, Retries: 0

2 10.4.9.10 Fa0/0 13 1w0d 1 3000 0 6 SVersion 12.2/1.2, Retrans: 1, Retries: 0

1 10.4.9.6 Fa0/0 12 1w0d 1 3000 0 4 SVersion 12.2/1.2, Retrans: 1, Retries: 0

Use the show ip eigrp neighbors command to display the neighbors discovered by EIGRP and to determine when neighbors become active and inactive. It is also useful for debugging certain types of transport problems.

show ip eigrp neighbors Example The table describes the significant fields for the show ip eigrp neighbors command.

Field Description

process 77 Autonomous system number specified in the router configuration command.

Address IP address of the EIGRP peer.

Interface Interface on which the router is receiving hello packets from the peer.

Holdtime Length of time (in seconds) that the Cisco IOS software will wait to hear from the peer before declaring it down. If the peer is using the default hold time, this number will be less than 15. If the peer configures a nondefault hold time, the nondefault hold time will be displayed.

Uptime Elapsed time (in hours:minutes:seconds) since the local router first heard from this neighbor.

Q Count Number of EIGRP packets (update, query, and reply) that the software is waiting to send.

Seq Num Sequence number of the last update, query, or reply packet that was received from this neighbor.

SRTT Smoothed round trip time. This is the number of milliseconds required for an EIGRP packet to be sent to this neighbor and for the local router to receive an acknowledgment of that packet.

RTO Retransmission timeout (in milliseconds). This is the amount of time

Page 230: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-90 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Field Description

the software waits before resending a packet from the retransmission queue to a neighbor.

show ip eigrp neighbors detail Example The table describes the significant fields for the show ip eigrp neighbors detail command.

Field Description

process 77 Autonomous system number specified in the router configuration command.

H This column lists the order in which a peering session was established with the specified neighbor. The order is specified with sequential numbering starting with 0.

Address IP address of the EIGRP peer.

Interface Interface on which the router is receiving hello packets from the peer.

Holdtime Length of time (in seconds) that the Cisco IOS software will wait to hear from the peer before declaring it down. If the peer is using the default hold time, this number will be less than 15. If the peer configures a nondefault hold time, the nondefault hold time will be displayed.

Uptime Elapsed time (in hours:minutes:seconds) since the local router first heard from this neighbor.

Q Count Number of EIGRP packets (update, query, and reply) that the software is waiting to send.

Seq Num Sequence number of the last update, query, or reply packet that was received from this neighbor.

SRTT Smoothed round trip time. This is the number of milliseconds required for an EIGRP packet to be sent to this neighbor and for the local router to receive an acknowledgment of that packet.

RTO Retransmission timeout (in milliseconds). This is the amount of time the software waits before resending a packet from the retransmission queue to a neighbor.

Version The software version that the specified peer is running.

Retrans The number of times that a packet has been retransmitted.

Retries The number of times an attempt was made to retransmit a packet.

Restart time Elapsed time (in hours:minutes:seconds) since the specified neighbor has restarted.

Page 231: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-91

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Verifying the EIGRP Configuration (Cont.)

Router# show ip eigrp topology

• Displays the IP EIGRP topology table

Router# show ip eigrp topologyIP-EIGRP Topology Table for process 77Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,

r - Reply statusP 172.16.90.0 255.255.255.0, 2 successors, FD is 0

via 172.16.80.28 (46251776/46226176), Ethernet0via 172.16.81.28 (46251776/46226176), Ethernet1via 172.16.80.31 (46277376/46251776), Serial0

P 172.16.81.0 255.255.255.0, 1 successors, FD is 307200via Connected, Ethernet1via 172.16.81.28 (307200/281600), Ethernet1via 172.16.80.28 (307200/281600), Ethernet0via 172.16.80.31 (332800/307200), Serial0

The show ip eigrp topology command displays the EIGRP topology table, the active or passive state of routes, the number of successors, and the feasible distance to the destination.

The table describes the significant fields for the show ip eigrp topology command output.

Field Description

Codes State of this topology table entry. Passive and Active refer to the EIGRP state with respect to this destination; Update, Query, and Reply refer to the type of packet that is being sent.

P - Passive No EIGRP computations are being performed for this destination.

A - Active EIGRP computations are being performed for this destination.

U - Update Indicates that an update packet was sent to this destination.

Q - Query Indicates that a query packet was sent to this destination.

R - Reply Indicates that a reply packet was sent to this destination.

r - Reply status Flag that is set after the software has sent a query and is waiting for a reply.

172.16.90.0 Destination IP network number.

255.255.255.0 Destination subnet mask.

successors Number of successors. This number corresponds to the number of next hops in the IP routing table. If "successors" is capitalized, then the route or next hop is in a transition state.

FD Feasible distance. The feasible distance is the best metric to reach the destination or the best metric that was known when the route went active. This value is used in the feasibility condition check. If the reported distance of the router (the metric after the slash) is less than the feasible distance, the feasibility condition is met and that path is a feasible successor. Once the software determines it has a feasible successor, it need not send a query for that destination.

Page 232: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-92 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Field Description

replies Number of replies that are still outstanding (have not been received) with respect to this destination. This information appears only when the destination is in Active state.

state Exact EIGRP state that this destination is in. It can be the number 0, 1, 2, or 3. This information appears only when the destination is in the active state.

via IP address of the peer that told the software about this destination. The first n of these entries, where N is the number of successors, are the current successors. The remaining entries on the list are feasible successors.

(46251776/46226176) The first number is the EIGRP metric that represents the cost to the destination. The second number is the EIGRP metric that this peer advertised.

Ethernet0 Interface from which this information was learned.

Serial0 Interface from which this information was learned.

Page 233: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-93

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

Verifying the EIGRP Configuration (Cont.)

Router# show ip eigrp traffic

• Displays the number of IP EIGRP packets sent and received

Router# show ip eigrp trafficIP-EIGRP Traffic Statistics for process 77

Hellos sent/received: 218/205Updates sent/received: 7/23Queries sent/received: 2/0Replies sent/received: 0/2Acks sent/received: 21/14

The show ip eigrp traffic command displays the number of packets sent and received.

The table describes the fields that might be shown in the display.

Field Description

process 77 Autonomous system number specified in the ip router command

Hellos sent/received Number of hello packets that were sent and received

Updates sent/received Number of update packets that were sent and received

Queries sent/received Number of query packets that were sent and received

Replies sent/received Number of reply packets that were sent and received

Acks sent/received Number of acknowledgment packets that were sent and received

Page 234: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-94 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

EIGRP Configuration Troubleshooting This topic describes using the debug command to troubleshoot an EIGRP configuration.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

debug ip eigrp Command

Router# debug ip eigrpIP-EIGRP: Processing incoming UPDATE packetIP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -256000 104960IP-EIGRP: Ext 192.168.0.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -256000 104960IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -256000 104960IP-EIGRP: 172.69.43.0 255.255.255.0, - do advertise out Ethernet0/1IP-EIGRP: Ext 172.69.43.0 255.255.255.0 metric 371200 - 256000 115200IP-EIGRP: 192.135.246.0 255.255.255.0, - do advertise out Ethernet0/1IP-EIGRP: Ext 192.135.246.0 255.255.255.0 metric 46310656 - 45714176 596480IP-EIGRP: 172.69.40.0 255.255.255.0, - do advertise out Ethernet0/1IP-EIGRP: Ext 172.69.40.0 255.255.255.0 metric 2272256 - 1657856 614400IP-EIGRP: 192.135.245.0 255.255.255.0, - do advertise out Ethernet0/1IP-EIGRP: Ext 192.135.245.0 255.255.255.0 metric 40622080 - 40000000 622080IP-EIGRP: 192.135.244.0 255.255.255.0, - do advertise out Ethernet0/1

The debug ip eigrp privileged EXEC command helps you analyze the packets that are sent and received on an interface. Because the debug ip eigrp command generates a substantial amount of output, use it only when traffic on the network is light.

The table describes the fields in the sample output from the debug ip eigrp command.

Field Description

IP-EIGRP: Indicates that this is an IP EIGRP packet.

Ext Indicates that the following address is an external destination rather than an internal destination, which would be labeled as “Int”.

M Displays the computed metric, which includes SM and the cost between this router and the neighbor. The first number is the composite metric. The next two numbers are the inverse bandwidth and the delay, respectively.

SM Displays the metric as reported by the neighbor.

Page 235: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-95

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-13

Summary

• EIGRP is an interior gateway protocol that scales well and provides quick convergence times with minimal network traffic.

• EIGRP is an enhanced version of IGRP developed by Cisco, with improved convergence properties and operating efficiency over IGRP.

• The router eigrp and network commands can be used to create an EIGRP routing process.

• The show ip eigrp commands can be used to verify the EIGRP configuration.

• The debug ip eigrp privileged EXEC command can be used to display information on EIGRP packets.

Page 236: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-96 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Page 237: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 6

Enabling OSPF

Overview Open Shortest Path First (OSPF) is an interior gateway protocol and a classless link-state routing protocol. Because OSPF is widely deployed, knowledge of its configuration and maintenance is essential. This lesson describes the function of OSPF and explains how to configure a single-area OSPF network on a Cisco router.

Objectives Upon completing this lesson, you will be able to enable OSPF on an IP network. This ability includes being able to meet these objectives:

Describe the features of OSPF

Compare OSPF routing with distance vector routing

Describe how OSPF uses hierarchical routing to separate a large internetwork into separate areas

Describe the SPF algorithm

Configure OSPF with a single area

Modify the OSPF router ID to a loopback address

Use the various show commands to verify an OSPF configuration

Use the debug commands to troubleshoot an OSPF configuration

Page 238: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-98 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

OSPF Features This topic describes the features of OSPF.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

Introducing OSPF

• Open standard• Shortest path first (SPF) algorithm• Link-state routing protocol (vs. distance vector)

OSPF is a routing protocol developed for IP networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). Similar to Interior Gateway Routing Protocol (IGRP), OSPF was created in the mid-1980s because Routing Information Protocol (RIP) was increasingly incapable of serving large, heterogeneous internetworks. OSPF routes packets within a single autonomous system.

OSPF has these two primary characteristics:

The protocol is an open standard, which means that its specification is in the public domain. The OSPF specification is published as an RFC. The most recent version, known as OSPF version 2, is described in RFC 2328.

OSPF is based on the shortest path first (SPF) algorithm.

Page 239: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-99

OSPF and Distance Vector Routing Protocol Comparison

This topic compares OSPF routing with distance vector routing.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

OSPF as a Link-State Protocol

• OSPF propagates link-state advertisements rather than routing table updates. – Link = router interface– State = description of an interface and its relationship to

neighboring routers• LSAs are flooded to all OSPF routers in the area.• The OSPF link-state database is pieced together from the LSAs

generated by the OSPF routers. • OSPF uses the SPF algorithm to calculate the shortest path to a

destination.

OSPF is a link-state routing protocol, whereas RIP and IGRP are distance vector routing protocols. Routers that are running distance vector algorithms send all or a portion of their routing tables in routing-update messages to their neighbors.

You can think of a link as an interface on a router. The state of the link is a description of that interface and of its relationship to its neighboring routers. A description of the interface would include, for example, the IP address of the interface, the subnet mask, the type of network to which it is connected, the routers connected to that network, and so on. The collection of all these link states forms a link-state database.

A router sends link-state advertisement (LSA) packets to advertise its state periodically and when the router state changes. Information about attached interfaces, metrics used, and other variables are included in OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node.

A topological (link-state) database is, essentially, an overall picture of networks in relation to routers. The topological database contains the collection of LSAs received from all routers in the same area. Because routers within the same area share the same information, they have identical topological databases.

Page 240: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-100 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

OSPF can operate within a hierarchy. The largest entity within the hierarchy is the autonomous system, which is a collection of networks under a common administration that share a common routing strategy. An autonomous system can be divided into a number of areas, which are groups of contiguous networks and attached hosts.

Page 241: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-101

Hierarchical Routing This topic describes how OSPF uses hierarchical routing to separate a large internetwork into multiple areas.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

OSPF Hierarchical Routing

• Consists of areas and autonomous systems• Minimizes routing update traffic

The ability of OSPF to separate a large internetwork, or autonomous system, into smaller internetworks called areas is referred to as hierarchical routing.

With this technique, routing still occurs between the areas (called interarea routing), but many of the minute internal routing operations, such as recalculating the database, are kept within an area.

Example: OSPF Hierarchical Routing In the figure, if area 1 is having problems with a link going up and down, routers in other areas need not continually run their SPF calculation, because they are isolated from the area 1 problem.

The hierarchical topology possibilities of OSPF have the following important advantages:

Reduced frequency of SPF calculations

Smaller routing tables

Reduced link-state update overhead

Page 242: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-102 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Shortest Path First Algorithm This topic describes the SPF algorithm.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

Shortest Path First Algorithm

• Places each router at the root of a tree and calculates the shortest path to each destination based on the cumulative cost

• Cost = 108/bandwidth (bps)

The SPF algorithm places each router at the root of a tree and calculates the shortest path to each node, using Dijkstra’s algorithm, based on the cumulative cost that is required to reach that destination. LSAs are flooded throughout the area using a reliable algorithm, which ensures that all routers in an area have exactly the same topological database. Each router uses the information in its topological database to calculate a shortest path tree, with itself as the root. The router then uses this tree to route network traffic. In the figure, router A is the root.

Each router has its own view of the topology, even though all the routers build a shortest-path tree using the same link-state database.

The cost, or metric, of an interface is an indication of the overhead that is required to send packets across a certain interface. The cost of an interface is inversely proportional to the bandwidth of that interface, so a higher bandwidth indicates a lower cost. There is more overhead, higher cost, and more time delays involved in crossing a 56-kbps serial line than in crossing a 10-Mbps Ethernet line.

The default formula used to calculate OSPF cost is:

cost = 100,000,000 / bandwidth in bps

For example, it will cost 108/107 = 10 to cross a 10-Mbps Ethernet line, and it will cost 108/1,544,000 = 64 to cross a T1 line.

Page 243: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-103

Single-Area OSPF Configuration This topic describes how to configure a single-area OSPF.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

Configuring Single-Area OSPF

Router(config-router)# network wildcard-mask area area-id

• Assigns networks to a specific OSPF area

Router(config)# router ospf process-id

• Defines OSPF as the IP routing protocol

The router ospf command takes a process identifier as an argument. The process ID is a unique, arbitrary number that you select to identify the routing process. The process ID does not need to match the OSPF process ID on other OSPF routers.

The network command identifies which IP networks on the router are part of the OSPF network. For each network, you must also identify the OSPF area that the networks belong to. The network command takes the three arguments listed in the table.

The table defines the parameters of the network command.

router ospf Command Parameters

Description

address Can be the network, subnet, or interface address.

wildcard-mask Wildcard mask. This mask identifies the part of the IP address that is to be matched, where 0 is a match and 1 is “do not care.” For example, a wildcard mask of 0.0.0.0 indicates a match of all 32 bits in the address.

area-id Area that is to be associated with the OSPF address range. It can be specified either as a decimal value or in dotted-decimal notation.

Page 244: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-104 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

OSPF Configuration Example

Example: OSPF Configuration Router B has specified 100 as the local process ID for the OSPF routing process. Addresses that begin with 10 as the first octet are assigned to area 0 (the backbone area). In this case, both the S2 and the S3 interface on router B will be in OSPF area 0. Both routers A and C will have similar configurations specifying addresses in area 0.

Routers that share a common segment become neighbors on that segment. In the figure, routers A and C are neighbors of router B, but not of each other.

A router uses the OSPF hello protocol to establish neighbor relationships. Hello packets also act as keepalives to let routers know that other routers are still functional.

On multi-access networks (networks supporting more than two routers) such as Ethernet networks, the hello protocol elects a designated router (DR) and a backup designated router (BDR). Among other things, the designated router is responsible for generating LSAs for the entire multi-access network. Designated routers allow a reduction in routing update traffic and manage link-state synchronization. The DR and BDR are elected based on the OSPF priority and OSPF router ID. In nonmulti-access networks, such as a point-to-point serial link, there will not be a DR or BDR elected.

Calculating wildcard masks on non-8-bit boundaries can be error-prone. You can avoid calculating wildcard masks by having a network statement that matches the IP address on each interface.

Page 245: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-105

Loopback Interfaces This topic describes how to modify the OSPF router ID to a loopback address.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

Router ID• Number by which the router is known to OSPF• Default: The highest IP address on an active interface at the moment of OSPF

process startup• Can be overridden by a loopback interface: Highest IP address of any active

loopback interface• Can be set manually using the router-id command

Configuring Loopback Interfaces

To modify the OSPF router ID to a loopback address, first define a loopback interface with the following command:

Router(config)# interface loopback number

The highest IP address, used as the router ID, can be overridden by configuring an IP address on a loopback interface. OSPF is more reliable if a loopback interface is configured because the interface is always active and cannot be in a down state like a real interface. For this reason, the loopback address should be used on all key routers. If the loopback address is going to be published with the network area command, using a private IP address will save on registered IP address space. Note that a loopback address requires a different subnet for each router, unless the host address itself is advertised.

Using an address that is not advertised saves on real IP address space, but unlike an address that is advertised, the unadvertised address does not appear in the OSPF table and therefore cannot be pinged. Therefore, using a private IP address represents a trade-off between the ease of debugging the network and conservation of address space.

Page 246: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-106 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

OSPF Configuration Verification This topic describes how to verify an OSPF configuration using a few of the show commands.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Verifying the OSPF Configuration

Router# show ip protocols

• Verifies that OSPF is configured

Router# show ip route

• Displays all the routes learned by the router

Router# show ip route

Codes: I - IGRP derived, R - RIP derived, O - OSPF derived, C - connected, S - static, E - EGP derived, B - BGP derived, E2 - OSPF external type 2 route, N1 - OSPF NSSA external type 1 route, N2 - OSPF NSSA external type 2 route

Gateway of last resort is 10.119.254.240 to network 10.140.0.0

O E2 10.110.0.0 [160/5] via 10.119.254.6, 0:01:00, Ethernet2 E 10.67.10.0 [200/128] via 10.119.254.244, 0:02:22, Ethernet2 O E2 10.68.132.0 [160/5] via 10.119.254.6, 0:00:59, Ethernet2 O E2 10.130.0.0 [160/5] via 10.119.254.6, 0:00:59, Ethernet2 E 10.128.0.0 [200/128] via 10.119.254.244, 0:02:22, Ethernet2 . . .

You can use any one of a number of show commands to display information about an OSPF configuration. The show ip protocols command displays parameters about timers, filters, metrics, networks, and other information for the entire router.

The show ip route command displays the routes that are known to the router and how they were learned. This command is one of the best ways to determine connectivity between the local router and the rest of the internetwork.

The table describes the significant fields shown in the show ip route display.

Page 247: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-107

Field Description

O Indicates the protocol that derived the route. It can be one of the following values:

I—IGRP-derived

R—RIP-derived

O—OSPF-derived

C—connected

S—static

E—Exterior Gateway Protocol (EGP)-derived

B—Border Gateway Protocol (BGP)-derived

D—Enhanced Interior Gateway Routing Protocol-(EIGRP)

EX—EIGRP external

i— Intermediate System-to-Intermediate System (IS-IS)-derived

ia—IS-IS

M—mobile

P—periodic downloaded static route

U—per-user static route

o—on-demand routing

E2 Type of route. It can be one of the following values:

*—Indicates the last path used when a packet was forwarded. It pertains only to the nonfast-switched packets. However, it does not indicate which path will be used next when forwarding a nonfast-switched packet, except when the paths are equal cost.

IA—OSPF interarea route

E1—OSPF external type 1 route

E2—OSPF external type 2 route

L1—IS-IS level 1 route

L2—IS-IS level 2 route

N1—OSPF not-so-stubby area (NSSA) external type 1 route

N2—OSPF NSSA external type 2 route

172.150.0.0 Indicates the address of the remote network.

[160/5] The first number in the brackets is the administrative distance of the information source; the second number is the metric for the route.

via 10.119.254.6 Specifies the address of the next router to the remote network.

0:01:00 Specifies the last time the route was updated (in hours:minutes:seconds).

Ethernet2 Specifies the interface through which the specified network can be reached.

Page 248: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-108 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

Router# show ip ospf interface

Verifying the OSPF Configuration (Cont.)

• Displays area ID and adjacency information

Router# show ip ospf interface ethernet 0

Ethernet 0 is up, line protocol is up Internet Address 192.168.254.202, Mask 255.255.255.0, Area 0.0.0.0 AS 201, Router ID 192.168.99.1, Network Type BROADCAST, Cost: 10Transmit Delay is 1 sec, State OTHER, Priority 1 Designated Router id 192.168.254.10, Interface address 192.168.254.10 Backup Designated router id 192.168.254.28, Interface addr 192.168.254.28 Timer intervals configured, Hello 10, Dead 60, Wait 40, Retransmit 5 Hello due in 0:00:05 Neighbor Count is 8, Adjacent neighbor count is 2

Adjacent with neighbor 192.168.254.28 (Backup Designated Router)Adjacent with neighbor 192.168.254.10 (Designated Router)

The show ip ospf interface command verifies that interfaces have been configured in the intended areas. If no loopback address is specified, the interface with the highest address is chosen as the router ID. This command also displays the timer intervals, including the hello interval, and shows the neighbor adjacencies.

The table describes the significant fields for the show ip ospf interface command output.

Field Description

Ethernet Status of physical link and operational status of protocol

Internet Address Interface IP address, subnet mask, and area address

AS Autonomous system number (OSPF process ID), router ID, network type, link-state cost

Transmit Delay Transmit delay, interface state, and router priority

Designated Router Designated router ID and respective interface IP address

Backup Designated router Backup designated router ID and respective interface IP address

Timer intervals configured Configuration of timer intervals

Hello Number of seconds until next hello packet is sent out this interface

Neighbor Count Count of network neighbors and list of adjacent neighbors

Page 249: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-109

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

Verifying the OSPF Configuration (Cont.)

Router# show ip ospf neighbor

• Displays OSPF neighbor information on a per-interface basis

Router# show ip ospf neighbor

ID Pri State Dead Time Address Interface 10.199.199.137 1 FULL/DR 0:00:31 192.168.80.37 Ethernet0 172.16.48.1 1 FULL/DROTHER 0:00:33 172.16.48.1 Fddi0 172.16.48.200 1 FULL/DROTHER 0:00:33 172.16.48.200 Fddi0 10.199.199.137 5 FULL/DR 0:00:33 172.16.48.189 Fddi0

The show ip ospf neighbor command displays OSPF neighbor information on a per-interface basis.

The figure shows example output from the show ip ospf neighbor command showing a single line of summary information for each neighbor.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-13

Verifying the OSPF Configuration (Cont.)

Router# show ip ospf neighbor 10.199.199.137 Neighbor 10.199.199.137, interface address 192.168.80.37 In the area 0.0.0.0 via interface Ethernet0 Neighbor priority is 1, State is FULL Options 2 Dead timer due in 0:00:32 Link State retransmission due in 0:00:04 Neighbor 10.199.199.137, interface address 172.16.48.189 In the area 0.0.0.0 via interface Fddi0 Neighbor priority is 5, State is FULL Options 2 Dead timer due in 0:00:32 Link State retransmission due in 0:00:03

Router# show ip ospf neighbor detail Neighbor 192.168.5.2, interface address 10.225.200.28 In the area 0 via interface GigabitEthernet1/0/0 Neighbor priority is 1, State is FULL, 6 state changes DR is 10.225.200.28 BDR is 10.225.200.30 Options is 0x42

LLS Options is 0x1 (LR), last OOB-Resync 00:03:08 ago Dead timer due in 00:00:36 Neighbor is up for 00:09:46 Index 1/1, retransmission queue length 0, number of retransmission 1 First 0x0(0)/0x0(0) Next 0x0(0)/0x0(0) Last retransmission scan length is 1, maximum is 1 Last retransmission scan time is 0 msec, maximum is 0 msec

The table describes the significant fields for the show ip ospf neighbor command output.

Page 250: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-110 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Field Description

Neighbor Neighbor router ID.

interface address IP address of the interface.

In the area Area and interface through which the OSPF neighbor is known.

Neighbor priority Router priority of the neighbor, neighbor state.

State OSPF state.

state changes Number of state changes since the neighbor was created. This value can be reset using the clear ip ospf counters neighbor command.

DR is Router ID of the designated router for the interface.

BDR is Router ID of the backup designated router for the interface.

Options Hello packet options field contents. (E-bit only. Possible values are 0 and 2; 2 indicates area is not a stub; 0 indicates area is a stub.)

LLS Options..., last OOB-Resync Link-local Signaling (LLS) and out-of-band (OOB) link-state database resynchronization performed hours:minutes:seconds ago (Nonstop Forwarding [NSF] information). The field indicates the last successful out-of-band resynchronization with the NSF-capable router.

Dead timer due in Expected time before Cisco IOS software will declare the neighbor dead.

Neighbor is up for Number of hours:minutes:seconds since the neighbor went into two-way state.

Index Neighbor location in the area-wide and autonomous system-wide retransmission queue.

retransmission queue length Number of elements in the retransmission queue.

number of retransmission Number of times update packets have been resent during flooding.

First Memory location of the flooding details.

Next Memory location of the flooding details.

Last retransmission scan length Number of LSAs in the last retransmission packet.

maximum Maximum number of LSAs sent in any retransmission packet.

Last retransmission scan time Time taken to build last retransmission packet.

maximum Maximum time taken to build any retransmission packet.

Page 251: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-111

OSPF Configuration Troubleshooting This topic describes the debug commands used to troubleshoot an OSPF configuration.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-14

OSPF debug Commands

Router# debug ip ospf events

OSPF:hello with invalid timers on interface Ethernet0hello interval received 10 configured 10net mask received 255.255.255.0 configured 255.255.255.0dead interval received 40 configured 30Router# debug ip ospf packet

OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.117aid:0.0.0.0 chk:6AB2 aut:0 auk:

Router# debug ip ospf packet

OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0

The debug ip ospf events output that is shown in the figure might appear if any of the following situations occur:

The IP subnet masks for routers on the same network do not match.

The OSPF hello interval for the router does not match that configured for a neighbor.

The OSPF dead interval for the router does not match that configured for a neighbor.

If a router configured for OSPF routing is not seeing an OSPF neighbor on an attached network, perform the following tasks:

Make sure that both routers have been configured with the same IP mask, OSPF hello interval, and OSPF dead interval.

Make sure that both neighbors are part of the same area type.

In the following example line, the neighbor and this router are not both part of a stub area (that is, one is a part of a transit area and the other is a part of a stub area, as explained in RFC 1247):

OSPF: hello packet with mismatched E bit

To display information about each OSPF packet received, use the debug ip ospf packet privileged EXEC command. The no form of this command disables debugging output.

Page 252: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-112 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

The debug ip ospf packet command produces one set of information for each packet received. The output varies slightly depending on which authentication is used. The table shows sample output from the debug ip ospf packet command when Message Digest 5 (MD5) authentication is used.

The table describes the fields shown in the debug ip ospf packet display.

Field Description

v: OSPF version

t: OSPF packet type; possible packet types are as follows: 1: Hello 2: Data description 3: Link-state request 4: Link-state update 5: Link-state acknowledgment

l: OSPF packet length in bytes

rid: OSPF router ID

aid: OSPF area ID

chk: OSPF checksum

aut: OSPF authentication type; possible authentication types are as follows: 0: No authentication 1: Simple password 2: MD5

auk: OSPF authentication key

keyid: MD5 key ID

seq: Sequence number

Page 253: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-113

Summary This topic summarizes the key points discussed in this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-15

Summary

• OSPF is an interior gateway protocol similar to IGRP, but based on link states rather than distance vectors.

• OSPF advertises information about each of its links rather than sending routing table updates like a distance vector protocol does.

• Hierarchical routing enables separation of a large internetwork into smaller internetworks, called areas.

• The SPF algorithm places each router at the root of a tree and calculates the shortest path to each destination based on the cumulative cost required to reach that destination.

Page 254: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-114 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-16

Summary (Cont.)

• The router ospf command starts an OSPF routing process. The network command is used to associate addresses to an OSPF area.

• The interface loopback command is used to modify the OSPF router ID to a loopback address.

• Any one of a number of show commands can be used to display information about an OSPF configuration.

• The debug ip ospf events privileged EXEC command can be used to display information on OSPF-related events, such as adjacencies, flooding information, designated router selection, and SPF calculation.

Page 255: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

Lesson 7

Implementing Variable-Length Subnet Masks

Overview Variable-length subnet masks (VLSMs) were developed to allow multiple levels of subnetworked IP addresses within a single network. This strategy can be used only when it is supported by the routing protocol in use, such as Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). VLSM is a key technology on large routed networks. Understanding the capabilities of VLSM is important when planning large networks. This lesson describes the capabilities of VLSMs.

Objectives Upon completing this lesson, you will be able to describe the operation of VLSMs on Cisco routers. This ability includes being able to meet these objectives:

Describe the benefits of VLSMs

Describe the process to calculate VLSMs

Explain the route summarization process

Describe the implementation considerations for route summarization

Explain how Cisco routers manage route summarization

Page 256: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-116 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLSM Benefits This topic describes the benefits of VLSMs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-3

What Is a Variable-Length Subnet Mask?

• Subnet 172.16.14.0/24 is divided into smaller subnets– Subnet with one mask (/27)– Then further subnet one of the unused /27 subnets into multiple /30 subnets

VLSMs provide the ability to include more than one subnet mask within a network and the ability to subnet an already subnetted network address. VLSM offers the following benefits:

More efficient use of IP addresses: Without the use of VLSMs, companies must implement a single subnet mask within an entire class A, B, or C network number.

For example, consider the 172.16.0.0/16 network address divided into subnetworks using /24 masking. One of the subnetworks in this range, 172.16.14.0/24, is further divided into smaller subnetworks with the /27 masking, as shown in the figure. These smaller subnetworks range from 172.16.14.0/27 to 172.16.14.224/27. In the figure, one of these smaller subnets, 172.16.14.128/27, is further divided with the /30 prefix, which creates subnets with only two hosts, to be used on the WAN links. The /30 subnets range from 172.16.14.128/30 to 172.16.14.156/30. In the figure, the WAN links used the 172.16.14.132/30, 172.16.14.136/30, and 172.16.14.140/30 subnets out of the range.

Greater capability to use route summarization: VLSM allows more hierarchical levels within an addressing plan and thus allows better route summarization within routing tables. For example, in the figure, subnet 172.16.14.0/24 summarizes all of the addresses that are further subnets of 172.16.14.0, including those from subnet 172.16.14.0/27 and from 172.16.14.128/30.

Page 257: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-117

Isolation of topology changes from other routers: Another advantage to using route summarization in a large, complex network is that it can isolate topology changes from other routers. For example, when a specific link in the 172.16.27.0/24 domain is flapping, or going up and down rapidly, the summary route does not change. Therefore, no router external to the domain needs to keep modifying its routing table because of this flapping activity.

Page 258: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-118 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

VLSM Calculations This topic describes the process to calculate VLSMs.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-4

Calculating VLSMs

VLSMs are commonly used to maximize the number of possible addresses available for a network. For example, because point-to-point serial lines require only two host addresses, using a /30 subnet will not waste scarce IP addresses.

By using VLSMs, you can further subnet an already subnetted address. Consider, for example, that you have a subnet address 172.16.32.0/20 and that you need to assign addresses to a network that has ten hosts. With this subnet address, however, you have more than 4000 (212 – 2 = 4094) host addresses, most of which will be wasted. With VLSMs, you can further subnet address 172.16.32.0/20 to give you more network addresses and fewer hosts per network. If, for example, you subnet 172.16.32.0/20 to 172.16.32.0/26, you gain 64 (26) subnets, each of which could support 62 (26 – 2) hosts.

Page 259: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-119

Follow these steps to further subnet 172.16.32.0/20 to 172.16.32.0/26:

Step 1 Write 172.16.32.0 in binary form.

Step 2 Draw a vertical line between the 20th and 21st bits, as shown in the figure. (/20 was the original subnet boundary.)

Step 3 Draw a vertical line between the 26th and 27th bits, as shown in the figure. (The original /20 subnet boundary is extended 6 bits to the right, becoming /26.)

Step 4 Calculate the 64 subnet addresses using the bits between the two vertical lines, from lowest to highest in value. The figure shows the first five subnets available.

Page 260: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-120 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-5

A Working VLSM Example

Example: A Working VLSM In the figure, the subnet addresses that are used on the Ethernets are those generated from subdividing the 172.16.32.0/20 subnet into multiple /26 subnets. The figure illustrates where the subnet addresses can be applied, depending on the number of host requirements. For example, the WAN links use subnet addresses with a prefix of /30. This prefix allows for only two hosts—just enough for a point-to-point connection between a pair of routers.

To calculate the subnet addresses that are used on the WAN links, further subnet one of the unused /26 subnets. In this example, 172.16.33.0/26 is further subnetted with a prefix of /30. This provides 4 subnet bits more and, therefore, 16 (24) subnets for the WANs.

Note It is important to remember that only unused subnets can be further subnetted. In other words, if you use any addresses from a subnet, that subnet cannot be further subnetted. In the example, four subnet numbers are used on the LANs. Another unused subnet, 172.16.33.0/26, is further subnetted for use on the WANs.

Page 261: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-121

Route Summarization with VLSM This topic describes the route summarization process.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-6

• Routing protocols can summarize addresses of several networks into one address.

What Is Route Summarization?

Example: Route Summarization As shown in the figure, router A can either send three routing update entries or summarize the addresses into a single network number. The figure illustrates a summary route based on a full octet: 172.16.25.0/24, 172.16.26.0/24, and 172.16.27.0/24 could be summarized into 172.16.0.0/16.

Note Router A in the figure can route to network 172.16.0.0/16, including all subnets of that network. However, if there are other subnets of 172.16.0.0 elsewhere in the network (for example, if 172.16.0.0 was discontiguous), summarizing in this way may not be valid.

Route summarization, also called route aggregation or supernetting, can reduce the number of routes that a router must maintain by representing a series of network numbers in a single summary address.

Route summarization is most effective within a subnetted environment when the network addresses are in contiguous blocks in powers of 2. For example, 4, 16, or 512 addresses can be represented by a single routing entry because summary masks are binary masks—just like subnet masks—so summarization must take place on binary boundaries (powers of 2).

Page 262: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-122 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Routing protocols summarize or aggregate routes based on shared network numbers within the network. Classless routing protocols, such as Routing Information Protocol version 2 (RIPv2), OSPF, Intermediate System-to-Intermediate System (IS-IS), and EIGRP, support route summarization based on subnet addresses, including VLSM addressing. Classful routing protocols, such as RIPv1 and Interior Gateway Routing Protocol (IGRP), automatically summarize routes on the classful network boundary and do not support summarization on any other boundaries.

Note Summarization is described in RFC 1518, An Architecture for IP Address Allocation with CIDR.

Page 263: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-123

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-7

Summarizing Within an Octet

Example: Summarizing with an Octet This example illustrates the process for route summarization within an octet. A router receives updates for the following routes:

172.16.168.0/24

172.16.169.0/24

172.16.170.0/24

172.16.171.0/24

172.16.172.0/24

172.16.173.0/24

172.16.174.0/24

172.16.175.0/24

To determine the summary route, the router determines the number of highest-order bits that match in all of the addresses. By converting the IP addresses to the binary format, you can determine the number of common bits shared among the IP addresses. In the figure, the first 21 bits are in common among the IP addresses. Therefore, the best summary route is 172.16.168.0/21. You can summarize addresses when the number of addresses is a power of 2. If the number of addresses is not a power of 2, you can divide the addresses into groups and summarize the groups separately.

Page 264: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-124 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-8

Summarizing Addresses in a VLSM-Designed Network

To allow the router to aggregate the most IP addresses into a single route summary, your IP addressing plan should be hierarchical in nature. This approach is particularly important when using VLSMs. A VLSM design allows for maximum use of IP addresses and for more efficient routing update communication when you are using hierarchical IP addressing.

In the figure, route summarization occurs at the following two levels:

Router C summarizes two routing updates from networks 172.16.32.64/26 and 172.16.32.128/26 into a single update, 172.16.32.0/24.

Router A receives three different routing updates but summarizes them into a single routing update, then propagates the single update to the corporate network.

Page 265: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-125

Route Summarization Implementation Considerations

This topic describes the implementation considerations for route summarization.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-9

Implementation Considerations

• Multiple IP addresses must have the same highest-order bits.

• Routing decisions are made based on the entire address.

• Routing protocols must carry the prefix (subnet mask) length.

Route summarization reduces memory use on routers and routing protocol network traffic. Requirements for summarization to work correctly are as follows:

Multiple IP addresses must share the same highest-order bits.

Routing protocols must base their routing decisions on a 32-bit IP address and a prefix length that can be up to 32 bits.

Routing protocols must carry the prefix length (subnet mask) with the 32-bit IP address.

Page 266: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-126 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Route Summarization Management This topic describes how Cisco routers manage route summarization.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-10

Route Summarization Operation in Cisco Routers

• Supports host-specific routes, blocks of networks, and default routes

• Routers use longest match

192.16.5.33 /32 Host192.16.5.32 /27 Subnet192.16.5.0 /24 Network192.16.0.0 /16 Block of Networks0.0.0.0 /0 Default

Cisco routers manage route summarization in two ways, as follows:

Sending route summaries: Routing protocols, such as RIP, IGRP, and EIGRP, perform automatic route summarization across network boundaries. Specifically, this automatic summarization occurs for those routes whose classful network address differs from the major network address of the interface to which the advertisement is being sent. For OSPF and IS-IS, you must configure manual summarization. For EIGRP and RIPv2, you can disable automatic route summarization and configure manual summarization. Whether routing summarization is automatic depends on the routing protocol. You should review the documentation for your specific routing protocols.

Route summarization is not always a solution. You would not use route summarization if you needed to advertise all networks across a boundary, such as when you have discontiguous networks.

Selecting routes from route summaries: If more than one entry in the routing table matches a particular destination, the longest prefix match in the routing table is used. Several routes might match one destination, but the longest matching prefix is used.

For example, if a routing table has different paths to 192.16.0.0/16 and 192.16.5.0/24, packets addressed to 192.16.5.99 would be routed through the 192.16.5.0/24 path because that address has the longest match with the destination address.

Page 267: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-127

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-11

Summarizing Routes in a Discontiguous Network

• RIPv1 and IGRP do not advertise subnets, and therefore cannot support discontiguous subnets.

• OSPF, EIGRP, and RIPv2 can advertise subnets, and therefore can support discontiguous subnets.

Classful routing protocols summarize automatically at network boundaries. This behavior, which cannot be changed with RIPv1 and IGRP, has important results, as follows:

Subnets are not advertised to a different major network.

Discontiguous subnets are not visible to each other.

Cisco IOS software also provides an IP unnumbered feature that permits discontiguous subnets to be separated by an unnumbered link.

Example: Summarizing Routes in a Discontiguous Network In the figure, RIPv1 does not advertise the 172.16.5.0 255.255.255.0 and 172.16.6.0 255.255.255.0 subnets because RIPv1 cannot advertise subnets; both router A and router B advertise 172.16.0.0. The fact that RIPv1 cannot advertise subnets leads to confusion when routing across network 192.168.14.0. In this example, router C receives routes about 172.16.0.0 from two different directions, so it cannot make a correct routing decision.

You can resolve this situation by using RIPv2, OSPF, IS-IS, or EIGRP and not using summarization; otherwise, the subnet routes would be advertised with their actual subnet masks.

Page 268: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-128 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Summary This topic summarizes the key points discussed this lesson.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-12

Summary

• VLSMs provide more efficient use of IP addresses and have greater capability to use route summarization.

• VLSMs can provide more network addresses and fewer hosts per network.

• Route summarization enables a router to summarize several addresses into a single network number.

• Route summarization reduces memory use on routers and routing protocol network traffic.

• Cisco routers manage route summarization by performing automatic summarization and by selecting routes from route summaries.

Page 269: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-129

Module Summary This topic summarizes the key points discussed in this module.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1

Module Summary

• Routing information takes the form of entries in a routing table, with one entry for each identified route. The routing table can be updated manually or automatically to accommodate network changes.

• Distance vector routing algorithms enable each router to send all or some portion of its routing table to its neighbors.

• Link-state routing algorithms maintain a complex database of topology information, which routers use to maintain full knowledge of distant routers. Balanced hybrid routing algorithms combine aspects of both distance vector and link-state routing.

Page 270: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-130 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-2

Module Summary (Cont.)

• RIP is used in small, homogeneous networks.• EIGRP is used in many different topologies and media.

EIGRP provides quick convergence times with minimal overhead.

• OSPF is a classless link-state routing protocol that is widely deployed in many networks.

• VLSMs allow multiple levels of subnetworked IP addresses within a single network.

Routers gather and maintain routing information to enable the transmission and receipt of packets. Various classes of routing protocols allow for different features in each network. Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF) are routing protocols, and each provides different features and capabilities. Routing can be further tuned with the implementation of a variable-length subnet mask (VLSM). It is up to network administrators to be knowledgeable about each protocol in order to implement the most appropriate routing protocol based upon the needs of their network.

Page 271: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-131

Module Self-Check Use the questions here to test what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) Which statement most accurately describes static and dynamic routes? (Source: Introducing Routing) A) Dynamic routes are manually configured by a network administrator, whereas

static routes are automatically learned and adjusted by a routing protocol. B) Static routes are manually configured by a network administrator, whereas

dynamic routes are automatically learned and adjusted by a routing protocol. C) Static routes tell the router how to forward packets to networks that are not

directly connected, whereas dynamic routes tell the router how to forward packets to networks that are directly connected.

D) Dynamic routes tell the router how to forward packets to networks that are not directly connected, whereas static routes tell the router how to forward packets to networks that are directly connected.

Q2) What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3 specify? (Source: Introducing Routing) A) Both 186.157.5.0 and 10.1.1.3 use a mask of 255.255.255.0. B) The router should use network 186.157.5.0 to get to address 10.1.1.3. C) You want the router to trace a route to network 186.157.5.0 via 10.1.1.3. D) The router should use address 10.1.1.3 to get to devices on network

186.157.5.0.

Q3) Which command displays information about static route configuration on a Cisco router? (Source: Introducing Routing) A) show route ip B) show ip route C) show ip route static D) show route ip static

Q4) Which of the following protocols is an example of an exterior gateway protocol? (Source: Introducing Routing) A) RIP B) BGP C) IGRP D) EIGRP

Q5) In which situation is an administrative distance required? (Source: Introducing Routing) A) whenever static routes are defined B) whenever dynamic routing is enabled C) when the same route is learned via multiple routing protocols D) when multiple paths are available to the same destination and they are all

learned via the same routing protocol

Page 272: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-132 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Q6) When a router receives a packet with a destination address that is within an unknown subnetwork of a directly attached network, what is the default behavior if the ip classless command is not enabled? (Source: Introducing Routing) A) drop the packet B) forward the packet to the default route C) forward the packet to the next hop for the directly attached network D) broadcast the packet through all interfaces except the one on which it was

received

Q7) Which command correctly assigns a subinterface to VLAN 50 using 802.1Q trunking? (Source: Introducing Routing) A) Router(config)#encapsulation 50 dot1Q B) Router(config)#encapsulation 802.1Q 50 C) Router(config-if)#encapsulation dot1Q 50 D) Router(config-if)#encapsulation 50 802.1Q

Q8) How does a distance vector router learn about paths for networks that are not directly connected? (Source: Introducing Distance Vector Routing) A) from the source router B) from neighboring routers C) from the destination router D) distance vector router learns only about directly connected networks

Q9) What does a distance vector router send to its neighboring routers as part of a periodic routing table update? (Source: Introducing Distance Vector Routing) A) the entire routing table B) information about new routes C) information about routes that have changed D) information about routes that no longer exist

Q10) With distance vector routing, the administrator can prevent count to infinity by setting a maximum for what value? (Source: Introducing Distance Vector Routing) A) metric B) update time C) holddown time D) administrative distance

Q11) What does split horizon specify? (Source: Introducing Distance Vector Routing) A) that information about a route should not be sent in any direction B) that information about a route should not be sent back in the direction that the

original information came from C) that information about a route should always be sent back in the direction that

the original information came from D) that information about a route should be sent back only in the direction that the

original information came from

Page 273: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-133

Q12) When a router sets the metric for a network that has gone down to the maximum value, what is it doing? (Source: Introducing Distance Vector Routing) A) triggering the route B) poisoning the route C) applying split horizon D) putting the route in holddown

Q13) If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do? (Source: Introducing Distance Vector Routing) A) ignores the update B) increments the holddown timer C) marks the network as “accessible” and removes the holddown timer D) marks the network as “accessible” but keeps the holddown timer on

Q14) If a router has a network path in holddown and an update arrives from a neighboring router with a better metric than originally recorded for the network, what two things does it do? (Choose two.) (Source: Introducing Distance Vector Routing) A) removes the holddown B) continues the holddown C) marks the route as “accessible” D) marks the route as “inaccessible” E) marks the route as “possibly down”

Q15) How can link-state protocols limit the scope of route changes? (Source: Introducing Link-State and Balanced Hybrid Routing) A) by supporting classless addressing B) by sending the mask along with the address C) by sending only updates of a topology change D) by segmenting the network into area hierarchies

Q16) What is the purpose of link-state advertisements? (Source: Introducing Link-State and Balanced Hybrid Routing) A) to construct a topological database B) to specify the cost to reach a destination C) to determine the best path to a destination D) to verify that a neighbor is still functioning

Q17) By default, how often does RIP broadcast routing updates? (Source: Enabling RIP) A) every 6 seconds B) every 15 seconds C) every 30 seconds D) every 60 seconds

Page 274: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-134 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Q18) What is the maximum allowable hop count for RIP? (Source: Enabling RIP) A) 6 B) 15 C) 30 D) 60

Q19) With RIP, load balancing is performed over multiple paths that have which characteristic? (Source: Enabling RIP) A) equal cost B) equal weight C) equal distance D) equal bandwidth

Q20) Which command correctly specifies RIP as the routing protocol? (Source: Enabling RIP) A) Router(config)#rip B) Router(config)#router rip C) Router(config-router)#rip {AS no.} D) Router(config-router)#router rip {AS no.}

Q21) What is the default value of the RIP holddown timer? (Source: Enabling RIP) A) 30 seconds B) 60 seconds C) 90 seconds D) 180 seconds

Q22) In this line from the output of the debug ip rip command, what do the numbers within the parentheses signify? (Source: Enabling RIP) RIP: sending v1 update to 255.255.255.255 via Ethernet1 (10.1.1.2)

A) the source address B) the next-hop address C) the destination address D) the address of the routing table entry

Q23) What could cause the message “RIP: bad version 128 from 160.89.80.43” to be displayed in the output of the debug ip rip command? (Source: Enabling RIP) A) receiving a malformed packet B) sending a routing table update C) receiving a routing table update

Q24) How is the bandwidth requirement for EIGRP packets minimized? (Source: Enabling EIGRP) A) by propagating only data packets B) by propagating only hello packets C) by propagating only routing table changes and hello packets D) by propagating the entire routing table only to those routers affected by a

topology change

Page 275: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-135

Q25) Which command correctly specifies that network 10.0.0.0 is directly connected to a router that is running EIGRP? (Source: Enabling EIGRP) A) Router(config)#network 10.0.0.0 B) Router(config)#router eigrp 10.0.0.0 C) Router(config-router)#network 10.0.0.0 D) Router(config-router)#router eigrp 10.0.0.0

Q26) Which command displays the amount of time since the router heard from an EIGRP neighbor? (Source: Enabling EIGRP) A) show ip eigrp traffic B) show ip eigrp topology C) show ip eigrp interfaces D) show ip eigrp neighbors

Q27) What are two characteristics of OSPF? (Choose two.) (Source: Enabling OSPF) A) hierarchical B) proprietary C) open standard D) similar to RIP E) distance vector protocol

Q28) OSPF routes packets within a single _____. (Source: Enabling OSPF) A) area B) network C) segment D) autonomous system

Q29) With OSPF, each router builds its SPF tree using the same link-state information, but each will have a separate _____ of the topology. (Source: Enabling OSPF) A) state B) view C) version D) configuration

Q30) Which component of the SPF algorithm is inversely proportional to bandwidth? (Source: Enabling OSPF) A) link cost B) root cost C) link state D) hop count

Q31) Which command correctly starts an OSPF routing process using process ID 191? (Source: Enabling OSPF) A) Router(config)#router ospf 191 B) Router(config)#network ospf 191 C) Router(config-router)#network ospf 191 D) Router(config-router)#router ospf process-id 191

Page 276: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-136 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.

Q32) What is the purpose of the show ip ospf interface command? (Source: Enabling OSPF) A) to display OSPF-related interface information B) to display general information about OSPF routing processes C) to display OSPF neighbor information on a per-interface basis D) to display OSPF neighbor information on a per-interface type basis

Q33) The output from which command includes information about the length of the OSPF packet? (Source: Enabling OSPF) A) debug ip ospf events B) debug ip ospf packet C) debug ip ospf packet size D) debug ip ospf mpls traffic-eng advertisements

Q34) How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets? (Source: Implementing Variable-Length Subnet Masks) A) 16 B) 32 C) 256 D) 1024

Q35) How many hosts can be addressed on a subnet that has 7 host bits? (Source: Implementing Variable-Length Subnet Masks) A) 7 B) 62 C) 126 D) 252

Q36) How many hosts can be addressed with a prefix of /30? (Source: Implementing Variable-Length Subnet Masks) A) 1 B) 2 C) 4 D) 30

Q37) Which subnet mask would be appropriate for a class C address used for 9 LANs, each with 12 hosts? (Source: Implementing Variable-Length Subnet Masks) A) 255.255.255.0 B) 255.255.255.224 C) 255.255.255.240 D) 255.255.255.252

Page 277: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

© 2006, Cisco Systems, Inc. Determining IP Routes 3-137

Module Self-Check Answer Key Q1) B

Q2) D

Q3) B

Q4) B

Q5) C

Q6) A

Q7) C

Q8) B

Q9) A

Q10) A

Q11) B

Q12) B

Q13) A

Q14) A, C

Q15) D

Q16) A

Q17) C

Q18) B

Q19) A

Q20) B

Q21) D

Q22) A

Q23) A

Q24) C

Q25) C

Q26) D

Q27) A, C

Q28) D

Q29) B

Q30) A

Q31) A

Q32) A

Q33) B

Q34) C

Q35) C

Q36) B

Q37) C

Page 278: Interconnecting Cisco Network Devices (ICND) v2.3 Volume 1

3-138 Interconnecting Cisco Network Devices (ICND) v2.3 © 2006, Cisco Systems, Inc.