Key Takeaways
1. Master EIGRP, OSPF, and BGP for Scalable Routing
As with any other Cisco career certification exam, understand the concepts, configuration, and verification commands (show and debug commands).
Routing Protocol Proficiency. The CCNP ROUTE certification demands a deep understanding of EIGRP, OSPF, and BGP. This includes not only knowing the basic configurations but also grasping the underlying concepts and mastering the verification commands. These protocols are the backbone of scalable networks, and a thorough understanding is crucial for any network professional.
EIGRP, OSPF, and BGP. Each protocol has its strengths and weaknesses, making them suitable for different network scenarios. EIGRP is known for its fast convergence and ease of configuration, OSPF for its open standard nature and hierarchical design, and BGP for its ability to handle complex routing policies and inter-domain routing.
Beyond Configuration. The ROUTE exam goes beyond simple configuration tasks. It requires the ability to troubleshoot complex routing issues, optimize network performance, and design scalable and resilient networks using these protocols. This necessitates a solid understanding of the protocols' inner workings and the ability to interpret various show and debug commands.
2. Plan Implementations with Design and Verification Tables
The ability to build a verification plan that lists the specific show commands and command options that list key pieces of information—information that directly either confirms or denies whether each planned feature has been implemented correctly.
Structured Planning. The CCNP ROUTE exam emphasizes the importance of planning network implementations and verifications. This involves creating detailed design documents, implementation plans, and verification plans. These plans serve as blueprints for network changes, ensuring that implementations are well-defined, efficient, and easily verifiable.
Design Review Tables. These tables help analyze design goals and identify appropriate implementation options. By listing design goals and then brainstorming possible features to achieve those goals, engineers can ensure that the chosen configurations align with the overall network design.
Implementation and Verification. Implementation plans outline the specific steps required to deploy a network change, while verification plans detail the commands and procedures used to confirm successful implementation. These plans are crucial for minimizing errors, reducing downtime, and ensuring that network changes meet the desired objectives.
3. Optimize EIGRP for Rapid Convergence
EIGRP converges very quickly even with all default settings.
Convergence Tuning. EIGRP's convergence speed is a key advantage, but it can be further optimized. Understanding the factors that influence convergence, such as Hello and Hold timers, is crucial for minimizing downtime and ensuring network stability.
Hello and Hold Timers. Adjusting these timers allows for faster detection of neighbor failures, leading to quicker convergence. However, it's important to balance this with the potential for increased network overhead.
Feasible Successors. EIGRP's use of feasible successors enables rapid convergence by providing backup routes that can be activated immediately upon failure of the primary route. Understanding the feasibility condition and how to influence the selection of feasible successors is essential for optimizing convergence.
4. Control Traffic Flow with Route Filtering and Summarization
The need to plan, and the need to document those plans, increases as the size of the organization increases.
Traffic Management. Route filtering and summarization are essential tools for controlling traffic flow and reducing routing table size. Route filtering prevents unwanted traffic from entering specific network segments, while route summarization aggregates multiple routes into a single, more manageable entry.
Route Filtering Techniques. EIGRP and OSPF offer various methods for route filtering, including access control lists (ACLs), prefix lists, and route maps. Each method has its own advantages and disadvantages, and the choice depends on the specific filtering requirements.
Route Summarization Design. Route summarization is most effective when the addressing plan is designed with summarization in mind. By assigning contiguous address blocks to specific network segments, engineers can create summary routes that accurately represent the network topology while minimizing routing table size.
5. Leverage BGP for Internet Connectivity and Path Control
The real question then about audience for this book–at least the intended audience–is whether you have motivation to get one of these Professional-level Cisco certifications.
BGP for Path Control. BGP is the routing protocol of the Internet, and it offers powerful tools for influencing traffic flow. While not always necessary, BGP can be invaluable for enterprises with multiple Internet connections or those seeking granular control over their outbound traffic.
BGP Path Attributes. BGP uses a variety of path attributes (PAs) to select the best route, including Weight, Local Preference, AS_Path length, and MED. By manipulating these attributes, engineers can influence BGP's decision-making process and steer traffic along desired paths.
Internet Connectivity Design. The choice between default routing and BGP depends on the specific requirements of the enterprise. Default routing is simpler to configure but offers limited control over traffic flow. BGP provides greater flexibility but requires more complex configuration and ongoing maintenance.
6. Implement IPv6 Addressing and Routing
Every student who ever takes an exam wants to know what’s on the exam.
IPv6 Proficiency. IPv6 is the future of IP addressing, and a solid understanding of its concepts and configuration is essential for any network professional. This includes understanding IPv6 address formats, subnetting, and routing protocols.
IPv6 Addressing. IPv6 addresses are 128 bits long and are typically represented in hexadecimal notation. Understanding the various types of IPv6 addresses, including global unicast, link-local, and unique local addresses, is crucial for network design and troubleshooting.
IPv6 Routing Protocols. RIPng, EIGRP for IPv6, and OSPFv3 are the routing protocols used to exchange IPv6 routing information. These protocols have many similarities to their IPv4 counterparts, but also some key differences that must be understood.
7. Navigate IPv4 and IPv6 Coexistence Strategies
This chapter discusses the whole area of implementation and verification planning for the CCNP ROUTE exam, including how you should prepare for these exam topics.
Coexistence is Key. The migration from IPv4 to IPv6 will be a gradual process, and networks will need to support both protocols for many years to come. Understanding the various coexistence mechanisms is crucial for ensuring a smooth transition.
Dual Stacks. Dual stacks involve running both IPv4 and IPv6 on the same devices, allowing them to communicate with both IPv4 and IPv6 hosts. This is a common approach for hosts and routers that need to support both protocols.
Tunneling. Tunneling encapsulates IPv6 packets inside IPv4 packets, allowing them to traverse IPv4 networks. This is useful for connecting IPv6 islands over an IPv4 backbone. Common tunneling techniques include manually configured tunnels, GRE tunnels, 6to4 tunnels, and ISATAP tunnels.
8. Secure and Optimize Branch Office Networking
The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
Branch Office Considerations. Branch offices often have unique networking requirements, including broadband Internet access, security, and VPN connectivity. Understanding these requirements and how to address them is crucial for designing and implementing effective branch office networks.
Broadband Access. Broadband technologies like DSL and cable are commonly used for Internet access in branch offices. Configuring these connections involves setting up DHCP clients, NAT, and other related services.
VPNs. VPNs, particularly IPsec tunnels, are essential for securing traffic between branch offices and the Enterprise core. Configuring IPsec tunnels involves defining encryption algorithms, authentication methods, and traffic policies.
Last updated:
Review Summary
CCNP ROUTE 642-902 receives generally positive reviews, with an average rating of 4.13/5. Readers find it detailed and helpful for exam preparation, though some note it's not sufficient on its own. The book is praised for its in-depth coverage of networking topics, with minimal errors. Some reviewers mention its usefulness alongside other study materials. While a few find it boring, most appreciate its thoroughness and value for aspiring Cisco Certified Network Professionals. The book is seen as a classic Cisco Press offering, providing comprehensive information for networking professionals.
Download EPUB
.epub
digital book format is ideal for reading ebooks on phones, tablets, and e-readers.