14F NET3008 Review of Topics
1) Beyond Static
a) Floating static routes – what, how, why
b) Discard routes
c) ODR
2) EIGRP
a) review of fundamentals
i) tables (neighbour, topology, routing)
ii) terms: fd, rd, succ, feasible succ, feasible condition
iii) protocols and architecture
b) requirements for neighbouring
c) packet types
d) Dual – in action (queries, replies, ACKs)
e) metric calculations
f) summarization – manual and auto
g) passive
h) default routing – 4 ways
i) architecture of EIGRP in MPLS implementations of L2 or L3 VPNs
j) load balancing & variance
k) use of “bandwidth‐percent” in FR deployments
l) authentication – simple, MD5, key chains
m) Active, SIA and scalability
n) Recent protocol enhancements
i) SIA‐reply while “active”
ii) graceful shutdown
iii) stub feature – receive only, static, connected, summary
3) OSPF
a) review of protocol & single area basics (including router‐id & neighbouring)
b) 5 different solutions over NBMA
i) broadcast/multicast packet may not be sent to all nodes
ii) when needed, controlling choice of DR/BDR can be critical
c) why multi‐area
d) config at interface or in router process
e) use of passive
f) LSA sequence numbering
g) LSA types – 1, 2, 3, 4, 5
h) Types of Stub areas: Stubby, TSA, NSSA, NSSA‐TSA (LSA type 7)
i) Virtual Links
j) Authentication
k) architecture of OSPF in MPLS implementations of L2 or L3 VPNs
l) design & miscellaneous (e.g. config, network statement ordering, DNS, etc)
4) Manipulating Routing Updates
a) Redistribution (what, how, hazards) into EIGRP
b) Redistribution into OSPF (plus, E1 vs E2 routes)
c) Seed metrics
d) Single‐ vs. Multi‐point redist
e) mixing classful & classless
f) using admin distance to control route preference
g) route maps
i) what, uses, match/set options
ii) example: setting route tags
h) route filtering using distribute lists
i) IN – to filter as routing updates are received on an interface
ii) OUT – to filter as routing updates are sent out an interface OR
as routes are redistributed out of a protocol into “this” one
i) prefix lists – to match both a route’s prefix and mask (and optionally, a range of mask lengths)
5) Path Control
a) offset lists – to increment (i.e. worsen) metric of received routes
b) IP SLA – with or without Responder
i) operation, configuration
c) Policy‐Based Routing (using route maps)
i) set commands to influence packet routing
ii) deny means packet is routed “normally”, NOT dropped
6) BGP
a) what is it (vs. IGP)
b) public vs. private ASNs
c) how it fits into various network architectures
d) philosophy of 2 logical links
e) AS_Path and loop free operation
f) protocol basics – peer interactions, databases, message types
g) Finite State Machine – states, events, troubleshooting tips
h) path attributes
i) iBGP vs. eBGP
j) announcing paths into BGP
k) peering – ebgp‐multi‐hop, peer groups, update‐source, ttl‐security
l) neighbour authentication
m) bgp split‐horizon
n) bgp AS synchronization
o) bgp table
p) neighbour resets
q) flow of bgp paths
r) implementing policy using attributes and route maps
i) attribute types:
(1) support – well‐known vs. optional
(2) existence – mandatory vs. discretionary
(3) scope – transitive vs. non‐transitive
s) best path selection process
i) next‐hop validity
ii) weight
iii) local pref
iv) path origination
v) AS Path
vi) origin type
vii) MED
viii) path source & age
ix) proximity of next‐hop
x) router ID & neighbour IP
t) summarization – via aggregate‐address or announcing a static summary
u) route filtering/manipulation using prefix lists
v) default routes
7) Other Selected Topics
a) IPsec
i) implemented by standards‐based protocols to negotiate Security Associations
(1) IKE – key management via ISAKMP & Oakley (DH)
(2) ESP – payload encryption
(3) AH – header authentication
ii) transport mode vs. tunnel mode
b) IOS implementation of IPsec
i) ISAKMP Policy
ii) Transform Set
iii) Crypto ACLs
iv) Crypto Map
v) apply to egress interface
c) GRE tunnels
i) GRE over IPsec
ii) native IPsec vs. GRE over IPsec vs. VTI
d) Tunneling IPv6 across IPv4 clouds
i) Manual tunnel types: IPv6, GRE IPv6
ii) Automatic tunnel types: 6to4, ISATAP
e) NAT‐PT
i) what is it, when to use
ii) static vs. dynamic NAT‐PT