1. ICND2
Interconnecting Cisco
Networking Devices
Part 2
Volume 2
Version 1.0
Student Guide
Editorial, Production, and Web Services (EPWS): 07.25.07
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
2. DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED “AS IS.” CISCO MAKES AND YOU RECEIVE NO WARRANTIES IN
CONNECTION WITH THE CONTENT PROVIDED HEREUNDER, EXPRESS, IMPLIED, STATUTORY OR IN ANY OTHER PROVISION OF
THIS CONTENT OR COMMUNICATION BETWEEN CISCO AND YOU. CISCO SPECIFICALLY DISCLAIMS ALL IMPLIED
WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR
PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. This learning product may contain early release
content, and while Cisco believes it to be accurate, it falls subject to the disclaimer above.
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
3. Table of Contents
Volume 2
EIGRP Implementation
Overview
Module Objectives
Implementing EIGRP
Overview
Objectives
Introducing EIGRP
Example: EIGRP Path Calculation (Router C)
Configuring and Verifying EIGRP
Example: EIGRP Configuration
Load Balancing with EIGRP
EIGRP Metric
Load Balancing Across Equal Paths
Configuring Load Balancing Across Unequal-Cost Paths
Example: Variance
EIGRP Authentication
Example: MD5 Authentication Configuration
Verifying MD5 Authentication
Summary
Troubleshooting EIGRP
Overview
Objectives
Components of Troubleshooting EIGRP
Troubleshooting EIGRP Neighbor Issues
Troubleshooting EIGRP Routing Tables
Troubleshooting EIGRP Authentication
Example: Successful MD5 Authentication
Example: Troubleshooting MD5 Authentication Problems
Summary
Module Summary
Module Self-Check
Module Self-Check Answer Key
Access Control Lists
5-1
5-1
5-1
5-3
5-3
5-3
5-4
5-7
5-8
5-8
5-17
5-17
5-18
5-19
5-20
5-22
5-29
5-31
5-32
5-33
5-33
5-33
5-34
5-35
5-38
5-41
5-41
5-42
5-43
5-44
5-45
5-47
6-1
Overview
Module Objectives
6-1
6-1
Introducing ACL Operation
6-3
Overview
Objectives
Understanding ACLs
ACL Operation
Example: Outbound ACL
Example: Inbound ACL
Types of ACLs
ACL Identification
Additional Types of ACLs
Dynamic ACLs
Reflexive ACLs
Time-Based ACLs
ACL Wildcard Masking
Example: Wildcard Masking Process for IP Subnets
Example: Wildcard Masking Process with a Single IP Address
Example: Wildcard Masking Process with a Match Any IP Address
Summary
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
6-3
6-3
6-4
6-7
6-8
6-8
6-10
6-11
6-15
6-15
6-17
6-19
6-21
6-22
6-23
6-23
6-24
7. Module 5
EIGRP Implementation
Overview
This module discusses the features of Enhanced Interior Gateway Routing Protocol (EIGRP), a
Cisco routing protocol that is designed to address the shortcomings of both distance vector and
link-state routing protocols. The module expands on the underlying technologies within EIGRP
including the path selection process.
Module Objectives
Upon completing this module, you will be able to configure, verify, and troubleshoot EIGRP.
This ability includes being able to meet these objectives:
Describe the operation and configuration of EIGRP, including load balancing and
authentication
Identify an approach for troubleshooting common EIGRP problems and offer solutions
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
9. Lesson 1
Implementing EIGRP
Overview
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing
protocol developed by Cisco. EIGRP is suited for many different topologies and media. In a
well-designed network, EIGRP scales well and provides extremely quick convergence times
with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices.
This lesson describes how to configure and monitor EIGRP.
Objectives
Upon completing this lesson, you will be able to describe the operation and configuration of
EIGRP, including load balancing and authentication This ability includes being able to meet
these objectives:
Describe the features of EIGRP
Configure and verify EIGRP
Configure load balancing with EIGRP
Configure MD5 authentication with EIGRP
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
39. Lesson 2
Troubleshooting EIGRP
Overview
As an advanced distance vector routing protocol, Enhanced Interior Gateway Routing Protocol
(EIGRP) scales well with a growing network. But this scalability introduces complexity in
design, configuration, and maintenance. This lesson introduces some of the common issues
surrounding an EIGRP network and a flowchart approach to troubleshooting these issues.
Objectives
Upon completing this lesson, you will be able identify an approach for troubleshooting
common EIGRP problems and offer solutions. This ability includes being able to meet these
objectives:
Describe the basic components of troubleshooting a network that is running EIGRP
Identify and resolve EIGRP neighbor relationship issues
Identify and resolve EIGRP routing table issues
Identify and resolve EIGRP authentication
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
55. Module 6
Access Control Lists
Overview
Standard and extended Cisco IOS access control lists (ACLs) can be used to classify IP
packets. Using ACLs, you can apply a number of features, such as encryption, policy-based
routing, quality of service (QoS), Network Address Translation (NAT), and Port Address
Translation (PAT), to the classified packets.
You can also configure standard and extended Cisco IOS ACLs on router interfaces for access
control (security). Cisco IOS features are applied on interfaces for specific directions (inbound
versus outbound). This module describes the operation of different types of ACLs and shows
you how to configure IP version 4 (IPv4) ACLs.
Module Objectives
Upon completing this module, you will be able to determine how to apply ACLs based on
network requirements and configure, verify, and troubleshoot ACLs on a medium-sized
network. This ability includes being able to meet these objectives:
Describe the different types of IPv4 ACLs
Configure and troubleshoot standard and extended, numbered and named IPv4 ACLs
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.
57. Lesson 1
Introducing ACL Operation
Overview
Understanding the uses of access control lists (ACLs) enables you to determine how to
implement them on your Cisco network. ACLs can provide an important network security
feature and filter packets on inbound and outbound router interfaces.
This lesson describes some of the applications for ACLs on Cisco networks, identifies the
different types of ACLs that can be implemented, and explains how Cisco IOS Software
processes ACLs.
Objectives
Upon completing this lesson, you will be able to describe the different types of IP version 4
(IPv4) ACLs. This ability includes being able to meet these objectives:
Explain the purpose of ACLs and give examples of when to use them
Explain how inbound and outbound ACLs operate
Describe numbered and named, standard and extended IPv4 ACLs
Describe time-based, reflexive, and dynamic extended ACLs
Use wildcard masking to create IPv4 ACLs
The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,
for the sole use by Cisco employees for personal study. The files or printed representations may not be
used in commercial training, and may not be distributed for purposes other than individual self-study.