ccnp route 642-902 quick reference pdf
- 6782 Reviews
Redistribute local direct connection network segment into BGP , MED value is 0 ; redistribute local static route into BGP , MED value is 0
Block non-designated ports
Neighbor 184.108.40.206 update-source Loopback0 neighbor 10.1.25.2 remote-as 200
Switch(config-vlan)# name Classroom
First come to know the first three-layer interface: SVI switched virtual interface, a logical interface of SVI , that is to say not a physical interface, when we create a VLAN on the switch , we can create a The SVI interface corresponding to the VLAN , for example, we created
We will ping 220.127.116.11 repeat 1 size 1500 , we will find that R1 directly sends an ICMP packet, no fragmentation, the message is as follows:
Ip dhcp snooping vlan 10 Interface fast0/1
Load balancing actions can be based on MAC , port, IP (source IP , destination IP, or both)
BGP table version is 3, local router ID is 18.104.22.168
If an error occurs after receiving the open message, a Notification message is sent . If not
Double-point bidirectional routing re-release 91
Gratuitous ARP , the free ARP is a special ARP Request/response message, that is, the Sender IP is the same as the Target IP (usually used for IP collision detection).
In the above output, the metric part of the red bold is the IGP metric that reaches the NEXT_HOP attribute address locally . We find that from R3 and R5 , the metric is 2 , then if we connect R4 to the interface of R3 , that is, F0/ 0 port OSPF
192.168.1.0 the OSPF routing but will be re-injected into the RIP (because we deploy a two-way re-release), this is the route Feedback , the route was filling back.
Learning from other sources, the routing source is incomplete (confirm that the source of the routing information is incomplete). ( Republish IGP or static )
Per packet load-sharing is disabled IP unicast RPF check is disabled Inbound access list is not set Outbound access list is not set
(1) Declare the loop port 22.214.171.1244
The so-called seed metric refers to when I use a route to re-publish from an external routing protocol to this routing protocol, if the metric of the route is not manually specified , the default metric is used . Look at the following table (the following table is a recognized default value that can be modified using the default-metric in the routing process ):
SW1(config-if)# glbp 1 10.1.1.254
Passive-interface configuration 51
Route-map first acquaintance
By using route tags in RIP , you can control the redistribution of related routes in other protocols. When republishing to other protocols, RIP routes simply compare the tokens assigned to them without comparing the entire route.
R3 configuration is as follows
Length, or mask length. When paired with the above ACL , some students will even write
Then, in order for R3 to dynamically learn the routing of production and office servers, it is now necessary to redistribute these two static routes into OSPF . Of course, there are tricks when re-publishing.
Switches, we are in VLAN configuration on the interface IP address, VLAN interfaces we called SVI switched virtual interface, it is with VLAN a corresponding logical, and virtual interfaces. A Layer 2 switch can only assign an IP address to a VLAN interface .
The vlan number supported by ISL is 1-1005 (the default is allowed to be normal), 802.1q is 1-4094 (all normal and extended by default), so mapping is required when passing through the 802.1q and ISL trunks .
Option 82 sub-option 2 : Remote ID ,ccnp route 642-902 quick reference pdf, which is generally the MAC of the access layer switch that inserts the option 82 information .
If DHCP snooping is turned off or this is a DHCP- free network environment, such as a pure static IP address environment, use ARP
As a result, when PC2 sends data to its own gateway 0.254 , since the MAC of the gateway has been spoofed into the MAC of PC1 , the data is forwarded to PC1 , and PC2 is disconnected. If PC1 is smarter, transfer the data sent by PC2 to the real gateway, and run a message analysis tool locally to snoop the data sent by PC2 . Then, in the case of PC2 continuous network, God does not know. I feel the Internet traffic of PC2 , this is the man in the middle , the middleman attack.