28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

emergency rescue, 42<br />

exclusive access, 17–18<br />

exiting configuration mode, 25–26<br />

first time, 12–17<br />

installing software releases, 49–52<br />

keeping records of changes, 26<br />

loading previous, 41<br />

managing similar, 62–66<br />

provisionally activating, 40<br />

re-creating, 19–20<br />

redundant Routing Engines, 66–70<br />

scheduling activation of, 37–39<br />

security with, 73<br />

statement hierarchy, 6<br />

text from terminal windows, 32–34<br />

router interfaces (see interfaces)<br />

router security<br />

allow access to routers, 76–77<br />

creating login banners, 101, 102<br />

customizing account privileges, 89–95<br />

determining who is logged in, 102, 103<br />

forcibly logging users out, 104, 105<br />

hiding encrypted passwords, 95<br />

logging in to console, 79<br />

logging out, 103, 104<br />

plain-text passwords, 84–86<br />

RADIUS user authentication, 96–97<br />

remote authentication, 86, 87<br />

restricting inbound access, 98, 100<br />

root authentication, 77–79<br />

setting authentication methods, 80–81<br />

setting up login accounts, 81–84<br />

TACACS+ user authentication, 98<br />

Telnet and source addresses, 100, 101<br />

routes<br />

adding BGP community, 465–471<br />

advertising, 247, 282, 338, 339<br />

aggregating, 269, 270<br />

BGP and, 433<br />

BGP attributes, 420–422<br />

BGP sessions and, 428, 429<br />

blackholing, 264–265<br />

changing preferences, 274–277<br />

convergence time, 333<br />

filtering, 291, 293<br />

filtering based on AS paths, 445–448<br />

in forwarding tables, 259–263<br />

half-life, 459, 460<br />

hidden, 255, 447<br />

IS-IS, 359–361, 371–373<br />

leaking Level 2 to Level 1, 371–373<br />

mitigating instabilities, 457–465<br />

multicast, 599–601<br />

OSPF, 387–389<br />

path vector algorithm and, 418<br />

restricting advertised, 448–450<br />

setting up reflectors, 452–457<br />

summarizing in OSPF, 401, 402<br />

unicast routing table, 546–548<br />

viewing in routing tables, 251–256<br />

viewing routes learned from<br />

protocols, 259<br />

viewing with particular prefixes, 257, 258<br />

(see also active routes; static routes)<br />

routing (see IP routing)<br />

Routing Engines<br />

active routes and, 515<br />

backup routers and, 14<br />

commit synchronize command, 23<br />

copying files between, 16<br />

disabling redundancy, 70<br />

firewall filters, 99, 304, 320–327<br />

forwarding tables, 248, 260, 261<br />

interfaces and, 241<br />

load-balancing traffic, 474<br />

MPLS routes and, 496<br />

operational information about, 146<br />

OSPF and, 385<br />

rate limiting traffic flow, 327–329<br />

redirecting logging messages, 175–177<br />

redundant, 66–70<br />

routing software, 55<br />

synchronizing time, 184<br />

upgrading software versions, 70, 71<br />

routing information bases (RIBs), 246<br />

Routing Information Protocol (see RIP;<br />

RIPng)<br />

routing information registry (RIR), 467<br />

routing keyword, 137<br />

routing permission bit, 90<br />

routing policy (see policies)<br />

routing preference<br />

default, 249<br />

defined, 440<br />

IS-IS, 360<br />

OSPF, 389<br />

routing tables<br />

adding BGP community to routes, 468<br />

aggregate routes and, 269<br />

BGP and, 369, 427, 428, 430, 436, 447,<br />

546<br />

blackholing routes, 265<br />

Index | 647<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!