As a CCNA / CCNP candidate you are expected to understand IPv6



During your career as a Cisco network engineer you will have to deal understanding IPv6 address structure.

For your CCNA and CCNP studies you have to at some point confront and understand IPv6. At first glance it can see quite daunting compared to IPv4 that we are all used to, in actual fact IPv6 is quite a simply addressing protocol once you get past the initial shock. In this article we are going to have a look at Neighbour discovery protocol for layer 2 mapping.

When an IPv6 host or router needs to send a packet to some other host on the same network it will first of all look into it's own local neighbour database to find if it has an IPv6 to MAC mapping, if it finds the right mapping the host will use it, if there is no mapping the host will need to resolve the known layer 3 IPv6 address to a currently unknown Layer 2 MAC address and to do this the host uses the Neighbor Discovery Protocol or NDP to discover the MAC address dynamically.

The Sending host will use a multicast message called a Neighbor Solicitation (NS) icmp message to ask the receiving host for it's MAC address, the receiving host will reply with a Neighbor Advertisement (NA) icmp message unicast in return with the requested MAC address.

How IPv6 achieves this is all in the construction of the Neighbor Solicitation message which makes use of a special IPv6 destination address called a "Solicited Node Multicast", this solicited Node Multicast at any given moment represented all of the IPv6 hosts on the link, the last 24 bits of the Solicited Node Address are the last 24 bits of the IPv6 address of the device that a host is requesting the MAC from.

The IPv6 multicast destination address is FF02::1:FF:0/104 the final 24 bits are made up of the last 24 bits of the IPv6 address to which the message is being sent to. For example if a host wanted to discover the MAC address of an IPv6 host addressed as 2222:3333:4444:5555:6666:AAAA:BBBB:CCCC:DDDD/64 then the solicited Node Address will look like the following FF02::1:FF:CC:DDDD/104

When a sending hosts wants to get the MAC address from the IPv6 host of 2222:3333:4444:5555:6666:AAAA:BBBB:CCCC:DDDD/64 it will take the last 24 bits of the known IPv6 address and place them into the remaining 24 bits of the Solicited Node Address and since all IPv6 hosts listen to their own Solicited Node addresses, when they hear their address they will reply with the MAC address.

Source: http://www.articlesbase.com/networks-articles/ccna-ccnp-training-ipv6-addressing-3375312.html

Cisco ASA 5510 Firewall : Basic Configuration Tutorial


Cisco ASA 5510 security appliance is the second model in the ASA series (ASA 5505, 5510, 5520 etc) and is fairly popular since is intended for small to medium enterprises. Like the smallest ASA 5505 model, the 5510 comes with two license options: The Base license and the Security Plus license. The second one (security plus) provides some performance and hardware enhancements over the base license, such as 130,000 Maximum firewall connections (instead of 50,000), 100 Maximum VLANs (instead of 50), Failover Redundancy, etc. Also, the security plus license enables two of the five firewall network ports to work as 10/100/1000 instead of only 10/100.


Next we will see a simple Internet Access scenario which will help us understand the basic steps needed to setup an ASA 5510. Assume that we are assigned a static public IP address 100.100.100.1 from our ISP. Also, the internal LAN network belongs to subnet 192.168.10.0/24. Interface Ethernet0/0 will be connected on the outside (towards the ISP), and Ethernet0/1 will be connected to the Inside LAN switch.

The firewall will be configured to supply IP addresses dynamically (using DHCP) to the internal hosts. All outbound communication (from inside to outside) will be translated using Port Address Translation (PAT) on the outside public interface. Let's see a snippet of the required configuration steps for this basic scenario:

Step1: Configure a privileged level password (enable password)
 By default there is no password for accessing the ASA firewall, so the first step before doing anything else is to configure a privileged level password, which will be needed to allow subsequent access to the appliance. Configure this under Configuration Mode:
ASA5510(config)# enable password mysecretpassword


Step2: Configure the public outside interface
ASA5510(config)# interface Ethernet0/0
 ASA5510(config-if)# nameif outside
 ASA5510(config-if)# security-level 0
 ASA5510(config-if)# ip address 100.100.100.1 255.255.255.252
 ASA5510(config-if)# no shut


Step3: Configure the trusted internal interface
ASA5510(config)# interface Ethernet0/1
 ASA5510(config-if)# nameif inside
 ASA5510(config-if)# security-level 100
 ASA5510(config-if)# ip address 192.168.10.1 255.255.255.0
 ASA5510(config-if)# no shut

Step 4: Configure PAT on the outside interface
ASA5510(config)# global (outside) 1 interface
 ASA5510(config)# nat (inside) 1 0.0.0.0 0.0.0.0

Step 5: Configure Default Route towards the ISP (assume default gateway is 100.100.100.2)
ASA5510(config)# route outside 0.0.0.0 0.0.0.0 100.100.100.2 1

Step 6: Configure the firewall to assign internal IP and DNS address to hosts using DHCP
ASA5510(config)# dhcpd dns 200.200.200.10
 ASA5510(config)# dhcpd address 192.168.10.10-192.168.10.200 inside
 ASA5510(config)# dhcpd enable inside

The above basic configuration is just the beginning for making the appliance operational. There are many more configuration features that you need to implement to increase the security of your network, such as Static and Dynamic NAT, Access Control Lists to control traffic flow, DMZ zones, VPN etc.

Source:http://www.articlesbase.com/networks-articles/cisco-asa-5510-firewall-basic-configuration-tutorial-833644.html


Notes for OSPF DR/BDR Peering priority



  • Higher priority value (0-255) is better.
  • Default value is 1
  • Can be set via neighbor command or interface command.
  • Neighbor command sets neighbor priority while interface command sets its own interface priority. Thus, both commands will not interfere each other. Again, one is for neighbor and other is for its own interface.
  • If the local interface priority is set and the other router uses neighbor priority command, then interface priority will take precedence.
hostname R2
interface Serial0/0
ip ospf priority 255

hostname R1
R1(config-router)#do sh run | s router ospf
router ospf 1
neighbor 10.1.1.2 priority 0

R1(config-router)#do sh ip ospf nei 2.2.2.2 | i priority|DR
Neighbor priority is 255 (configured 0), State is FULL, 7 state changes
DR is 10.1.1.2 BDR is 10.1.1.1

R1(config-router)#do sh ip ospf nei | I 2.2.2.2
2.2.2.2 255 FULL/DR 00:01:51 10.1.1.2 Serial0/0
hostname R2
interface Serial0/0
ip ospf priority 0

R1(config-router)#do sh run | s router ospf
router ospf 1
neighbor 10.1.1.2 priority 255

R1(config-router)#do sh ip ospf nei 2.2.2.2 | i priority|DR
Neighbor priority is 0 (configured 255), State is FULL, 7 state changes
DR is 10.1.1.1 BDR is 10.1.1.1

R1(config-router)#do sh ip ospf nei | I 2.2.2.
2.2.2.2 0 FULL/DROTHER 00:01:41 10.1.1.2 Serial0/0
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.

EIGRP Overview

EIGRP Facts


Enhanced IGRP is a Cisco-proprietary balanced hybrid routing protocol that combines the best features of distance vector and link state routing. EIGRP:
  • Sends the subnet mask in the routing update. It supports route summarization and VLSM.
  • Supports automatic classful route summarization at major network boundaries (this is the default in EIGRP). Unlike IGRP and RIP, manual route summarization can also be configured on arbitrary network boundaries to reduce the routing table size.
  • Is not susceptible to routing loops. Instead, EIGRP uses built-in loop avoidance techniques. Under certain conditions, EIGRP will use split horizon, but not hold downs or flush timers.
  • Is scalable and does not have the 16 hop limitation of RIP.
  • Uses hello packets to discover neighbor routers. Hello intervals on EIGRP routers do not need to match.
  • Exchanges the full routing table at startup, and then partial routing updates thereafter.
  • Uses unicasts or multicasts to 224.0.0.10 for routing updates. Hello packets always use the multicast address.
  • Uses bandwidth, delay, reliability, and load for the route metric. The metric is expressed as the number of microseconds.
    • The degree to which each value is used to calculate the metric can be customized by modifying one of five K values.
    • By default, K1 and K3 are set to 1, while K2, K4, and K5 are set to 0. These settings mean that with the default configuration, only delay and bandwidth have an effect on the metric.
    • On serial links, a default bandwidth of 1544 is used. EIGRP does not detect the actual bandwidth on the link. You must manually configure bandwidth values for accurate metric calculations.
  • Uses an autonomous system (AS) number to identify routers that are to share EIGRP information. The AS number on both routers must match.
  • Maintains partial network topology information in addition to routes.
  • Supports load balancing on equal-cost and unequal cost links. This means that EIGRP can keep multiple paths to a single network, even if they have a different cost. With IOS 12.4 and above, EIGRP supports up to 16 paths (earlier versions supported up to 6), with the default being 4 equal-cost paths.
  • Minimizes network bandwidth usage for routing updates. During normal operation EIGRP transmits only hello packets across the network. EIGRP does not send periodic routing updates like RIP and IGRP. When change occurs, only routing table changes are propagated in EIGRP not the entire table.
  • Requires less processing and memory than link state protocols.
  • Converges more quickly than distance vector protocols. In some cases, convergence can be almost instantaneous because an EIGRP router stores backup routes for destinations. If no appropriate route or backup exists in the routing table, EIGRP will query neighbor routers to discover an alternate route. In this manner, EIGRP can quickly adapt to alternate routes when changes occur.
  • Uses the DUAL link-state algorithm for calculating routes.
  • Supports multiple protocols. EIGRP can exchange routes for IP, AppleTalk and IPX/SPX networks.
  • Uses a neighbors table to keep track of neighbor routers. The neighbors table includes the following for each neighbor:
    • A hold time. Each hello packet includes a hold time that identifies how long the hello information is valid. If the hold time expires without receipt of a hello packet, the neighbor is assumed to be unreachable.
    • Round-trip timers that help the router identify cost values to reach the neighbor router.
  • Uses a topology database to keep track of all known networks.
    • The topology table has a list of each destination network and all neighbor routers that reported routes to that network.
    • The best routes that will be used for routing packets are copied from the topology table into the routing table.
    • The topology table holds up to 16 known routes (previously up to 6 before IOS version 12.4).
To understand how EIGRP can provide load balancing and fast recovery for failed links, you need to understand the following concepts:
Term Definition
Advertised Distance (AD) The advertised distance (AD) is the cost to the destination network as reported by the neighbor router. The AD is also called the reported distance (RD).
Feasible Distance (FD) The feasible distance (FD) is the lowest total cost to a destination network. The feasible distance is identified for each destination network, and is determined as follows: # For each neighbor, a total cost to the network through the neighbor is calculated by adding the AD to the cost required to reach the neighbor router (the cost of the link used to reach the neighbor router).
  1. The router compares the total cost of all routes. The lowest total cost to the destination network is the feasible distance to the network.
Note: Sometimes the total cost for each neighbor route is referred to as a feasible distance. However, the term more correctly identifies the lowest known cost to the network, not the total cost for each reported (possible) route.
Successor A successor is the route to a destination network with the lowest total cost. * When a new route is first learned, the total cost to the successor route is used as the feasible distance to that network.
  • The successor route is copied from the topology table into the routing table.
  • You can have multiple successor routes if multiple routes to the same network exist with the same lowest metric.
Feasible Successor A feasible successor is an alternate route to a destination network. The total cost to the route through the feasible successor is higher than the total cost of successor routes. A route must meet the following condition to qualify as a feasible successor route:
The advertised distance of the route through that neighbor must be less than the feasible distance used for that network (AD < FD).
Be aware of the following regarding feasible successors: * Satisfying the AD < FD condition ensures that the route is loop free. In other words, the router knows for sure that the route does not include itself in the path if the AD is lower than the FD. Note: Successor routes must also meet this condition.
  • Feasible successor routes are kept in the topology table but are not copied to the routing table.
  • Successor routes can also be classified as feasible successor routes.
  • When all successor routes to a network are lost, the router can immediately begin to use the next best feasible successor route. This provides for rapid recovery in the event of a topology change.
Be aware of the following regarding the EIGRP and routes:
  • All known routes to a destination are kept in the topology table. Only successor routes are copied to the routing table.
  • If the successor route goes down and there are no feasible successors, routes whose advertised distance is greater than the feasible distance for the route are not used because they might be routes that include loops.
  • When the last feasible successor route to a network is lost, the router recalculates all routes for the lost neighbor. Instead of using other routes that are not feasible successor routes, it first communicates with neighbor routers. If necessary, the router recalculates the feasible distance for the route.
  • A route whose AD is greater than the FD does not prove that a loop exists, only that a loop might exist. After the last feasible successor route is lost, a previously unacceptable route could be identified as a feasible successor route as long as its AD is less than the newly-calculated FD.
  • By default, EIGRP uses equal-cost load balancing. To use unequal-cost load balancing, configure the variance value. The variance is a multiplier that identifies the degree to which alternate paths can be used.
    • The variance value ranges from 1 to 255.
    • The default variance is 1, meaning that only routes that match the best route can be used.
    • Setting the variance to 2 allows alternate routes to be used whose total costs are within a factor of 2 (double or less) of the best cost route.
    • Only feasible successor routes can be used. This means that a route whose AD is greater than the FD cannot be used as an alternate route, even if its total cost is within the variance amount.
For an EIGRP router to share information with a neighbor, the following conditions must be met:
  • Both routers are on the same subnet with the same subnet mask.
  • If used, authentication checks must pass.
  • Both routers must be configured with the same AS number.
  • Metric weight values (K values) must match on both routers.


EIGRP Command List

You configure EIGRP just the same as you would configure IGRP. The following table lists the applicable commands.
Command Function
Router(config)#router eigrp number Defines an EIGRP process.
The number must match between routers for information to be shared.
-->
Router(config-router)#network n.n.n.n
Router(config-router)#network n.n.n.n w.w.w.w

Identifies a network that participates in the routing process.
Networks can be specified with or without the wildcard mask. If you do not use a wildcard mask, the network address you add will be automatically truncated based on classful network boundaries.
You must use a wildcard mask to identify VLSM subnets.

-->
Router(config-router)#no auto-summary

Turn off automatic route summarization.
With automatic route summarization, subnets are summarized based on classful boundaries when advertising routes on networks with a different class boundary. You must disable automatic summarization if you have a network address (such as 10.0.0.0) subnetted into smaller subnets and separated by a network with a different classful network address (such as 12.0.0.0).
Example
The following commands enable EIGRP on a router and define three networks that participate in the routing process.

Router(config)#router eigrp 2
Router(config-network)#network 172.16.1.0 0.0.0.255
Router(config-network)#network 172.16.2.0 0.0.0.255
Router(config-network)#network 172.16.3.0 0.0.0.255

Use the following commands to manage and monitor EIGRP.
Command Features
-->
show ip route

View EIGRP-learned routes.

-->
show eigrp neighbors

View neighboring routers from which EIGRP routes can be learned. Lists the IP address of the connected router.

-->
show eigrp interfaces

View the interfaces that are running EIGRP and the number of connected routers.

LAB

You have two routers connected as shown in the network diagram. Router Jujuy has already been configured to share route information using EIGRP with an autonomous system number of 100. Your task in this lab is to configure the Salta router to share routing information using EIGRP with the Jujuy router.
All interfaces have been configured and enabled. Your task is to:
  • Configure the Salta router to share information about all directly-connected routes with the Jujuy router.
  • When you are finished, save your changes.
Tip: To check your work, view the routing table on each router. If successful, each router will have learned about two networks through EIGRP.


Task SummaryActions you were required to perform
  • Run EIGRP on Fa0/0 for AS 100
  • Run EIGRP on Fa0/1 for AS 100
  • Run EIGRP on s0/1/1 for AS 100
Explanation
When configuring EIGRP, all routers that share information must use the same autonomous system number. In this scenario, use router eigrp 100 to configure the Salta router. Add network statements to identify networks on which to run EIGRP.
Use the following commands:

Salta>enable
Salta#config t
Salta(config)#router eigrp 100
Salta(config-router)#network 192.168.1.0
Salta(config-router)#network 192.168.2.0
Salta(config-router)#network 172.17.150.140 0.0.0.3

(Press Ctrl + Z)
Be aware of the following when configuring EIGRP:
  • Using a network statement without a wildcard mask makes an entry using classful network boundaries.
  • To run EIGRP on the Salta s0/1/1 interface, you could have also used the following command: network 172.17.0.0. This classful network entry would match the IP address assigned to the s0/1/1 interface, thereby enabling EIGRP on that interface.
  • You can enable EIGRP on all interfaces on a router using a single command as follows: network 0.0.0.0 255.255.255.255. This wildcard mask value matches every possible network, enabling EIGRP on all IP interfaces.

7 reasons why you should get a CCNA certification

CCNA certification or the Cisco Certified Network Associate is one of the important certifications in the networking field.  A CCNA certified individual means he has the ability to install, operate, configure and trouble shoot medium sized switching and routing networks. The demand of CCNA certified professionals is increasing rapidly. If you want to choose networking as your carrier option then taking a CCNA certification will be a wise move. Let us now take a look of some of the important reasons for taking a CCNA certification.

1. CCNA certification will undoubtedly increase your knowledge. The syllabus is filled with rich information about networking and will help you to understand new concepts and developments in the field of networking. Your skill will be tested and after the course  you will come as a more technically advanced person.


2. The addition of CCNA in your resume will be a big advantage.   CCNA jobs are increasing in the world.  If people see the four letters CCNA in your resume they will not think further and will hire you because CCNA has a value that no other certification has.

3. IF you are already employed in a Networking company then doing CCNA will be of great advantage in your carrier. There is  a big chance that you might get a promotion after doing CCNA.

4. CCNA certified professionals are highly paid. If you are worried about your monthly income and if you are not getting as much as you deserve then just take a CCNA certification. Employers will have no other option than giving you a decent salary.


5. CCNA certification is the stepping stone for many other reputed certifications. The syllabus of CCNA is so vivid and informative that it will be helpful for you to study other networking courses such as CCNA security, CCNA  wireless and  others

6. Being a CCNA certified individual will help us to earn respect amount our coworkers. CCNA certified individual means he has some good skill and intellectual capability.

7. If you are in confusion about the networking course the CCNA will be the perfect solution. It is like read job after certification. Just Google CCNA jobs and you can see thousands of vacancies for CCNA certified individuals. you can get a prestigious job near your home itself with a good salary.

What Is OSPF Router LSA?




Q1. What is OSPF Router LSA?
Answer: It is also called Type-1 LSA. A router running OSPF creates a Type-1 LSA to describe its interface IP addresses and costs. When starting OSPF, the router creates a Type-1 LSA to describe its links.


Q2. Why Type-1 LSA?
Answer. Hosts attached to routers need to learn each others' network addresses and how to reach them. One alternative is static routing. But that won't scale when the number of routers increases. With OSPF, every router creates its own Type-1 LSA and floods it. As a result, routers in an area are able to discover other routers' interface addresses and learn the same knowledge of network topology. This allows routers to calculate routing paths correctly.


Q3. What is Link ID in Router LSA?
Answer: Type-1 LSA describes each link with a Link-ID, which is represented by Router-ID, interface IP address, or subnet address. Let's review a case study to see how Link ID works. In the companion simulation topology, R3 has three interfaces. Interface 1: R3 is connected to R11 by a serial link. Interface 2: R3 is connected to R1 by an Ethernet link (a multi-access subnet.) R3 is elected as DR. Interface 3: R3 is connected to a host subnet. No OSPF router is attached. Their Link ID values are specified as follows: Interface IP address Link ID Link type Description #1 S0/0 1.1.1.1 1.1.1.1 Point-to-point Link ID is the Router ID of the connected router (R1) #2 E0/0 10.1.1.1 10.1.1.1 Transit network This subnet has OSPF routers. Link ID is DR's IP. #3 E0/1 192.168.1.1 192.168.1.1 Host network This subnet has no OSPF router. Link ID is subnet address.


Q4. What are VEB bits in Type-1 LSA?
Answer: V=1 if this router uses virtual link to set up full adjacency with anther router. E =1 if the Type-1 LSA is created by an ASBR. B=1 if this router is an ABR.


Q5. How is routing table affected by Type-1 LSA?
Answer: After a Type-1 LSA is flooded, routers use its IP addresses and costs specified in Link IDs to calculate routing paths. and update their routing tables. That is, IP addresses specified in Type-1 LSAs are reflected in routing tables' destination addresses. This can be verified in LSDBs and routing tables in the topology of the companions simulation.


Q6. What is Type-1 LSA's flooding scope?
Answer: With the area. This article is the FAQ of an interactive OSPF simulation: Router LSA. See External links.

10 Multiple Choice Questions For CCNA


After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams....
- Reinforce what you learnt - fill in the gaps of what you missed
- Get you used to answering questions to build confidence and familiarity
Here are 10 Multiple Choice exams questions for you to practice on:
Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply)
A. HTTP
B. Aux Port
C. Console
D. LLC
E. Telnet
F. SNMP
Question 2# - Which statement is true regarding the user exec and privileged exec mode?
A. They both require the enable password
B. User exec is a subset of the privileged exec
C. The '?' only works in Privileged exec
D. They are identical
Question 3# - This modem standard has a speed of 28.8k and has error-correction features.
A. V.42
B. V.32bis
C. V.90
D. V.34
Questions 4# - What would be the proper command to set a DCE clock rate of 56k for a serial interface?
A. Router (config) # clockrate 56000
B. Router# clockrate 56000.
C. Router (config-if) #clock rate 56000
D. Router (config-if) # clockrate 56k
Question 5# - What is an example of a MAC address?
A. Az32:6362:2434
B. BA:281x:8288
C. 101:354:665:8734:ffd6:8023
D. A625:cbdf:6525
Question 6# - Which command does not show that two devices are failing to route packets between them successfully?
A. show interface
B. trace
C. telnet
D. ping
Question 7# - You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer.
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.224.0.0
E. 255.255.255.200
Question 8# - MAC is to Ethernet what ________ is to Frame Relay.
A. DLCI
B. LCI
C. PVC
D. None of the above
Question 9# - The 802.2 frame specifies a type whereas 802.3 frame specifies a length:
A. True
B. False
Question 10# - What is used to see if a client is still connected to a NetWare server?
A. Spoofing TCP/SAP
B. Watchdog packet
C. GNS Round Robin
D. DNS Round Robin
ANSWERS
Question 1 - Correct Answers: B,C,E
Question 2 - Correct Answers: B
Question 3 - Correct Answers: A
Question 4 - Correct Answers: C
Question 5 - Correct Answers: D
Question 6 - Correct Answers: A
Question 7 - Correct Answers: B
Question 8 - Correct Answers: A
Question 9 - Correct Answers: A
Question 10 - Correct Answers: B

Dual Stack IPv6 and IPv4 configuration

CCNA Exploration 4.0, Semester 4, "Dual Stack IPv6 and IPv4 configuration " Packet Tracer 5.0 practice file (CNA-04-006).





This example is designed for you to practice basic IPv6 commands in IOS. You will also know the new fashion to start a routing protocol in IPv6.

Note: Packet Tracer 4.X does not support IPv6. Please use version 5.X and later to practice IPv6.

To simplify your task, I configured all the necessary IPv4/IPv6 addresses on the interfaces. You can just begin to observe and verify!

interface FastEthernet0/0
 ip address 10.1.1.1 255.255.255.0
 duplex auto
 speed auto
!
interface FastEthernet0/1
 no ip address
 duplex auto
 speed auto
 ipv6 address 2001:1:1:1::1/64
!
interface Serial0/0/0
 ip address 10.2.2.1 255.255.255.0
 ipv6 address 2001:2:2:2::1/64
 clock rate 64000
!



You have to configure "routing protocol" yourself. To verify "Dual Stack", we will enable both IPv4 routing protocol and IPv6 routing protocol.

The IPv4 part (in this case, RIPv2) is very easy for you. Remember the basic two steps to start any IPv4 routing protocols in IOS:

  1. Use one "router X" command, to start one routing protocol process
  2. Use one or more "network Y" commands, to specify at which interfaces will this protocol being enabled

So the configuration is this:

router rip
 version 2
 network 10.0.0.0
 no auto-summary
!




For this simple IPv4 addressing, it is not necessary to include an "no auto-summary" command. It is always a good habit to add "no auto-summary" in today's VLSM world.

As to IPv6 part (RIPng), steps are quite different from IPv4:
  1. We need to start the routing protocol process first. In addition, we also have to create a TAG name for it. This is because in IPv6 IOS supports multiple instances on routing protocols
  2. Go directly to interface configuration mode to assign which "routing instance" to be enabled on this interface.

interface FastEthernet0/1
 no ip address
 duplex auto
 speed auto
 ipv6 address 2001:1:1:1::1/64
 ipv6 rip CCNA enable 
!
interface Serial0/0/0
 ip address 10.2.2.1 255.255.255.0
 ipv6 address 2001:2:2:2::1/64
 ipv6 rip CCNA enable 
 clock rate 64000
!
interface Serial0/0/1
 no ip address
 shutdown
!
ipv6 router rip CCNA
!

In fact, the tag name "CCNA" is only locally significant. You can play by using different tags on two routers and verify it yourself.


Creative Commons License
This work by LI-JI HONG is licensed under a Creative Commons Attribution 3.0 Unported License.

How Does OSPF Neighbor State Change?

Q1. What are OSPF packets? What do they do?
Answer: There are 5 OSPF packets:
Hello: Discover neighbors.
DD (Data Description): Exchange LSDB catalog (LSA headers).
Request: Ask neighbor to send LSA that I don't have.
Update: Send LSA requested by neighbors.
Ack: Tell Update sending router that I have received your Update.

Q2: What are neighbor states? What do they do?
Answer: There are 7 states:
Down. Neighbor is gone. E.g. neighbor is down, stops running OSPF, or is just initialized.
Init: The node has a one-way relationship with a neighbor. It receives a Hello from the neighbor.
2-way. The node has a bidirectional relationship with a neighbor. It has received a Hello from the neighbor and the Hello's neighbor list contains my name.
ExStart. Two neighbors negotiate Master-Slave relationship before exchanging LSA.
Exchange: Exchange LSDB catalogs with neighbors and find out which LSA is missing.
Loading. Ask a neighbor to send LSAs that I don't have.
Full: Two neighbors have the same LSDB. They have the same knowledge of the topology.
Note: See the companion simulation to relate how routers change states when receiving packets.

Q3. How to groups 9 neighbor into some meaningful stages?
Answer. These states can be classified into 4 stages:
- Discover neighbors. Down, Init, 2-way. Use Hello.
- Determine Master-Slave: ExStart, Exchange. Use DD.
- Find out which LSA to exchange: Loading. Use DD, Request.
- Synchronize LSDB: Full Adjacency. Use Update, Ack.

Q4. What is Master-Slave relationship for neighbors?
Answer: When two neighbors are ready to exchange LSA catalogs, they need to use a sequence number to tag LSA catalog exchange. The first job is to decide the sequence number. Two neighbors exchange DD to indicate their Router ID. The one with the higher Router ID wins and chooses a sequence number.
Note. In the companion simulation (External link), you can click DD to see its content.

Q5. Why neighbors need to use a sequence number to track LSA catalog exchange?
Answer: Sequence numbers are used to track LSA catalog transaction sessions. A router may have a large LSA catalog that does fit into one DD packet. This router may have several neighbors to exchange LSA catalog at the same time.

Q6. Does OSPF use TCP to provide reliable transmission of LSA?
Answer: No. OSPF uses Request-Update-Ack to ensure reliable transmission of LSA.

Q7. Why doesn't OSPF use TCP to transfer LSA?
Answer: TCP is designed to transmit large chunk of data across a congested network. Its goal is to adapt to network congestion and avoid packet losses due to router queue full. It is costly to set up a TCP sessions. An OSPF router transmits LSA to directly connected neighbors. There is no network congestion is involved between sender and receiver nodes. Using a light weight send-ack reliable transmission method is sufficient.