We may earn an affiliate commission when you visit our partners.
sikandar Shaik and Shaik Gouse Moinuddin

Cisco Certified Network Professional (CCNP) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks.

who are ready to advance their skills and work independently on complex network solutions.

Those who achieve CCNP have demonstrated the skills required in enterprise roles such as

  • network technician,
  • support engineer,
  • systems engineer or network engineer.

CCNP focuses on the skills needed by a network engineer working for an Enterprise

Enroll now

What's inside

Learning objectives

  • Upon completing this course, you will be able to meet these objectives:
  • Plan routing services to meet requirements
  • Implement an eigrp-based solution
  • implement a scalable multiarea network ospf-based solution
  • Implement an ipv4-based redistribution solution
  • implement path control
  • Implement and verify a layer 3 solution using bgp to connect an enterprise network to an isp

Syllabus

Introduction
Introduction to CCNP Certifications
How to access this Course on udemy

About GNS3 Simulation Tool

    ·GNS3 is an open source software that simulate complex networks while being as close as possible to the way real networks perform. All of this without having dedicated network hardware such as routers and switches.

    ·GNS3 is an excellent alternative or complementary tool to real labs for network engineers, administrators and people studying for certifications such as Cisco CCNA, CCNP and CCIE as well as Juniper JNCIA, JNCIS and JNCIE. Open source networking is supported too!

    ·It can also be used to experiment with features or to check configurations that need to be deployed later on real devices.

    ·To use GNS3 you first need to provide your own copy of a network operating system, like Cisco IOS, PIX, ASA, IPS or Juniper JunOS.

    ·You can download GNS3 software from http://www.gns3.net/download/

Read more

    ·To use GNS3 you first need to provide your own copy of a network operating system, like Cisco IOS, PIX, ASA, IPS or Juniper JunOS.

    ·You can download GNS3 software from http://www.gns3.net/download/

Summarization
  • It is the process of combining smaller networks in to single large sub network (Combining the contagious address into one and send to neighbor.)
  • It helps in reducing the size of routing table.

Advantages

    ·Minimizing the routing table.

    ·Less use of resources like memory, processor, bandwidth.

Two Type of Summarization

·Auto summary

·Manual summary

AUTO SUMMARY

·Summarization is done to a default class full boundary

§A /8

§B /16

§C /24

·Class full routing protocol does auto summary by default and it can’t be disabled

·Routing protocol like RIPv2, EIGRP, BGPv4 support auto summary and can be disabled

·Routing protocol like OSPF and ISIS doesn’t support auto summary

Disadvantages of Auto-summary:

·Can create Problems if the network is in discontiguous Subnets.

·Not always applicable

To enable or disable auto summary

Router(config-router)# [no] auto-summary

Manual summary

·Administrator manually configures Summarization

·It is supported by all classless routing protocols

EXAMPLE – 1

SUMMARIZE THE FOLLOWING ADDRESSES TO NEAREST SUBNET MASK POSSIBLE

10.1.0.0/24

10.1.2.0/24

10.1.3.0/24

10.1.4.0/24

10.1.5.0/24

10.1.6.0/24

STEPS FOR CALCULATING MANUAL SUMMARY :

1)WRITE THE BINARY OF FIRST and the last number

2)Separate the portions in to two parts ( common and un-common) ( 0 – 0 or 1- 1 are common)

3) Convert right side values of the first number in to zeros ( change in to decimal) and leftside values should be same.

4) count the left side bits (to find the / value)

SOME EXAMPLES TO UNDERSTAND METHOD OF CONVERTING TO BINARY

128 64 32 16 8 4 2 1

6 0 0 0 0 0 1 1 0

25 0 0 0 1 1 0 0 1

29 0 0 0 1 1 1 0 1

1 0 0 0 0 0 0 0 1

1)Write the binary of first and the last number

2)Separate the portions in to two parts ( common and un-common) ( 0 – 0 or 1- 1 are common)

10.1.0.0/24 written as 10. 1. 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

10.1.6.0/24 written as 10. 1. 0 0 0 0 01 1 0 0 0 0 0 0 0 0 0

3)Convert right side values of the first number in to zeros ( change in to decimal)

10. 1. 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

Change the above binary value in to decimal to get network ID of summary address

10.1.0.0

4)Count the left side bits (to find the / value)

10. 1. 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

8 bits 8 bits 5 bits 0 bits

From the above /value will be /21

So the final summarization address with nearest subnet mask possible is 10.1.0.0 /21

Manual Summarization Calculation Process exxample-2
Lab : EIGRP Summarization
Lab : EIGRP Summarization Advance
EIGRP

In this Video you get Introduced to EIGRP from basics

Verifying the EIGRP Process discussed in the previous video using some of the debug commands

  • Metric (32 bit) : Composite Metric (BW + Delay + load + MTU + reliability )

CONFIGURING EIGRP FOR IP

Router(config)# router EIGRP

Router(config-router)#network network-id [wildcard-mask]

  • Feasible Distance
  • Total cost from local router to destination
  • cost from local router = AD of next-hop router + cost between the local router and the next-hop router
  • Advertise Distance
  • Cost from the next-hop router to the destination
  • FD of current successor route > AD of feasible successor

    Feasible Successor= Second best AD < FD of Successor

    Feasibility Condition part 2

    EIGRP supports both

      1.equal-cost load balancing

      2.unequal-cost load balancing

      ·Routes with lowest equal metric are installed in the routing table by default

      ·When a router learns a same route from different neighbors with the same metric it install both the routes in the routing table and does load balancing, this is called equal cost load balancing.

      ·Note:- It does equal cost load balancing automatically. whereas unequal cost is not automatic.

      ·For unequal cost load balancing we need to enable "variance"

      ·EIGRP can load share up to six paths. (The default is four paths)

    EIGRP Unequal-Cost Load Balancing Allows the router to include routes with a metric smaller than the multiplier value times the metric of successor

      ·Variance is configured for unequal cost load balancing

      ·Variance is the multiplier to FD of successor

      ·Default is 1(equal cost load balancing)

    Router(config)# router eigrp 100

    Router(config-router)# variance

    EIGRP STUB

    • Stub routingis one way to limit queries. A stub router is one that is connected to no more than two neighbors and should never be a transit router.
    • The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies remote router (spoke) configuration.
    • Stub routing is commonly used in a hub-and-spoke topology.
    • A stub router sends a special peer information packet to all neighboring routers to report its status as a stub router.
    • A neighbor that receives a packet informing it of the stub status does not query the stub router for any routes.

    Configuring EIGRP Stub

    Router(config-router)# EIGRP stub [receive-only|connected|static|summary]

    ·receive-only: Prevents the stub from sending any type of route.

    ·connected: Permits stub to send connected routes
    (may still need to redistribute).

    ·static: Permits stub to send static routes
    (must still redistribute).

    ·summary: Permits stub to send summary routes.

    Default is connected and summary.

    Default Routes with Dynamic Routing

    IN this video I explained why we need to inject default route in to IGP protocols

    IN this video I explained how to inject default route in to EIGRP

    IN this video I explained how to inject default route in to RIPv2

    IN this video I explained how to inject default route in to OSPF

    Basic OSPF

    In this lecture you will understand the basic Process of OSPF 7 stages when you configure OSPF for the first time

    In this Lecture we will discuss on the concept of Areas in OSPF and how to design some big complex networks using OSPF areas

    LAB: OSPF Single Area
    LAB: OSPF Multiple Area
    Redistribution

    Redistribution

    The process of exchanging routing information between different routing protocols

    When we use multiple protocol

    • Application-specific protocols

    • Mismatch between devices (Vendors)

    • Political boundaries

    ØUsing multiple IP routing protocols can be a result of migrating to a more advanced routing protocol, a multivendor environment, political boundaries, or device mismatch.

    ØRoute redistribution is possible between any two IP routing protocols.

    ØInternal routes are routes advertised with in the same protocol

    Ø External routes are routes which gets redistributed .

    Configuring Redistribution into RIP

    Router(config)# router rip

    Router(config-router)# redistribute metric

    Note :Metric value has to be defined in the hops for the external routes redistributed in to RIP

    Configuring Redistribution into OSPF

    Router(config)# router ospf 5

    Router(config-router)# redistribute [metric ] [metric-type] [subnet]

    Configuring Redistribution into EIGRP

    Router(config)# router eigrp 10

    Router(config-router)# redistribute metric μs>

    Routing Metrics

      ·A seed metric must be defined when redistributing routes between routing protocols with unalike metrics.

      ·Some default seed metrics need to be changed to allow redistribution to take affect.

    Default seed metrics:

    EIGRP: Infinity (no routes enter the table)

    IS-IS: 0

    OSPF: 20 (type 2); BGP-learned routes are given 1 (type 2)

    BGP: MED is given the IGP metric value

    Advance OSPF

    OSPF Virtual Link

      ·Virtual links are used to connect a discontiguous area to area 0

      ·A logical connection is built between routers

      ·Virtual links are recommended for backup or temporary connections

    Configuring Virtual Links :

    Router(config)#router ospf

    Router(config-router)#areavirtual-link

    OSPF NETWORK TYPES


    Adjacency Behavior for a Broadcast Multi Access networks

      ·Generally these are, LAN technologies like Ethernet and Token Ring.

      ·DR and BDR selection are required.

      ·OSPF detects this type of link automatically.

      ·All neighbor routers form full adjacencies with the DR and BDR only.


    Designated Router &Backup Designated Router

      ·The router having highest priority is DR

      ·The router with second-highest priority is BDR

      ·The default priority value is 1

      ·In the case of a tie, router with highest router ID is DR second highest router ID becomes the BDR

      ·If router priority is 0 it cannot become the DR or BDR

      ·Router which is not a DR or BDR is called as DROTHER

      ·DR & BDR election is not preemptive

    Router(config)#interface

    Router(config-if)#ip ospf priority number

    • The above interface configuration command assigns the OSPF priority to an interface.
    • Different interfaces on a router may be assigned different values.
    • The default priority is 1. The range is from 0 to 255.

    DR/BDR Elections Neighbors

    DR/BDR DROTHER Full

    DROTHER DR/BDR Full

    DROTHER DROTHER 2 Way

    Updates

    DROTHER DR/BDR 224.0.0.6

    DR DROTHER 224.0.0.5

    Stub Areas

      ·External LSAs are stopped ( E1 and E2 routes)

      ·Default route is advertised into stub area by the ABR

      ·All routers in stub area must be configured as stub

    Configuring all routers of Totally Stubby Area

    Router(config-router)#area stub

    Configuring Area Border Router of Totally Stubby AreaRouter

    (config-router)#area stubno-summary

  • NSSA breaks stub area rules.
  • ASBR (R1) is allowed in NSSA.
  • Special LSA type 7 defined, sent by ASBR.
  • ABR (R2) converts LSA type 7 to LSA type 5.
  • ABR sends default route into NSSA instead of external routes from other ASBRs.
  • NSSA is an RFC addendum.
  • LAB: NSSA & Totally NSSA
    OSPF LSA Types
    IPV6

    Features of IPv6

      Larger Address Space

      Aggregation-based address hierarchy

      Efficient backbone routing

      Efficient and Extensible IP datagram

      Stateless Address Autoconfiguration

      Security (IPsec mandatory)

      Mobility

    Assigning the IPV6 address

      1)Static

      2)Autoconfiguration

      a.Statefull ( via DHCP)

      b.Stateless ( device gets IP IPv6 add by including the MAC add )

    IPV6 Address Types:

    UNICAST

    1) Global unicast

    ·like public IP ( routable ) , 2000:: and 2001::

    2) site local ( unique local)

      · like private ip ( routable)

      ·any address whichever starts with FC or FD in the first two numbers

    3) link local

      odefault IPV6 address on every ipv6 enabled interface

      o( non routable ) FE80::

    TASK

    ·Configure basic Ipv6 Addresses as per the diagram

    Router(config)#hostname R-1

    R-1(config)#interface fastEthernet 0/0

    R-1(config-if)#ipv6 address fc00:11:11:11::1/64

    R-1(config-if)#no shutdown

    R-1(config-if)#exit

    R-1(config)#interface s1/0

    R-1(config-if)#ipv6 address 2001:12:12:12::1/64

    R-1(config-if)#no shutdown

    R-1(config-if)#end

    IPV6 address Stateless Autoconfiguration
    IPV6 address Stateless Auto configuration LAB

    STATIC & DEFAULT ROTUING

    IPv6 support static and default routing and the working principle ( when to use and how it works is same what we learned in IPV4 routing )

      ·Syntax for writing static and default routing is similar in IPV6 when compared with IPV4

      ·As in IPv4, IPv6 has 2 families of routing protocols: IGP and EGP, and still uses the longest-prefix match routing algorithm

    RIPng

      ·Same as IPv4:

      ·Distance-vector, 15-hop radius, split-horizon, poison reverse, and so on Based on RIPv2

      ·Updated features for IPv6:

      oUses IPv6 for transport

      oIPv6 prefix, next-hop IPv6 address

      oUses the multicast group FF02::9 for RIP updates

      oUpdates are sent on UDP port 521

    OSPFv3

      ·Based on OSPFv2, with enhancements

      oDistributes IPv6 prefixes

      oRuns directly over IPv6

      oShips in the night with OSPFv2

      ·Adds IPv6-specific attributes:

      o128-bit addresses

      oLink-local address

      oMultiple addresses and instances per interface

      oAuthentication (now uses IPsec)

      oOSPFv3 runs over a link, rather than a subnet

    EIGRP FOR IPv6

      ·Same EIGRP used with IPv4

      ·Best of distance vector and link state (advanced distance vector)

      ·Multiprotocol EIGRP has a protocol-dependent module for IPv4, IPX, AppleTalk, and now IPv6

      ·Easy to configure and fast convergence

    Route Filtering Methods

    Why do we need Route Filtering Methods

    }You might need to control exactly which routes are advertised or redistributed, or which paths are chosen.

    }Advertise only some specific Routes to Neighbor

    }Redistribute Specific Routes

    }Path Manipulation of some specific Routes

    }Changing Metric and Metric-type for specific routes

    }Changing The Administrative Distance for Specific Routes

    }With BGP

    Controlling routes to be advertised to ISP

    Control routes to get in to routing table

    }Policy Based Routing

    ways to control routing updates

    }Cisco IOS provides several ways to control routing updates:

    Passive Interface

    Distribute Lists

    Prefix Lists

    Route Maps

    PASSIVE INTERFACE

    Passive-interface command is used in all routing protocols to disable sending updates out from a specific interface. However the command behavior varies from o­ne protocol to another.

    Passive Interface in RIPv2

    ·In RIP this command will disable sending multicast updates via a specific interface but will allow listening to incoming updates from other RIP speaking neighbors.

    ·This simply means that the router will still be able to receive updates o­n that passive interface and use them in the routing table.

    Router(config)#router EIGRP 100

    Router(config-router)#passive-interface s1/0



    Router(config)#router OSPF 1

    Router(config-router)#passive-interface s1/0

    Using Distribution lists

      ·A distribute-list is used to control routing updates either

      ocoming TO your router

      oor leaving FROM your router.

      ·Distribute-lists work on a variety of different IOS routing protocols.

      ·One of the easiest way

      ·Use an access list (or route map Or Prefix-list ) to permit or deny routes.

      ·Can be applied to transmitted, received, or redistributed routing updates.

    Configuring Distribute-list

    Router(config-router)# distribute-list

    Configuring Distribute-list

    Router(config-router)# distribute-list

    Using IP Prefix-list

    }The IOS IP prefix-list another tool for matching routes.

    }match two components of an IP route:

    The route prefix (the subnet number)

    The prefix length (the subnet mask)

    }The command then sets either a deny or permit action for each matched prefix/length.

    }Prefix lists work very similarly to access lists;

    }a prefix list contains one or more ordered entries which are processed sequentially.

      }The evaluatioqn of a prefix against a prefix list ends as soon as a match is found.

      }To create a prefix list or add a prefix-list entry, use the ip prefix-list command in global configuration mode. To delete a prefix-list entry, use the no form of this command.

      ip prefix-list list-name | list-number [seq number] {deny network/length | permit network/length}[ge length] [le length]

    ip prefix-list list-name | list-number [seq number] {deny network/length | permit network/length}[ge length] [le length]

    Route-maps

    }Route maps are similar to a scripting language for these reasons:

    }They work like a more sophisticated access list.

    }They offer top-down processing.

    }Once there is a match, leave the route map.

    }Lines are sequence-numbered for easier editing

    }Insertion of lines ,Deletion of lines

    }Route maps are named rather than numbered for easier documentation.

    }Match criteria and set criteria can be used, similar to the “if, then” logic in a scripting language.

    }The common uses of route maps are as follows:

    Redistribution route filtering: a more sophisticated alternative to distribute lists

    Policy-based routing: the ability to determine routing policy based on criteria other than the destination network

    BGP policy implementation: the primary tool for defining BGP routing policies

    Configure Route Map

    Router(config)# Route-map permit/deny

    Defining the condition to Match

    Router(config-route-map)#match

    Defining the condition to Set

    Router(config-route-map)#set

    match conditions used in redistribution:

    match interface

    match ip address [ACL]

    match ip next-hop

    match ip route-source

    match metric

    match route-type

    set operations used in redistribution:

    set level {level-1 | level-2 | level-1-2 | stub-area | backbone} (OSPF/IS-IS)

    set metric

    set metric-type {internal | external | type-1 | type-2}

    LAB: Route filtering using Routemaps

    POLICY -BASED ROUTING

    ØIt is used for implementing policy that cause the packet to take a different direction

    ØPBR allows source based routing

    ØRouting table is destination base

    ØPBR can be used for making type of service tag

    ADVANTAGES

    ØDifferent users can go from different directions

    ØLoad sharing

    ØPBR will be implemented on the incoming direction of the source interface

    ØIf the packet is match in the route map and it is permit it will be send according to the policy

    ØIf the packet is match in the route map and route map deny packet will be forwarded according to normal routing table

    LAB : Source based Policy Based Routing
    LAB : Destination based Policy Based Routing
    LAB : Services Specific Policy Based Routing
    LAB : Policy Based Routing for Packet size
    BGP

    Introduction to BGP

      ·BGP is the only routing protocol in widespread use which facilitates inter-domain routing (between autonomous systems).

      ·BGP is path-vector; routes are tracked in terms of which autonomous systems they pass through.

      ·BGP attributes allow granularity in path selection.

    When to use BGP

    BGP is more appropriate if one of the following conditions exist

      §A.S. working as transit A.S. (Ex. ISP)

      §A.S. connected to multiple A.S.

      §Data traffic path entering or leaving A.S. need to manipulated

    When not to use BGP

    BGP is not recommended if one or more following condition exist

      §If it is Single-home A.S

      §Lack of recourses like memory and less processing power in routers

      §Low bandwidth link between A.S

      §Limited understanding about BGP route filtering and path selection processes

    Types of ISP Connections


    Single Homed

    Dual-homed site

    Multihoming

    Dual Multihomed

    BGP Neighbors

      ·BGP neighbors are routers forming TCP connection for exchanging BGP updates. Also called as BGP Peers or BGP Speakers.

      ·Two type of BGP neighbor relationship.

      §IBGP

      §EBGP

    ·Configuration parameters such as neighbor IP addresses and their AS number, and which networks you will advertise via BGP

    Router(config)# router bgp

    Router(config-router)# network [mask ]

    Router(config-router)# neighbor remote-as

  • Update-source command allows the BGP process to use the IP address of a specified interface as the source IP address of all BGP updates to that neighbor.
  • A loopback interface is usually used, because it will be available as long as the router is operational.
  • The IP address used in the neighbor command on the other router will be the destination IP address of all BGP updates and should be the loopback interface of this router.
  • The neighbor update-source command is normally used only with IBGP neighbors.
  • The address of an EBGP neighbor must be directly connected by default; the loopback of an EBGP neighbor is not directly connected.
  • Configuring BGP Authentication on Cisco IOS:

      ·Border Gateway Protocol (BGP) supports authentication mechanism using Message Digest 5 (MD5) algorithm.

      ·When authentication is enabled, any Transmission Control Protocol (TCP) segment belonging to BGP exchanged between the peers is verified and accepted only if authentication is successful.

      ·For authentication to be successful, both the peers must be configured with the same password.

      ·If authentication fails, the BGP neighbor relationship is not be established.

      Router(config-router)#neighbor {ip-address | peer-group-name} <password string>

    Peer groups

      ·Peer groups are defined to efficiently apply same policies to multiple neighbors:

      ·Peer groups are useful when many neighbors have the same outbound policies.

      ·Members can have a different inbound policy.

      ·Updates are generated once per peer group.

      ·Configuration is simplified.

    Router(config-router)# neighbor peer-group

    This command creates a peer group.

    Router(config-router)# neighbor < peer-group peer-group-name>

    In order to get the routes to be learned we have two Solutions:

      1.Full mesh neighborship ( which the requirement says not to use here )

      2.Route reflector

    To Configure Route-reflector

      ·All Clients should establish neigbbor with only servers

      ·Clients will not establish neigbor with any other clinet

      ·In case if you have 2 servers ( server establish neigbbor with other servers and clients )

    LAB : Basic EBGP Configuration

    When EBGP ---sends an update to another EBGP neighbor -------------changes the next hop

    When IBGP ---sends an update to another IBGP neighbor ------------- the next hop remains same (not change)

    BGP neighbor ebgp-multihop Command

      ·This command increases the default of one hop for EBGP peers.

      ·It allows routes to the EBGP loopback address (which will have a hop count greater than 1).

      ·Ebgp-multihop tells to neighbor that the 12.0.0.1 is not directly connected and it is multiple hops away

      ·Increases the default TTL value from 1 to 255

    Synchronization rule:

      ·Do not use or advertise to an external neighbor a route learned by IBGP until a matching route has been learned from an IGP

      ·Ensures consistency of information throughout the AS.

      ·Safe to have it off only if all routers in the transit path in the AS are running full-mesh IBGP;

      ·off by default in Cisco IOS software release 12.2(8)T and later

      ·BGP synchronization is often disabled for autonomous systems which do not act as a transit AS.

      ·Safe to have it off only if all routers in the transit path in the AS are running full-mesh IBGP; off by default in Cisco IOS software release 12.2(8)T and later

    Router (config-router)# no synchronization

    ·The above command Disables BGP synchronization so that a router will advertise routes in BGP without learning them in an IGP

    Router (config-router)# synchronization

  • The Above Command enables BGP synchronization so that a router will not advertise routes in BGP until it learns them in an IGP
  • BGP ATTRIBUTES

    BGP chooses a route to a network based on the attributes of its path. Four categories of attributes exist as follows:

      ·Well-known mandatory:

      oMust be recognized by all BGP routers, present in all BGP updates, and passed on to other BGP routers. For example, AS path, origin, and next hop.

      ·Well-known discretionary:

      oMust be recognized by all BGP routers and passed on to other BGP routers but need not be present in an update, for example, local preference.

      ·Optional transitive:

      oMight or might not be recognized by a BGP router but is passed on to other BGP routers.

      oIf not recognized, it is marked as partial, for example, aggregator, community.

      ·Optional non-transitive:

      oIf the BGP process does not recognize the attribute then it can ignore the update and not advertise the path to its peers

      ofor example, Multi-Exit Discriminator (MED), originator ID.

    AS Path

      ·AS Path is Well known, mandatory attribute

      ·List of AS through which updates has traversed.

      ·Path with shortest AS path list is more desirable.

    Next Hop

      ·The next-hop attribute is well-known, mandatory.

      ·BGP is AS by AS routing Protocol

      ·Next hop ≠ next router

      ·Next hop = IP to reach next AS

    The IP address of the next AS to reach a given network:

    • Router A advertises network 172.16.0.0 to router B in EBGP, with a next hop of 10.10.10.3.
    • Router B advertises 172.16.0.0 in IBGP to router C, keeping 10.10.10.3 as the next-hop address.

    ORIGIN

      ·Origin informs all AS in Internetwork how network got introduced into BGP.

      oIGP (i) advertised in BGP using network command

      oEGP (e) Redistributed from EGP

      oIncomplete (?) Redistributed in to BGP from IGP or static

      ·The origin attribute is well-known, mandatory, and transitive.

      ·“I” is better then “E” and “e” is better then “?”

    TASK:

    Configure R1 to prefer exit path via R4 to reach all the Networks.

    By default R1 prefer via R2 (1.1.1.2) to reach 20.0.0.0/30.0.0.0 network as it has less number of AS path.

    WEIGHT

      ·Weight is Cisco’s attribute.

      ·Tells how to exit the AS

      ·Path with the highest weight is more desirable.

      ·Local to the router ( not advertise to the other routers in the AS )

      ·Weight is partial attribute.

      ·Default weight = 0 for learned routes, 32,768 for locally injected routes)

    LOCAL PREFERENCE

      ·Local preference defines how data traffic should exit from an AS.

      ·Path with highest preference value is more desirable.

      ·It is advertised only to IBGP neighbor within an AS.

      ·Default value is 100

      ·Local preference is well known, discretionary attribute.

    TASK:

    ·Make sure that only 12.0.0.0 and 12.0.1.0 both networks should prefer via R4 where as the remaining should use the default route via R2 :

    R1(config)#access-list 12 permit 12.0.0.0 0.0.0.255

    R1(config)# access-list 12 permit 12.0.1.0 0.0.0.255

    R1(config)# route-map WEIGHT permit 10

    R1(config-route-map)# match ip address 12

    R1(config-route-map)# set weight 5000

    R1(config-route-map)# exit

    R1(config)# route-map WEIGHT permit 20

    R1(config-route-map)#end

    R1(config)#router bgp 500

    R1(config-router)#neighbor 4.4.4.1 route-map ?

    WORD Name of route map

    R1(config-router)#neighbor 4.4.4.1 route-map WEIGHT ?

    in Apply map to incoming routes

    out Apply map to outbound routes

    R1(config-router)#neighbor 4.4.4.1 route-map WEIGHT in

    R1(config-router)#end

    R1#clear ip bgp *

    IN Bound

    Out Bound

    ·In bound Route-map Changes the local Router Path selection process.

    ·outbound Route-maps influence some other Routers Decision

    ·In Bound Route-maps apply changes to BGP updates recived from that specific Neighbor

    ·Out Bound Route-maps apply changes routes advertised to that specific Neighbor

    ·Applying inbound influence outbound Traffic

      ·Applying outbound influence inbound Traffic

    TASK:

      · All the routes going from AS 600 to reach as -700 ( 40.0.0.0 ) by default prefers out via R3

      ·Make sure that R2 and R3 (all the routers in the as 600 should prefer use path via R2 /R1/R4 using local preference.)


    TASK:

      ·Configure AS 600 such that only routes ( 14.0.0.0 and 14.0.1.0 ) both networks prefer via R2 to exit the AS

      ·All the remaining networks should use the default exit ( via R3)

    R2

    R2(config)#access-list 14 permit 14.0.0.0 0.0.0.255

    R2(config)# access-list 14 permit 14.0.1.0 0.0.0.255

    R2(config)# route-map LOCAL permit 10

    R2(config-route-map)# match ip add 14

    R2(config-route-map)# set local-preference 2000

    R2(config-route-map)# exit

    R2(config)# route-mapLOCAL permit 20

    R2(config-route-map)# exit

    R2(config)# router bgp 600

    R2(config-router)# neighbor 1.1.1.1 route-map LOCAL in

    R2(config-router)#end

    Route Selection Decision Process

    Consider only (synchronized) routes with no AS loops and a valid next hop, and then:

    1. Prefer highest weight (local to router).
    2. Prefer highest local preference (global within AS).
    3. Prefer route originated by the local router (next hop = 0.0.0.0).
    4. Prefer shortest AS path.
    5. Prefer lowest origin code (IGP < EGP < incomplete) i > E > ? .
    6. Prefer lowest MED (exchanged between autonomous systems).
    7. Neighbor Type (Prefer eBGP over iBGP)
    8. IGP metric to NEXT_HOP (Smaller value preferred)
    9. Prefer oldest route for EBGP paths.
    10. Prefer the path with the lowest neighbor BGP router ID.
    11. Prefer the path with the lowest neighbor IP address.

    Good to know

    Know what's good
    , what to watch for
    , and possible dealbreakers
    Covers EIGRP, OSPF, and BGP, which are essential routing protocols for enterprise networks and are heavily emphasized in the CCNP certification exam
    Includes hands-on labs using GNS3, an open-source network simulation tool, allowing learners to practice configuring and troubleshooting complex network scenarios without dedicated hardware
    Explores route filtering methods using distribute lists, prefix lists, and route maps, which are critical for controlling routing updates and implementing network policies
    Requires learners to provide their own copies of network operating systems like Cisco IOS or Juniper JunOS to use with GNS3, which may require additional effort to acquire
    Focuses on IPv4 and IPv6, which are both relevant, but IPv4 is considered legacy and IPv6 is the modern standard, so learners should prioritize IPv6 skills
    Teaches summarization techniques, which are useful for reducing routing table size, but modern networks rely on more advanced techniques such as automation and SDN

    Save this course

    Save CCNP Route 642-902 Implementing Cisco IP Routing to your list so you can find it easily later:
    Save

    Activities

    Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in CCNP Route 642-902 Implementing Cisco IP Routing with these activities:
    Review Subnetting Fundamentals
    Solidify understanding of subnetting to effectively plan and implement IP addressing schemes within EIGRP and OSPF networks.
    Browse courses on Subnetting
    Show steps
    • Study subnetting concepts and practice subnet calculations.
    • Work through subnetting exercises with varying subnet sizes.
    • Relate subnetting to network design scenarios.
    Read "Routing TCP/IP, Volume 1 (2nd Edition)"
    Gain a deeper understanding of routing protocols and their implementation in enterprise networks.
    Show steps
    • Read chapters related to EIGRP and OSPF.
    • Take notes on key concepts and configuration details.
    • Relate the book's content to the course syllabus.
    Configure EIGRP and OSPF in GNS3
    Reinforce EIGRP and OSPF configuration skills by building and troubleshooting network scenarios in a virtual lab environment.
    Show steps
    • Set up a GNS3 lab with multiple routers and switches.
    • Configure EIGRP and OSPF on the devices.
    • Troubleshoot connectivity issues and verify routing.
    Four other activities
    Expand to see all activities and additional details
    Show all seven activities
    Create a Cheat Sheet for Route Filtering
    Consolidate knowledge of route filtering techniques by creating a reference guide for different methods.
    Show steps
    • Research different route filtering methods (ACLs, prefix lists, route maps).
    • Create a table summarizing the syntax and usage of each method.
    • Include examples of common filtering scenarios.
    Document a Redistribution Scenario
    Solidify understanding of route redistribution by documenting a complex scenario with multiple routing protocols.
    Show steps
    • Design a network topology with RIP, EIGRP, and OSPF.
    • Configure route redistribution between the protocols.
    • Document the configuration and troubleshooting steps.
    Read "BGP (Networking Technologies)"
    Gain a comprehensive understanding of BGP and its role in connecting enterprise networks to ISPs.
    View Melania on Amazon
    Show steps
    • Read chapters related to BGP configuration and attributes.
    • Take notes on key concepts and best practices.
    • Relate the book's content to the course syllabus.
    Design an Enterprise Network with BGP
    Apply BGP knowledge by designing a network for a multi-homed enterprise with redundancy and optimal path selection.
    Show steps
    • Design a network topology with multiple ISPs and BGP routers.
    • Configure BGP peering and routing policies.
    • Test redundancy and path selection.

    Career center

    Learners who complete CCNP Route 642-902 Implementing Cisco IP Routing will develop knowledge and skills that may be useful to these careers:
    Network Engineer
    A network engineer is responsible for designing, implementing, and maintaining an organization's network infrastructure, and this course directly aligns with those responsibilities. This role involves planning and implementing routing services, which this course's objectives directly address. A network engineer needs to understand how to implement EIGRP, OSPF, and BGP solutions, all of which are covered in this course. This course also covers multiarea network solutions and Layer 3 connectivity, all of which are within a network engineer's daily tasks. Therefore, someone looking to excel as a network engineer should take this course, as it provides essential skills and knowledge required for success in this career.
    Network Administrator
    A network administrator manages the day-to-day operations of an organization's network, making this course highly relevant. This role requires hands-on skills in troubleshooting and configuring network devices, and this course helps build that skill set. The course covers the implementation of routing protocols, which is crucial for maintaining a functional network. This course's practical labs and focus on real-world network scenarios are particularly useful for a network administrator, since most of their responsibilities are directly related to what is taught in the course. A network administrator will gain confidence and proficiency in managing networks by completing this course, making them more effective in their role.
    Network Technician
    A network technician is responsible for the installation, maintenance, and repair of network hardware and software, and this course helps equip them for these tasks. This role requires a foundational understanding of network protocols and routing, and this course provides extensive hands-on experience in implementing network solutions. The CCNP course's focus on routing protocols like EIGRP and OSPF is directly relevant to the work a network technician will perform daily. A network technician will find great value in the practical skills and knowledge provided by this course, as it greatly enhances their ability to handle networking tasks, and work with complex networks, making them more proficient and prepared.
    Systems Engineer
    The systems engineer role demands a broad understanding of various IT components, including networking, and this course provides a deep dive into routing. A systems engineer may oversee the entire infrastructure, and a strong network understanding, such as that provided in this course, helps ensure smooth operations. This course provides training in the planning and implementation of network solutions, which is a key part of designing and maintaining stable systems. A systems engineer who takes this course will gain valuable expertise in routing protocols like EIGRP, OSPF, and BGP, which are important for any enterprise network. This career would benefit highly from the practical knowledge of network topologies and routing strategies that this course features.
    Support Engineer
    A support engineer provides technical assistance to clients or internal users, often involving troubleshooting network issues, and this course is a great tool for them. This role requires a detailed understanding of network configurations and routing protocols, which are directly addressed in the course. This course's focus on implementing and verifying various routing solutions helps support engineers diagnose and fix network problems effectively. A support engineer benefits directly from the course's in-depth coverage of network technologies, as it prepares them to handle complex network-related support requests. The hands-on nature of this course greatly assists a support engineer in developing practical expertise.
    IT Consultant
    An IT consultant provides expert advice to organizations on their technology needs, often needing a deep understanding of networking, and this course will help them. This role requires the ability to assess and recommend network solutions, and this course provides a solid foundation in enterprise networking. The course's emphasis on planning and implementing network services directly contributes to the skills desired for an IT consultant. An IT consultant who takes this course builds a strong foundation in routing protocols and network design, which allows them to offer valuable insights to clients. This course covers many of the challenges commonly faced by IT consultants in enterprise networking.
    Cybersecurity Analyst
    A cybersecurity analyst needs to understand network traffic and potential vulnerabilities, and this course will help develop that capacity. This role requires a solid understanding of network infrastructure, and this course provides an in-depth view of routing protocols. The course content, which covers the implementation of routing services and Layer 3 solutions, helps a cybersecurity analyst identify potential security weaknesses. Cybersecurity analysts benefit from understanding how networks are structured and how data flows, making this course particularly relevant. This course also helps provide the cybersecurity analyst with the knowledge to strengthen network defenses.
    Cloud Network Engineer
    A cloud network engineer designs and manages the network infrastructure for cloud computing environments, and this course will be useful to them. This role requires a deep understanding of network routing and connectivity, and this course offers practical skills in these areas. While cloud networks may differ from traditional enterprise networks, the underlying principles of routing are essential. A cloud network engineer can use the course's coverage of EIGRP, OSPF, and BGP, to improve their understanding of network design within cloud services. This course gives cloud network engineers the abilities to manage cloud connectivity effectively, making it a good educational resource.
    Technical Trainer
    A technical trainer educates others on technical topics, often specializing in networking, and this course helps build a strong knowledge base. This role requires a deep understanding of networking concepts and practices, and this course delivers both. With this course's in-depth coverage of routing protocols and network implementations, a technical trainer can help other people learn how to apply this knowledge to their job. A technical trainer who takes this course will be well-equipped with the necessary theoretical and practical knowledge to effectively train others. This course provides a foundation in routing and network design, which are essential for a technical trainer in networking.
    Solutions Architect
    A solutions architect designs comprehensive technical solutions for business problems, often needing a strong understanding of networking, and this course may be useful to them. This role requires the ability to integrate various IT components, including network infrastructure, and this course provides an in-depth knowledge of routing protocols and network design. The course's content, covering enterprise network solutions, helps a solutions architect create cohesive and efficient systems. A solutions architect who takes this course will enhance their abilities to make informed decisions about network configurations. This course may help a solutions architect who needs to understand how to build large scale networks and provide a solution for them.
    Telecommunications Specialist
    A telecommunications specialist works with communication systems and networks, requiring a good knowledge of network routing, and this course may be useful. This role involves planning and implementing various telecommunication solutions, and this course covers some of the necessary networking components. The course's focus on implementing routing services and Layer 3 solutions directly relates to the work of a telecommunications specialist. While this role encompasses a broader range of communication technologies, the network routing skills gained in this course may enhance a telecommunications specialist's ability to handle advanced network configurations. This course may help them if they are involved in the implementation or design of network infrastructure.
    IT Project Manager
    An IT project manager oversees the planning, execution, and completion of IT projects, often involving networking, and this course may be useful to them. This role requires a good understanding of various IT components, including network infrastructure, and this course may assist with this. The course's content, which addresses the implementation of different routing protocols, may help an IT project manager have a better understanding of project scope and resourcing of network-related tasks. An IT project manager who takes this course can gain insight into the technical complexities of network projects. This course may be helpful for IT project managers with technical backgrounds that wish to expand their professional knowledge.
    Technical Sales Engineer
    A technical sales engineer uses technical knowledge to support the sales process, often needing an in-depth understanding of networking technologies, and this course may be useful. While sales roles often do not require hands-on technical abilities, a technical sales engineer may present and explain solutions to clients, and this course will provide the expertise to do so. The course's emphasis on planning and implementing network services helps a technical sales engineer communicate the value of their offerings. A technical sales engineer who understands the practical application of these network concepts can better articulate the benefits to clients. This course may help them sound more technically proficient and knowledgeable.
    Data Center Technician
    A data center technician is responsible for the physical infrastructure of a data center, needing some understanding of networking, so this course may be useful for them. While this role is heavily involved with the hardware side of things, a high level understanding of how the network works is beneficial. This course may be useful to a data center technician looking to expand their skills, as it will address how routers interact across a network. This course provides foundational knowledge which may help a data center technician understand the overall network. As their role may not directly involve design, implementation or troubleshooting, this course may be helpful, but is not a perfect fit.
    Field Service Technician
    A field service technician provides on-site technical support, often involving networking issues, and this course may be useful to them. This role deals with both hardware and software, and the course may help them diagnose network problems. The course's coverage of routing protocols may help the technician gain an understanding of network configurations. Field service technicians who wish to expand their knowledge of enterprise-level routing may find this course helpful. As their role generally involves a broad set of issues, this course may be helpful to enhance their understanding of networking.

    Reading list

    We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CCNP Route 642-902 Implementing Cisco IP Routing.
    Provides a comprehensive understanding of routing protocols, including RIP, OSPF, IS-IS, and EIGRP. It delves into the underlying principles and design considerations for building scalable and efficient networks. This book is particularly useful for understanding the intricacies of routing protocol behavior and configuration options. It is commonly used as a reference by network engineers and architects.
    Provides an in-depth look at the Border Gateway Protocol (BGP), the routing protocol used to exchange routing information between autonomous systems (AS) on the Internet. It covers BGP concepts, configuration, and troubleshooting techniques. This book is valuable for understanding how BGP works and how to configure it to connect an enterprise network to an ISP. It is commonly used by network engineers and architects.

    Share

    Help others find this course page by sharing it with your friends and followers:

    Similar courses

    Similar courses are unavailable at this time. Please try again later.
    Our mission

    OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

    Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

    Find this site helpful? Tell a friend about us.

    Affiliate disclosure

    We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

    Your purchases help us maintain our catalog and keep our servers humming without ads.

    Thank you for supporting OpenCourser.

    © 2016 - 2025 OpenCourser