SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 1: Routing
Concepts
CCNA Routing and Switching
Routing and Switching
Essentials v6.0
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
Chapter 1: Routing
Concepts
Routing and Switching Essentials v6.0
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1 - Sections & Objectives
1.1 Router Initial Configuration
• Describe the primary functions and features of a router.
• Configure basic settings on a router to route between two directly-connected
networks, using CLI.
• Verify connectivity between two networks that are directly connected to a
router.
1.2 Routing Decisions
• Explain the encapsulation and de-encapsulation process used by routers when
switching packets between interfaces.
• Explain the path determination function of a router.
1.3 Router Operation
• Explain routing table entries for directly connected networks.
• Explain how a router builds a routing table of directly connected networks.
• Explain how a router builds a routing table using static routes.
• Explain how a router builds a routing table using a dynamic routing protocol.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
1.1 Router Initial
Configuration
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Characteristicsof a Network
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Why Routing?
The router is responsible for the routing of traffic
between networks.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers are specialized computers containing the following
required components to operate:
• Central processing unit (CPU)
• Operating system (OS) - Routers use Cisco IOS
• Memory and storage (RAM, ROM, NVRAM, Flash, hard drive)
Router Functions
Routers are Computers
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers use specialized ports and network interface cards to
interconnect to other networks.
Router Functions
Routers are Computers (cont.)
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers are Computers
Router Memory
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Interconnect Networks
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Choose Best Paths
 Routers use static routes and dynamic routing protocols to learn
about remote networks and build their routing tables.
 Routers use routing tables to determine the best path to send
packets.
 Routers encapsulate the packet and forward it to the interface
indicated in routing table.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Process switching – An
older packet forwarding
mechanism still available for
Cisco routers.
 Fast switching – A common
packet forwarding
mechanism which uses a
fast-switching cache to store
next hop information.
 Cisco Express Forwarding
(CEF) – The most recent,
fastest, and preferred Cisco
IOS packet-forwarding
mechanism.
Router Functions
Packet Forwarding Methods
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Connect to a Network
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Default Gateways
To enable network
access devices, must be
configured with the
following IP address
information:
IP address - Identifies a
unique host on a local
network.
Subnet mask - Identifies
the host’s network subnet.
Default gateway -
Identifies the router a
packet is sent to when the
destination is not on the
same local network
subnet.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Document Network Addressing
Network documentation should include at least the following in a topology diagram
and addressing table:
 Device names
 Interfaces
 IP addresses and
subnet masks
 Default gateways
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Statically Assigned IP address – The host is manually assigned an IP
address, subnet mask and default gateway. A DNS server IP address can
also be assigned.
• Used to identify specific network resources such as network servers
and printers.
• Can be used in very small networks with few hosts.
Dynamically Assigned IP Address – IP Address information is
dynamically assigned by a server using Dynamic Host Configuration
Protocol (DHCP).
• Most hosts acquire their IP address information through DHCP.
• DHCP services can be provided by Cisco routers.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect devices
Device LEDs
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Console Access
Connect Devices
Console Access
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Switch
 Network infrastructure devices require IP addresses to enable remote
management.
 On a switch, the management IP address is assigned on a virtual interface
called a switched virtual interface (SVI)
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure Router Basic Settings
 Name the device – Distinguishes
it from other routers
 Secure management access –
Secures privileged EXEC, user
EXEC, and Telnet access, and
encrypts passwords .
 Configure a banner – Provides
legal notification of unauthorized
access.
 Save the Configuration
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Router Interface
To be available, a router interface
must be:
 Configured with an address and subnet
mask.
 Activated using no shutdown
command. By default LAN and WAN
interfaces are not activated.
 Configured with the clock
rate command on the Serial cable end
labeled DCE.
Optional description can be included.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface
Configure interface with IPv6 address and subnet mask:
 Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration
command.
 Activate using the no shutdown command.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface (cont.)
IPv6 interfaces can support more than one address:
 Configure a specified global unicast – ipv6address ipv6-
address /ipv6-length
 Configure a global IPv6 address with an interface identifier (ID) in the
low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64
 Configure a link-local address - ipv6address ipv6-address /ipv6-
length link-local
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Loopback Interface
A loopback interface is a logical interface that is internal to the
router:
 It is not assigned to a physical port, it is considered a software interface that is
automatically in an UP state.
 A loopback interface is useful for testing.
 It is important in the OSPF routing process.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Show commands are used to
verify operation and configuration
of interface:
 show ip interfaces brief
 show ip route
 show running-config
Show commands that are used to
gather more detailed interface
information:
 show interfaces
 show ip interfaces
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings (cont.)
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify IPv6 Interface Settings
Common commands to verify the IPv6 interface configuration:
 show ipv6 interface brief - displays a summary for each of the interfaces.
 show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6
addresses for this interface.
 show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have
been installed in the IPv6 routing table.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show command output can be managed using the following
command and filters:
 Use the terminal length number command to specify the number of lines to be
displayed.
 To filter specific output of commands use the (|)pipe character after show
command. Parameters that can be used after pipe include:
• section, include, exclude, begin
Verify Connectivity of Directly Connected Networks
Filter Show Command Output
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Command History Feature
The command history feature temporarily stores a list of executed
commands for access:
 To recall commands press Ctrl+P or the UP Arrow.
 To return to more recent commands press Ctrl+N or the Down Arrow.
 By default, command history is enabled and the system captures the last 10 commands
in the buffer. Use the show history privileged EXEC command to display the buffer
contents.
 Use the terminal history size user EXEC command to increase or decrease size of
the buffer.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45
1.2 Routing Decisions
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Router Switching Function
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Send a Packet
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Forward to Next Hop
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Packet Routing
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Reach the Destination
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Routing Decisions
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Best Path
 Best path is selected by a routing protocol based on the value or
metric it uses to determine the distance to reach a network:
o A metric is the value used to measure the distance to a given network.
o Best path to a network is the path with the lowest metric.
 Dynamic routing protocols use their own rules and metrics to build
and update routing tables:
o Routing Information Protocol (RIP) - Hop count
o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to
destination
o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Load Balancing
 When a router has two or more paths to a destination with equal cost
metrics, then the router forwards the packets using both paths equally:
o Equal cost load balancing can improve network performance.
o Equal cost load balancing can be configured to use both dynamic routing protocols and
static routes.
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Administrative Distance
 If multiple paths to a destination are configured on a router, the path
installed in the routing table is the one with the lowest Administrative
Distance (AD):
o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an
AD of 90.
o A directly connected route with an AD of 0 is more reliable than a static route with an AD
of 1.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55
1.3 Router Operation
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
The Routing Table
 A routing table is a file stored in RAM that contains information about:
o Directly connected routes
o Remote routes
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources
The show ip route command is used to display the contents of the routing
table:
o Local route interfaces - Added to the routing table when an interface is configured.
(displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.)
o Directly connected interfaces - Added to the routing table when an interface is
configured and active.
o Static routes - Added when a route is manually configured and the exit interface is active.
o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and
networks are identified.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources (cont.)
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Remote Network Routing Entries
Interpreting the entries in the routing table
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Interfaces
A newly deployed router, without any configured interfaces, has an empty
routing table.
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Routing Table Entries
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Example
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected IPv6 Example
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Routes
Static routes and default static routes can be implemented after
directly connected interfaces are added to the routing table:
o Static routes are manually configured.
o They define an explicit path between two networking devices.
o Static routes must be manually updated if the topology changes.
o Their benefits include improved security and control of resources.
o Configure a static route to a specific network using the ip route network
mask {next-hop-ip | exit-intf} command.
o A default static route is used when the routing table does not contain a
path for a destination network.
o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit-
intf | next-hop-ip} command.
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example (cont.)
Entering and Verifying a Static Route
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
Dynamic Routing
 Dynamic routing is used by
routers to share information
about the reachability and
status of remote networks.
 It performs network
discovery and maintains
routing tables.
 Routers have converged
after they have finished
exchanging and updating
their routing tables.
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Routing Protocols
Cisco routers can support a variety of dynamic IPv4 routing protocols
including:
• EIGRP – Enhanced Interior Gateway Routing Protocol
• OSPF – Open Shortest Path First
• IS-IS – Intermediate System-to-Intermediate System
• RIP – Routing Information Protocol
Use the router ? Command in global configuration mode to determine
which routing protocols are supported by the IOS.
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Dynamic Routing Examples
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Routing Protocols
Cisco routers can support a variety of dynamic IPv6 routing protocols
including:
o RIPng (RIP next generation)
o OSPFv3
o EIGRP for IPv6
Use the ipv6 router ? command to determine which routing
protocols are supported by the IOS
IPv6 Routing Protocols
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Dynamic Routing Examples
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74
1.4 Chapter Summary
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Describe the primary functions and features of a router.
 Configure basic settings on a router to route between two directly-connected networks,
using CLI.
 Verify connectivity between two networks that are directly connected to a router.
 Explain how routers use information in data packets to make forwarding decisions in a
small to medium-sized business network.
 Explain the encapsulation and de-encapsulation process used by routers when switching
packets between interfaces.
 Explain the path determination function of a router.
 Explain how a router learns about remote networks when operating in a small to medium-
sized business network.
 Explain how a router builds a routing table of directly connected networks.
 Explain how a router builds a routing table using static routes.
 Explain how a router builds a routing table using a dynamic routing protocol.
Chapter Summary
Summary
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
CCNA3 Verson6 Chapter6
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
PDF
Router commands
PPTX
CCNA3 Verson6 Chapter3
PPTX
CCNA3 Verson6 Chapter4
DOCX
Ccna command
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
DOC
Cisco switch commands cheat sheet
CCNA3 Verson6 Chapter6
CCNA 2 Routing and Switching v5.0 Chapter 3
Router commands
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter4
Ccna command
CCNA 1 Routing and Switching v5.0 Chapter 3
Cisco switch commands cheat sheet

What's hot (20)

PPT
Configuracion y conceptos basicos de switch
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 11
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PPTX
CCNA2 Verson6 Chapter3
PPTX
Memory access tracing [poug17]
PPTX
Chapter 17 : static routing
PDF
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
PPT
CCNA Exploration 2 - Chapter 1
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 6
PPTX
CCNA Product Overview.pptx
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 5
PDF
CCNAv5 - S2: Chapter4 Routing Concepts
PPT
CCNA Exploration 1 - Chapter 2
PDF
Cisco commands List for Beginners (CCNA, CCNP)
PPTX
Ccna PPT
PPT
CCNA Basic Switching and Switch Configuration
PPTX
ITN_Module_2.pptx
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 4
Configuracion y conceptos basicos de switch
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA2 Verson6 Chapter3
Memory access tracing [poug17]
Chapter 17 : static routing
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA Exploration 2 - Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA Product Overview.pptx
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNAv5 - S2: Chapter4 Routing Concepts
CCNA Exploration 1 - Chapter 2
Cisco commands List for Beginners (CCNA, CCNP)
Ccna PPT
CCNA Basic Switching and Switch Configuration
ITN_Module_2.pptx
CCNA 1 Routing and Switching v5.0 Chapter 4
Ad

Similar to CCNA2 Verson6 Chapter1 (20)

PPT
1 Routing Concepts-students to download only.ppt
PPTX
Chapter 15 : routing concepts
PPTX
KPUCC-Rs instructor ppt_chapter4_final
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PPTX
ITN6_Instructor_Materials_Chapter6git.pptx
PPTX
CCNA_RSE_Chp1-1 Routing Concepts for Network
PPTX
CCNA CISCO Chapter 01 Routing Concepts and Network
PPTX
CCNA3 Verson6 Chapter1
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
PPTX
ITN_Module_10.pptx gfhfdgsrfryrenikerrtvbter
PPTX
Detailed explanation of Basic router configuration
PDF
CCNA RSE Routing concept
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
PDF
CCNAv5 - S1: Chapter 6 - Network Layer
PPTX
Chapter 6 : Network layer
PPTX
57798_Lectures1415.pptx
PPTX
Chapter: Basic Router Configuration Cisco
PPTX
Chapter 5 Routing.pptx
PPTX
CCNA RS_NB - Chapter 6
1 Routing Concepts-students to download only.ppt
Chapter 15 : routing concepts
KPUCC-Rs instructor ppt_chapter4_final
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 4
ITN6_Instructor_Materials_Chapter6git.pptx
CCNA_RSE_Chp1-1 Routing Concepts for Network
CCNA CISCO Chapter 01 Routing Concepts and Network
CCNA3 Verson6 Chapter1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
ITN_Module_10.pptx gfhfdgsrfryrenikerrtvbter
Detailed explanation of Basic router configuration
CCNA RSE Routing concept
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNAv5 - S1: Chapter 6 - Network Layer
Chapter 6 : Network layer
57798_Lectures1415.pptx
Chapter: Basic Router Configuration Cisco
Chapter 5 Routing.pptx
CCNA RS_NB - Chapter 6
Ad

More from Chaing Ravuth (20)

PPTX
CCNP ROUTE V7 CH8
PPTX
CCNP ROUTE V7 CH7
PPTX
CCNP ROUTE V7 CH6
PPTX
CCNP ROUTE V7 CH5
PPTX
CCNP ROUTE V7 CH4
PPTX
CCNP ROUTE V7 CH3
PPTX
CCNP ROUTE V7 CH2
PPTX
CCNP ROUTE V7 CH1
PPTX
CCNP Switching Chapter 3
PPTX
CCNP Switching Chapter 2
PPTX
CCNP Switching Chapter 1
PPTX
CCNP Switching Chapter 10
PPTX
CCNP Switching Chapter 9
PPTX
CCNP Switching Chapter 8
PPTX
CCNP Switching Chapter 7
PPTX
CCNP Switching Chapter 6
PPTX
CCNP Switching Chapter 5
PPTX
CCNP Switching Chapter 4
PPTX
CCNA4 Verson6 Chapter1
PPTX
CCNA4 Verson6 Chapter8
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH1
CCNP Switching Chapter 3
CCNP Switching Chapter 2
CCNP Switching Chapter 1
CCNP Switching Chapter 10
CCNP Switching Chapter 9
CCNP Switching Chapter 8
CCNP Switching Chapter 7
CCNP Switching Chapter 6
CCNP Switching Chapter 5
CCNP Switching Chapter 4
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter8

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
GDM (1) (1).pptx small presentation for students
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
Cell Structure & Organelles in detailed.
Sports Quiz easy sports quiz sports quiz
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O7-L3 Supply Chain Operations - ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial diseases, their pathogenesis and prophylaxis
GDM (1) (1).pptx small presentation for students
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
RMMM.pdf make it easy to upload and study
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
102 student loan defaulters named and shamed – Is someone you know on the list?
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf

CCNA2 Verson6 Chapter1

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 1: Routing Concepts CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 Chapter 1: Routing Concepts Routing and Switching Essentials v6.0
  • 3. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 - Sections & Objectives 1.1 Router Initial Configuration • Describe the primary functions and features of a router. • Configure basic settings on a router to route between two directly-connected networks, using CLI. • Verify connectivity between two networks that are directly connected to a router. 1.2 Routing Decisions • Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces. • Explain the path determination function of a router. 1.3 Router Operation • Explain routing table entries for directly connected networks. • Explain how a router builds a routing table of directly connected networks. • Explain how a router builds a routing table using static routes. • Explain how a router builds a routing table using a dynamic routing protocol.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 1.1 Router Initial Configuration
  • 5. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Characteristicsof a Network
  • 6. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Why Routing? The router is responsible for the routing of traffic between networks.
  • 7. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers are specialized computers containing the following required components to operate: • Central processing unit (CPU) • Operating system (OS) - Routers use Cisco IOS • Memory and storage (RAM, ROM, NVRAM, Flash, hard drive) Router Functions Routers are Computers
  • 8. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers use specialized ports and network interface cards to interconnect to other networks. Router Functions Routers are Computers (cont.)
  • 9. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers are Computers Router Memory
  • 10. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Interconnect Networks
  • 11. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Choose Best Paths  Routers use static routes and dynamic routing protocols to learn about remote networks and build their routing tables.  Routers use routing tables to determine the best path to send packets.  Routers encapsulate the packet and forward it to the interface indicated in routing table.
  • 12. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Process switching – An older packet forwarding mechanism still available for Cisco routers.  Fast switching – A common packet forwarding mechanism which uses a fast-switching cache to store next hop information.  Cisco Express Forwarding (CEF) – The most recent, fastest, and preferred Cisco IOS packet-forwarding mechanism. Router Functions Packet Forwarding Methods
  • 13. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Connect to a Network
  • 14. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Default Gateways To enable network access devices, must be configured with the following IP address information: IP address - Identifies a unique host on a local network. Subnet mask - Identifies the host’s network subnet. Default gateway - Identifies the router a packet is sent to when the destination is not on the same local network subnet.
  • 15. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Document Network Addressing Network documentation should include at least the following in a topology diagram and addressing table:  Device names  Interfaces  IP addresses and subnet masks  Default gateways
  • 16. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host Statically Assigned IP address – The host is manually assigned an IP address, subnet mask and default gateway. A DNS server IP address can also be assigned. • Used to identify specific network resources such as network servers and printers. • Can be used in very small networks with few hosts. Dynamically Assigned IP Address – IP Address information is dynamically assigned by a server using Dynamic Host Configuration Protocol (DHCP). • Most hosts acquire their IP address information through DHCP. • DHCP services can be provided by Cisco routers.
  • 17. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 18. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 19. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect devices Device LEDs
  • 20. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Console Access Connect Devices Console Access
  • 21. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Switch  Network infrastructure devices require IP addresses to enable remote management.  On a switch, the management IP address is assigned on a virtual interface called a switched virtual interface (SVI)
  • 22. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure Router Basic Settings  Name the device – Distinguishes it from other routers  Secure management access – Secures privileged EXEC, user EXEC, and Telnet access, and encrypts passwords .  Configure a banner – Provides legal notification of unauthorized access.  Save the Configuration
  • 23. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Router Interface To be available, a router interface must be:  Configured with an address and subnet mask.  Activated using no shutdown command. By default LAN and WAN interfaces are not activated.  Configured with the clock rate command on the Serial cable end labeled DCE. Optional description can be included.
  • 24. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface Configure interface with IPv6 address and subnet mask:  Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration command.  Activate using the no shutdown command.
  • 25. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface (cont.) IPv6 interfaces can support more than one address:  Configure a specified global unicast – ipv6address ipv6- address /ipv6-length  Configure a global IPv6 address with an interface identifier (ID) in the low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64  Configure a link-local address - ipv6address ipv6-address /ipv6- length link-local
  • 26. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Loopback Interface A loopback interface is a logical interface that is internal to the router:  It is not assigned to a physical port, it is considered a software interface that is automatically in an UP state.  A loopback interface is useful for testing.  It is important in the OSPF routing process.
  • 27. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings Show commands are used to verify operation and configuration of interface:  show ip interfaces brief  show ip route  show running-config Show commands that are used to gather more detailed interface information:  show interfaces  show ip interfaces
  • 28. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings (cont.)
  • 29. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify IPv6 Interface Settings Common commands to verify the IPv6 interface configuration:  show ipv6 interface brief - displays a summary for each of the interfaces.  show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6 addresses for this interface.  show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have been installed in the IPv6 routing table.
  • 30. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show command output can be managed using the following command and filters:  Use the terminal length number command to specify the number of lines to be displayed.  To filter specific output of commands use the (|)pipe character after show command. Parameters that can be used after pipe include: • section, include, exclude, begin Verify Connectivity of Directly Connected Networks Filter Show Command Output
  • 31. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Command History Feature The command history feature temporarily stores a list of executed commands for access:  To recall commands press Ctrl+P or the UP Arrow.  To return to more recent commands press Ctrl+N or the Down Arrow.  By default, command history is enabled and the system captures the last 10 commands in the buffer. Use the show history privileged EXEC command to display the buffer contents.  Use the terminal history size user EXEC command to increase or decrease size of the buffer.
  • 32. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45 1.2 Routing Decisions
  • 33. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Router Switching Function
  • 34. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Send a Packet
  • 35. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Forward to Next Hop
  • 36. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Packet Routing
  • 37. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Reach the Destination
  • 38. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Routing Decisions
  • 39. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Best Path  Best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network: o A metric is the value used to measure the distance to a given network. o Best path to a network is the path with the lowest metric.  Dynamic routing protocols use their own rules and metrics to build and update routing tables: o Routing Information Protocol (RIP) - Hop count o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to destination o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
  • 40. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Load Balancing  When a router has two or more paths to a destination with equal cost metrics, then the router forwards the packets using both paths equally: o Equal cost load balancing can improve network performance. o Equal cost load balancing can be configured to use both dynamic routing protocols and static routes.
  • 41. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Administrative Distance  If multiple paths to a destination are configured on a router, the path installed in the routing table is the one with the lowest Administrative Distance (AD): o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an AD of 90. o A directly connected route with an AD of 0 is more reliable than a static route with an AD of 1.
  • 42. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55 1.3 Router Operation
  • 43. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table The Routing Table  A routing table is a file stored in RAM that contains information about: o Directly connected routes o Remote routes
  • 44. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources The show ip route command is used to display the contents of the routing table: o Local route interfaces - Added to the routing table when an interface is configured. (displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.) o Directly connected interfaces - Added to the routing table when an interface is configured and active. o Static routes - Added when a route is manually configured and the exit interface is active. o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and networks are identified.
  • 45. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources (cont.)
  • 46. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Remote Network Routing Entries Interpreting the entries in the routing table
  • 47. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Interfaces A newly deployed router, without any configured interfaces, has an empty routing table.
  • 48. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Routing Table Entries
  • 49. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Example
  • 50. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected IPv6 Example
  • 51. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Routes Static routes and default static routes can be implemented after directly connected interfaces are added to the routing table: o Static routes are manually configured. o They define an explicit path between two networking devices. o Static routes must be manually updated if the topology changes. o Their benefits include improved security and control of resources. o Configure a static route to a specific network using the ip route network mask {next-hop-ip | exit-intf} command. o A default static route is used when the routing table does not contain a path for a destination network. o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit- intf | next-hop-ip} command.
  • 52. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example
  • 53. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example (cont.) Entering and Verifying a Static Route
  • 54. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 55. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 56. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols Dynamic Routing  Dynamic routing is used by routers to share information about the reachability and status of remote networks.  It performs network discovery and maintains routing tables.  Routers have converged after they have finished exchanging and updating their routing tables.
  • 57. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Routing Protocols Cisco routers can support a variety of dynamic IPv4 routing protocols including: • EIGRP – Enhanced Interior Gateway Routing Protocol • OSPF – Open Shortest Path First • IS-IS – Intermediate System-to-Intermediate System • RIP – Routing Information Protocol Use the router ? Command in global configuration mode to determine which routing protocols are supported by the IOS.
  • 58. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Dynamic Routing Examples
  • 59. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Routing Protocols Cisco routers can support a variety of dynamic IPv6 routing protocols including: o RIPng (RIP next generation) o OSPFv3 o EIGRP for IPv6 Use the ipv6 router ? command to determine which routing protocols are supported by the IOS IPv6 Routing Protocols
  • 60. Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Dynamic Routing Examples
  • 61. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74 1.4 Chapter Summary
  • 62. Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Describe the primary functions and features of a router.  Configure basic settings on a router to route between two directly-connected networks, using CLI.  Verify connectivity between two networks that are directly connected to a router.  Explain how routers use information in data packets to make forwarding decisions in a small to medium-sized business network.  Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.  Explain the path determination function of a router.  Explain how a router learns about remote networks when operating in a small to medium- sized business network.  Explain how a router builds a routing table of directly connected networks.  Explain how a router builds a routing table using static routes.  Explain how a router builds a routing table using a dynamic routing protocol. Chapter Summary Summary
  • 63. Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 64. Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential