Key Tables for CCIE Study


Key Tables for CCIE Study

Chapter 1

Table 1-2

Ethernet Cabling Types

Table 1-3

Ethernet Attack Fields

Type of Cable Pinouts Key Pins Connected

Straight-through T568A (both ends) or T568B (both ends) 1 1; 2 2; 3 3; 6 6

Cross-over T568A on one end, T568B on the added 1 3; 2 6; 3 1; 6 2

Field Description

Preamble (DIX) Provides synchronization and arresting transitions to acquiesce able clocking

of the transmitted signal. Consists of 62 alternating 1s and 0s, and ends

with a brace of 1s.

Preamble and Start

of Anatomy Delimiter

(802.3)

Same purpose and bifold bulk as DIX preamble; 802.3 artlessly renames

the 8-byte DIX conference as a 7-byte conference and a 1-byte Start of

Frame Delimiter (SFD).

Type (or Protocol

Type) (DIX)

2-byte acreage that identifies the blazon of agreement or agreement attack that

follows the header. Allows the receiver of the anatomy to apperceive how to

process a accustomed frame.

Length (802.3) Describes the length, in bytes, of the abstracts afterward the Breadth field, up

to the Ethernet trailer. Allows an Ethernet receiver to adumbrate the end of

the accustomed frame.

Destination Service

Access Point

(802.2)

DSAP; 1-byte agreement blazon field. The admeasurement limitations, forth with other

uses of the low-order bits, appropriate the afterwards accession of SNAP headers.

Source Service

Access Point

(802.2)

SSAP; 1-byte agreement blazon acreage that describes the upper-layer protocol

that created the frame.

Control (802.2) 1- or 2-byte acreage that provides mechanisms for both connectionless and

connection-oriented operation. About acclimated alone for connectionless

operation by avant-garde protocols, with a 1-byte bulk of 0x03.

3

CCIE Acquisition and Switching Exam Certification Guide

Table 1-3

Ethernet Attack Fields

Table 1-4

Three Types of Ethernet/MAC Address

Table 1-5

I/G and U/L Bits

Table 1-6

Ethernet Blazon Fields

Organizationally

Unique Identifier

(SNAP)

OUI; 3-byte field, about bare today, accouterment a abode for the

sender of the anatomy to cipher the OUI apery the architect of the

Ethernet NIC.

Type (SNAP) 2-byte Blazon field, application aforementioned ethics as the DIX Blazon field, overcoming

deficiencies with admeasurement and use of the DSAP field.

Type of Ethernet/MAC Abode Description and Notes

Unicast Fancy appellation for an abode that represents a single

LAN interface. The I/G bit, the best cogent bit

in the best cogent byte, is set to 0.

Broadcast An abode that agency “all accessories that abide on

this LAN appropriate now.” Consistently a bulk of hex

FFFFFFFFFFFF.

Multicast A MAC abode that implies some subset of all

devices currently on the LAN. By definition, the

I/G bit is set to 1.

Field Meaning

I/G Bifold 0 agency the abode is a unicast; Bifold 1 agency the abode is a multicast or

broadcast.

U/L Bifold 0 agency the abode is bell-ringer assigned; Bifold 1 agency the abode has been

administratively assigned, cardinal the vendor-assigned address.

Type Acreage Description

Protocol Blazon DIX V2 Blazon field; 2 bytes; registered ethics now administered by the IEEE

DSAP 802.2 LLC; 1 byte, with 2 high-order $.25 aloof for added purposes;

registered ethics now administered by the IEEE

SNAP SNAP header; 2 bytes; uses aforementioned ethics as Ethernet Agreement Type; signified

by an 802.2 DSAP of 0xAA

IP Acclamation Practice

4

Table 1-7

LAN About-face Forwarding Behavior

Table 1-8

Ethernet Standards

Type of

Address About-face Action

Known unicast Assiduously anatomy out the distinct interface associated with the destination

address

Unknown unicast Floods anatomy out all interfaces, except the interface on which the anatomy was

received

Broadcast Floods anatomy analogously to alien unicasts

Multicast Floods anatomy analogously to alien unicasts, unless multicast optimizations

are configured

Type of Ethernet General Description

10BASE5 Commonly alleged “thick-net”; uses coaxial cabling

10BASE2 Commonly alleged “thin-net”; uses coaxial cabling

10BASE-T Aboriginal blazon of Ethernet to use twisted-pair cabling

DIX Ethernet Adaptation 2 Band 1 and Band 2 blueprint for aboriginal Ethernet, from Digital/

Intel/ Xerox; about alleged DIX V2

IEEE 802.3 Alleged MAC due to the name of the IEEE board (Media Access

Control); aboriginal Band 1 and 2 specifications, affiliated application DIX

V2 as a basis

IEEE 802.2 Alleged LLC due to the name of the IEEE board (Logical Link

Control); Band 2 blueprint for attack accepted to assorted IEEE

LAN specifications

IEEE 802.3u IEEE accepted for Fast Ethernet (100 Mbps) over chestnut and optical

cabling; about alleged FastE

IEEE 802.3z Gigabit Ethernet over optical cabling; about alleged GigE

IEEE 802.3ab Gigabit Ethernet over chestnut cabling

5

CCIE Acquisition and Switching Exam Certification Guide

Table 1-9

Switch Centralized Processing

Chapter 2

Table 2-2

Private VLAN Communications Amid Ports

Table 2-3

VTP Modes and Features*

Switching

Method Description

Store-andforward

The about-face absolutely receives all $.25 in the anatomy (store) afore forwarding the frame

(forward). This allows the about-face to analysis the FCS afore forwarding the frame,

thus ensuring that errored frames are not forwarded.

Cut-through The about-face performs the abode table lookup as anon as the Destination Address

field in the attack is received. The aboriginal $.25 in the anatomy can be beatific out the

outbound anchorage afore the final $.25 in the admission anatomy are received. This does not

allow the about-face to abandon frames that abort the FCS check, but the forwarding action

is faster, consistent in lower latency.

Fragmentfree

This performs like cut-through switching, but the about-face waits for 64 bytes to be

received afore forwarding the aboriginal bytes of the approachable frame. According to

Ethernet specifications, collisions should be detected during the aboriginal 64 bytes of the

frame, so frames that are in absurdity because of a blow will not be forwarded.

Description of Who Can Talk to

Whom

Primary

VLAN Ports

Community

VLAN Ports1

Isolated

VLAN Ports1

Talk to ports in primary VLAN

(promiscuous ports)

Yes Yes Yes

Talk to ports in the aforementioned secondary

VLAN (host ports)

N/A2 Yes No

Talks to ports in addition secondary

VLAN

N/A2 No No

Function

Server

Mode

Client

Mode

Transparent

Mode

Originates VTP advertisements Yes No No

Processes accustomed advertisements to amend its VLAN

configuration

Yes Yes No

Forwards accustomed VTP advertisements Yes Yes Yes

Saves VLAN agreement in NVRAM or vlan.dat Yes No Yes

Can create, modify, or annul VLANs application configuration

commands

Yes No Yes

IP Acclamation Practice

6

Table 2-4

VTP Agreement Options

Table 2-5

Valid VLAN Numbers, Normal and Extended

Option Meaning

domain Sends breadth name in VTP updates. Accustomed VTP amend is abandoned if it does

not bout a switch’s breadth name. One VTP breadth name per about-face is

allowed.

password Acclimated to accomplish an MD5 assortment that is included in VTP updates. Accustomed VTP

updates are abandoned if the passwords on the sending and accepting about-face do not

match.

mode Sets server, client, or cellophane approach on the switch.

version Sets adaptation 1 or 2. Servers and audience charge bout adaptation to barter VLAN

configuration data. Cellophane approach switches at adaptation 2 advanced adaptation 1 or

version 2 VTP updates.

pruning Enables VTP pruning, which prevents broadcasts from actuality advertisement on a

per-VLAN base to switches that do not accept any ports configured as members

of that VLAN.

interface Specifies from which interface a about-face picks the antecedent MAC abode for VTP

updates.

VLAN

Number

Normal or

Extended?

Can Be Advertised and Pruned

by VTP Versions 1 and 2? Comments

0 Aloof Not accessible for use

1 Normal No On Cisco switches, the default

VLAN for all admission ports;

cannot be deleted or changed

21001 Normal Yes

10021005 Normal No Authentic accurately for use

with FDDI and TR

translational bridging

10064094 Extended No

7

CCIE Acquisition and Switching Exam Certification Guide

Table 2-6

VLAN Agreement and Storage

Table 2-7

Comparing ISL and 802.1Q

Function

When in VTP

Server Mode

When in VTP

Transparent Mode

Normal-range VLANs can be configured from Both VLAN

database and

configuration

modes

Both VLAN database

and configuration

modes

Extended-range VLANs can be configured from Nowhere—cannot

be configured

Configuration mode

only

VTP and normal-range VLAN configuration

commands are stored in

vlan.dat in Flash Both vlan.dat in Flash

and running

configuration1

Extended-range VLAN agreement commands

stored in

Nowhere—

extended ambit not

allowed in VTP

server mode

Running configuration

only

Feature ISL 802.1Q

VLANs accurate Normal and extended

range1

Normal and extended

range

Protocol authentic by Cisco IEEE

Encapsulates aboriginal anatomy or inserts

tag

Encapsulates Inserts tag

Supports built-in VLAN No Yes

IP Acclamation Practice

8

Table 2-9

Trunking Agreement Options That Lead to a Working Trunk

Configuration Command on One

Side1 Abbreviate Name Meaning

To Trunk, Other

Side Charge Be

switchport approach trunk

Trunk Consistently trunks

on this end;

sends DTP to

help added side

choose to

trunk

On, desirable, auto

switchport approach trunk

;

switchport

nonegotiate

Nonegotiate Consistently trunks

on this end;

does not send

DTP

messages

(good when

other about-face is

a non-Cisco

switch)

On

switchport approach activating desirable

Desirable Sends DTP

messages, and

trunks if

negotiation

succeeds

On, desirable, auto

switchport approach activating auto

Auto Replies to

DTP

messages, and

trunks if

negotiation

succeeds

On, desirable

switchport approach access

Access Never trunks;

sends DTP to

help added side

reach same

conclusion

(Never trunks)

switchport approach access

;

switchport

nonegotiate

Access (with

nonegotiate)

Never trunks;

does not send

DTP

messages

(Never trunks)

9

CCIE Acquisition and Switching Exam Certification Guide

Chapter 3

Table 3-2

Three Major 802.1d STP Activity Steps

Table 3-3

Default Anchorage Costs According to IEEE 802.1d

Table 3-4

IEEE 802.1d Spanning Timberline Interface States

Major Step Description

Elect the basis about-face The about-face with the everyman arch ID wins;

the accepted arch ID is 2-byte priority

followed by a MAC abode altered to that

switch.

Determine anniversary switch’s Basis Anchorage The one anchorage on anniversary about-face with the least

cost aisle aback to the root.

Determine the Designated Anchorage for anniversary articulation Back assorted switches affix to the same

segment, this is the about-face that assiduously the

least bulk Hello assimilate a segment.

Speed of Ethernet Aboriginal IEEE Bulk Revised IEEE Cost

10 Mbps 100 100

100 Mbps 10 19

1 Gbps 1 4

10 Gbps 1 2

State

Forwards

Data Frames?

Learn Antecedent MACs of

Received Frames?

Transitory or Stable

State?

Blocking No No Stable

Listening No No Transitory

Learning No Yes Transitory

Forwarding Yes Yes Stable

Disabled No No Stable

IP Acclamation Practice

10

Table 3-5

PortFast, UplinkFast, and BackboneFast

Table 3-7

PAgP and LACP Agreement Settings and Recommendations

Table 3-8

RSTP Articulation Types

Feature Requirements for Use How Convergence Is Optimized

PortFast Acclimated on admission ports that are not

connected to added switches or hubs

Immediately puts the anchorage into

forwarding accompaniment already the anchorage is

physically working

UplinkFast Acclimated on admission band switches that

have assorted uplinks to

distribution/core switches

Immediately replaces a absent RP with an

alternate RP, anon assiduously on

the RP, and triggers updates of all

switches’ CAMs

BackboneFast Acclimated to ascertain aberrant articulation failures,

typically in the arrangement core

Avoids cat-and-mouse for Maxage to expire

when its RP ceases to accept Hellos;

does so by querying the about-face attached

to its RP

PAgP Ambience LACP 802.1AD Ambience Action

on on

Disables PAgP or LACP, and armament the

port into the PortChannel

off off

Disables PAgP or LACP, and prevents the

port from actuality allotment of a PortChannel

auto passive

Uses PAgP or LACP, but waits on other

side to accelerate aboriginal PAgP or LACP message

desirable active

Uses PAgP or LACP, and initiates the

negotiation

Link Blazon Description

Point-to-point Connects a about-face to one added switch; Cisco switches amusement FDX links in which

Hellos are accustomed as point-to-point links.

Shared Connects a about-face to a hub; the important agency is that switches are attainable off

that port.

Edge Connects a about-face to a distinct end-user device.

11

CCIE Acquisition and Switching Exam Certification Guide

Table 3-9

RSTP and STP Anchorage States

Table 3-10

RSTP and STP Anchorage Roles

Table 3-11

Protocols and Standards for Chapter 3

Table 3-12

IEEE 802.1d STP Timers

Administrative Accompaniment STP Accompaniment (802.1d) RSTP Accompaniment (802.1w)

Disabled Disabled Discarding

Enabled Blocking Discarding

Enabled Alert Discarding

Enabled Acquirements Learning

Enabled Forwarding Forwarding

RSTP Role Definition

Root Anchorage Aforementioned as 802.1d Basis Port.

Designated Anchorage Aforementioned as 802.1d Designated Port.

Alternate Anchorage Aforementioned as the Alternating Anchorage abstraction in UplinkFast; an alternating Basis Port.

Backup Anchorage A anchorage that is absorbed to the aforementioned link-type aggregate articulation as addition anchorage on

the aforementioned switch, but the added anchorage is the DP for that segment. The Backup

Port is accessible to booty over if the DP fails.

Name Standards Body

RSTP IEEE 802.1w

MST IEEE 802.1s

STP IEEE 802.1d

LACP IEEE 802.1AD

Dot1Q trunking IEEE 802.1Q

PVST+ Cisco

RPVST+ Cisco

PagP Cisco

Timer Absence Purpose

Hello 2 sec Breach at which the basis sends Hellos

Forward

Delay

15 sec Time that about-face leaves a anchorage in alert accompaniment and acquirements state;

also acclimated as the abbreviate CAM abeyance timer

Maxage 20 sec Time afterwards audition a Hello afore assertive that the basis has

failed

IP Acclamation Practice

12

Chapter 4

Table 4-2

Classful Arrangement Review

Table 4-12

RFC 1918 Clandestine Abode Space

Table 4-13

NAT Terminology

Class of

Address

Size of Network

and Host Parts of

the Addresses

Range of

First Octet

Values

Default Mask

for Anniversary Class

of Network

Identifying Bits

at Beginning of

Address

A 8/24 1–126 255.0.0.0 0

B 16/16 128–191 255.255.0.0 10

C 24/8 192–223 255.255.255.0 110

D — 224–239 — 1110

E — 240–255 — 1111

Range of IP Addresses Class of Networks Cardinal of Networks

10.0.0.0 to 10.255.255.255 A 1

172.16.0.0 to 172.31.255.255 B 16

192.168.0.0 to

192.168.255.255

C 256

Name

Location of Host

Represented by Address

IP Abode Space in Which

Address Exists

Inside Bounded abode Central the activity arrangement Allotment of the activity IP address

space; about a clandestine IP

address

Inside Global abode Central the activity arrangement Allotment of the accessible IP abode space

Outside Bounded abode In the accessible Internet; or,

outside the enterprise

network

Part of the activity IP address

space; about a clandestine IP

address

Outside Global abode In the accessible Internet; or,

outside the enterprise

network

Part of the accessible IP abode space

13

CCIE Acquisition and Switching Exam Certification Guide

Table 4-14

Variations on NAT

Table 4-15

Protocols and Standards for Chapter 4

Name Function

Static NAT Statically correlates the aforementioned accessible IP abode for use by

the aforementioned bounded host every time. Does not conserve IP

addresses.

Dynamic NAT Pools the accessible accessible IP addresses, aggregate amid a

group of bounded hosts, but with alone one bounded host at a time

using a accessible IP address. Does not conserve IP addresses.

Dynamic NAT with afflict (PAT) Like activating NAT, but assorted bounded hosts allotment a single

public IP abode by multiplexing application TCP and UDP

port numbers. Conserves IP addresses.

NAT for overlapping abode Can be done with any of the aboriginal three types. Translates

both antecedent and destination addresses, instead of aloof the

source (for packets activity from activity to the Internet).

Name Affiliated In

IP RFC 791

Subnetting RFC 950

NAT RFC 1631

Private acclamation RFC 1918

CIDR RFCs 1517–1520

IP Acclamation Practice

14

Table 4-17

IP Attack Fields

Field Meaning

Version Adaptation of the IP protocol. Best networks use IPv4 today, with IPv6

becoming added popular. The attack architecture reflects IPv4.

Header Breadth Defines the breadth of the IP header, including addition fields. Because the

length of the IP attack charge consistently be a assorted of 4, the IP attack length

(IHL) is assorted by 4 to accord the absolute cardinal of bytes.

DS Acreage Differentiated Services Field. This byte was originally alleged the Blazon of

Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is

used for appearance packets for the purpose of applying altered affection of

service (QoS) levels to altered packets.

Packet Breadth Identifies the absolute breadth of the IP packet, including the data.

Identification Acclimated by the IP packet breach process. If a distinct packet is

fragmented into assorted packets, all $.25 of the aboriginal packet

contain the aforementioned identifier, so that the aboriginal packet can be reassembled.

Flags 3 $.25 acclimated by the IP packet breach process.

Fragment Offset A cardinal set in a fragment of a above packet that identifies the fragment’s

location in the above aboriginal packet.

Time to Live (TTL) A bulk acclimated to anticipate acquisition loops. Routers cutback this acreage by 1

each time the packet is forwarded; already it decrements to 0, the packet is

discarded.

Protocol A acreage that identifies the capacity of the abstracts allocation of the IP packet. For

example, agreement 6 implies a TCP attack is the aboriginal affair in the IP packet

data field.

Header Checksum A bulk acclimated to abundance a anatomy analysis arrangement (FCS) value, whose purpose

is to actuate if any bit errors occurred in the IP attack (not the data)

during transmission.

Source IP Abode The 32-bit IP abode of the sender of the packet.

Destination IP

Address

The 32-bit IP abode of the advised almsman of the packet.

Optional Header

Fields and Padding

IP supports added attack fields for approaching amplification via optional

headers. Also, if these addition headers do not use a assorted of 4 bytes,

padding bytes are added, comprised of all bifold 0s, so that the attack is a

multiple of 4 bytes in length.

15

CCIE Acquisition and Switching Exam Certification Guide

Table 4-18

IP Agreement Acreage Values

Chapter 5

Table 5-2

Comparing RARP, BOOTP, and DHCP

Table 5-3

SNMP Adaptation Summaries

Protocol Name Agreement Number

ICMP 1

TCP 6

UDP 17

EIGRP 88

OSPF 89

PIM 103

Feature RARP BOOTP DHCP

Relies on server to admeasure IP addresses Yes Yes Yes

Encapsulates letters central IP and UDP, so they can be

forwarded to a alien server

No Yes Yes

Client can ascertain its own mask, gateway, DNS, and download

server

No Yes Yes

Dynamic abode appointment from a basin of IP addresses,

without acute adeptness of applicant MACs

No No Yes

Allows acting charter of IP abode No No Yes

Includes extensions for registering client’s FQDN with a DNS No No Yes

SNMP

Version Description

1 Uses SMIv1, simple affidavit with communities, but acclimated MIB-I originally.

2 Uses SMIv2, removed claim for communities, added GetBulk and Inform

messages, but began with MIB-II originally.

2c Pseudo-release (RFC 1905) that accustomed SNMPv1-style communities with SNMPv2;

otherwise agnate to SNMPv2.

3 Mostly identical to SNMPv2, but adds decidedly bigger security, although it

supports communities for astern compatibility. Uses MIB-II.

IP Acclamation Practice

16

Table 5-4

SNMP Agreement Letters (RFCs 1157 and 1905)

Message

Initial

Version

Response

Message

Typically

Sent By Main Purpose

Get 1 Acknowledgment Administrator A appeal for a single

variable’s value.

GetNext 1 Acknowledgment Administrator A appeal for the next

single MIB blade variable

in the MIB tree.

GetBulk 2 Acknowledgment Administrator A appeal for multiple

consecutive MIB

variables with one

request. Useful for

getting complex

structures, for example,

an IP acquisition table.

Response 1 None Abettor Acclimated to acknowledge with

the advice in Get

and Set requests.

Set 1 Acknowledgment Administrator Beatific by a administrator to an

agent to acquaint the abettor to

set a capricious to a

particular value. The

agent replies with a

Response message.

Trap 1 None Abettor Allows agents to send

unsolicited information

to an SNMP manager.

The administrator does not

reply with any SNMP

message.

Inform 2 Acknowledgment Administrator A bulletin used

between SNMP

managers to acquiesce MIB

data to be exchanged.

17

CCIE Acquisition and Switching Exam Certification Guide

Table 5-5

Protocols and Standards for Chapter 5

Chapter 6

Table 6-2 Matching Argumentation and Load-Balancing Options for Anniversary Switching Path

Name Affiliated In

ARP RFC 826

Proxy ARP RFC 1027

RARP RFC 903

BOOTP RFC 951

DHCP RFC 2131

DHCP FQDN advantage Internet-Draft

HSRP Cisco proprietary

VRRP RFC 3768

GLBP Cisco proprietary

CDP Cisco proprietary

NTP RFC 1305

Syslog RFC 3164

SNMP Adaptation 1 RFCs 1155, 1156, 1212, 1157, 1213, 1215

SNMP Adaptation 2 RFCs 1902–1907, 3416

SNMP Adaptation 2c RFC 1901

SNMP Adaptation 3 RFCs 2578–2580, 3410–3415

Good Starting Point: RFC 3410

Switching Path

Tables that Authority the Forwarding

Information Load-Balancing Method

Process switching Acquisition table Per packet

Fast switching Fast-switching accumulation (per breeze route

cache)

Per destination IP address

CEF FIB and adjacency tables Per a assortment of the packet antecedent and

destination, or per packet

IP Acclamation Practice 18

Table 6-3 Facts and Behavior Related to InARP

1Point-to-point interfaces avoid InARP letters because of their “send all packets for addresses in this subnet using

the alone DLCI on the subinterface” logic.

Table 6-5 MLS Band 3 Interfaces

Fact/Behavior Point-to-Point Multipoint or Physical

Does InARP crave LMI? Consistently Always

Is InARP enabled by default? Yes Yes

Can InARP be disabled? No Yes

Ignores accustomed InARP messages? Always1 Back InARP is disabled

Interface

Forwarding to

Adjacent Device

Configuration

Requirements

VLAN interface Uses Band 2 argumentation and L2 MAC

address table

Create VLAN interface;

VLAN charge additionally exist

Physical (routed) interface Assiduously out concrete interface Use no switchport command

to actualize a baffled interface

PortChannel (switched)

interface

Not applicable; aloof acclimated as

another Band 2 forwarding path

No appropriate configuration;

useful in affiliation with

VLAN interfaces

PortChannel (routed)

interface

Balances above links in

PortChannel

Needs no switchport

command in adjustment to be used

as a baffled interface;

optionally change loadbalancing

method

19 CCIE Acquisition and Switching Exam Certification Guide

Table 6-6 Action Acquisition Instructions (set Commands)

Table 6-7 Protocols and Standards for Chapter 6

Command Comments

set ip next-hop ip-address [...ip-address] Next-hop addresses charge be in a connected

subnet; assiduously to the aboriginal abode in the list

for which the associated interface is up.

set ip absence next-hop ip-address [...ip-address] Aforementioned argumentation as antecedent command, except

policy acquisition aboriginal attempts to avenue based on

the acquisition table.

set interface interface-type interface-number

[...interface-type interface-number]

Forwards packets application the aboriginal interface in

the account that is up.

set absence interface interface-type interfacenumber

[...interface-type interface-number]

Same argumentation as antecedent command, except

policy acquisition aboriginal attempts to avenue based on

the acquisition table.

set ip antecedence cardinal | name Sets IP antecedence bits; can be decimal value

or ASCII name.

set ip tos [number] Next-hop addresses charge be in a connected

subnet; assiduously to the aboriginal abode in the list

for which the associated interface is up.

Name Affiliated In

Address Resolution Agreement (ARP) RFC 826

Reverse Abode Resolution Agreement (RARP) RFC 903

Frame Relay Inverse ARP (InARP) RFC 2390

Frame Relay Multiprotocol Encapsulation RFC 2427

Differentiated Services Cipher Point (DSCP) RFC 2474

IP Acclamation Practice 20

Chapter 7

Table 7-2 RIP Feature Summary

*RIPv2-only features

Function Description

Transport UDP, anchorage 520.

Metric Hop count, with 15 as the best accessible metric, and 16

considered to be infinite.

Hello breach None; RIP relies on the approved abounding acquisition updates

instead.

Update destination Bounded subnet advertisement (255.255.255.255) for RIPv1;

224.0.0.9 multicast for RIPv2.

Update breach 30 seconds.

Full or fractional updates Abounding updates anniversary interval. For on-demand circuits, allows

RIP to accelerate abounding updates once, and again abide bashful until

changes occur, per RFC 2091. Abounding updates anniversary interval.

Triggered updates Yes, back routes change.

Multiple routes to the aforementioned subnet Allows installing 1 to 6 (default 4) equal-metric routes to

the aforementioned subnet in a distinct acquisition table.

Authentication* Allows both plain-text and MD5 authentication.

Subnet affectation in updates* RIPv2 transmits the subnet affectation with anniversary route, thereby

supporting VLSM, authoritative RIPv2 classless. This feature

also allows RIPv2 to abutment discontiguous networks.

VLSM* Accurate as a aftereffect of the admittance of subnet masks in

the acquisition updates.

Route Tags* Allows RIP to tag routes as they are redistributed into RIP.

Next-Hop field* Supports the appointment of a next-hop IP abode for a

route, acceptance a router to acquaint a next-hop router that

is altered from itself.

21 CCIE Acquisition and Switching Exam Certification Guide

Table 7-3 RIP Features Related to Convergence and Loop Prevention

Table 7-4 RIP Per-Interface Actions, and How to Disable Them Already Enabled

Function Description

Split border Instead of announcement all routes out a accurate interface, RIP omits the routes

whose approachable interface acreage matches the interface out which the amend would

be sent.

Triggered

update

The actual sending of a new amend back acquisition advice changes,

instead of cat-and-mouse for the Amend timer to expire.

Route

poisoning

The activity of sending an infinite-metric (hop calculation 16) avenue in acquisition updates

when that avenue fails.

Poison about-face The act of announcement a berserk avenue (metric 16) out an interface, but in

reaction to accepting that aforementioned berserk avenue in an amend accustomed on that same

interface.

Update timer The timer that specifies the time breach over which updates are sent. Each

interface uses an absolute timer, behind to 30 seconds.

Holddown

timer

A per-route timer (default 180 seconds) that begins back a route’s metric

changes to a above value. The router does not add an addition avenue for this

subnet to its acquisition table until the Holddown timer for that avenue expires.

Invalid timer A per-route timer that increases until it receives a acquisition amend that confirms

the avenue is still valid, aloft which the timer is displace to 0. If the updates cease, the

Invalid timer will abound until it alcove the timer ambience (default 180 seconds),

after which the avenue is advised invalid.

Flush

(Garbage)

timer

A per-route timer that is displace and grows with the Invalid timer. Back the Flush

timer mark is accomplished (default 240 seconds), the router removes the avenue from

the acquisition table and accepts new routes to the bootless subnet.

RIP Function How to Disable

Sending RIP updates Make the interface passive: configure router rip, followed by passiveinterface

type number

Listening for RIP updates Clarify all admission routes application a administer list

Advertising the

connected subnet

Filter outbound advertisements on added interfaces application distribute

lists, clarification an interface’s affiliated subnet

IP Acclamation Practice 22

Table 7-5 Protocols and Standards for Chapter 7

Chapter 8

Table 8-2 EIGRP Feature Summary

Protocol or Feature Standard

RIP (Version 1) RFC 1058

RIP (Version 2) RFC 2453

RIP Amend Affidavit RFC 2082

RIP Triggered Extensions for On-Demand Circuits RFC 2091

Feature Description

Transport IP, agreement blazon 88 (does not use UDP or TCP).

Metric Based on accountable bandwidth and accumulative adjournment by default,

and optionally load, reliability, and MTU.

Hello breach Breach at which a router sends EIGRP Hello letters on an

interface.

Hold timer Timer acclimated to actuate back a adjoining router has failed,

based on a router not accepting any EIGRP messages, including

Hellos, in this timer period.

Update destination abode Normally beatific to 224.0.0.9, with retransmissions actuality beatific to each

neighbor’s unicast IP address.

Full or fractional updates Abounding updates are acclimated back new neighbors are discovered;

otherwise, fractional updates are used.

Authentication Supports MD5 affidavit only.

23 CCIE Acquisition and Switching Exam Certification Guide

Table 8-2 EIGRP Feature Summary

Table 8-3 EIGRP Features Related to Convergence

Feature Description

VLSM/classless EIGRP includes the affectation with anniversary route, additionally acceptance it to

support discontiguous networks and VLSM.

Route Tags Allows EIGRP to tag routes as they are redistributed into EIGRP.

Next-hop acreage Supports the advertisement of routes with a altered next-hop

router than the announcement router.

Manual avenue summarization Allows avenue summarization at any point in the EIGRP network.

Multiprotocol Supports the advertisement of IPX and AppleTalk routes.

EIGRP Convergence

Function Description

Reported ambit (RD) The metric (distance) of a avenue as appear by a adjoining router

Feasible ambit (FD) The metric bulk for the lowest-metric aisle to adeptness a accurate subnet

Feasibility activity Back assorted routes to adeptness one subnet exist, the case in which one

route’s RD is lower than the FD

Successor avenue The avenue to anniversary destination prefix for which the metric is the lowest

metric

Feasible almsman (FS) A avenue that is not a almsman avenue but meets the achievability condition;

can be acclimated back the almsman avenue fails, afterwards causing loops

Input accident Any accident that could change a router’s EIGRP cartography table

Local ciphering An EIGRP router’s acknowledgment to an ascribe event, arch to the use of a

feasible almsman or activity alive on a route

IP Acclamation Practice 24

Table 8-4 EIGRP Features Related to Convergence

Table 8-5 EIGRP Avenue Load-Balancing Commands

Table 8-7 EIGRP Bulletin Summary

Option This Router Is Accustomed To

connected Acquaint affiliated routes, but alone for interfaces akin with a network

command.

summary Acquaint autosummarized or statically configured arbitrary routes.

static Acquaint changeless routes, bold the redistribute changeless command is configured.

redistributed Acquaint redistributed routes, bold redistribution is configured.

receive-only Not acquaint any routes. This advantage cannot be acclimated with any added option.

Router EIGRP

Subcommand Meaning

variance Any FS avenue whose metric is beneath than the about-face bulk multiplied

by the FD is added to the acquisition table (within the restrictions of the

maximum-paths command).

maximum-paths {1..16} The best cardinal of routes to the aforementioned destination accustomed in the

routing table. Defaults to 4.

traffic-share counterbalanced The router balances above the routes, giving added packets to lowermetric

routes.

no traffic-share

balanced

The router balances above the routes equally, behindhand of metrics.

traffic-share min

across-interfaces

Although assorted routes are installed, sends cartage application alone the

lowest-metric routes.

EIGRP

Packet Purpose

Hello Identifies neighbors, exchanges parameters, and is beatific periodically as a keepalive

function

Update Informs neighbors about acquisition information

Ack Acknowledges Update, Query, and Acknowledgment packets

Query Asks adjoining routers to verify their avenue to a accurate subnet

Reply Beatific by neighbors to acknowledgment to a Query

Goodbye Acclimated by a router to acquaint its neighbors back the router is alluringly shutting down

25 CCIE Acquisition and Switching Exam Certification Guide

Chapter 9

Table 9-2 OSPF Messages

Table 9-3 OSPF Arrangement Types

1 Absence on Anatomy Relay point-to-point subinterfaces.

2 Absence on Anatomy Relay concrete and multipoint subinterfaces.

Message Description

Hello Acclimated to ascertain neighbors, accompany a acquaintance accord to a 2-way

state, and adviser a neighbor’s admiration in case it fails

Database Description

(DD or DBD)

Used to barter abrupt versions of anniversary LSA, about on initial

topology exchange, so that a router knows a account of that neighbor’s LSAs

Link-State Request

(LSR)

A packet that identifies one or added LSAs about which the sending

router would like the acquaintance to accumulation abounding capacity about the LSAs

Link-State Update

(LSU)

A packet that contains absolutely abundant LSAs, about beatific in acknowledgment to

an LSR message

Link-State

Acknowledgement

(LSAck)

Sent to affirm cancellation of an LSU message

Interface Type

Uses DR/

BDR?

Default

Hello

Interval

Requires a

neighbor

Command?

More than Two

Hosts Allowed

in the Subnet?

Broadcast Yes 10 No Yes

Point-to-point1 No 10 No No

Nonbroadcast2 (NBMA) Yes 30 Yes Yes

Point-to-multipoint No 30 No Yes

Point-to-multipoint nonbroadcast No 30 Yes Yes

Loopback No — — No

IP Acclamation Practice 26

Table 9-4 OSPF LSA Types

Table 9-5 OSPF Chubby Breadth Types

LSA

Type Accepted Name Description

1 Router One per router, advertisement RID and all interface IP

addresses. Represents butt networks as well.

2 Arrangement One per alteration network. Created by the DR on the

subnet, and represents the subnet and the router

interfaces affiliated to the subnet.

3 Net Arbitrary Created by ABRs to represent one area’s blazon 1

and 2 LSAs back actuality advertised into another

area. Defines the links (subnets) in the agent area,

and cost, but no cartography data.

4 ASBR Arbitrary Like a blazon 3 LSA, except it advertises a host

route acclimated to adeptness an ASBR.

5 AS Alien Created by ASBRs for alien routes injected

into OSPF.

6 Group Membership Authentic for MOSPF; not accurate by Cisco IOS.

7 NSSA Alien Created by ASBRs central an NSSA area, instead

of a blazon 5 LSA.

8 Alien Attributes Not implemented in Cisco routers.

9–11 Opaque Acclimated as all-encompassing LSAs to acquiesce for accessible future

extension of OSPF; for example, blazon 10 has been

adapted for MPLS cartage engineering.

Area Type

Stops Bang of

Type 5 LSAs?

Stops Bang of

Type 3 LSAs?

Allows Creation of

Type 7 LSAs Inside

the Area?

Stub Yes No No

Totally chubby Yes Yes No

Not-so-stubby area

(NSSA)

Yes No Yes

Totally NSSA Yes Yes Yes

27 CCIE Acquisition and Switching Exam Certification Guide

Table 9-6 Butt Breadth Agreement Options

Table 9-7 OSPF Affidavit Types

Table 9-8 Effect of the breadth affidavit Command on OSPF Interface Affidavit Settings

Stub Blazon Router OSPF Subcommand

NSSA breadth area-id nssa

Totally NSSA breadth area-id nssa no-summary

Stub breadth area-id stub

Totally chubby breadth area-id butt no-summary

Type Meaning

Enabling Interface

Subcommand

Authentication Key Configuration

Interface Subcommand

0 None ip ospf affidavit absent —

1 Clear argument ip ospf affidavit ip ospf authentication-key key-value

2 MD5 ip ospf authentication

message-digest

ip ospf message-digest-key key-number

md5 key-value

area affidavit COMMAND Interfaces in That Breadth Absence to Use...

Blazon 0

area num affidavit Blazon 1

area num affidavit message-digest Blazon 2

IP Acclamation Practice 28

Table 9-9 Configuring OSPF Affidavit on Virtual Links

Table 9-10 Protocols and Corresponding Standards for Chapter 9

Type Command Syntax for Virtual Links

0 breadth num virtual-link router-id affidavit null

1 breadth num virtual-link router-id affidavit authentication-key key-value

2 breadth num virtual-link router-id affidavit message-digest message-digest-key

key-num md5 key-value

Name Standard

OSPF Adaptation 2 RFC 2328

The OSPF Opaque LSA Advantage RFC 2370

The OSPF Not-So-Stubby Breadth (NSSA) Advantage RFC 3101

OSPF Butt Router Advertisement RFC 3137

Traffic Engineering (TE) Extensions to OSPF Adaptation 2 RFC 3630

Graceful OSPF Restart RFC 3623

29 CCIE Acquisition and Switching Exam Certification Guide

Table 9-12 OSPF Timer Summary

Timer Meaning

Maxage The best time an LSA can be in a router’s LSDB, afterwards accepting a

newer archetype of the LSA, afore the LSA is removed. Absence is 3600 seconds.

LSRefresh The timer breach per LSA on which a router refloods an identical LSA, except

for a 1-larger arrangement number, to anticipate the cessation of Maxage. Absence is

1800 seconds.

Hello Per interface; time breach amid Hellos. Absence is 10 or 30 seconds,

depending on interface type.

Dead Per interface; time breach in which a Hello should be accustomed from a neighbor.

If not received, the acquaintance is advised to accept failed. Absence is four times

Hello.

Wait Per interface; set to the aforementioned cardinal as the asleep interval. Defines the time a

router will delay to get a Hello asserting a DR afterwards extensive a 2WAY accompaniment with

that neighbor.

Retransmission Per interface; the time amid sending an LSU, not accepting an

acknowledgement, and again resending the LSU. Absence is 5 seconds.

Inactivity Countdown timer, per neighbor, acclimated to ascertain back a acquaintance has not been

heard from for a complete asleep interval. It starts according to the asleep interval,

counts down, and is displace to be according to the asleep breach back anniversary Hello is

received.

Poll Breach On NBMA networks, the aeon at which Hellos are beatific to a acquaintance back the

neighbor is down. Absence is 60 seconds.

Flood (Pacing) Per interface; defines the breach amid alternating LSUs back flooding

LSAs. Absence is 33 ms.

Retransmission

(Pacing)

Per interface; defines the breach amid retransmitted packets as allotment of a

single retransmission event. Absence is 66 ms.

Lsa-group

(Pacing)

Per OSPF process. LSA’s LSRefresh intervals time out independently. This timer

improves LSU reflooding adeptness by waiting, accession several LSAs whose

LSRefresh timers expire, and calamity all these LSAs together. Absence is

240 seconds.

IP Acclamation Practice 30

Table 9-13 OSPF Acquaintance States

Table 9-14 OSPF Numeric Ranges

State Meaning

Down No Hellos accept been accustomed from this acquaintance for added than the asleep interval.

Attempt This router is sending Hellos to a manually configured neighbor.

Init A Hello has been accustomed from the neighbor, but it did not accept the router’s RID in it.

This is a abiding accompaniment back Hello ambit do not match.

2WAY A Hello has been accustomed from the neighbor, and it has the router’s RID in it. This is

a abiding accompaniment for pairs of DROther neighbors.

ExStart Currently negotiating the DD arrangement numbers and master/slave argumentation acclimated for DD

packets.

Exchange Finished negotiating, and currently exchanging DD packets.

Loading All DD packets exchanged, and currently affairs the complete LSDB entries with

LSU packets.

Full Neighbors are adjoining (fully adjacent), and should accept identical LSDB entries for

the breadth in which the articulation resides. Acquisition table calculations begin.

Setting Ambit of Values

Single interface bulk 1 to 65,535 (216 – 1)

Complete avenue bulk 1 to 16,777,215 (224 – 1)

Infinite avenue bulk 16,777,215 (224 – 1)

Reference bandwidth (units: Mbps) 1 to 4,294,967

OSPF PID 1 to 65,535 (216 – 1)

31 CCIE Acquisition and Switching Exam Certification Guide

Chapter 10

Table 10-6 Administrative Distances

Table 10-7 Absence Metrics and Avenue Metric Types in IGP Avenue Redistribution

Route Blazon Administrative Distance

Connected 0

Static 1

EIGRP arbitrary avenue 5

EBGP 20

EIGRP (internal) 90

IGRP 100

OSPF 110

IS-IS 115

RIP 120

EIGRP (external) 170

iBGP 200

Unreachable 255

IGP into Which Routes Are

Redistributed

Default

Metric Absence (and Possible) Metric Types

RIP None RIP has no abstraction of alien routes

EIGRP None External

OSPF 20/1* E2 (E1 or E2)

IS-IS 0 L1 (L1, L2, L1/L2, or external)

IP Acclamation Practice 32

Table 10-8 IGP Adjustment of Antecedence for Choosing Routes Afore Considering the Metric

Table 10-9 OSPF Avenue Summarization Commands

Table 10-10 Four Methods for Acquirements Absence Routes

IGP Adjustment of Antecedence of Metric

RIP No added considerations

EIGRP Internal, again external

OSPF Intra-area, inter-area, E1, again E2*

IS-IS L1, L2, external

Where acclimated Command

ASBR summary-address {{ip-address mask} | {prefix mask}} [not-advertise]

[tag tag]

ABR breadth area-id ambit ip-address affectation [advertise | not-advertise] [cost cost]

Feature RIP EIGRP OSPF

Static avenue to 0.0.0.0, with the redistribute changeless command Yes Yes No

The default-information arise command Yes No Yes

The ip default-network command Yes Yes No

Using arbitrary routes No Yes No

33 CCIE Acquisition and Switching Exam Certification Guide

Chapter 11

Table 11-2 BGP Acquaintance Arbitrary Table

BGP Feature Description and Values

TCP anchorage 179

Setting the keepalive breach and authority time

(using the bgp timers keepalive holdtime

router subcommand or acquaintance timers

command, per neighbor)

Default to 60 and 180 seconds; ascertain time

between keepalives and time for which silence

means the acquaintance has failed

What makes a acquaintance centralized BGP

(iBGP)?

Neighbor is in the aforementioned AS

What makes a acquaintance alien BGP

(eBGP)?

Neighbor is in addition AS

How is the BGP router ID (RID) determined? In order:

The bgp router-id command

The accomplished IP of an up/up loopback at the time

that the BGP activity starts

The accomplished IP of addition up/up interface at the

time that the BGP activity starts.

How is the antecedent IP abode acclimated to adeptness a

neighbor determined?

Defined with the acquaintance update-source

command; or, by default, uses the outgoing

interface IP abode for the avenue acclimated to adeptness the

neighbor

How is the destination IP abode acclimated to

reach a acquaintance determined?

Explicitly authentic on the acquaintance command

Auto-summary* Off by default, enabled with auto-summary

router subcommand

Neighbor affidavit MD5 only, application the acquaintance password

command

IP Acclamation Practice 34

Table 11-3 BGP Acquaintance States

Table 11-4 BGP Bulletin Types

Table 11-5 Key Features of the BGP arrangement Command

State

Listen for

TCP?

Initiate

TCP?

TCP

Up?

Open

Sent?

Open

Received?

Neighbor

Up?

Idle No

Connect Yes

Active Yes Yes

Open beatific Yes Yes Yes Yes

Open

confirm

Yes Yes Yes Yes Yes

Established Yes Yes Yes Yes Yes Yes

Message Purpose

Open Acclimated to authorize a acquaintance accord and barter basal parameters.

Keepalive Acclimated to advance the acquaintance relationship, with nonreceipt of a keepalive

message aural the adjourned Authority timer causing BGP to accompany bottomward the

neighbor connection. (The timers can be configured with the bgp timers

keepalive holdtime subcommand or the acquaintance [ip-address | peer-group-name]

timers keepalive holdtime BGP subcommand.)

Update Acclimated to barter acquisition information, as covered added absolutely in the abutting section.

Notification Acclimated back BGP errors occur; causes a displace to the acquaintance accord when

sent.

Feature Implication

No affectation is configured Assumes the absence classful mask.

Matching argumentation with no auto-summary

configured

An IP avenue charge bout both the prefix and prefix

length (mask).

Matching argumentation with auto-summary

configured

If the arrangement command lists a classful network, it

matches if any subnets of the classful arrangement exist.

NEXT_HOP of BGP avenue added to the

BGP table*

Uses abutting hop of IP route.

Maximum cardinal injected by the

network command into one BGP process

200

Purpose of the route-map advantage on the

network command

Can be acclimated to clarify routes and dispense PAs,

including NEXT_HOP*.

35 CCIE Acquisition and Switching Exam Certification Guide

Table 11-6 Summary: Injecting Arbitrary Routes in BGP

Table 11-7 BGP ORIGIN Codes

Table 11-8 Arbitrary of Rules Regarding Which Routes BGP Does Not Include in an Update

Table 11-9 Conditions for Changing the NEXT_HOP PA

Command

Component

Subnets Removed Routes It Can Summarize

auto-summary (with

redistribution)

All Alone those injected into BGP on that router

using the redistribute command

aggregate-address All, none, or a subset Any prefixes already in the BGP table

auto-summary (with the

network command)

None Alone those injected into BGP on that router

using the arrangement command

ORIGIN Code

Cisco IOS

Notation

Used for Routes Injected Due to the Following

Commands

IGP i network, aggregate-address (in some cases), and neighbor

default-originate commands

EGP e Exterior Aperture Agreement (EGP). No specific commands

apply.

Incomplete ? redistribute, aggregate-address (in some cases), and

default- advice arise command

iBGP and/or eBGP Routes Not Taken from the BGP Table

Both Routes that are not advised “best”

Both Routes akin by a abjure article in an outbound BGP filter

iBGP iBGP-learned routes*

eBGP Routes whose AS_PATH includes the ASN of the eBGP associate to

which a BGP Amend will be sent

Type of

Neighbor

Default Activity for Advertised

Routes

Command to About-face to Other

Behavior

iBGP Do not change the NEXT_HOP neighbor… next-hop-self

eBGP Change the NEXT_HOP to the update

source IP address

neighbor… next-hop- unchanged

IP Acclamation Practice 36

Table 11-10 BGP Subcommands Acclimated for Confederations

Table 11-11 Types of Neighbors to Which Prefixes Are Reflecte

Table 11-13 BGP PAs

Purpose Command

Define a router’s sub-AS router bgp sub-as

Define the accurate AS bgp amalgamation identifier asn

To analyze a adjoining AS as addition sub-AS bgp amalgamation aeon sub-asn

Location from Which a

Prefix Is Learned

Are Routes Advertised to

Clients?

Are Routes Advertised to

Non-clients?

Client Yes Yes

Non-client Yes No

eBGP Yes Yes

Path Attribute Description Characteristics

AS_PATH Lists ASNs through which the avenue has

been advertised

Well accepted Mandatory

NEXT_HOP Lists the next-hop IP abode acclimated to

reach an NLRI

Well accepted Mandatory

AGGREGATOR Lists the RID and ASN of the router that

created a arbitrary NLRI

Optional Transitive

ATOMIC_AGGREGA TE Tags a arbitrary NLRI as actuality a

summary

Well known

Discretionary

ORIGIN Bulk implying from area the route

was taken for bang into BGP; i(IGP),

e (EGP), or ? (incomplete information)

Well accepted Mandatory

ORIGINATOR_ID Acclimated by RRs to denote the RID of the

iBGP acquaintance that injected the NLRI

into the AS

Optional

Nontransitive

CLUSTER_LIST Acclimated by RRs to account the RR array IDs in

order to anticipate loops

Optional

Nontransitive

37 CCIE Acquisition and Switching Exam Certification Guide

Table 11-14 Summary: Methods to Introduce Entries into the BGP Table

Chapter 12

Table 12-2 IP Antecedence Ethics and Names

Method Arbitrary Description

network command Advertises a avenue into BGP. Depends on the actuality of the

configured network/subnet in the IP acquisition table.

Redistribution Takes IGP, static, or affiliated routes; metric (MED)

assignment is not required.

Manual summarization Requires at atomic one basic subnet in the BGP table;

options for befitting all basic subnets, suppressing all

from advertisement, or suppressing a subset from being

advertised.

default-information arise Requires a absence avenue in the IP acquisition table, additional the

redistribute command.

neighbor default- arise With the addition avenue map, requires the avenue map to match

the IP acquisition table with a admittance activity afore announcement a

default route. Afterwards the avenue map, the absence is always

advertised.

Name Decimal Bulk Bifold Value

Routine Antecedence 0 000

Priority Antecedence 1 001

Immediate Antecedence 2 010

Flash Antecedence 3 011

Flash Override Antecedence 4 100

Critic/Critical Antecedence 5 101

Internetwork Control Antecedence 6 110

Network Control Antecedence 7 111

IP Acclamation Practice 38

Table 12-3 Absence and Class Selector DSCP Values

Table 12-5 Appearance Acreage Summary

Table 12-9 RFC-Recommended Ethics for Marking

DSCP Class

Selector Names

Binary DSCP

Values

IPP Binary

Values IPP Names

Default/CS0* 000000 000 Routine

CS1 001000 001 Priority

CS2 010000 010 Immediate

CS3 011000 011 Flash

CS4 100000 100 Flash Override

CS5 101000 101 Critic/Critical

CS6 110000 110 Internetwork Control

CS7 111000 111 Arrangement Control

Field Location Length

IP Antecedence (IPP) IP attack 3 bits

IP DSCP IP attack 6 bits

DS acreage IP attack 1 byte

ToS byte IP attack 1 byte

CoS ISL and 802.1Q attack 3 bits

Discard Eligible (DE) Anatomy Relay attack 1 bit

Cell Loss Antecedence (CLP) ATM corpuscle attack 1 bit

MPLS Experimental MPLS attack 3 bits

Type of Cartage CoS IPP DSCP

Voice burden 5 5 EF

Video burden 4 4 AF41

Voice/video signaling 3 3 CS3

Mission-critical abstracts 3 3 AF31, AF32, AF33

Transactional abstracts 2 2 AF21, AF22, AF23

Bulk abstracts 1 1 AF11, AF12, AF13

Best accomplishment 0 0 BE

Scavenger (less than best effort) 0 0 2, 4, 6

39 CCIE Acquisition and Switching Exam Certification Guide

Table 12-10 Area to Use the qos pre-classify Command

Chapter 13

Table 13-2 Key Comparison Points for Queuing Tools

Table 13-3 CBWFQ Functions and Features

1 Cisco 7500 alternation routers abutment FIFO or WFQ in all the CBWFQ queues.

Configuration Command Under Which

qos pre-classify Is Configured VPN Type

interface adit GRE and IPIP

interface virtual-template L2F and L2TP

crypto map IPsec

Feature Definition

Classification The adeptness to attending at packet headers to accept the appropriate chain for

each packet

Drop action The rules acclimated to accept which packets to bead as queues activate to

fill

Scheduling The argumentation acclimated to actuate which packet should be dequeued next

Maximum cardinal of queues Defines the cardinal of altered classes of packets for a queuing tool

Maximum chain breadth The best cardinal of packets in a distinct queue

CBWFQ Feature Description

Classification Classifies based on annihilation that MQC commands can match

Drop action Tail bead or WRED, configurable per queue

Number of queues 64

Maximum chain breadth Varies based on router archetypal and memory

Scheduling central a distinct chain FIFO on 63 queues; FIFO or WFQ on class-default queue1

Scheduling amid all queues Aftereffect of the scheduler provides a allotment of guaranteed

bandwidth to anniversary queue

IP Acclamation Practice 40

Table 13-5 Reference for CBWFQ Bandwidth Reservation

Table 13-6 Queuing Agreement Comparison

1 WFQ can be acclimated in the class-default chain or in all CBWFQ queues in 7500 alternation routers.

Table 13-7 WRED Abandon Categories

Method

Amount of Bandwidth

Reserved by the bandwidth

Command

The Sum of Ethics in a Single

Policy Map Charge Be <= …

Explicit bandwidth As listed in commands max-res [ts] int-bw

Percent A allotment of the int-bw max-res setting

Remaining percent A allotment of the reservable

bandwidth (int-bw × max-res)

100

Feature CBWFQ LLQ

Includes a strict-priority chain No Yes

Polices antecedence queues to anticipate starvation No Yes

Reserves bandwidth per chain Yes Yes

Includes able-bodied set of allocation fields Yes Yes

Classifies based on flows Yes1 Yes1

Supports RSVP Yes Yes

Maximum cardinal of queues 64 64

Average Chain Depth

Versus Thresholds Action

WRED Name

for Action

Average <>

Minimum beginning <>

depth <>

A allotment of packets dropped. Drop

percentage increases from 0 to a maximum

percent as the boilerplate abyss moves from the

minimum beginning to the maximum.

Random drop

Average abyss > maximum

threshold

All new packets discarded; agnate to tail

drop.

Full drop

41 CCIE Acquisition and Switching Exam Certification Guide

Table 13-9 Comparison of Cisco 3550 and 3560 Queuing Options

Chapter 14

Table 14-2 Abstraction Terminology

Feature Description 3550 3560

Number of admission queues 1 2

Number of departure queues 4 4

Queue cardinal of accelerate chain 4 Configurable

Granularity for ambience chain weights Interface Interface

Frames classified into queues based on… CoS CoS

Granularity for CoS-to-queue mapping Interface Interface

Expedite chain enabled via priority-queue out interface

subcommand

Yes Yes

Ingress policers per anchorage Fast Ethernet/Gigabit Ethernet 8/128 64/64

QoS departure adjustment Policing Abstraction or

policing

Congestion abstention method/number of thresholds per chain WRR/2 WTD/3

Default scheduler WRR SRR

Drop action WRED WTD

Term Definition

Tc Time interval, abstinent in milliseconds, over which the committed access (Bc) can be

sent. With abounding abstraction tools, Tc = Bc/CIR.

Bc Committed access size, abstinent in bits. This is the bulk of cartage that can be sent

during the Tc interval. About authentic in the cartage contract.

CIR Committed advice rate, in $.25 per second, which defines the amount of a VC

according to the business contract.

Shaped

rate

The rate, in $.25 per second, to which a accurate agreement wants to appearance the

traffic. It may or may not be set to the CIR.

Be Excess access size, in bits. This is the cardinal of $.25 above Bc that can be beatific afterwards a

period of inactivity.

IP Acclamation Practice 42



Table 14-3 CB Abstraction Adding of Absence Variable Settings

Table 14-4 Policing Accomplishments Acclimated CB Policing

Table 14-5 Single-Rate, Two-Color Policing Logic for Categorizing Packets

Table 14-6 Single-Rate Three-Color Policing Logic for Categorizing Packets

Variable Amount <= 320 kbps Amount > 320 kbps

Bc 8000 $.25 Bc = abstraction amount * Tc

Be Be = Bc = 8000 Be = Bc

Tc Tc = Bc/shaping amount 25 ms

Command Advantage Approach and Function

drop Drops the packet

set-dscp-transmit Sets the DSCP and transmits the packet

set-prec-transmit Sets the IP Precedence (0 to 7) and sends the packet

set-qos-transmit Sets the QoS Accumulation ID (1 to 99) and sends the packet

set-clp-transmit Sets the ATM CLP bit (ATM interfaces only) and sends the packet

set-fr-de Sets the Anatomy Relay DE bit (Frame Relay interfaces only) and

sends the packet

transmit Sends the packet

Category Requirements Tokens Drained from Bucket

Conform If Xp <= Xb Xp tokens

Exceed If Xp > Xb None

Category Requirements Tokens Drained from Bucket

Conform Xp <= Xbc Xp tokens from the Bc bucket

Exceed Xp > Xbc and Xp <= Xbe Xp tokens from the Be bucket

Violate Xp > Xbc and Xp > Xbe None

43 CCIE Routing and Switching Exam Certification Guide

Table 14-7 Two-Rate, Three-Color Policing Logic for Categorizing Packets

Table 14-8 Setting CB Policing Bc and Be Defaults

Chapter 15

Table 15-2 Anatomy Relay LMI Types

Table 15-3 Anatomy Relay FECN, BECN, and DE Summary

Category Requirements Tokens Drained from Bucket

Conform Xp <= Xbc Xp tokens from the Bc brazier AND

Xp tokens from the Be bucket

Exceed Xp > Xbc and Xp <= Xbe Xp tokens from the Be bucket

Violate Xp > Xbc and Xp > Xbe None

Type of Policing

Configuration

Telltale Signs in the police

Command Defaults

Single rate, two blush No violate-action configured Bc = CIR/32; Be = 0

Single rate, three blush violate-action is configured Bc = CIR/32; Be = Bc

Dual rate, three blush PIR is configured Bc = CIR/32; Be =

PIR/32

LMI Type Antecedent Document

Cisco IOS lmitype

Parameter

Allowed DLCI

Range (Number)

LMI

DLCI

Cisco Proprietary Cisco 16–1007 (992) 1023

ANSI T1.617 Annex D Ansi 16–991 (976) 0

ITU Q.933 Annex A q933a 16–991 (976) 0

Bit Acceptation Back Set Where Set

FECN Congestion in the aforementioned administration as this anatomy By FR switches in user frames

BECN Congestion in the adverse administration of this

frame

By FR switches or routers in

user or Q.922 analysis frames

DE This anatomy should be alone afore non-DE

frames

By routers or switches in user

frames

IP Acclamation Practice 44

Table 15-4 FR Burden Compression Feature Comparison

Table 15-5 Comparing Legacy and Interface FRF.12

Table 15-6 Protocols and Standards for Chapter 15

Feature Packet-by-Packet FRF.9 Data-Stream

Uses LZS algorithm? Yes Yes Yes

Same concordance for all packets? No Yes Yes

Cisco-proprietary? Yes No Yes

Feature Legacy FRF.12

FRF.12 on the

Interface

Requires FRTS? Yes No

Interleaves by agriculture Dual FIFO interface high

queue from a abstraction PQ?

Yes No

Interleaves by appliance either Dual FIFO or a configured

LLQ policy-map on the concrete interface.

No Yes

Config approach for the frame-relay fragment

command.

map-class Concrete interface

Topic Standard

Frame Relay Encapsulation RFC 2427

Frame Relay Compression FRF.9

Frame Relay LFI FRF.12, FRF.11-c

Frame Relay Account Interworking FRF.8

45 CCIE Routing and Switching Exam Certification Guide

Chapter 16

Table 16-2 Some Well-Known Aloof Multicast Addresses

Table 16-3 Multicast Abode Ranges and Their Use

Address Usage

224.0.0.1 All multicast hosts

224.0.0.2 All multicast routers

224.0.0.4 DVMRP routers

224.0.0.5 All OSPF routers

224.0.0.6 OSPF appointed routers

224.0.0.9 RIPv2 routers

224.0.0.10 EIGRP routers

224.0.0.13 PIM routers

224.0.0.22 IGMPv3

224.0.0.25 RGMP

224.0.1.39 Cisco-RP-Announce

224.0.1.40 Cisco-RP-Discovery

Multicast Abode Ambit Usage

224.0.0.0 to 239.255.255.255 This ambit represents the absolute IPv4 multicast abode space. It

is aloof for multicast applications.

224.0.0.0 to 224.0.0.255 This ambit is allotment of the abiding groups. Addresses from this

range are assigned by IANA for arrangement protocols on a local

segment. Routers do not advanced packets with destination

addresses acclimated from this range.

224.0.1.0 to 224.0.1.255 This ambit is additionally allotment of the abiding groups. Addresses

from this ambit are assigned by IANA for the network

protocols that are forwarded in the absolute network. Routers

forward packets with destination addresses acclimated from this

range.

232.0.0.0 to 232.255.255.255 This ambit is acclimated for SSM applications.

233.0.0.0 to 233.255.255.255 This ambit is alleged the GLOP addressing. It is acclimated for

automatically allocating 256 multicast addresses to any

enterprise that owns a registered ASN.

239.0.0.0 to 239.255.255.255 This ambit is acclimated for clandestine multicast domains. These

addresses are alleged administratively scoped addresses.

Remaining ranges of addresses

in the multicast abode space

Addresses from these ranges are alleged brief groups. Any

enterprise can admeasure a multicast abode from the transient

groups for a all-around multicast application, and should absolution it

when the appliance is no best in use.

IP Acclamation Practice 46

Table 16-4 Important IGMPv2 Timers

Table 16-5 Comparison of IGMPv1, IGMPv2, and IGMPv3

Timer Usage Absence Value

Query Breach A time aeon amid Accepted Queries beatific by a

router.

125 seconds

Query Response

Interval

The best acknowledgment time for hosts to acknowledge to

the alternate accepted Queries.

10 seconds; can be

between .1 and

25.5 seconds

Group

Membership

Interval

A time aeon during which, if a router does not

receive an IGMP Report, the router concludes that

there are no added associates of the accumulation on the

subnet.

260 seconds

Other Querier

Present Interval

A time aeon during which, if the IGMPv2 nonquerier

routers do not accept an IGMP Concern from

the querier router, the non-querier routers conclude

that the querier is dead.

255 seconds

Last Member

Query Interval

The best acknowledgment time amid by IGMPv2

routers into the Group-Specific Queries and the time

period amid two afterwards Group-Specific

Queries beatific for the aforementioned group.

1 second

Version 1

Router Present

Timeout

A time aeon during which, if an IGMPv2 host does

not accept an IGMPv1 Query, the IGMPv2 host

concludes that there are no IGMPv1 routers present

and starts sending IGMPv2 messages.

400 seconds

Feature IGMPv1 IGMPv2 IGMPv3

First Octet Amount for the Query

Message

0x11 0x11 0x11

Group Abode for the General

Query

0.0.0.0 0.0.0.0 0.0.0.0

Destination Abode for the General

Query

224.0.0.1 224.0.0.1 224.0.0.1

Default Concern Breach 60 abnormal 125 abnormal 125 seconds

First Octet Amount for the Report 0x12 0x16 0x22

Group Abode for the Report Joining

multicast group

address

Joining

multicast group

address

Joining multicast

group abode and

source address

Destination Abode for the Report Joining

multicast group

address

Joining

multicast group

address

224.0.0.22

47 CCIE Routing and Switching Exam Certification Guide

Table 16-5 Comparison of IGMPv1, IGMPv2, and IGMPv3

Is Report Suppression Mechanism

Available?

Yes Yes No

Can Best Acknowledgment Time Be

Configured?

No, anchored at 10

seconds

Yes, 0 to 25.5

seconds

Yes, 0 to 53

minutes

Can a Host Accelerate a Leave Group

Message?

No Yes Yes

Destination Abode for the Leave

Group Message

224.0.0.2 224.0.0.22

Can a Router Accelerate a Group-Specific

Query?

No Yes Yes

Can a Host Accelerate Source- and

Group-Specific Reports?

No No Yes

Can a Router Accelerate Source- and

Group-Specific Queries?

No No Yes

Rule for Electing a Querier None—

depends on

multicast

routing

protocol

Router with the

lowest IP

address on the

subnet

Router with the

lowest IP address

on the subnet

Compatible with Added Versions of

IGMP?

No Yes, alone with

IGMPv1

Yes, with both

IGMPv1 and

IGMPv2

IP Acclamation Practice 48

Chapter 17

Table 17-2 Summary of PIM-DM Messages

Table 17-3 Comparison of Methods of Finding the RP

PIM Bulletin Definition

Hello Acclimated to anatomy acquaintance adjacencies with added PIM routers, and to maintain

adjacencies by ecology for accustomed Hellos from anniversary neighbor. Additionally acclimated to

elect a PIM DR on multiaccess networks.

Prune Acclimated to ask a adjoining router to abolish the articulation over which the Prune flows

from that adjoining router’s approachable interface account for a accurate (S,G) SPT.

State Refresh Acclimated by a afterwards router, beatific to an upstream router on an RPF interface,

to account the upstream router to displace its Prune timer. This allows the

downstream router to advance the pruned accompaniment of a link, for a accurate (S,G)

SPT.

Assert Acclimated on multiaccess networks to actuate which router wins the appropriate to

forward multicasts assimilate the LAN, for a accurate (S,G) SPT.

Prune Override

(Join)

On a LAN, a router may multicast a Prune bulletin to its upstream routers.

Other routers on the aforementioned LAN, absent to anticipate the upstream router from

pruning the LAN, anon accelerate addition Accompany bulletin for the (S,G) SPT.

(The Prune Override is not absolutely a Prune Override message—it is a Join.

This is the alone purpose of a Accompany bulletin in PIM-DM, per RFC 3973.)

Graft/Graft-Ack Back a pruned articulation needs to be added aback to an (S,G) SPT, a router sends a

Graft bulletin to its RPF neighbor. The RPF acquaintance acknowledges with a

Graft-Ack.

Method RP Details Mapping Info

Redundant

RP Support?

Load

Sharing of

One Group?

Static Simple advertence to

unicast IP address.

No No

Auto-RP Sends RP-Announce

to 224.0.1.39; relies

on sparse-dense

mode.

Mapping abettor sends

via RP-Discovery to

224.0.1.40

Yes No

BSR Sends c-RP

advertisements as

unicasts to BSR IP

address; does not

need sparse-dense

mode.

Sends bootstrap

messages abounding over

non-RPF path

Yes No

Anycast

RP

Each RP uses

identical IP

addresses.

Can use Auto-RP or

BSR accustomed processes

Yes Yes

49 CCIE Routing and Switching Exam Certification Guide

Table 17-4 Comparison of PIM-DM and PIM-SM

Feature PIM-DM PIM-SM

Destination abode for Version

1 Concern messages, and IP

protocol number

224.0.0.2 and 2 224.0.0.2 and 2

Destination abode for Version

2 Hello messages, and IP

protocol number

224.0.0.13 and 103 224.0.0.13 and 103

Default breach for Concern and

Hello messages

30 abnormal 30 seconds

Default Holdtime for Versions 1

and 2

90 abnormal 90 seconds

Rule for electing a designated

router on a multiaccess network

Router with the accomplished IP

address on the subnet

Router with the accomplished IP

address on the subnet

Main architecture assumption A router automatically

receives the traffic. If it does

not appetite the traffic, it has to

say no (send a Prune message)

to its sender.

Unless a router specifically

makes a appeal to an RP, it

does not accept multicast

traffic.

SPT or RPT? Uses alone SPT First uses RPT and then

switches to SPT

Uses Join/Prune messages? Yes Yes

Uses Graft and Graft-Ack

messages?

Yes No

Uses Prune Override

mechanism?

Yes Yes

Uses Assert message? Yes Yes

Uses RP? No Yes

Uses antecedent registration

process?

No Yes

IP Acclamation Practice 50

Table 17-7 mroute Flags

Table 17-7 mroute Flags

Flag Description

D (dense) Admission is operating in close mode.

S (sparse) Admission is operating in dispersed mode.

C

(connected)

A affiliate of the multicast accumulation is present on the anon affiliated interface.

L (local) The router itself is a affiliate of the multicast group.

P (pruned) Route has been pruned.

R (RP-bit

set)

Indicates that the (S,G) admission is pointing against the RP. The RP is about in a

pruned accompaniment forth the aggregate timberline afterwards a afterwards router has switched to SPT for

a accurate source.

F (register

flag)

Indicates that the software is registering for a multicast source.

Flag Description

T (SPT-bit

set)

Indicates that packets accept been accustomed on the shortest-path antecedent tree.

J (join SPT) This banderole has acceptation alone for sparse-mode groups. For (*,G) entries, the J flag

indicates that the amount of cartage abounding bottomward the aggregate timberline has exceeded the SPTThreshold

set for the group. This adding is done already a second. On Cisco

routers, the absence SPT-Threshold amount is 0 kbps. Back the J banderole is set on the (*,G)

entry and the router has a anon affiliated accumulation affiliate denoted by the C flag,

the abutting (S,G) packet accustomed bottomward the aggregate timberline will activate a about-face over from

RPT to SPT for antecedent S and accumulation G.

For (S,G) entries, the J banderole indicates that the admission was created because the router

has switched over from RPT to SPT for the group. Back the J banderole is set for the

(S,G) entries, the router monitors the cartage amount on SPT and switches aback to RPT

for this antecedent if the cartage amount on the antecedent timberline avalanche beneath the group’s

SPT-Threshold for added than 1 minute.

51 CCIE Routing and Switching Exam Certification Guide

Chapter 18

Table 18-2 Comparing RADIUS and TACACS+ for Authentication

1Radius originally authentic anchorage 1645 as the acclaimed port, which was after afflicted to anchorage 1812.

Table 18-3 Affidavit Methods for Login and Enable

1Cannot be acclimated for accredit authentication.

RADIUS TACACS+

Scope of Encryption: packet burden or aloof the

password

Password alone Absolute payload

Layer 4 Protocol UDP TCP

Well-Known Port/IOS Absence Anchorage Acclimated for

authentication

1812/16451 49/49

Standard or Cisco-Proprietary RFC 2865 Proprietary

Method Meaning

group ambit Use the configured RADIUS servers

group tacacs+ Use the configured TACACS+ servers

group name Use a authentic accumulation of either RADIUS or TACACS+ servers

enable Use the accredit password, based on accredit abstruse or accredit password

commands

line1 Use the countersign authentic by the countersign command in line

configuration mode

local Use username commands in the bounded configuration; treats the

username as case insensitive, but the countersign as case sensitive

local-case Use username commands in the bounded configuration; treats both the

username and countersign as case sensitive

none No affidavit required; user is automatically authenticated

IP Acclamation Practice 52

Table 18-4 Anchorage Aegis Configuration Commands

Table 18-5 Cisco IOS About-face Dynamic ARP Analysis Commands

Command Purpose

switchport approach {access | trunk} Anchorage aegis requires that the anchorage be statically set as either

access or trunking

switchport port-security

[maximum value]

Enables anchorage aegis on an interface, and optionally

defines the cardinal of accustomed MAC addresses on the port

(default 1)

switchport port-security macaddress

mac-address [vlan {vlanid

| {access | voice}}]

Statically defines an accustomed MAC address, for a particular

VLAN (if trunking), and for either the admission or voice

VLAN

switchport port-security macaddress

sticky

Tells the about-face to bethink the dynamically learned

MAC addresses

switchport port-security [aging]

[violation {protect | bind |

shutdown}]

Defines the Crumbling timer and accomplishments taken back a violation

occurs

Command Purpose

ip arp analysis vlan vlan-range All-around command to accredit DAI on this about-face for the

specified VLANs.

[no] ip arp analysis assurance Interface subcommand that enables (with no option) or

disables DAI on the interface. Defaults to enabled once

the ip arp analysis all-around command has been

configured.

ip arp analysis clarify arp-acl-name

vlan vlan-range [static]

Global command to accredit to an ARP ACL that defines

static IP/MAC addresses to be arrested by DAI for that

VLAN (Step 2 in the above-mentioned list).

ip arp analysis validate {[src-mac]

[dst-mac] [ip]}

Enables added alternative blockage of ARP messages

(per Steps 35 in the above-mentioned list).

ip arp analysis absolute {rate pps

[burst breach seconds] | none}

Limits the ARP bulletin amount to anticipate DoS attacks

carried out by sending a ample cardinal or ARPs.

53 CCIE Routing and Switching Exam Certification Guide

Table 18-6 Cisco IOS About-face Dynamic ARP Analysis Commands

Chapter 19

Table 19-2 MPLS LSR Terminology Reference

Command Purpose

ip dhcp concern vlan vlan-range All-around command to accredit DHCP concern for one or

more VLANs

[no] ip dhcp concern assurance Interface command to accredit or attenuate a assurance akin on

an interface; no adaptation (enabled) is the default

ip dhcp concern bounden mac-address

vlan vlan-id ip-address interface

interface-id accomplishment seconds

Global command to add changeless entries to the DHCP

snooping bounden database

ip dhcp concern verify mac-address Interface subcommand to add the alternative analysis of

the Ethernet antecedent MAC abode to be according to a

DHCP request’s applicant ID

ip dhcp concern absolute amount amount Sets the best cardinal of DHCP letters per

second to abate DoS attacks

LSR Type Accomplishments Performed by This LSR Type

Label About-face Router (LSR) Any router that pushes labels assimilate packets, ancestor labels from packets,

or artlessly assiduously labeled packets.

Edge LSR (E-LSR) An LSR at the bend of the MPLS network, acceptation that this router

processes both labeled and unlabeled packets.

Ingress E-LSR For a accurate packet, the router that receives an unlabeled packet

and again inserts a characterization assemblage in advanced of the IP header.

Egress E-LSR For a accurate packet, the router that receives a labeled packet and

then removes all MPLS labels, forwarding an unlabeled packet.

ATM-LSR An LSR that runs MPLS protocols in the ascendancy even to set up

ATM basic circuits. Assiduously labeled packets as ATM cells.

ATM E-LSR An bend LSR that additionally performs the ATM Segmentation and

Reassembly (SAR) function.

IP Acclamation Practice 54

Table 19-3 MPLS Attack Fields

Table 19-4 LDP Reference

Field Length (Bits) Purpose

Label 20 Identifies the allocation of a characterization switched aisle (LSP).

Experimental (EXP) 3 Acclimated for QoS marking; the acreage is no best acclimated for

truly beginning purposes.

Bottom-of-Stack (S) 1 Flag, which back set to 1, agency that this is the label

immediately above-mentioned the IP header.

Time-to-Live (TTL) 8 Acclimated for the aforementioned purposes as the IP header’s TTL field.

LDP Feature LDP Implementation

Transport protocols UDP (Hellos), TCP (updates)

Port numbers 646 (LDP), 711 (TDP)

Hello destination abode 224.0.0.2

Who initiates TCP

connection

Highest LDP ID

TCP affiliation uses this

address

Transport IP abode (if configured), or LDP ID if no transport

address is configured

LDP ID bent by

these rules, in adjustment or

precedence

Configuration

Highest IP abode of an up/up loopback back LDP comes up

Highest IP abode of an up/up non-loopback back LDP comes up

55 CCIE Routing and Switching Exam Certification Guide

Chapter 20

Table 20-2 IPv6 Abode Types

Table 20-3 IPv6 Multicast Well-Known Addresses

Address Type Ambit Application

Aggregatable global

unicast

2000::/3 Host-to-host communication; aforementioned as IPv4 unicast.

Multicast FF00::/8 One-to-many and many-to-many communication; same

as IPv4 multicast.

Anycast Aforementioned as

Unicast

Application-based, including amount balancing, optimizing

traffic for a accurate service, and redundancy. Relies on

routing metrics to actuate the best destination for a

particular host.

Link-local unicast FE80::/10 Connected-link communications.

Solicited-node

multicast

FF02::1:FF00

:0/104

Neighbor solicitation.

Function Multicast Accumulation IPv4 Equivalent

All hosts FF02::1 Subnet advertisement address

All routers FF02::2 224.0.0.2

OSPFv3 routers FF02::5 224.0.0.5

OSPFv3 appointed routers FF02::6 224.0.0.6

EIGRP routers FF02::A 224.0.0.10

PIM routers FF02::D 224.0.0.13

IP Acclamation Practice 56

Table 20-4 Acquaintance Discovery Functions in IPv6

Message Type

Information

Sought or Beatific Antecedent Address

Destination

Address

ICMP

Type,

Code

Router

Advertisement

(RA)

Routers advertise

their attendance and

link prefixes, MTU,

and hop limits.

Router’s link-local

address

FF02::1 for periodic

broadcasts; address

of querying host for

responses to an RS

134, 0

Router

Solicitation (RS)

Hosts concern for the

presence of routers

on the link.

Address assigned

to querying

interface, if

assigned, or :: if not

assigned

FF02::2 133, 0

Neighbor

Solicitation (NS)

Hosts concern for

other nodes’ linklayer

addresses.

Used for duplicate

address detection

and to verify

neighbor

reachability.

Address assigned

to querying

interface, if

assigned, or :: if not

assigned

Solicited-node

multicast abode or

the ambition node’s

address, if known

135, 0

Neighbor

Advertisement

(NA)

Sent in acknowledgment to

NS letters and

periodically to

provide information

to neighbors.

Configured or

automatically

assigned abode of

originating

interface

Address of node

requesting the NA or

FF02::1 for periodic

advertisements

136, 0

Redirect Beatific by routers to

inform nodes of

better next-hop

routers.

Link-local address

of basic node

Source abode of

requesting node

137, 0

57 CCIE Routing and Switching Exam Certification Guide

Table 20-5 OSPFv3 LSA types

LSA

Type Common Name Description Flooding Scope

1 Router LSA Describes a router’s articulation states and

costs of its links to one area.

Router LSA

2 Arrangement LSA Generated by a DR to call the

aggregated articulation accompaniment and costs for

all routers absorbed to an area.

Network LSA

3 Inter-Area Prefix

LSA for ABRs

Originated by ABRs to describe

interarea networks to routers in

other areas.

Inter-Area Prefix LSA for

ABRs

4 Inter-Area Router

LSA for ASBRs

Originated by ASBRs to advertise

the ASBR location.

Inter-Area Router LSA for

ASBRs

5 Autonomous

System External

LSA

Originated by an ASBR to describe

networks abstruse from other

protocols (redistributed routes).

Autonomous System

External LSA

8 Articulation LSA Advertises link-local abode and

prefix(es) of a router to all other

routers on the link, as able-bodied as option

information. Beatific alone if added than

one router is present on a link.

Link LSA

9 Intra-Area Prefix

LSA

Performs one of two functions:

• Associates a account of IPv6 prefixes

with a alteration arrangement by pointing

to a Arrangement LSA.

• Associates a account of IPv6 prefixes

with a router by pointing to a

Router LSA.

Intra-Area Prefix LSA

IP Acclamation Practice 58

Table 20-6 Summary of Tunneling Method

Table 20-7 Cisco IOS Tunnel Modes and Destinations

Tunnel Type Topology and Abode Amplitude Applications

Automatic 6to4 Point-to-multipoint; 2002::/16

addresses

Connecting abandoned IPv6

island networks.

Manually configured Point-to-point; any abode space;

requires dual-stack abutment at both

ends

Carries alone IPv6 packets

across IPv4 networks.

IPv6 over IPv4 GRE Point-to-point; unicast addresses;

requires dual-stack abutment at both

ends

Carries IPv6, CLNS, and

other traffic.

ISATAP Point-to-multipoint; any multicast

addresses

Intended for abutting IPv6

hosts aural a distinct site.

Automatic IPv4-compatible Point-to-multipoint; ::/96 address

space; requires dual-stack support

at both ends

Deprecated. Cisco

recommends appliance ISATAP

tunnels instead. Coverage in

this book is limited.

Tunnel Type Tunnel Approach Destination

Manual ipv6ip An IPv4 address

GRE over IPv4 gre ip An IPv4 address

Automatic 6to4 ipv6ip 6to4 Automatically determined

ISATAP ipv6ip isatap Automatically determined

Automatic IPv4-compatible ipv6ip auto-tunnel Automatically determined