Presentation is loading. Please wait.

Presentation is loading. Please wait.

TCOM 515 Lecture 6.

Similar presentations


Presentation on theme: "TCOM 515 Lecture 6."— Presentation transcript:

1 TCOM 515 Lecture 6

2 Objectives Route Redistribution Default Routes Access Lists

3 Route Redistribution Route redistribution involves a router using a routing protocol to advertise routes it learned through another routing protocol, static routes or direction connection. Route redistribution is often used on the border routers, to move routes between the IGP and EGP. Static routes maybe be needed to advertise into the dynamic routing protocols. Route redistribution can be used to bridge legacy networks or connect vendor specific networks. Route redistribution is part of an efficient network to connect the LAN to the WAN.

4 Route Redistribution Three things to consider in route redistribution: metric, administrative distances, and classful/classless capabilities. Routing protocols do not understand metrics used from other routing protocols. They may assign defaults or network administrator’s may assign specific values. Assigning metrics is a very useful tool given the proper consideration and understanding of how it affects routing decision. Administrative distances pose a problem when a route is redistributed from a protocol with a higher admin distance to a protocol with a lower admin distance. In this case, the redistributed route would be preferred over the original route.

5 Route Redistribution While routing protocols use metrics to determine the best route, routers use administrative distances to determine the best source. Each type of source has a different administrative distance, the lower the distance the better the source of the route. Below are the administrative distance for each of the protocols discussed. Connected Interface 0 Static Route 1 EIGRP Summary 5 External BGP 20 EIGRP 90 IGRP 100 OSPF 110 IS-IS 115 RIP EGP 140 External EIGRP 170 Internal BGP 200

6 Route Redistribution Redistribution of routes between routing protocols that only do classful routing to those that do classless routing and vice versa can behave differently than expected. Classful routing protocols may not advertise a given route or may summarize up to the assigned class subnet causing problems and outages. Network administrators should only redistribution between classful and classless subnet when necessary and only specific routes needed.

7 Redistribution Models
There are two network models in which we will discuss the how and why of route redistribution. Data Center or Non-transit network Backbone and/or Transit network Redistribution is occurs in one of 3 forms Static route to a routing protocol EGP to an IGP IGP to an EGP

8 Route Redistribution Types
There are two network models in which we will discuss the how and why of route redistribution. Data Center or Non-transit network Backbone and/or Transit network Redistribution is occurs in one of 3 forms Static route to a routing protocol EGP to an IGP IGP to an EGP

9 Data Center Routes Why redistribute in a data center?
For the Data Center to send its local routes to its ISP. For the ISP to send Internet routes to the Data Center (will cover this in ISP backbone routes)

10 Data Center Local Route
How does a Data Center send its local routes to its ISP? A static route to NULL0 that is redistributed into BGP, sent to ISP The IGP local routes are redistributed into BGP, sent to ISP The ISP has static routes for the Data Center’s local routes configured to point to the interface that connects to the Data Center

11 Backbone ISP Routes Why would a Backbone ISP redistribute routes?
First we have to define who a Backbone ISP exchanges routes with: Peers - other Backbone ISPs that provide transit for other customers Customers - end systems for which the ISP provides transit to the rest of the Internet

12 Backbone ISP Routes Why would a Backbone ISP redistribute routes?
Tell its Peers about all the local routes the ISP owns including its customers. Tell all of its other routers about the Peer’s advertised routes it is receiving. Tell its Customers about the rest of the Internet routes. Tell all of its other routers about the Customer’s local routes.

13 ISP Peer Routes How can an ISP router tell its Peer about its local routes? Static routes for all local and Customer routes that are redistributed into BGP. IGP routes are redistributed into BGP. Statics routes configured on Peer for ISP’s local and Customer routes to Peering interface. iBGP run between all ISP routers.

14 ISP Peer Routes How can an ISP router tell its other routers about the Peer’s advertised routes? BGP routes are redistributed into IGP. Statics routes configured on ISP for Peer’s local and Customer routes to Peering interface. iBGP run between all ISP routers.

15 ISP Customer Routes How can an ISP tell its Customers about the rest of the Internet routes? ISP redistributes Peer and Local routes into BGP advertisement. ISP sends default route via BGP advertisement. ISP has the Customer configure static route for pointing to the interface that connects to the ISP.

16 ISP Customer Routes How can an ISP router tell its other routers about the Customer’s advertised routes? ISP redistributes Customer BGP routes into its IGP. ISP runs iBGP between all routers. ISP configures static routes for the Customer’s local routes pointing to the interface that connects to the Customer and redistributes into IGP.

17 Router Redist Wrap-up The why’s of route redistribution is the science of routing, whereas the how’s of route redistribution is the art of routing. There are multiple solutions to most routing problems, being able to weigh the benefits against the costs are where network engineers earn their keep. Always look at every solution, even if you quickly rule it out.

18 Default Route A full Internet routing table contains upward of 160,000 routes. This consumes significant of memory and processing power of a router. Large backbone routers are built to handle routing tables of this size. However smaller routers cannot handle routing tables of this size. For networks that have only one connection to the Internet, there is no need to carry a full routing table. Routers only need to know about local subnets and where to send everything that isn’t local. Default routes are used as guide to the rest of the world or as a route of last resort. The syntax of a default route is A default route is the least specific subnet match for a destination and used when there is no other match.

19 Default Route Default routes can be brought into a network through a variety of different methods and routing protocols. The ISP providing Internet connectivity may send a default route only or in addition to other routes through a BGP peering. That default route in BGP can be redistributed into the Interior Routing Protocol. An IGP can originate a default route from a certain router always or only if the router has received a default route from another method. A static route for the default can also be configured on a router pointing to the interface that connects to the Internet or the backbone. Only backbone routers need to know about most routes, routers on the edge need to know about local routes and a default.

20 What are Access Lists? Access Lists are mechanisms that are applied to an interface or a peering to filter the traffic. ACLs may be applied inbound or outbound on an interface. Access lists check for matches on one or more: Source IP address Destination IP address Protocol - IP, TCP, UDP Protocol Ports - 25 (SMTP), 80 (HTTP) Based on the match, the packet is either permited to pass through or denied.

21 Access Lists Access lists may be used to count packets based on each the permit or deny. Access lists were originated for security reasons but have evolved to filter traffic as well. Security Access list specifically permit certain types of packets and denies everything else. This organization assumes that the network administrator knows what traffic should be allowed to reach the hosts behind the Access List (ACL). Security ACLs have an implicit or unwritten deny for all traffic not permitted. Traffic Access lists specifically deny certain types of packets that are known to be bad and allows everything else.

22 Access Lists Access list syntax
Access-list number permit or deny protocol source destination port number extensions Number - each access list has a number and each statement in that list has the same number Permit or deny - each statement directs the router to either permit or deny the matched packets Source - this maybe a single host a /32, a subnet of any size or the word “any” which is a wildcard Destination - this maybe a single host, a /32, a subnet of any size or the word “any” which is a wildcard Port - this can specify a single port of the protocol, if the port isn’t specificied any traffic of that protocol type is a match, An example would be just IP and no port which means all IP packets. Another example would be TCP protocol and the port 23 which would is Telnet traffic. Extensions - this allows check for specific flags in the IP packet. An example is is the use of the extension “established” which looks into the packet to see that it is a response to an established session. Another example is the ability to look for a specific type and code combination by the name, such as network unreachable which is type 3 code 0.

23 Access Lists Examples:
Access-list 2000 tcp permit any eq smtp This allows traffic from any source destined to hosts between and using the TCP protocol of port 25 or SMTP which is used for Access-list 100 ip deny This does not allow traffic sourced from to that is destined for to that is an IP packet. Access-list 1000 udp allow any eq domain This allows traffic sourced from anywhere and destined for to that is a UDP packet on port 53 which is DNS traffic.


Download ppt "TCOM 515 Lecture 6."

Similar presentations


Ads by Google