440 likes | 584 Views
IP Routing. MIS 4700 Dr. Garrett. Understanding Routing. Routing table Database that lives in the memory of the router Entries in this database are known as “routes” Network addresses “next hop” Metrics Vendor-specific information
E N D
IP Routing MIS 4700 Dr. Garrett
Understanding Routing • Routing table • Database that lives in the memory of the router • Entries in this database are known as “routes” • Network addresses • “next hop” • Metrics • Vendor-specific information • Compilation of information about all the networks that the router can reach
Understanding Routing (cont.) • The routing table is used as follows: • Router reads destination address • Looks in the Network field of its routing table for a match • Finds a match, then it sends the packet to the corresponding next hop
How Entries Are Placed in the Routing Table • Route entries can be placed in a routing table in three basic ways: • Direct connection • Manually configured • Exact configuration • Simple and secure • Dynamically with a routing protocol • Network Layer Reachability Information (NLRI)
Routing Protocols and Routed Protocols • Routing protocols are used to exchange routing information • Routing Information Protocol (RIP) • Open Shortest Path First (OSPF) • Routed protocols are Layer 3 protocols that are used to get packets through an internetwork • Internet Protocol (IP) • Internetwork Packet Exchange (IPX)
Grouping Routing Protocols • Two primary ways to group routing protocols • Routing domains or autonomous systems • Interior gateway protocols (IGPs) • Exterior gateway protocols (EGPs) • Functionality of routing protocols • Distance vector • Link-state
Distance Vector Routing Protocols • Route by rumor • Periodically broadcast entire routing table • Considered “chatty” • Routing decisions are based on network distance • Routing Information Protocol (RIP) • Interior Gateway Routing Protocol (IGRP) • Border Gate Protocol (BGP)
Routing Loops • One router believes the best path to a network is via a second router, and at the same time, the second router believes the best path to that network is through the first router • TTL
Loop-Avoidance Schemes • Count to infinity • Network diameter • IP header TTL field • Split horizon • Poison reverse
Link-State Routing Protocols • Generates information about directly connected neighbors • Flood network (update) with information • Update only when a link change is detected • All routers have identical view of network topology • Convergence time is short • Dijkstra algorithm • Build adjacencies with neighbor routers
Routing Characteristics • Route convergence • Loop-free path to all networks • Split horizon • Poison reverse • Assigning costs to routes to prevent routing loops • Time to Live (TTL) • Defined in the Network layer header • Multicast vs broadcast update behavior
Routing Characteristics (cont.) • ICMP router advertisements • Allow hosts to passively learn about available routes • Black holes • ICMP is turned off • Path Maximum • Transmission Unit black hole router • Areas, autonomous systems, and border routers
Interior Gateway Protocols • RIP • RIPv1, RIPv2 • Distance vector routing protocol • UDP based • UDP port 520 • RIPv2 • Support for variable-length subnets
RIPv1 • Broadcast routing table every 30 seconds • Does not support non-default subnet masks • A RIP packet can have up to 25 networks • RIPv1 packet format: • Command • Version • Reserved (or Zero) • Address Family Identifier • IP Address • Metric
RIPv2 • Support of variable-length subnet masks • Basic authentication • Multicasts routing updates • RIPv2 packet format • Command • Version • Reserved • Address Family • Authentication Type
RIPv2 (cont.) • RIPv2 packet format (cont.) • Authentication • Plain text passwords • Address Family Identifier • Route Tag • Internal route entry, external route entry • IP Address • Subnet Mask • Next Hop • Metric
Open Shortest Path First • Link-state routing protocol • Non-proprietary • Configurable metrics • Multicast Hello packets • Establish adjacencies
Open Shortest Path First (cont.) • Dijkstra algorithm • Designated router (DR) • Backup designated router (BDR) • Link State Advertisements (LSA) • LSA multicast to DR (224.0.0.6)
Open Shortest Path First (cont.) • Six types of LSAs • Type 1 (Router Links Advertisement) • Type 2 (Network Links Advertisement) • Type 3 (Network Summary Link Advertisement) • Type 4 (AS Boundary Router Summary Link Advertisement) • Type 5 (AS External Link Advertisement) • Type 7 (Not So Stubby Area Networks Advertisement)
Open Shortest Path First (cont.) • OSPF header fields • Version Number Field • Type Field • Packet Length Field • Router ID Field • Area ID Field • Checksum Field • AuType Field • Authentication
Enhanced Interior Gateway Routing Protocol (EIGRP) • Developed by Cisco in 1980s (IGRP) • Updated to EIGRP in early 1990s • Hybrid routing protocol • Integrates distance vector and link-state functions
Border Gateway Protocol • Exchange routing information between separate autonomous systems • Current version 4 • BGP offers three types of routing operations • Inter-autonomous system routing • Intra-autonomous system routing • Pass-through autonomous system routing
Managing Routing On A In-House Internetwork • Routing protocols • Do not discriminate between users or types of traffic • Load balancing • Control network paths with Policy-based routing based on • Type of protocol, source/destination address
Hybrid Networks • Supporting multiple routing protocol • Redistribution • Requires careful attention to configuration
Routing On And Off A Wide Area Network • Several small offices • Hub and spoke • Multiprotocol • Mobile Users • Mobil IP • Local Area Mobility (LAM)
Routing To And From The Internet • BGPv4 • Requires a major hardware investment • Only networks that connect to multiple ISPs should use BGP
Securing Routers And Routing Behavior • Turn off unnecessary services, shut down unnecessary listening ports • Configure strong access security to prevent tampering, and, of course, secure physical access to the boxes • Assign secure encrypted passwords • Telnet sends unencrypted login names and passwords • Use secure routing protocols
Troubleshooting IP Routing • Test connectivity with the following tools • ROUTE: Used to view the host’s local routing table, and add and remove route entries • PING • TRACERT • PATHPING