Beruflich Dokumente
Kultur Dokumente
Introduction
Routing is at the core of every data network, moving information across an internetwork from source to
destination. Routers are the devices responsible for the transfer of packets from one network to the
next.
Routers learn about remote networks either dynamically, using routing protocols, or manually, or using
static routes. In many cases, routers use a combination of both dynamic routing protocols and static
routes. This chapter focuses on static routing.
Static routes are very common and do not require the same amount of processing and overhead as
dynamic routing protocols.
In this chapter, sample topologies will be used to configure IPv4 and IPv6 static routes and to present
troubleshooting techniques. In the process, several important IOS commands and the resulting output
will be examined. An introduction to the routing table using both directly connected networks and static
routes will be included.
This chapter will also contrast classful routing and the widely implemented classless routing methods.
It will cover Classless Inter-Domain Routing (CIDR) and the variable-length subnet mask (VLSM)
methods. CIDR and VLSM have helped conserve the IPv4 address space using subnetting and
summarization techniques.
Static Routing
Introduction
Activity - Which Way Should We Go?
A huge sporting event is about to take place in your city. To attend the event, you make concise plans
to arrive at the sports arena on time to see the entire game.
There are two routes you can take to drive to the event:
Highway route - It is easy to follow and fast driving speeds are allowed.
Alternative, direct route - You found this route using a city map. Depending on conditions,
such as the amount of traffic or congestion, this just may be the way to get to the arena on time!
With a partner, discuss these options. Choose a preferred route to arrive at the arena in time to see
every second of the huge sporting event.
Compare your optional preferences to network traffic, which route would you choose to deliver data
communications for your small- to medium-sized business? Would it be the fastest, easiest route or
the alternative, direct route? Justify your choice.
Complete the modeling activity .pdf and be prepared to justify your answers to the class or with
another group.
Manually - Remote networks are manually entered into the route table using static routes.
Dynamically - Remote routes are automatically learned using a dynamic routing protocol.
Figure 1 provides a sample scenario of static routing. Figure 2 provides a sample scenario of dynamic
routing using EIGRP.
A network administrator can manually configure a static route to reach a specific network. Unlike a
dynamic routing protocol, static routes are not automatically updated and must be manually
reconfigured any time the network topology changes. A static route does not change until the
administrator manually reconfigures it.
Static routes are not advertised over the network, resulting in better security.
Static routes use less bandwidth than dynamic routing protocols, no CPU cycles are used to
calculate and communicate routes.
The path a static route uses to send data is known.
Does not scale well with growing networks; maintenance becomes cumbersome.
In the figure, dynamic and static routing features are compared. Notice that the advantages of one
method are the disadvantages of the other.
Static routes are useful for smaller networks with only one path to an outside network. They also
provide security in a larger network for certain types of traffic or links to other networks that need more
control. It is important to understand that static and dynamic routing are not mutually exclusive. Rather,
most networks use a combination of dynamic routing protocols and static routes. This may result in the
router having multiple paths to a destination network via static routes and dynamically learned routes.
However, the administrative distance (AD) of a static route is 1. Therefore, a static route will take
precedence over all dynamically learned routes.
Providing ease of routing table maintenance in smaller networks that are not expected to grow
significantly.
Routing to and from stub networks. A stub network is a network accessed by a single route,
and the router has only one neighbor.
Using a single default route to represent a path to any network that does not have a more
specific match with another route in the routing table. Default routes are used to send traffic to
any destination beyond the next upstream router.
The figure shows an example of a stub network connection and a default route connection. Notice in
the figure that any network attached to R1 would only have one way to reach other destinations,
whether to networks attached to R2, or to destinations beyond R2. This means that network
172.16.3.0 is a stub network and R1 is a stub router. Running a routing protocol between R2 and R1 is
a waste of resources.
In this example, a static route can be configured on R2 to reach the R1 LAN. Additionally, because R1
has only one way to send out non-local traffic, a default static route can be configured on R1 to point
to R2 as the next hop for all other networks.
Reduce the number of routes advertised by summarizing several contiguous networks as one
static route
Create a backup route in case a primary route link fails
The following types of IPv4 and IPv6 static routes will be discussed:
When no other routes in the routing table match the packet destination IP address. In other
words, when a more specific match does not exist. A common use is when connecting a
company's edge router to the ISP network.
When a router has only one other router to which it is connected. This condition is known as a
stub router.
Refer to the figure for a sample scenario of implementing default static routing.
The destination networks are contiguous and can be summarized into a single network
address.
The multiple static routes all use the same exit interface or next-hop IP address.
In the figure, R1 would require four separate static routes to reach the 172.20.0.0/16 to 172.23.0.0/16
networks. Instead, one summary static route can be configured and still provide connectivity to those
networks.
subnet-mask - Subnet mask, or just mask, of the remote network to be added to the routing
table. The subnet mask can be modified to summarize a group of networks.
One or both of the following parameters must also be used:
ip-address - The IP address of the connecting router to use to forward the packet to the
remote destination network. Commonly referred to as the next hop.
exit-intf - The outgoing interface to use to forward the packet to the next hop.
As shown in the figure, the command syntax commonly used is ip routenetwork-address
subnet-mask {ip-address | exit-intf}.
Thedistance parameter is used to create a floating static route by setting an administrative distance
that is higher than a dynamically learned route.
Note: The remaining parameters are not relevant for this chapter or for CCNA studies.
172.16.1.0/24 - LAN on R2
192.168.2.0/24 - LAN on R3
Figure 4 displays a successful ping from R1 to R2. Figure 5 displays an unsuccessful ping to the R3
LAN. This is because R1 does not have an entry in its routing table for the R3 LAN network.
The next hop can be identified by an IP address, exit interface, or both. How the destination is
specified creates one of the three following route types:
Directly connected static route - Only the router exit interface is specified.
Fully specified static route - The next-hop IP address and exit interface are specified.
show ip route
Figure 1 displays sample output of theshow ip route static command. In the example, the
output is filtered using the pipe and begin parameter. The output reflects the use of static routes
using the next-hop address.
Figure 2 displays sample output of theshow ip route 192.168.2.1command.
Figure 3 verifies the ip routeconfiguration in the running configuration.
Use the Syntax Checker in Figure 4 to verify the routing settings of R2.
Use the Syntax Checker in Figure 5 to verify the routing settings of R3.
As shown in the figure, the command syntax for a default static route is similar to any other static
route, except that the network address is 0.0.0.0 and the subnet mask is 0.0.0.0. The basic
command syntax of a default static route is:
As with IPv4, these routes can be configured as recursive, directly connected, or fully specified.
The ipv6 unicast-routing global configuration command must be configured to enable the
router to forward IPv6 packets. Figure 2 displays the enabling of IPv6 unicast routing.
Use the Syntax Checker in Figures 3 and 4 to enable IPv6 unicast routing on R2 and R3.
2001:DB8:ACAD:2::/64 - LAN on R2
2001:DB8:ACAD:3::/64 - LAN on R3
Figure 4 displays a successful ping from R1 to R2. Figure 5 displays an unsuccessful ping to the R3
LAN. This is because R1 does not have an entry in its routing table for that network.
The next hop can be identified by an IPv6 address, exit interface, or both. How the destination is
specified creates one of three route types:
Next-hop static IPv6 route - Only the next-hop IPv6 address is specified.
Directly connected static IPv6 route- Only the router exit interface is specified.
Fully specified static IPv6 route - The next-hop IPv6 address and exit interface are
specified.
Figure 1 displays sample output of the show ipv6 route static command. The output reflects
the use of static routes using next-hop global unicast addresses.
Figure 2 displays sample output from theshow ip route 2001:DB8:ACAD:3::command.
Figure 3 verifies the ipv6 routeconfiguration in the running configuration.
As shown in the figure, the command syntax for a default static route is similar to any other static
route, except that the ipv6-prefix/prefix-length is ::/0, which matches all routes.
The basic command syntax of a default static route is:
Class A addresses begin with 0 - Intended for large organizations; includes all addresses
from 0.0.0.0 (00000000) to 127.255.255.255 (01111111). The 0.0.0.0 address is reserved for
default routing and the 127.0.0.0 address is reserved for loopback testing.
Class B addresses begin with 10 - Intended for medium-to-large organizations; includes all
addresses from 128.0.0.0 (10000000) to 191.255.255.255 (10111111).
Class C addresses begin with 110 - Intended for small-to-medium organizations; includes all
addresses from 192.0.0.0 (11000000) to 223.255.255.255 (11011111).
The remaining addresses were reserved for multicasting and future uses.
Class D Multicast addresses begin with 1110 - Multicast addresses are used to identify a
group of hosts that are part of a multicast group. This helps reduce the amount of packet
processing that is done by hosts, particularly on broadcast media (i.e., Ethernet LANs). Routing
protocols, such as RIPv2, EIGRP, and OSPF use designated multicast addresses (RIP =
224.0.0.9, EIGRP = 224.0.0.10, OSPF 224.0.0.5, and 224.0.0.6).
Class E Reserved IP addresses begin with 1111 - These addresses were reserved for
experimental and future use.
Class A had 50% of the total address space. However, only 126 organizations could be
assigned a class A network address. Ridiculously, each of these organizations could provide
addresses for up to 16 million hosts. Very large organizations were allocated entire class A
address blocks. Some companies and governmental organizations still have class A addresses.
For example, General Electric owns 3.0.0.0/8, Apple Computer owns 17.0.0.0/8, and the U.S.
Postal Service owns 56.0.0.0/8.
Class B had 25% of the total address space. Up to 16,384 organizations could be assigned a
class B network address and each of these networks could support up to 65,534 hosts. Only the
largest organizations and governments could ever hope to use all 65,000 addresses. Like class A
networks, many IP addresses in the class B address space were wasted.
Class C had 12.5 % of the total address space. Many more organizations were able to get
class C networks, but were limited in the total number of hosts that they could connect. In fact, in
many cases, class C addresses were often too small for most midsize organizations.
The overall result was that the classful addressing was a very wasteful addressing scheme. A better
network addressing solution had to be developed. For this reason, Classless Inter-Domain Routing
(CIDR) was introduced in 1993.
Route summarization - Also known as prefix aggregation, routes are summarized into a
single route to help reduce the size of routing tables. For instance, one summary static route can
replace several specific static route statements.
Supernetting - Occurs when the route summarization mask is a smaller value than the default
traditional classful mask.
Note: A supernet is always a route summary, but a route summary is not always a supernet.
Individual host addresses are assigned from the addresses of "sub-subnets". For example, the figure
shows the 10.1.0.0/16 subnet divided into /24 subnets. The 10.1.4.10 address would now be a
member of the more specific subnet 10.1.4.0/24.
The destination networks are contiguous and can be summarized into a single network
address.
The multiple static routes all use the same exit interface or next-hop IP address.
Consider the example in Figure 1. All routers have connectivity using static routes.
Figure 2 displays the static routing table entries for R3. Notice that it has three static routes that can be
summarized because they share the same two first octets.
Figure 3 displays the steps to summarize those three networks:
Step 1. Write out the networks to summarize in binary.
Step 2. To find the subnet mask for summarization, start with the far left bit, work to the right, finding
all the bits that match consecutively until a column of bits that do not match is found, identifying the
summary boundary.
Step 3. Count the number of far left matching bits; in our example, it is 22. This number identifies the
subnet mask for the summarized route as /22 or 255.255.252.0.Note: The figure shows all networks
converted to binary to demonstrate the matching bits; but the summary can also be determined by
converting just the lowest and highest network addresses to binary to find the matching bits.
Step 4. To find the network address for summarization, copy the matching 22 bits and add all 0 bits to
the end to make 32 bits.
After the summary route is identified, replace the existing routes with the one summary route.
Figure 4 displays how the three existing routes are removed and then the new summary static route is
configured.
Figure 5 confirms that the summary static route in is the routing table of R3.
The destination networks are contiguous and can be summarized into a single network
address.
The multiple static routes all use the same exit interface or next-hop IPv6 address.
Refer to the network in the Figure 1. R1 currently has four static IPv6 routes to reach networks
2001:DB8:ACAD:1::/64 to 2001:DB8:ACAD:4::/64.
Figure 2 displays the IPv6 static routes installed in the IPv6 routing table.
EIGRP = 90
IGRP = 100
OSPF = 110
IS-IS = 115
RIP = 120
The administrative distance of a static route can be increased to make the route less desirable than
that of another static route or a route learned through a dynamic routing protocol. In this way, the static
route floats and is not used when the route with the better administrative distance is active. However,
if the preferred route is lost, the floating static route can take over, and traffic can be sent through this
alternate route.
A floating static route can be used to provide a backup route to multiple interfaces or networks on a
router. It is also encapsulation independent, meaning it can be used to forward packets out any
interface, regardless of encapsulation type.
An important consideration of a floating static route is that it is affected by convergence time. A route
that is continuously dropping and re-establishing a connection can cause the backup interface to be
activated unnecessarily.
An interface fails.
When there is a change in the network, connectivity may be lost. Network administrators are
responsible for pinpointing and solving the problem. To find and solve these issues, a network
administrator must be familiar with tools to help isolate routing problems quickly.
Common IOS troubleshooting commands include:
ping
traceroute
show ip route
Figure 1 displays the result of an extended ping from the source interface of R1 to the LAN interface of
R3. An extended ping is when the source interface or source IP address is specified.
Figure 2 displays the result of a traceroute from R1 to the R3 LAN.
Figure 3 displays the routing table of R1.
Figure 4 provides a quick status of all interfaces on the router.
Figure 5 provides a list of directly connected Cisco devices. This command validates Layer 2 (and
therefore Layer 1) connectivity. For example, if a neighbor device is listed in the command output, but
it cannot be pinged, then Layer 3 addressing should be investigated.
Summary
Summary
Activity - Make It Static!
As the use of IPv6 addressing becomes more prevalent, it is important for network administrators to be
able to direct network traffic between routers.
To prove that you are able to direct IPv6 traffic correctly and review the IPv6 default static route
curriculum concepts, use the topology as shown in the .pdf file provided, specifically for this activity.
Work with a partner to write an IPv6 statement for each of the three scenarios. Try to write the route
statements without the assistance of completed labs, Packet Tracer files, etc.
Scenario 1
IPv6 default static route from R2 directing all data through your S0/0/0 interface to the next hop
address on R1.
Scenario 2
IPv6 default static route from R3 directing all data through your S0/0/1 interface to the next hop
address on R2.
Scenario 3
IPv6 default static route from R2 directing all data through your S0/0/1 interface to the next hop
address on R3.
When complete, get together with another group and compare your written answers. Discuss any
differences found in your comparisons.
Summary
Summary
In this chapter, you learned how IPv4 and IPv6 static routes can be used to reach remote networks.
Remote networks are networks that can only be reached by forwarding the packet to another router.
Static routes are easily configured. However, in large networks, this manual operation can become
quite cumbersome. Static routes are still used, even when a dynamic routing protocol is implemented.
Static routes can be configured with a next-hop IP address, which is commonly the IP address of the
next-hop router. When a next-hop IP address is used, the routing table process must resolve this
address to an exit interface. On point-to-point serial links, it is usually more efficient to configure the
static route with an exit interface. On multi-access networks, such as Ethernet, both a next-hop IP
address and an exit interface can be configured on the static route.
Static routes have a default administrative distance of 1. This administrative distance also applies to
static routes configured with a next-hop address, as well as an exit interface.
A static route is only entered in the routing table if the next-hop IP address can be resolved through an
exit interface. Whether the static route is configured with a next-hop IP address or exit interface, if the
exit interface that is used to forward that packet is not in the routing table, the static route is not
included in the routing table.
Using CIDR, several static routes can be configured as a single summary route. This means fewer
entries in the routing table and results in a faster routing table lookup process. CIDR also manages the
IPv4 address space more efficiently.
VLSM subnetting is similar to traditional subnetting in that bits are borrowed to create subnets. With
VLSM, the network is first subnetted, and then the subnets are subnetted again. This process can be
repeated multiple times to create subnets of various sizes
The ultimate summary route is a default route, configured with a 0.0.0.0 network address and a 0.0.0.0
subnet mask for IPv4, and the prefix/prefix-length ::/0 for IPv6. If there is not a more specific match in
the routing table, the routing table uses the default route to forward the packet to another router.
A floating static route can be configured to back up a main link by manipulating its administrative
value.