Books & Videos

Table of Contents

  1. Chapter 1 Router Configuration and File Management

    1. Introduction

    2. Configuring the Router for the First Time

    3. Configuring the Router from the CLI

    4. Getting Exclusive Access to Configure the Router

    5. Displaying the Commands to Recreate a Configuration

    6. Including Comments in the Configuration

    7. Checking the Syntax of the Configuration

    8. Activating the Router Configuration

    9. Debugging a Failed Commit

    10. Exiting Configuration Mode

    11. Keeping a Record of Configuration Changes

    12. Determining What Changes You Have Made to the Configuration

    13. Configuring the Router by Copying a File from a Server

    14. Configuring the Router by Copying Text from a Terminal Window

    15. Backing Up the Router's Configuration

    16. Scheduling the Activation of a Configuration

    17. Provisionally Activating a Configuration

    18. Loading a Previous Router Configuration

    19. Creating an Emergency Rescue Configuration

    20. Backing Up Filesystems on M-Series and T-Series Routers

    21. Backing Up Filesystems on J-Series Routers

    22. Restoring a Backed-Up Filesystem

    23. Installing a Different Software Release on M-Series and T-Series Routers

    24. Installing a Different Software Release on J-Series Routers

    25. Creating an Emergency Boot Disk

    26. Gathering Software Version Information

    27. Gathering Hardware Inventory Information

    28. Finding Out How Long the Router Has Been Up

    29. Gathering Information Before Contacting Support

    30. Managing Routers with Similar Configurations

    31. Managing Redundant Routing Engines

    32. Using the Second Routing Engine to Upgrade to a New Software Version

  2. Chapter 2 Basic Router Security and Access Control

    1. Introduction

    2. Allowing Access to the Router

    3. Controlling Root Authentication

    4. Logging In to the Router's Console

    5. Setting the Login Authentication Methods

    6. Setting Up Login Accounts on the Router

    7. Changing the Format of Plain-Text Passwords

    8. Changing the Plain-Text Password Encryption Method

    9. Creating a Login Account for Remote Authentication

    10. Creating a Group Login Account

    11. Customizing Account Privileges

    12. Creating a Privilege Class that Hides Encrypted Passwords

    13. Setting Up RADIUS User Authentication

    14. Setting Up TACACS+ User Authentication

    15. Restricting Inbound SSH and Telnet Access

    16. Setting the Source Address for Telnet Connections

    17. Creating a Login Banner

    18. Finding Out Who Is Logged In to the Router

    19. Logging Out of the Router

    20. Forcibly Logging a User Out

  3. Chapter 3 IPSec

    1. Introduction

    2. Configuring IPSec

    3. Configuring IPSec Dynamic SAs

    4. Creating IPSec Dynamic SAs on J-Series Routers or Routers with AS PICs

    5. Using Digital Certificates to Create Dynamic IPSec SAs

  4. Chapter 4 SNMP

    1. Introduction

    2. Configuring SNMP

    3. Setting Router Information for the MIB-II System Group

    4. Setting Up SNMP Traps

    5. Controlling SNMP Access to the Router

    6. Using a Firewall Filter to Protect SNMP Access

    7. Controlling Access to Router MIBs

    8. Extracting Software Inventory Information with SNMP

    9. Extracting Hardware Inventory Information with SNMP

    10. Collecting Router Operational Information with SNMP

    11. Logging SNMP Access to the Router

    12. Logging Enterprise-Specific Traps

    13. Using RMON Traps to Monitor the Router's Temperature

    14. Configuring SNMPv3

    15. Tracking Router Configuration Changes

    16. Setting Up SNMPv3 Traps

  5. Chapter 5 Logging

    1. Introduction

    2. Turning On Logging

    3. Limiting the Messages Collected

    4. Including the Facility and Severity in Messages

    5. Changing the Size of a Logging File

    6. Clearing the Router's Logfiles

    7. Sending Log Messages to Your Screen

    8. Sending Logging Messages to a Log Server

    9. Saving Logging Messages to the Other Routing Engine

    10. Turning Off Logging

    11. Turning On Basic Tracing

    12. Monitoring Interface Traffic

  6. Chapter 6 NTP

    1. Introduction

    2. Setting the Date and Time on the Router Manually

    3. Setting the Time Zone

    4. Synchronizing Time When the Router Boots

    5. Synchronizing Time Periodically

    6. Authenticating NTP

    7. Checking NTP Status

  7. Chapter 7 Router Interfaces

    1. Introduction

    2. Viewing Interface Status

    3. Viewing Traffic Statistics on an Interface

    4. Setting an IP Address for the Router

    5. Setting the Router's Source Address

    6. Configuring an IPv4 Address on an Interface

    7. Configuring an IPv6 Address on an Interface

    8. Configuring an ISO Address on an Interface

    9. Creating an MPLS Protocol Family on a Logical Interface

    10. Configuring an Interface Description

    11. Choosing Primary and Preferred Interface Addresses

    12. Using the Management Interface

    13. Finding Out What IP Addresses Are Used on the Router

    14. Configuring Ethernet Interfaces

    15. Using VRRP on Ethernet Interfaces

    16. Connecting to an Ethernet Switch

    17. Configuring T1 Interfaces

    18. Performing a Loopback Test on a T1 Interface

    19. Setting Up a BERT Test on a T1 Interface

    20. Configuring Frame Relay on a T1 Interface

    21. Configuring a SONET Interface

    22. Using APS to Protect Against SONET Circuit Failures

    23. Configuring an ATM Interface

    24. Dealing with Nonconfigurable Interfaces

    25. Configuring Interfaces Before the PICs Are Installed

  8. Chapter 8 IP Routing

    1. Introduction

    2. Viewing the Routes in the Routing Table

    3. Viewing Routes to a Particular Prefix

    4. Viewing Routes Learned from a Specific Protocol

    5. Displaying the Routes in the Forwarding Table

    6. Creating Static Routes

    7. Blackholing Routes

    8. Filtering Traffic Using Unicast Reverse-Path Forwarding

    9. Aggregating Routes

    10. Load-Balancing Traffic Flows

    11. Adding Martian Addresses

    12. Changing Route Preferences to Migrate to Another IGP

    13. Configuring Routing Protocols to Restart Without Losing Adjacencies

  9. Chapter 9 Routing Policy and Firewall Filters

    1. Introduction

    2. Creating a Simple Routing Policy

    3. Changing a Route's Routing Information

    4. Filtering Routes by IP Address

    5. Filtering Long Prefixes

    6. Filtering Unallocated Prefix Blocks

    7. Creating a Chain of Routing Policies

    8. Making Sure a Routing Policy Is Functioning Properly

    9. Creating a Simple Firewall Filter that Matches Packet Contents

    10. Creating a Firewall Filter that Negates a Match

    11. Reordering Firewall Terms

    12. Filtering Traffic Transiting the Router

    13. Using a Firewall Filter to Count Traffic on an Interface

    14. Logging the Traffic on an Interface

    15. Limiting Traffic on an Interface

    16. Protecting the Local Routing Engine

    17. Rate-Limiting Traffic Flow to the Routing Engine

    18. Using Counters to Determine Whether a Router Is Under Attack

  10. Chapter 10 RIP

    1. Introduction

    2. Configuring RIP

    3. Having RIP Advertise Its Routes

    4. Configuring RIP for IPv6

    5. Enabling RIP Authentication

    6. Routing RIP Traffic over Faster Interfaces

    7. Sending Version 1 Update Messages

    8. Tracing RIP Protocol Traffic

  11. Chapter 11 IS-IS

    1. Introduction

    2. Configuring IS-IS

    3. Viewing the IS-IS Link-State Database

    4. Viewing Routes Learned by IS-IS

    5. Configuring IS-IS for IPv6

    6. Configuring a Level 1–Only Router

    7. Controlling DIS Election

    8. Enabling IS-IS Authentication

    9. Redistributing Static Routes into IS-IS

    10. Leaking IS-IS Level 2 Routes into Level 1

    11. Adjusting IS-IS Link Costs

    12. Improving IS-IS Convergence Times

    13. Moving IS-IS Traffic off a Router

    14. Disabling IS-IS on an Interface

    15. Tracing IS-IS Protocol Traffic

  12. Chapter 12 OSPF

    1. Introduction

    2. Configuring OSPF

    3. Viewing Routes Learned by OSPF

    4. Viewing the OSPF Link-State Database

    5. Configuring OSPF for IPv6

    6. Configuring a Multiarea OSPF Network

    7. Setting Up Stub Areas

    8. Creating a Not-So-Stubby Area

    9. Summarizing Routes in OSPF

    10. Enabling OSPF Authentication

    11. Redistributing Static Routes into OSPF

    12. Adjusting OSPF Link Costs

    13. Improving OSPF Convergence Times

    14. Moving OSPF Traffic off a Router

    15. Disabling OSPF on an Interface

    16. Tracing OSPF Protocol Traffic

  13. Chapter 13 BGP

    1. Introduction

    2. Configuring a BGP Session Between Routers in Two ASs

    3. Configuring BGP on Routers Within an AS

    4. Diagnosing TCP Session Problems

    5. Adjusting the Next-Hop Attribute

    6. Adjusting Local Preference Values

    7. Removing Private AS Numbers from the AS Path

    8. Prepending AS Numbers to the AS Path

    9. Filtering BGP Routes Based on AS Paths

    10. Restricting the Number of Routes Advertised to a BGP Peer

    11. Authenticating BGP Peers

    12. Setting Up Route Reflectors

    13. Mitigating Route Instabilities with Route Flap Damping

    14. Adding a BGP Community to Routes

    15. Load-Balancing BGP Traffic

    16. Tracing BGP Protocol Traffic

  14. Chapter 14 MPLS

    1. Introduction

    2. Configuring LSPs Using LDP as the Signaling Protocol

    3. Viewing Information and LDP-Signaled LSPs in the Routing Tables

    4. Verifying that an LDP-Signaled LSP Is Carrying Traffic

    5. Enabling LDP Authentication

    6. Tracing LDP Operations

    7. Setting Up RSVP-Signaled LSPs

    8. Viewing Information About RSVP-Signaled LSPs in the Routing Tables

    9. Verifying Packet Labels

    10. Verifying that the RSVP-Signaled LSP Is Carrying Traffic

    11. Configuring RSVP Authentication

    12. Protecting an LSP's Path

    13. Using Fast Reroute to Reduce Packet Loss Following a Link Failure

    14. Automatically Allocating Bandwidth

    15. Prioritizing LSPs

    16. Allowing IGP Traffic to Use an LSP

    17. Installing LSPs into the Unicast Routing Table

    18. Tracing RSVP Operations

  15. Chapter 15 VPNs

    1. Introduction

    2. Setting Up a Simple Layer 3 VPN

    3. Viewing the VPN Routing Tables

    4. Adding a VPN for a Second Customer

  16. Chapter 16 IP Multicast

    1. Introduction

    2. Configuring PIM-SM

    3. Manually Establishing a PIM-SM RP

    4. Using Auto-RP to Dynamically Map RPs

    5. Setting Up a PIM-SM Bootstrap Router

    6. Filtering PIM-SM Bootstrap Messages

    7. Configuring Multiple RPs in a PIM-SM Domain with Anycast RP

    8. Configuring Multiple RPs in a PIM-SM Domain Anycast PIM

    9. Limiting the Group Ranges an RP Services

    10. Viewing Multicast Routes

    11. Checking the Groups for Which a PIM-SM Router Maintains Join State

    12. Manually Configuring IGMP

    13. Using SSM

    14. Connecting PIM-SM Domains Using MSDP and MBGP

    15. Configuring PIM-DM

    16. Tracing PIM Packets

  1. Colophon