SlideShare uma empresa Scribd logo
1 de 83
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 1
VLSM and CIDR
ITE PC v4.0
Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Compare and contrast classful and classless IP addressing.
 Review VLSM and explain the benefits of classless IP
addressing.
 Describe the role of the Classless Inter-Domain Routing
(CIDR) standard in making efficient use of scarce IPv4
addresses
ITE PC v4.0
Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Introduction
 Prior to 1981, IP addresses used only the first 8 bits to specify
the network portion of the address
 In 1981, RFC 791 modified the IPv4 32-bit address to allow
for three different classes
 IP address space was depleting rapidly
the Internet Engineering Task Force (IETF) introduced
Classless Inter-Domain Routing (CIDR)
–CIDR uses Variable Length Subnet Masking (VLSM)
to help conserve address space.
-VLSM is simply subnetting a subnet
ITE PC v4.0
Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Classful IP addressing
 As of January 2007, there are over 433 million hosts on
internet
 Initiatives to conserve IPv4 address space include:
-VLSM & CIDR notation (1993, RFC 1519)
-Network Address Translation (1994, RFC 1631)
-Private Addressing (1996, RFC 1918)
ITE PC v4.0
Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 The High Order Bits
These are the leftmost bits in a 32 bit address
ITE PC v4.0
Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Classes of IP addresses are identified by the decimal number of
the 1st octet
Class A address begin with a 0 bit
Range of class A addresses = 0.0.0.0 to 127.255.255.255
Class B address begin with a 1 bit and a 0 bit
Range of class B addresses = 128.0.0.0 to 191.255.255.255
Class C addresses begin with two 1 bits & a 0 bit
Range of class C addresses = 192.0.0.0 to 223.255.255.255.
ITE PC v4.0
Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 The IPv4 Classful Addressing Structure (RFC 790)
An IP address has 2 parts:
-The network portion
Found on the left side of an IP address
-The host portion
Found on the right side of an IP address
ITE PC v4.0
Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
ITE PC v4.0
Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Purpose of a subnet mask
It is used to determine the network portion of an IP
address
ITE PC v4.0
Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Classful Routing Updates
-Recall that classful routing protocols (i.e. RIPv1)
do not send subnet masks in their routing updates
The reason is that the Subnet mask is
directly related to the network address
ITE PC v4.0
Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Classless Inter-domain Routing (CIDR – RFC 1517)
Advantage of CIDR :
-More efficient use of IPv4 address
space
-Route summarization
Requires subnet mask to be included in routing update
because address class is meaningless
Recall purpose of a subnet mask:
-To determine the network and host portion
of an IP address
ITE PC v4.0
Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
 Classless Routing Protocol
 Characteristics of classless routing protocols:
-Routing updates include the subnet mask
-Supports VLSM
Supports Route Summarization
ITE PC v4.0
Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classful and Classless IP Addressing
Routing
Protocol
Routing
updates
Include
subnet
Mask
Supports
VLSM
Ability to send
Supernet routes
Classful No No No
Classless Yes Yes Yes
 Classless Routing Protocol
ITE PC v4.0
Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classless Inter-Domain Routing (CIDR)
 Route summarization done by CIDR
-Routes are summarized with masks that are less
than that of the default classful mask
-Example:
172.16.0.0 / 13 is the summarized
route for the 172.16.0.0 / 16 to
172.23.0.0 / 16 classful networks
ITE PC v4.0
Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Classless Inter-Domain Routing (CIDR)
 Steps to calculate a route
summary
-List networks in binary
format
-Count number of left
most matching bits to
determine summary route’s
mask
-Copy the matching
bits and add zero bits to
determine the summarized
network address
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 16
Distance Vector Routing
Protocols
ITE PC v4.0
Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Identify the characteristics of distance vector routing
protocols.
 Describe the network discovery process of distance
vector routing protocols using Routing Information
Protocol (RIP).
 Describe the processes to maintain accurate routing
tables used by distance vector routing protocols.
 Identify the conditions leading to a routing loop and
explain the implications for router performance.
ITE PC v4.0
Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Why dynamic routing protocol
ITE PC v4.0
Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
 Examples of Distance Vector routing protocols:
Routing Information Protocol (RIP) v1,2
Interior Gateway Routing Protocol (IGRP)
Enhanced Interior Gateway Routing Protocol
(EIGRP)
ITE PC v4.0
Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
 Distance Vector Technology
–The Meaning of Distance Vector:
•A router using distance vector routing protocols
knows 2 things:
Distance to final destination
Vector, or direction, traffic should be
directed
ITE PC v4.0
Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
Characteristics of Distance Vector routing protocols:
 Periodic updates
 Broadcast updates
 Entire routing table is included into routing update
ITE PC v4.0
Chapter 1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
 Routing Protocol Algorithm:
-Defined as a procedure for accomplishing a certain task
ITE PC v4.0
Chapter 1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
Routing Protocol Characteristics
–Criteria used to compare routing protocols includes
Time to convergence
Scalability
Resource usage
Implementation & maintenance
ITE PC v4.0
Chapter 1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Distance Vector Routing Protocols
ITE PC v4.0
Chapter 1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Discovery
 Router initial start up
-Initial network discovery
Directly connected networks are initially placed in
routing table
ITE PC v4.0
Chapter 1 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Discovery
 Initial Exchange of Routing Information
–If a routing protocol is configured then
-Routers will exchange routing information
 Routing updates received from other routers
-Router checks update for new information
If there is new information:
-Metric is updated
-New information is
stored in routing table
ITE PC v4.0
Chapter 1 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Discovery
 Exchange of Routing Information
–Router convergence is reached when
-All routing tables in the network contain the same
network information
–Routers continue to exchange routing information
-If no new information is found then Convergence is
reached
ITE PC v4.0
Chapter 1 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Discovery
 Convergence must be reached before a network is
considered completely operable
 Speed of achieving convergence consists of 2 independent
categories
-Speed of broadcasting routing information
-Speed of calculating routes
ITE PC v4.0
Chapter 1 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Table Maintenance
 Periodic Updates: RIPv1 & RIPv2
These are time intervals in which a router sends
out its entire routing table.
ITE PC v4.0
Chapter 1 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Table Maintenance
 RIP uses 4 timers
-Update timer
-Invalid timer
-Hold-down timer
-Flush timer
ITE PC v4.0
Chapter 1 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Table Maintenance
 Invalid Timer:- If an update has not been received to refresh
an existing route after 180 seconds (the default), the route is
marked as invalid by setting the metric to 16. The route is
retained in the routing table until the flush timer expires.
 Flush Timer:- By default, the flush timer is set for 240 seconds,
which is 60 seconds longer than the invalid timer. When the
flush timer expires, the route is removed from the routing table.
ITE PC v4.0
Chapter 1 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Table Maintenance
 EIGRP routing updates are
-Partial updates (The Update Contain only the changed
Routes)
-Triggered by topology changes (Once a change happen,
Update is sent)
-Bounded (Update sent only to Routers who need it )
-Non periodic
ITE PC v4.0
Chapter 1 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Table Maintenance
 Triggered Updates
–Conditions in which triggered updates are sent
-Interface changes state
-Route becomes unreachable
-Route is placed in routing table
ITE PC v4.0
Chapter 1 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 Routing loops are
A condition in
which a packet is
continuously
transmitted within
a series of routers
without ever
reaching its
destination.
ITE PC v4.0
Chapter 1 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 Routing loops may be caused by:
-Incorrectly configured static routes
-Incorrectly configured route redistribution
-Slow convergence
-Incorrectly configured discard routes
 Routing loops can create the following issues
-Excess use of bandwidth
-CPU resources may be strained
-Network convergence is degraded
-Routing updates may be lost or not processed in a timely
manner
ITE PC v4.0
Chapter 1 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops problems
 Count to Infinity
This is a routing loop whereby packets bounce
infinitely around a network.
ITE PC v4.0
Chapter 1 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops problems
 Distance Vector routing protocols set a specified
metric value to indicate infinity
Once a router “counts to infinity” it marks the route
as unreachable
ITE PC v4.0
Chapter 1 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 Preventing loops with holddown timers
-Holddown timers allow a router to not accept any changes to a
route for a specified period of time.
-Point of using holddown timers
Allows routing updates to propagate through network with
the most current information. Holddown timers are used to
prevent regular update messages from inappropriately
reinstaling a route that may have gone bad.
ITE PC v4.0
Chapter 1 39© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 Holddown Timer. This timer stabilizes routing
information and helps prevent routing loops during
periods when the topology is converging on new
information. Once a route is marked as unreachable
(Invalid), it must stay in holddown long enough for all
routers in the topology to learn about the unreachable
network. By default, the holddown timer is set for 180
seconds.
ITE PC v4.0
Chapter 1 40© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Update, holddown & flush timers
Last update
about certain
network
Invalid timer Flush timerHolddown timer
180 sec 180 sec 240 sec
ITE PC v4.0
Chapter 1 41© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Update, holddown & flush timers
Last update
about certain
network
Update about the
same network with
metric=16
Invalid timer Flush timerHolddown timer
180 sec 180 sec 240 sec
ITE PC v4.0
Chapter 1 42© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 The Split Horizon Rule is used to prevent routing
loops
 Split Horizon rule:
A router should not advertise a network through the
interface from which the update came.
ITE PC v4.0
Chapter 1 43© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 Split horizon with poison
reverse
The rule states that
once a router learns of
an unreachable route
through an interface,
advertise it as
unreachable back
through the same
interface
ITE PC v4.0
Chapter 1 44© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Route poisoning & Poison reverse
 Route poisoning: sending update about the
unreachable network with setting the metric (hop count)
to 16
 Poison reverse: after receiving the poisoned update the
router will suspend the split horizon rule and send the
same poisoned update again across the same interface
then resume split horizon rule again
ITE PC v4.0
Chapter 1 45© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Loops
 IP & TTL
–Purpose of the TTL field
The TTL field is found in an IP header and is
used to prevent packets from endlessly
traveling on a network
 How the TTL field works
-TTL field contains a numeric value
The numeric value is decreased by one by
every router on the route to the destination.
If numeric value reaches 0 then Packet
is discarded.
ITE PC v4.0
Chapter 1 46© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Protocols Today
 Factors used to determine whether to use RIP or EIGRP
include
-Network size
-Compatibility between models of routers
-Administrative knowledge
ITE PC v4.0
Chapter 1 47© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Routing Protocols Today
 RIP
Features of RIP:
-Supports split horizon & split horizon with
poison reverse
-Capable of load balancing
-Easy to configure
-Works in a multi vendor router environment
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 48
RIP version 1
ITE PC v4.0
Chapter 1 49© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Describe the functions, characteristics, and operation
of the RIPv1 protocol.
 Configure a device for using RIPv1.
 Verify proper RIPv1 operation.
 Describe how RIPv1 performs automatic
summarization.
 Configure, verify, and troubleshoot default routes
propagated in a routed network implementing RIPv1.
 Use recommended techniques to solve problems
related to RIPv1
ITE PC v4.0
Chapter 1 50© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
RIPv1
 RIP Characteristics
-A classful, Distance Vector (DV) routing protocol
-Metric = hop count
-Routes with a hop count > 15 are unreachable
-Updates are broadcast every 30 seconds
ITE PC v4.0
Chapter 1 51© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
RIP v1 message
ITE PC v4.0
Chapter 1 52© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
RIPv1
 RIP Operation
–RIP uses 2 message types:
Request message
-This is sent out on startup by each RIP
enabled interface
-Requests all RIP enabled neighbors to send
routing table
Response message
-Message sent to requesting router
containing routing table
ITE PC v4.0
Chapter 1 53© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Basic RIPv1 Configuration
 Router RIP Command
–To enable RIP enter:
-Router rip at the global configuration prompt
-Prompt will look like R1(config-router)#
ITE PC v4.0
Chapter 1 54© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Basic RIPv1 Configuration
 Specifying Networks
–Use the network command
to:
-Enable RIP on all
interfaces that
belong to this
network
-Advertise this
network in RIP
updates
sent to other
routers
every 30 seconds
ITE PC v4.0
Chapter 1 55© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verification and Troubleshooting
 To verify and troubleshoot routing
-Use the following
commands:
-show ip route
-show ip protocols
-debug ip rip
ITE PC v4.0
Chapter 1 56© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Interpreting RIP route
ITE PC v4.0
Chapter 1 57© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verification and Troubleshooting
 show ip
protocols
command
-Displays
routing protocol
configured
on router
ITE PC v4.0
Chapter 1 58© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verification and Troubleshooting
 Debug ip rip command
-Used to display RIP routing updates as they are
happening
ITE PC v4.0
Chapter 1 59© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verification and Troubleshooting
 Passive interface command
-Used to prevent a router from sending updates through
an interface
-Example:
Router(config-router)#passive-interface interface-type interface-number
ITE PC v4.0
Chapter 1 60© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verification and Troubleshooting
 Passive interfaces
ITE PC v4.0
Chapter 1 61© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
 Boundary Routers
–RIP automatically summarizes classful networks
–Boundary routers summarize RIP subnets from one
major network to another.
ITE PC v4.0
Chapter 1 62© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
Processing RIP Updates
 2 rules govern RIPv1 updates:
-If a routing update and the interface it’s
received on belong to the same
network then
The subnet mask of the
interface is applied to the
network in the routing update
-If a routing update and the interface it’s
received on belong to a different
network then
The classful subnet mask of the
network is applied to the
network in the routing update.
ITE PC v4.0
Chapter 1 63© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
 Sending RIP Updates
–RIP uses automatic summarization to reduce the
size of a routing table.
ITE PC v4.0
Chapter 1 64© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
 Advantages of automatic
summarization:
–The size of routing updates is
reduced
–Single routes are used to
represent multiple routes which
results in faster lookup in the
routing table.
–Stability in routing table
ITE PC v4.0
Chapter 1 65© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
 Disadvantage of Automatic Summarization:
-Does not support discontiguous networks
ITE PC v4.0
Chapter 1 66© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Automatic Summarization
 Discontiguous
Topologies do not
converge with RIPv1
 A router will only
advertise major
network addresses
out interfaces that do
not belong to the
advertised route.
ITE PC v4.0
Chapter 1 67© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Default Route and RIPv1
 Default routes
Packets that are not defined specifically in a routing
table will go to the specified interface for the default
route
Example: Customer routers use default routes to
connect to an ISP router.
Command used to configure a default route is
ip route 0.0.0.0 0.0.0.0 s0/0/1
ITE PC v4.0
Chapter 1 68© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Default Route and RIPv1
 Propagating the Default Route in RIPv1
 Default-information originate command
-This command is used to specify that the router is to originate
default information, by propagating the static default route in
RIP update.
ITE PC v4.0
Chapter 1 69© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary: Commands used by RIP
Command Command’s purpose
Rtr(config)#router rip Enables RIP routing process
Rtr(config-router)#network Associates a network with a RIP routing process
Rtr#debug ip rip used to view real time RIP routing updates
Rtr(config-router)#passive-interface fa0/0 Prevent RIP updates from going out an interface
Rtr(config-router)#default-information originate Used by RIP to propagate default routes
Rtr#show ip protocols Used to display timers used by RIP
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 70
RIPv2
ITE PC v4.0
Chapter 1 71© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Introduction
 Chapter focus
-Difference between RIPv1 & RIPv2
RIPv1
-A classful distance vector routing protocol
-Does not support discontiguous subnets
-Does not support VLSM
-Does not send subnet mask in routing update
-Routing updates are broadcast
RIPv2
-A classless distance vector routing protocol that is an
enhancement of RIPv1’s features.
-Next hop address is included in updates
-Routing updates are multicast
-The use of authentication is an option
ITE PC v4.0
Chapter 1 72© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Introduction
 Similarities between RIPv1 & RIPv2
-Use of timers to prevent routing loops
-Use of split horizon or split horizon with poison
reverse
-Use of triggered updates
-Maximum hop count of 15
ITE PC v4.0
Chapter 1 73© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
RIPv1 Limitations
Examining the routing tables
-To examine the contents of
routing updates use the
debug ip rip command
-If RIPv1 is
configured then
Subnet masks will not be
included with the
network address
ITE PC v4.0
Chapter 1 74© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Configuring RIPv2
 Enabling and Verifying RIPv2
 Configuring RIP on a Cisco router
By default it is running RIPv1
ITE PC v4.0
Chapter 1 75© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Configuring RIPv2
 Configuring RIPv2 on a
Cisco router
-Requires using the
version 2 command
-RIPv2 ignores RIPv1
updates
 To verify RIPv2 is
configured use the
show ip protocols
command
ITE PC v4.0
Chapter 1 76© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Configuring RIPv2
 Auto-Summary & RIPv2
 RIPv2 will automatically
summarize routes at
major network
boundaries and can
also summarize routes
with a subnet mask that
is smaller than the
classful subnet mask
ITE PC v4.0
Chapter 1 77© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Disabling Auto-
Summary in RIPv2
 To disable automatic
summarization issue
the no auto-summary
command
Configuring RIPv2
ITE PC v4.0
Chapter 1 78© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
VLSM & CIDR
 Networks using a VLSM IP
addressing scheme
Use classless
routing protocols (i.e.
RIPv2) to disseminate
network addresses
and their subnet
masks
ITE PC v4.0
Chapter 1 79© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verifying & Troubleshooting RIPv2
 Basic Troubleshooting steps
-Check the status of all links
-Check cabling
-Check IP address & subnet mask configuration
-Remove any unneeded configuration commands
 Commands used to verify proper operation of RIPv2
–Show ip interfaces brief
–Show ip protocols
–Debug ip rip
–Show ip route
ITE PC v4.0
Chapter 1 80© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verifying & Troubleshooting RIPv2
 Common RIPv2 Issues
 When trouble shooting RIPv2 examine the following issues:
Version
Check to make sure you are using version 2
Network statements
Network statements may be incorrectly typed
or missing
Automatic summarization
If summarized routes are not needed then disable
automatic summarization
ITE PC v4.0
Chapter 1 81© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Verifying & Troubleshooting RIPv2
 Reasons why it’s good to authenticate routing information
-Prevent the possibility of accepting invalid routing
updates
-Contents of routing updates are encrypted
 Types of routing protocols that can use authentication
-RIPv2
-EIGRP
-OSPF
-IS-IS
-BGP
ITE PC v4.0
Chapter 1 82© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
Routing
Protocol
Distance
Vector
Classless
Routing
Protocol
Uses
Hold-
Down
Timers
Use of
Split
Horizon
or
Split
Horizon
w/
Poison
Reverse
Max
Hop
count
= 15
Auto
Summary
Support
CIDR
Supports
VLSM
Uses
Authen-
tication
RIPv1 Yes No Yes Yes Yes Yes No No No
RIPv2 Yes Yes Yes Yes Yes Yes Yes Yes Yes
ITE PC v4.0
Chapter 1 83© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Mais conteúdo relacionado

Mais procurados

Exploration routing chapter_5
Exploration routing chapter_5Exploration routing chapter_5
Exploration routing chapter_5Joshua Torres
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3Joshua Torres
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8Joshua Torres
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11Irsandi Hasan
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8Irsandi Hasan
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4Irsandi Hasan
 
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2Irsandi Hasan
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2Joshua Torres
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1Irsandi Hasan
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1Joshua Torres
 

Mais procurados (20)

Exploration routing chapter_5
Exploration routing chapter_5Exploration routing chapter_5
Exploration routing chapter_5
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
ip v6
ip v6ip v6
ip v6
 
Ethernet
EthernetEthernet
Ethernet
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
 

Destaque

100822 the pharisee and the tax collector luke 18 9-14
100822 the pharisee and the tax collector   luke 18 9-14100822 the pharisee and the tax collector   luke 18 9-14
100822 the pharisee and the tax collector luke 18 9-14Palm Desert Church of Christ
 
The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)Mark Wickersham
 
The parable of the sower
The parable of the sower  The parable of the sower
The parable of the sower Lilian Po
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
 
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)Mark Wickersham
 
The Prodigal Son
The Prodigal SonThe Prodigal Son
The Prodigal SonVernetta
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT CertificationsMuhammad Qasim
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksDani Royman Simanjuntak
 
Eigrp
EigrpEigrp
Eigrpfirey
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
The Parable of Prodigal Son
The Parable of Prodigal SonThe Parable of Prodigal Son
The Parable of Prodigal SonEunice Torre
 

Destaque (19)

100822 the pharisee and the tax collector luke 18 9-14
100822 the pharisee and the tax collector   luke 18 9-14100822 the pharisee and the tax collector   luke 18 9-14
100822 the pharisee and the tax collector luke 18 9-14
 
The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
The parable of the sower
The parable of the sower  The parable of the sower
The parable of the sower
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
 
The Prodigal Son
The Prodigal SonThe Prodigal Son
The Prodigal Son
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
Eigrp
EigrpEigrp
Eigrp
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
The Parable of Prodigal Son
The Parable of Prodigal SonThe Parable of Prodigal Son
The Parable of Prodigal Son
 

Semelhante a 1

Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptSunny1710
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2trayyoo
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3Irsandi Hasan
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning NetworkingExploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning NetworkingbrainxMagic
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 

Semelhante a 1 (20)

Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
ccna lec 1.pdf
ccna lec 1.pdfccna lec 1.pdf
ccna lec 1.pdf
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning NetworkingExploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning Networking
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

1

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 1 VLSM and CIDR
  • 2. ITE PC v4.0 Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Compare and contrast classful and classless IP addressing.  Review VLSM and explain the benefits of classless IP addressing.  Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making efficient use of scarce IPv4 addresses
  • 3. ITE PC v4.0 Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction  Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address  In 1981, RFC 791 modified the IPv4 32-bit address to allow for three different classes  IP address space was depleting rapidly the Internet Engineering Task Force (IETF) introduced Classless Inter-Domain Routing (CIDR) –CIDR uses Variable Length Subnet Masking (VLSM) to help conserve address space. -VLSM is simply subnetting a subnet
  • 4. ITE PC v4.0 Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Classful IP addressing  As of January 2007, there are over 433 million hosts on internet  Initiatives to conserve IPv4 address space include: -VLSM & CIDR notation (1993, RFC 1519) -Network Address Translation (1994, RFC 1631) -Private Addressing (1996, RFC 1918)
  • 5. ITE PC v4.0 Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  The High Order Bits These are the leftmost bits in a 32 bit address
  • 6. ITE PC v4.0 Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Classes of IP addresses are identified by the decimal number of the 1st octet Class A address begin with a 0 bit Range of class A addresses = 0.0.0.0 to 127.255.255.255 Class B address begin with a 1 bit and a 0 bit Range of class B addresses = 128.0.0.0 to 191.255.255.255 Class C addresses begin with two 1 bits & a 0 bit Range of class C addresses = 192.0.0.0 to 223.255.255.255.
  • 7. ITE PC v4.0 Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  The IPv4 Classful Addressing Structure (RFC 790) An IP address has 2 parts: -The network portion Found on the left side of an IP address -The host portion Found on the right side of an IP address
  • 8. ITE PC v4.0 Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing
  • 9. ITE PC v4.0 Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Purpose of a subnet mask It is used to determine the network portion of an IP address
  • 10. ITE PC v4.0 Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Classful Routing Updates -Recall that classful routing protocols (i.e. RIPv1) do not send subnet masks in their routing updates The reason is that the Subnet mask is directly related to the network address
  • 11. ITE PC v4.0 Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Classless Inter-domain Routing (CIDR – RFC 1517) Advantage of CIDR : -More efficient use of IPv4 address space -Route summarization Requires subnet mask to be included in routing update because address class is meaningless Recall purpose of a subnet mask: -To determine the network and host portion of an IP address
  • 12. ITE PC v4.0 Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing  Classless Routing Protocol  Characteristics of classless routing protocols: -Routing updates include the subnet mask -Supports VLSM Supports Route Summarization
  • 13. ITE PC v4.0 Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Routing Protocol Routing updates Include subnet Mask Supports VLSM Ability to send Supernet routes Classful No No No Classless Yes Yes Yes  Classless Routing Protocol
  • 14. ITE PC v4.0 Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classless Inter-Domain Routing (CIDR)  Route summarization done by CIDR -Routes are summarized with masks that are less than that of the default classful mask -Example: 172.16.0.0 / 13 is the summarized route for the 172.16.0.0 / 16 to 172.23.0.0 / 16 classful networks
  • 15. ITE PC v4.0 Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classless Inter-Domain Routing (CIDR)  Steps to calculate a route summary -List networks in binary format -Count number of left most matching bits to determine summary route’s mask -Copy the matching bits and add zero bits to determine the summarized network address
  • 16. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 16 Distance Vector Routing Protocols
  • 17. ITE PC v4.0 Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Identify the characteristics of distance vector routing protocols.  Describe the network discovery process of distance vector routing protocols using Routing Information Protocol (RIP).  Describe the processes to maintain accurate routing tables used by distance vector routing protocols.  Identify the conditions leading to a routing loop and explain the implications for router performance.
  • 18. ITE PC v4.0 Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Why dynamic routing protocol
  • 19. ITE PC v4.0 Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols  Examples of Distance Vector routing protocols: Routing Information Protocol (RIP) v1,2 Interior Gateway Routing Protocol (IGRP) Enhanced Interior Gateway Routing Protocol (EIGRP)
  • 20. ITE PC v4.0 Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols  Distance Vector Technology –The Meaning of Distance Vector: •A router using distance vector routing protocols knows 2 things: Distance to final destination Vector, or direction, traffic should be directed
  • 21. ITE PC v4.0 Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Characteristics of Distance Vector routing protocols:  Periodic updates  Broadcast updates  Entire routing table is included into routing update
  • 22. ITE PC v4.0 Chapter 1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols  Routing Protocol Algorithm: -Defined as a procedure for accomplishing a certain task
  • 23. ITE PC v4.0 Chapter 1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Routing Protocol Characteristics –Criteria used to compare routing protocols includes Time to convergence Scalability Resource usage Implementation & maintenance
  • 24. ITE PC v4.0 Chapter 1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols
  • 25. ITE PC v4.0 Chapter 1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery  Router initial start up -Initial network discovery Directly connected networks are initially placed in routing table
  • 26. ITE PC v4.0 Chapter 1 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery  Initial Exchange of Routing Information –If a routing protocol is configured then -Routers will exchange routing information  Routing updates received from other routers -Router checks update for new information If there is new information: -Metric is updated -New information is stored in routing table
  • 27. ITE PC v4.0 Chapter 1 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery  Exchange of Routing Information –Router convergence is reached when -All routing tables in the network contain the same network information –Routers continue to exchange routing information -If no new information is found then Convergence is reached
  • 28. ITE PC v4.0 Chapter 1 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery  Convergence must be reached before a network is considered completely operable  Speed of achieving convergence consists of 2 independent categories -Speed of broadcasting routing information -Speed of calculating routes
  • 29. ITE PC v4.0 Chapter 1 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance  Periodic Updates: RIPv1 & RIPv2 These are time intervals in which a router sends out its entire routing table.
  • 30. ITE PC v4.0 Chapter 1 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance  RIP uses 4 timers -Update timer -Invalid timer -Hold-down timer -Flush timer
  • 31. ITE PC v4.0 Chapter 1 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance  Invalid Timer:- If an update has not been received to refresh an existing route after 180 seconds (the default), the route is marked as invalid by setting the metric to 16. The route is retained in the routing table until the flush timer expires.  Flush Timer:- By default, the flush timer is set for 240 seconds, which is 60 seconds longer than the invalid timer. When the flush timer expires, the route is removed from the routing table.
  • 32. ITE PC v4.0 Chapter 1 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance  EIGRP routing updates are -Partial updates (The Update Contain only the changed Routes) -Triggered by topology changes (Once a change happen, Update is sent) -Bounded (Update sent only to Routers who need it ) -Non periodic
  • 33. ITE PC v4.0 Chapter 1 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance  Triggered Updates –Conditions in which triggered updates are sent -Interface changes state -Route becomes unreachable -Route is placed in routing table
  • 34. ITE PC v4.0 Chapter 1 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  Routing loops are A condition in which a packet is continuously transmitted within a series of routers without ever reaching its destination.
  • 35. ITE PC v4.0 Chapter 1 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  Routing loops may be caused by: -Incorrectly configured static routes -Incorrectly configured route redistribution -Slow convergence -Incorrectly configured discard routes  Routing loops can create the following issues -Excess use of bandwidth -CPU resources may be strained -Network convergence is degraded -Routing updates may be lost or not processed in a timely manner
  • 36. ITE PC v4.0 Chapter 1 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops problems  Count to Infinity This is a routing loop whereby packets bounce infinitely around a network.
  • 37. ITE PC v4.0 Chapter 1 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops problems  Distance Vector routing protocols set a specified metric value to indicate infinity Once a router “counts to infinity” it marks the route as unreachable
  • 38. ITE PC v4.0 Chapter 1 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  Preventing loops with holddown timers -Holddown timers allow a router to not accept any changes to a route for a specified period of time. -Point of using holddown timers Allows routing updates to propagate through network with the most current information. Holddown timers are used to prevent regular update messages from inappropriately reinstaling a route that may have gone bad.
  • 39. ITE PC v4.0 Chapter 1 39© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  Holddown Timer. This timer stabilizes routing information and helps prevent routing loops during periods when the topology is converging on new information. Once a route is marked as unreachable (Invalid), it must stay in holddown long enough for all routers in the topology to learn about the unreachable network. By default, the holddown timer is set for 180 seconds.
  • 40. ITE PC v4.0 Chapter 1 40© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Update, holddown & flush timers Last update about certain network Invalid timer Flush timerHolddown timer 180 sec 180 sec 240 sec
  • 41. ITE PC v4.0 Chapter 1 41© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Update, holddown & flush timers Last update about certain network Update about the same network with metric=16 Invalid timer Flush timerHolddown timer 180 sec 180 sec 240 sec
  • 42. ITE PC v4.0 Chapter 1 42© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  The Split Horizon Rule is used to prevent routing loops  Split Horizon rule: A router should not advertise a network through the interface from which the update came.
  • 43. ITE PC v4.0 Chapter 1 43© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  Split horizon with poison reverse The rule states that once a router learns of an unreachable route through an interface, advertise it as unreachable back through the same interface
  • 44. ITE PC v4.0 Chapter 1 44© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Route poisoning & Poison reverse  Route poisoning: sending update about the unreachable network with setting the metric (hop count) to 16  Poison reverse: after receiving the poisoned update the router will suspend the split horizon rule and send the same poisoned update again across the same interface then resume split horizon rule again
  • 45. ITE PC v4.0 Chapter 1 45© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops  IP & TTL –Purpose of the TTL field The TTL field is found in an IP header and is used to prevent packets from endlessly traveling on a network  How the TTL field works -TTL field contains a numeric value The numeric value is decreased by one by every router on the route to the destination. If numeric value reaches 0 then Packet is discarded.
  • 46. ITE PC v4.0 Chapter 1 46© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Protocols Today  Factors used to determine whether to use RIP or EIGRP include -Network size -Compatibility between models of routers -Administrative knowledge
  • 47. ITE PC v4.0 Chapter 1 47© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Protocols Today  RIP Features of RIP: -Supports split horizon & split horizon with poison reverse -Capable of load balancing -Easy to configure -Works in a multi vendor router environment
  • 48. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 48 RIP version 1
  • 49. ITE PC v4.0 Chapter 1 49© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Describe the functions, characteristics, and operation of the RIPv1 protocol.  Configure a device for using RIPv1.  Verify proper RIPv1 operation.  Describe how RIPv1 performs automatic summarization.  Configure, verify, and troubleshoot default routes propagated in a routed network implementing RIPv1.  Use recommended techniques to solve problems related to RIPv1
  • 50. ITE PC v4.0 Chapter 1 50© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1  RIP Characteristics -A classful, Distance Vector (DV) routing protocol -Metric = hop count -Routes with a hop count > 15 are unreachable -Updates are broadcast every 30 seconds
  • 51. ITE PC v4.0 Chapter 1 51© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIP v1 message
  • 52. ITE PC v4.0 Chapter 1 52© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1  RIP Operation –RIP uses 2 message types: Request message -This is sent out on startup by each RIP enabled interface -Requests all RIP enabled neighbors to send routing table Response message -Message sent to requesting router containing routing table
  • 53. ITE PC v4.0 Chapter 1 53© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Basic RIPv1 Configuration  Router RIP Command –To enable RIP enter: -Router rip at the global configuration prompt -Prompt will look like R1(config-router)#
  • 54. ITE PC v4.0 Chapter 1 54© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Basic RIPv1 Configuration  Specifying Networks –Use the network command to: -Enable RIP on all interfaces that belong to this network -Advertise this network in RIP updates sent to other routers every 30 seconds
  • 55. ITE PC v4.0 Chapter 1 55© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting  To verify and troubleshoot routing -Use the following commands: -show ip route -show ip protocols -debug ip rip
  • 56. ITE PC v4.0 Chapter 1 56© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Interpreting RIP route
  • 57. ITE PC v4.0 Chapter 1 57© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting  show ip protocols command -Displays routing protocol configured on router
  • 58. ITE PC v4.0 Chapter 1 58© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting  Debug ip rip command -Used to display RIP routing updates as they are happening
  • 59. ITE PC v4.0 Chapter 1 59© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting  Passive interface command -Used to prevent a router from sending updates through an interface -Example: Router(config-router)#passive-interface interface-type interface-number
  • 60. ITE PC v4.0 Chapter 1 60© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting  Passive interfaces
  • 61. ITE PC v4.0 Chapter 1 61© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization  Boundary Routers –RIP automatically summarizes classful networks –Boundary routers summarize RIP subnets from one major network to another.
  • 62. ITE PC v4.0 Chapter 1 62© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Processing RIP Updates  2 rules govern RIPv1 updates: -If a routing update and the interface it’s received on belong to the same network then The subnet mask of the interface is applied to the network in the routing update -If a routing update and the interface it’s received on belong to a different network then The classful subnet mask of the network is applied to the network in the routing update.
  • 63. ITE PC v4.0 Chapter 1 63© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization  Sending RIP Updates –RIP uses automatic summarization to reduce the size of a routing table.
  • 64. ITE PC v4.0 Chapter 1 64© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization  Advantages of automatic summarization: –The size of routing updates is reduced –Single routes are used to represent multiple routes which results in faster lookup in the routing table. –Stability in routing table
  • 65. ITE PC v4.0 Chapter 1 65© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization  Disadvantage of Automatic Summarization: -Does not support discontiguous networks
  • 66. ITE PC v4.0 Chapter 1 66© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization  Discontiguous Topologies do not converge with RIPv1  A router will only advertise major network addresses out interfaces that do not belong to the advertised route.
  • 67. ITE PC v4.0 Chapter 1 67© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Default Route and RIPv1  Default routes Packets that are not defined specifically in a routing table will go to the specified interface for the default route Example: Customer routers use default routes to connect to an ISP router. Command used to configure a default route is ip route 0.0.0.0 0.0.0.0 s0/0/1
  • 68. ITE PC v4.0 Chapter 1 68© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Default Route and RIPv1  Propagating the Default Route in RIPv1  Default-information originate command -This command is used to specify that the router is to originate default information, by propagating the static default route in RIP update.
  • 69. ITE PC v4.0 Chapter 1 69© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary: Commands used by RIP Command Command’s purpose Rtr(config)#router rip Enables RIP routing process Rtr(config-router)#network Associates a network with a RIP routing process Rtr#debug ip rip used to view real time RIP routing updates Rtr(config-router)#passive-interface fa0/0 Prevent RIP updates from going out an interface Rtr(config-router)#default-information originate Used by RIP to propagate default routes Rtr#show ip protocols Used to display timers used by RIP
  • 70. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 70 RIPv2
  • 71. ITE PC v4.0 Chapter 1 71© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction  Chapter focus -Difference between RIPv1 & RIPv2 RIPv1 -A classful distance vector routing protocol -Does not support discontiguous subnets -Does not support VLSM -Does not send subnet mask in routing update -Routing updates are broadcast RIPv2 -A classless distance vector routing protocol that is an enhancement of RIPv1’s features. -Next hop address is included in updates -Routing updates are multicast -The use of authentication is an option
  • 72. ITE PC v4.0 Chapter 1 72© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction  Similarities between RIPv1 & RIPv2 -Use of timers to prevent routing loops -Use of split horizon or split horizon with poison reverse -Use of triggered updates -Maximum hop count of 15
  • 73. ITE PC v4.0 Chapter 1 73© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1 Limitations Examining the routing tables -To examine the contents of routing updates use the debug ip rip command -If RIPv1 is configured then Subnet masks will not be included with the network address
  • 74. ITE PC v4.0 Chapter 1 74© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2  Enabling and Verifying RIPv2  Configuring RIP on a Cisco router By default it is running RIPv1
  • 75. ITE PC v4.0 Chapter 1 75© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2  Configuring RIPv2 on a Cisco router -Requires using the version 2 command -RIPv2 ignores RIPv1 updates  To verify RIPv2 is configured use the show ip protocols command
  • 76. ITE PC v4.0 Chapter 1 76© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2  Auto-Summary & RIPv2  RIPv2 will automatically summarize routes at major network boundaries and can also summarize routes with a subnet mask that is smaller than the classful subnet mask
  • 77. ITE PC v4.0 Chapter 1 77© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Disabling Auto- Summary in RIPv2  To disable automatic summarization issue the no auto-summary command Configuring RIPv2
  • 78. ITE PC v4.0 Chapter 1 78© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public VLSM & CIDR  Networks using a VLSM IP addressing scheme Use classless routing protocols (i.e. RIPv2) to disseminate network addresses and their subnet masks
  • 79. ITE PC v4.0 Chapter 1 79© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2  Basic Troubleshooting steps -Check the status of all links -Check cabling -Check IP address & subnet mask configuration -Remove any unneeded configuration commands  Commands used to verify proper operation of RIPv2 –Show ip interfaces brief –Show ip protocols –Debug ip rip –Show ip route
  • 80. ITE PC v4.0 Chapter 1 80© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2  Common RIPv2 Issues  When trouble shooting RIPv2 examine the following issues: Version Check to make sure you are using version 2 Network statements Network statements may be incorrectly typed or missing Automatic summarization If summarized routes are not needed then disable automatic summarization
  • 81. ITE PC v4.0 Chapter 1 81© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2  Reasons why it’s good to authenticate routing information -Prevent the possibility of accepting invalid routing updates -Contents of routing updates are encrypted  Types of routing protocols that can use authentication -RIPv2 -EIGRP -OSPF -IS-IS -BGP
  • 82. ITE PC v4.0 Chapter 1 82© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary Routing Protocol Distance Vector Classless Routing Protocol Uses Hold- Down Timers Use of Split Horizon or Split Horizon w/ Poison Reverse Max Hop count = 15 Auto Summary Support CIDR Supports VLSM Uses Authen- tication RIPv1 Yes No Yes Yes Yes Yes No No No RIPv2 Yes Yes Yes Yes Yes Yes Yes Yes Yes
  • 83. ITE PC v4.0 Chapter 1 83© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public