2. Enhanced Interior Gateway Routing Protocol (EIGRP)
2.1. Overview
2.1.1. EIGRP Hello and Neighboring
2.1.2. EIGRP Metric
2.1.3. DUAL Algorithm
2.1.4. Unequal-Cost Load Balancing
2.1.5. Route Summarization
2.2. EIGRP Authentication
2.3. EIGRP Neighboring in Non-Broadcast Network
2.4. EIGRP Query and Stuck-In-Active
2.5. Route Filtering
2.5.1. Distribute List
2.5.2. Prefix List
2.5.3. Route Map
2.6. EIGRP Stub
2.7. Route Leaking
2.8. EIGRP Named Mode
2.9. EIGRP Configuration Example
2.9.1. Exercise for EIGRP
2.9.2. EIGRP Query Example
3. Open Shortest Path First (OSPF)
3.1. Overview
3.1.1. OSPF Neighboring
3.1.2. Areas and LSA Types
3.1.3. Route Summarization and Filtering
3.1.4. OSPF Metric / Cost
3.2. OSPF Authentication
3.3. Virtual Link
3.4. OSPF Stub Area
3.4.1. Stub Area
3.4.2. Totally Stub Area
3.4.3. Not So Stubby Area (NSSA)
3.4.4. Totally Not So Stubby Area.
3.4.5. Summary
3.5. OSPF Network Types
3.5.1. Overview
3.5.2. Point-to-Point
3.5.3. Broadcast
3.5.4. Loopback
3.5.5. Non-Broadcast MultiAccess / NBMA
3.5.6. Point-to-Multipoint
3.5.7. Point-to-Multipoint Non-broadcast
3.5.8. Summary
3.6. OSPF for IPv6
3.7. Configuration Examples
3.7.1. Exercise for OSPF
3.7.2. More about Route Filtering in OSPF (參考章節)
3.7.3. EIGRP Example for Partially Meshed Network
4. Border Gateway Protocol (BGP)
4.1. Overview
4.1.1. BGP Peering
4.1.2. BGP Routing Updates
4.1.3. BGP Path Attributes
4.1.4. BGP Best Path Selection Algorithm
4.2. More about BGP Peering
4.3. BGP Route Summarization
4.3.1. Summarization before Entering BGP Table
4.3.2. Summarization by BGP
4.3.3. Summarization with as-set
4.3.4. Summarization with Route Leaking
4.4. BGP Route Filtering
4.4.1. Route Filtering Configuration
4.4.2. BGP Route Refresh
4.5. BGP Dampening
4.6. iBGP
4.6.1. iBGP Peering
4.6.2. Route Reflector
4.6.3. Confederation
4.6.4. BGP Next Hop and Synchronization Rule
4.7. BGP for IPv6
4.8. Exercise for BGP
5. Redistribution
5.1. Overview
5.2. Parameters for redistribute Command
5.2.1. Types of Routes
5.2.2. Metric Value
5.2.3. Other Parameters
5.2.4. Example
5.3. Filtering
5.4. Problems in Redistribution
5.4.1. Only One Router at Routing Protocols’ Boundary
5.4.2. Two Routers at Routing Protocols’ Boundary
5.4.3. Two Routers performing Redistribution
5.4.4. More Complex Redistribution Problems
5.5. Route Tagging
5.6. Exercise for Redistribution
6. Policy Based Routing
6.1. Overview
6.2. PBR Configuration
6.2.1. Sample Route Map for PBR
6.2.2. match condition in Route Map for PBR
6.2.3. set in Route Map for PBR
6.3. Exercise for PBR
7. MPLS
7.1. MPLS
7.1.1. Overview
7.1.2. MPLS Label
7.1.3. Label Assignment and LIB
7.1.4. Label Exchange
7.1.5. Label Forwarding Information Base (LFIB)
7.1.6. Label Operations
7.1.7. Penultimate Hop Popping (PHP)
7.1.8. MPLS Configuration
7.2. MPLS VPN
7.2.1. Overview
7.2.2. VRF
7.2.3. MP-BGP
7.2.4. More about Setup / Feature for MPLS VPN
7.3. Exercise for MPLS
8. VRF Lite
8.1. Overview
8.2. Examples for Connecting Two VRF-Lite Routers
8.3. Import / Export Routes Between VRFs
8.4. Exercise for VRF Lite
8.5. Other Ways for Inter-VRF Routing
8.5.1. Inter-VRF Static Routes
8.5.2. Inter-VRF PBR
9. DMVPN
9.1. Overview
9.2. mGRE
9.3. NHRP
9.4. IPsec
9.4.1. Background
9.4.2. Traditional IPsec VPN Setup (參考章節)
9.4.3. IPsec Setup for DMVPN
9.5. Additional DMVPN Settings
9.5.1. Multicast Traffic
9.5.2. NHRP Tuning
9.5.3. Working with OSPF
9.5.4. Working with EIGRP
9.5.5. DMVPN Phase 3
9.6. Exercise for DMVPN
10. Security
10.1. IPv6 Security
10.1.1. IPv6 Access List
10.1.2. IPv6 First Hop Security (FHS)
10.2. Unicast Reverse Path Forwarding (uRPF)
10.2.1. Background
10.2.2. Mechanism and Configuration of uRPF
10.2.3. Options for Configuring uRPF
10.3. Access Control / Policy for Router’s Service
10.3.1. Inbound ACL
10.3.2. Service’ Access Control by ACL
10.3.3. Service’ Access Control by Authentication
10.3.4. Control Plane Policing (CoPP)
10.4. Exercise for Security
11. Monitoring and Troubleshooting
11.1. Config Log Archive
11.1.1. Overview
11.1.2. Configuration Settings
11.1.3. Password / Key Protection
11.1.4. Sending to Syslog
11.1.5. Time Information
11.2. IP SLA
11.2.1. Overview
11.2.2. Configuring Reaction Configuration
11.2.3. Configuring Track Object
11.3. Other Monitoring Tools
11.3.1. SNMP
11.3.2. SNMP Trap
11.3.3. NetFlow
11.4. DHCP
11.4.1. DHCP Operations
11.4.2. DHCP Configuration
11.4.3. DHCP Relay Agent
11.5. Exercise for Monitoring / Troubleshooting
11.6. Troubleshooting with Cisco DNA Center Assurance