Understanding Redistribution (Part III)

Please, refer to the previous parts of this article, for information on the diagram and terms. For this scenario, called “dual-core”, we want the “fast” Ethernet connections (VLAN 356) to be used as primary transport for packet exchange between the routing domains. The Frame-Relay cloud should only be traversed, if the primary (“fast”) connections fail for some reason. That obviously means we will need to configure two transit domains: the OSPF and EIGRP 356. Plus, routes traversing EIGRP 356 should be given higher preference inside other routing domains, since it’s going to be the primary transit path.

To accomplish this goal, we are going to develop a technique based on the use of access-list a route-maps for route-filtering. It may look somewhat cumbersome at first sight, but this method allows for implementing any redistribution scheme. To start with, we need to enumerate and group all the IGP prefixes into access-lists per the respective routing domain. We have 4 domains in our scenario – therefore we need to configure 4 access-lists. Those access-lists should be configured on every border router (R2, R3, R4 and R5).
R2,R3,R5 and R5:
!
! All prefixes native to the RIP domain
!
ip access-list standard RIP_PREFIXES
 permit 192.10.9.0
 permit 222.22.2.0
 permit 220.20.3.0
 permit 205.90.31.0

!
! All Loopbacks (R2, R3 and R4) belong to OSPF
!
ip access-list standard OSPF_PREFIXES
 permit 174.9.234.0
 permit 150.9.3.0
 permit 150.9.4.0
 permit 150.9.2.0

!
! EIGRP 123 native prefixes
!
ip access-list standard EIGRP_123_PREFIXES
 permit 174.9.123.0
 permit 150.9.1.0

!
! EIGRP 356 native prefixes
!
ip access-list standard EIGRP_356_PREFIXES
 permit 174.9.0.0
 permit 150.9.6.0
 permit 150.9.5.0
Next, both EIGRP 356 and OSPF are elected as core (transit) routing domain. Other domains should remain stub, and don’t pass-through any routing information. How could this be accomplished? First, recall the rule of Split Horizon: never advertise a route back to the domain of it’s origin. In our case, this rule could be enforced by the use of route-maps and access-lists for redistribution control. For example, when redistributing routes from the RIP domain into OSPF, we can use access-list to permit only the RIP prefixes, and block all others.
However, the main question is how to set up redistribution flows. Well, it’s obvious, that both EIGRP 356 and OSPF are directly connected to the other remaining routing domains (including each-other). Because of that fact, they both could effectively provide full connectivity, by letting the other prefixes transit their domains. In addition, some route exchange should be established among the “core” domains.
We could illustrate the “dual-core” redistribution, by thinking of the routing domain as BGP routers, connected by imaginary iBGP links (redistribution paths on the respective routers). The “core” domains (EIGRP 356 an OSPF) could be represented as iBGP route-reflectors, and the other domains – as iBGP route-reflector clients. Using this illustration, we may quickly realize that iBGP rules of split-horizon effectively apply to the route-redistribution. Say when EIGRP 356 receives a route from the RIP domain, it should reflect it to EIGRP 123 plus send a copy to the OSPF domain. When a route is received from the OSPF domain by EIGRP 356 domain, that route should be replicated to the EIGRP 123 and the RIP domains (route-reflector clients). When the RIP domain receives a prefix from the OSPF domain, it should not send it to other domains (BGP split-horizon). This imaginary technique could be generalized to the case of many “core” routing topology, provided that full-mesh route exchange relationships could be established among then.
But enough of illustrations, let’s start implementing our configuration right away, beginning with R3 as the first border router (the remaining border routers to be configured are R2, R4 and R5). The OSPF and EIGRP 356 domains are both transit. That means, when redistributing from the OSPF domain to EIGRP 356 we should accept the OSPF native prefixes (per the ACLs configured above) in addition to the transit RIP and EIGRP 123 prefixes. The latter prefixes could also be injected into EIGRP 356 natively, from the respective routing domains. Therefore, when accepting the transit routes from the OSPF domain, we should give them the metric value, which makes the prefixes less preferable. For out example, we will use EIGRP metric “1 100 1 1 1” for the “non-native” injected prefixes, which is less preferable than our default “1 1 1 1 1” due to the higher “delay” component value:
R3:
!
! OSPF -> EIGRP 356
!
route-map OSPF_TO_EIGRP_356 permit 10
 match ip address OSPF_PREFIXES
 set metric 1 1 1 1 1
!
route-map OSPF_TO_EIGRP_356 permit 20
 match ip address EIGRP_123_PREFIXES
 set metric 1 100 1 1 1
!
route-map OSPF_TO_EIGRP_356 permit 30
 match ip address RIP_PREFIXES
 set metric 1 100 1 1 1
In the opposite direction, from EIGRP 356 toward the OSPF domain, we can only inject EIGRP 356 native prefixes, in addition to the transit RIP prefixes (which should be given some “less preferable” metric, compared to the native RIP routes that are to be injected into OSPF on R4 later). The EIGRP 123 prefixes will not transit EIGP 356 on their way to OSPF domain, so they could not be redistributed via EIGRP 356 process.
R3:
!
! EIGRP 356 -> OSPF
!
route-map EIGRP_356_TO_OSPF permit 10
 match ip address EIGRP_356_PREFIXES
!
route-map EIGRP_356_TO_OSPF permit 20
 match ip address RIP_PREFIXES
 set metric 100
Next, we have EIGRP 123 and EIGRP 356 domain. While EIGRP 123 could only advertise native prefixes into EIGRP 356, the latter could also inject the transit RIP prefixes into EIGRP 123. Note, that we don’t set metric when redistributing native EIGRP prefixes, retaining their original metric, which is way much better than our default “1 1 1 1 1”. For the transit RIP prefixes we set metric to the default “1 1 1 1 1” keeping in mind, that the same prefixes injected via OSPF should be given a worse metric value later.
R3:
!
! EIGRP 123 -> EIGRP 356
!
route-map EIGRP_123_TO_EIGRP_356 permit 10
 match ip address EIGRP_123_PREFIXES

!
! EIGRP 356 -> EIGRP 123
!
route-map EIGRP_356_TO_EIGRP_123 permit 10
 match ip address EIGRP_356_PREFIXES
!
route-map EIGRP_356_TO_EIGRP_123 permit 20
 match ip address RIP_PREFIXES
 set metric 1 1 1 1 1
For OSPF and EIGRP 123 relations, we could inject the OSPF native and the transit RIP prefixes from the OSPF domain to EIGRP 123. For the RIP prefixes, we should set value worse than it was for the RIP prefixes transiting EIGRP 356 injected into EIGRP 123. In the reverse direction, we simply inject EIGRP 123 routes into the OSPF domain with the default metric value.
R3:
!
! OSPF -> EIGRP 123
!
route-map OSPF_TO_EIGRP_123 permit 10
 match ip address OSPF_PREFIXES
 set metric 1 1 1 1 1
!
route-map OSPF_TO_EIGRP_123 permit 20
 match ip address RIP_PREFIXES
 set metric 1 100 1 1 1

!
! EIGRP 123 -> OSPF
!
route-map EIGRP_123_TO_OSPF permit 10
 match ip address EIGRP_123_PREFIXES
The redistribution is finally set up, using the route map configured above.
R3:
!
! Redistribution
!
router ospf 1
 redistribute eigrp 356 route-map EIGRP_356_TO_OSPF subnets
 redistribute eigrp 123 route-map EIGRP_123_TO_OSPF subnets
!
router eigrp 123
 redistribute ospf 1 route-map OSPF_TO_EIGRP_123
 redistribute eigrp 356 route-map EIGRP_356_TO_EIGRP_123
!
router eigrp 356
 redistribute eigrp 123 route-map EIGRP_123_TO_EIGRP_356
 redistribute ospf 1 route-map OSPF_TO_EIGRP_356
Our next stop is R2. Here the OSPF domain meets EIGRP 123 domain. We need to inject the OSPF native routes into EIGRP 123 domain, plus the transit routes from EIGRP 356 and the RIP domains. Note, that the RIP prefixes may enter the OSPF domain either through R4 or R3 (transiting EIGRP 356). Therefore, to avoid suboptimal routing and possible loops, we should give the “native” RIP prefixes better metric in the OSPF domain, compared to the RIP routes injected via R3. This is a side note, which is to be implemented on R4 later. In the opposite direction, from EIGRP 123 to the OSPF, we need to inject EIGRP 123 native prefixes only, with the default (most preferred in our scheme) metric value.
R2:
!
! OSPF -> EIGRP 123
!
route-map OSPF_TO_EIGRP_123 permit 10
 match ip address OSPF_PREFIXES
 set metric 1 1 1 1 1
!
route-map OSPF_TO_EIGRP_123 permit 20
 match ip address RIP_PREFIXES
 set metric 1 100 1 1 1
!
route-map OSPF_TO_EIGRP_123 permit 30
 match ip address EIGRP_356_PREFIXES
 set metric 1 1 1 1 1

!
! EIGRP 123 -> OSPF
!
route-map EIGRP_123_TO_OSPF permit 10
 match ip address EIGRP_123_PREFIXES

!
! Redistribution
!
router eigrp 123
 redistribute ospf 1 route-map OSPF_TO_EIGRP_123
!
router ospf 1
 redistribute eigrp 123 route-map EIGRP_123_TO_OSPF subnets
OK, now for the RIP and OSPF junction point. Obviously, we only need to accept the RIP native prefixes into the OSPF domain. As it has been configured above, the RIP prefixes entering the OSPF domain on R3, will have OSPF metric value of 100. So now all we need is to redistribute RIP into OSPF with the default metric value. For the opposite direction, from the OSPF into the RIP domain, we set metric value of 8 to the native OSPF routes (our convention for the RIP external prefixes). For the transit prefixes (EIGRP 123 and EIGRP 356) we set metric to 12, so that later we could import the same prefixes from EIGRP 356 on R5 with a better metric value.
R4:
!
! RIP->OSPF
!
route-map RIP_TO_OSPF permit 10
 match ip address RIP_PREFIXES 

!
! OSPF -> RIP
!
route-map OSPF_TO_RIP permit 10
 match ip address OSPF_PREFIXES
 set metric 8
!
route-map OSPF_TO_RIP permit 20
 match ip address EIGRP_123_PREFIXES
 set metric 12
!
route-map OSPF_TO_RIP permit 30
 match ip address EIGRP_356_PREFIXES
 set metric 12

!
! Redistribution
!
router rip
 redistribute ospf 1 route-map OSPF_TO_RIP
!
router ospf 1
 redistribute rip route-map RIP_TO_OSPF subnets
The last border router is R5. We inject the native RIP prefixes into EIGRP 356 with our default metric value (which is the most preferred, compared with the other artificial metric values). Next, from EIGRP 356 into the RIP we permit the native EIGRP 356 prefixes (with our “default” seed metric value of 8), the OSPF prefixes with metric 12 (to reflect the fact that the RIP domain should prefer the closest path via R4), and finally the native EIGRP 123 prefixes (to be more preferred than the same prefixes injected into the RIP via the OSPF core domain):
R5:
!
! RIP -> EIGRP 356
!
route-map RIP_TO_EIGRP_356 permit 10
 match ip address RIP_PREFIXES
 set metric 1 1 1 1 1
!
! EIGRP 356 -> RIP
!
route-map EIGRP_356_TO_RIP permit 10
 match ip address EIGRP_356_PREFIXES
 set metric 8
!
route-map EIGRP_356_TO_RIP permit 20
 match ip address OSPF_PREFIXES
 set metric 12
!
route-map EIGRP_356_TO_RIP permit 30
 match ip address EIGRP_123_PREFIXES
 set metric 8

!
!  Redistribution
!
router eigrp 356
 redistribute rip route-map RIP_TO_EIGRP_356
!
router rip
 redistribute eigrp 356 route-map EIGRP_356_TO_RIP
We’re done with disseminating the routing information. However, one other thing should also be completed. We need to set route preferences on the border routers (which run more than one routing protocol). As per our general rules, core protocol routes should be preferred over edge routes; and external routes should be always less preferred than internal. According to this, we should (generally) prefer EIGRP 356 routes over the OSPF prefixes; prefer the OSPF prefixes over EIGRP 123 and RIP prefixes; And always prefer internal routing information over external. Let’s see how this could be implemented on all the border routes.
For R2, we set OSPF external routes distance to 190 (110+80, to reflect the EIGRP rule of external AD 170=90 (internal AD)+80). However, we should also tune EIGRP 123 to be less preferred than OSPF, setting it’s AD values to 120/200.
R2:
!
! External routes should be less preferred all the times
!
router ospf 1
 distance ospf external 190

!
! EIGRP 123 should be less preferred than OSPF
!
router eigrp 123
 distance eigrp 120 200
R3 is the junction point for three protocols. We set EIGRP 123 to be less preferred than OSPF, and OSPF to be less preferred than EIGRP 356, to reflect the “primary core”, “secondary core” and “edge” routing domain relationships.
R3:
!
! EIGRP 123 < OSPF
!
router eigrp 123
 distance eigrp 120 190
!
! OSPF < EIGRP 356
!
router ospf 1
 distance ospf external 180
R4 is interesting case, because here we should be setting OSPF external routes to be less preferred than RIP external routes (injected from EIGRP 356). However, EIGRP 356 is the primary routing domain, so we need to make sure R4 prefers all the routes (except for the OSPF native) via the EIGRP 356 domain. This is why we are going to set the OSPF process external AD to 190, and make the RIP external routes more preferred on R4:
R4:
router ospf 1
 distance ospf external 190
Finally, R5. Here, we should make sure that the RIP external routes are less preferred than EIGRP external prefixes. However, since RIP protocol has no notion of external routes, we need to use the access-list RIP_PREFIXES to selectively set AD to 120 for the RIP native prefixes, and set the administrative distance of the whole RIP process to 200 (greater than 170):
R5:
router rip
 distance 200
 distance 120 0.0.0.0 255.255.255.255 RIP_PREFIXES
We’re done with redistribution. So far, we implemented the split-horizon rule by carefully filtering routes using the access-list enumerating each protocol’s native prefixes. We set metrics on redistribution so that routes traversing EIGRP 356 domain are always preferred over the routes traversing the OSPF routing domain. Finally, we tuned AD values on border routers, to force them choosing the optimal path.
To verify our implementation, you may run a Tcl verification script, and additionally look at the “show ip route” command output.
Rack9R1#sh ip route | beg Gate
Gateway of last resort is not set

D EX 222.22.2.0/24 [170/2560002816] via 174.9.123.3, 00:02:18, FastEthernet0/0
D EX 220.20.3.0/24 [170/2560002816] via 174.9.123.3, 00:02:18, FastEthernet0/0
     174.9.0.0/24 is subnetted, 3 subnets
D EX    174.9.234.0
           [170/2560002816] via 174.9.123.3, 00:24:55, FastEthernet0/0
           [170/2560002816] via 174.9.123.2, 00:24:55, FastEthernet0/0
D EX    174.9.0.0 [170/284160] via 174.9.123.3, 00:07:18, FastEthernet0/0
C       174.9.123.0 is directly connected, FastEthernet0/0
D EX 192.10.9.0/24 [170/2560002816] via 174.9.123.3, 00:02:18, FastEthernet0/0
     150.9.0.0/24 is subnetted, 6 subnets
D EX    150.9.6.0 [170/412160] via 174.9.123.3, 00:07:16, FastEthernet0/0
D EX    150.9.5.0 [170/412160] via 174.9.123.3, 00:02:18, FastEthernet0/0
D EX    150.9.4.0 [170/2560002816] via 174.9.123.3, 00:24:55, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:24:55, FastEthernet0/0
D EX    150.9.3.0 [170/2560002816] via 174.9.123.3, 00:24:55, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:24:56, FastEthernet0/0
D EX    150.9.2.0 [170/2560002816] via 174.9.123.3, 00:24:56, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:24:56, FastEthernet0/0
C       150.9.1.0 is directly connected, Loopback0
D EX 205.90.31.0/24
           [170/2560002816] via 174.9.123.3, 00:02:19, FastEthernet0/0

Rack9R2#sh ip route | beg Gate
Gateway of last resort is not set

O E2 222.22.2.0/24 [190/20] via 174.9.234.4, 00:02:43, Serial0/0
O E2 220.20.3.0/24 [190/20] via 174.9.234.4, 00:02:43, Serial0/0
     174.9.0.0/24 is subnetted, 3 subnets
C       174.9.234.0 is directly connected, Serial0/0
O E2    174.9.0.0 [190/20] via 174.9.234.3, 00:07:43, Serial0/0
C       174.9.123.0 is directly connected, FastEthernet0/0
O E2 192.10.9.0/24 [190/20] via 174.9.234.4, 00:02:43, Serial0/0
     150.9.0.0/24 is subnetted, 6 subnets
O E2    150.9.6.0 [190/20] via 174.9.234.3, 00:07:41, Serial0/0
O E2    150.9.5.0 [190/20] via 174.9.234.3, 00:02:43, Serial0/0
O       150.9.4.0 [110/65] via 174.9.234.4, 00:43:06, Serial0/0
O       150.9.3.0 [110/65] via 174.9.234.3, 00:43:06, Serial0/0
C       150.9.2.0 is directly connected, Loopback0
D       150.9.1.0 [120/156160] via 174.9.123.1, 00:42:53, FastEthernet0/0

O E2 205.90.31.0/24 [190/20] via 174.9.234.4, 00:02:43, Serial0/0

Rack9R3#sh ip route | beg Gate
Gateway of last resort is not set

D EX 222.22.2.0/24 [170/2560025856] via 174.9.0.5, 00:03:58, Ethernet0/1
D EX 220.20.3.0/24 [170/2560025856] via 174.9.0.5, 00:03:58, Ethernet0/1
     174.9.0.0/24 is subnetted, 3 subnets
C       174.9.234.0 is directly connected, Serial1/0
C       174.9.0.0 is directly connected, Ethernet0/1
C       174.9.123.0 is directly connected, Ethernet0/0
D EX 192.10.9.0/24 [170/2560025856] via 174.9.0.5, 00:03:58, Ethernet0/1
     150.9.0.0/24 is subnetted, 6 subnets
D       150.9.6.0 [90/409600] via 174.9.0.6, 00:08:56, Ethernet0/1
D       150.9.5.0 [90/409600] via 174.9.0.5, 00:03:58, Ethernet0/1
O       150.9.4.0 [110/782] via 174.9.234.4, 00:26:45, Serial1/0
C       150.9.3.0 is directly connected, Loopback0
O       150.9.2.0 [110/782] via 174.9.234.2, 00:26:45, Serial1/0
D       150.9.1.0 [120/409600] via 174.9.123.1, 00:26:35, Ethernet0/0
D EX 205.90.31.0/24 [170/2560025856] via 174.9.0.5, 00:03:58, Ethernet0/1

Rack9R4#sh ip route | beg Gate
Gateway of last resort is not set

R    222.22.2.0/24 [120/7] via 192.10.9.254, 00:00:21, Ethernet0/0
R    220.20.3.0/24 [120/7] via 192.10.9.254, 00:00:21, Ethernet0/0
     174.9.0.0/24 is subnetted, 3 subnets
C       174.9.234.0 is directly connected, Serial0/0
R       174.9.0.0 [120/8] via 192.10.9.5, 00:00:25, Ethernet0/0
R       174.9.123.0 [120/8] via 192.10.9.5, 00:00:25, Ethernet0/0
C    192.10.9.0/24 is directly connected, Ethernet0/0
     150.9.0.0/24 is subnetted, 6 subnets
R       150.9.6.0 [120/8] via 192.10.9.5, 00:00:25, Ethernet0/0
R       150.9.5.0 [120/8] via 192.10.9.5, 00:00:25, Ethernet0/0
C       150.9.4.0 is directly connected, Loopback0
O       150.9.3.0 [110/65] via 174.9.234.3, 00:44:33, Serial0/0
O       150.9.2.0 [110/65] via 174.9.234.2, 00:44:33, Serial0/0
R       150.9.1.0 [120/8] via 192.10.9.5, 00:00:25, Ethernet0/0
R    205.90.31.0/24 [120/7] via 192.10.9.254, 00:00:21, Ethernet0/0

Rack9R5#sh ip route | beg Gate
Gateway of last resort is not set

R    222.22.2.0/24 [120/7] via 192.10.9.254, 00:00:09, Ethernet0/1
R    220.20.3.0/24 [120/7] via 192.10.9.254, 00:00:09, Ethernet0/1
     174.9.0.0/24 is subnetted, 3 subnets
D EX    174.9.234.0 [170/2560025856] via 174.9.0.3, 00:05:15, Ethernet0/0
C       174.9.0.0 is directly connected, Ethernet0/0
D EX    174.9.123.0 [170/307200] via 174.9.0.3, 00:05:15, Ethernet0/0
C    192.10.9.0/24 is directly connected, Ethernet0/1
     150.9.0.0/24 is subnetted, 6 subnets
D       150.9.6.0 [90/409600] via 174.9.0.6, 00:05:15, Ethernet0/0
C       150.9.5.0 is directly connected, Loopback0
D EX    150.9.4.0 [170/2560025856] via 174.9.0.3, 00:05:15, Ethernet0/0
D EX    150.9.3.0 [170/2560025856] via 174.9.0.3, 00:05:15, Ethernet0/0
D EX    150.9.2.0 [170/2560025856] via 174.9.0.3, 00:05:15, Ethernet0/0
D EX    150.9.1.0 [170/435200] via 174.9.0.3, 00:05:15, Ethernet0/0
R    205.90.31.0/24 [120/7] via 192.10.9.254, 00:00:09, Ethernet0/1

Rack9R6#sh ip route | beg Gate
Gateway of last resort is not set

D EX 222.22.2.0/24 [170/2560002816] via 174.9.0.5, 00:06:01, FastEthernet0/0
D EX 220.20.3.0/24 [170/2560002816] via 174.9.0.5, 00:06:01, FastEthernet0/0
     174.9.0.0/24 is subnetted, 3 subnets
D EX    174.9.234.0 [170/2560002816] via 174.9.0.3, 00:10:59, FastEthernet0/0
C       174.9.0.0 is directly connected, FastEthernet0/0
D EX    174.9.123.0 [170/284160] via 174.9.0.3, 00:10:59, FastEthernet0/0
D EX 192.10.9.0/24 [170/2560002816] via 174.9.0.5, 00:06:01, FastEthernet0/0
     150.9.0.0/24 is subnetted, 6 subnets
C       150.9.6.0 is directly connected, Loopback0
D       150.9.5.0 [90/156160] via 174.9.0.5, 00:06:01, FastEthernet0/0
D EX    150.9.4.0 [170/2560002816] via 174.9.0.3, 00:10:59, FastEthernet0/0
D EX    150.9.3.0 [170/2560002816] via 174.9.0.3, 00:10:59, FastEthernet0/0
D EX    150.9.2.0 [170/2560002816] via 174.9.0.3, 00:10:59, FastEthernet0/0
D EX    150.9.1.0 [170/412160] via 174.9.0.3, 00:10:59, FastEthernet0/0
D EX 205.90.31.0/24 [170/2560002816] via 174.9.0.5, 00:06:02, FastEthernet0/0
Shutdown VLAN 356 links of R3 and R5 next, to test the “backup” core links and check the routing tables again:
Rack9R1#sh ip route | beg Gate
Gateway of last resort is not set

D EX 222.22.2.0/24 [170/2560028160] via 174.9.123.3, 00:00:59, FastEthernet0/0
                   [170/2560028160] via 174.9.123.2, 00:00:59, FastEthernet0/0
D EX 220.20.3.0/24 [170/2560028160] via 174.9.123.3, 00:00:59, FastEthernet0/0
                   [170/2560028160] via 174.9.123.2, 00:00:59, FastEthernet0/0
     174.9.0.0/24 is subnetted, 2 subnets
D EX    174.9.234.0
           [170/2560002816] via 174.9.123.3, 00:30:07, FastEthernet0/0
           [170/2560002816] via 174.9.123.2, 00:30:07, FastEthernet0/0
C       174.9.123.0 is directly connected, FastEthernet0/0
D EX 192.10.9.0/24 [170/2560028160] via 174.9.123.3, 00:00:59, FastEthernet0/0
                   [170/2560028160] via 174.9.123.2, 00:00:59, FastEthernet0/0
     150.9.0.0/24 is subnetted, 4 subnets
D EX    150.9.4.0 [170/2560002816] via 174.9.123.3, 00:30:07, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:30:07, FastEthernet0/0
D EX    150.9.3.0 [170/2560002816] via 174.9.123.3, 00:30:09, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:30:09, FastEthernet0/0
D EX    150.9.2.0 [170/2560002816] via 174.9.123.3, 00:30:09, FastEthernet0/0
                  [170/2560002816] via 174.9.123.2, 00:30:09, FastEthernet0/0
C       150.9.1.0 is directly connected, Loopback0
D EX 205.90.31.0/24
           [170/2560028160] via 174.9.123.3, 00:01:00, FastEthernet0/0
           [170/2560028160] via 174.9.123.2, 00:01:00, FastEthernet0/0

Rack9R2#sh ip route | beg Gate
Gateway of last resort is not set

O E2 222.22.2.0/24 [190/20] via 174.9.234.4, 00:01:12, Serial0/0
O E2 220.20.3.0/24 [190/20] via 174.9.234.4, 00:01:12, Serial0/0
     174.9.0.0/24 is subnetted, 2 subnets
C       174.9.234.0 is directly connected, Serial0/0
C       174.9.123.0 is directly connected, FastEthernet0/0
O E2 192.10.9.0/24 [190/20] via 174.9.234.4, 00:01:12, Serial0/0
     150.9.0.0/24 is subnetted, 4 subnets
O       150.9.4.0 [110/65] via 174.9.234.4, 00:48:06, Serial0/0
O       150.9.3.0 [110/65] via 174.9.234.3, 00:48:06, Serial0/0
C       150.9.2.0 is directly connected, Loopback0
D       150.9.1.0 [120/156160] via 174.9.123.1, 00:47:53, FastEthernet0/0
O E2 205.90.31.0/24 [190/20] via 174.9.234.4, 00:01:12, Serial0/0

Rack9R3#sh ip route | beg Gate
Gateway of last resort is not set

O E2 222.22.2.0/24 [180/20] via 174.9.234.4, 00:01:40, Serial1/0
O E2 220.20.3.0/24 [180/20] via 174.9.234.4, 00:01:40, Serial1/0
     174.9.0.0/24 is subnetted, 2 subnets
C       174.9.234.0 is directly connected, Serial1/0
C       174.9.123.0 is directly connected, Ethernet0/0
O E2 192.10.9.0/24 [180/20] via 174.9.234.4, 00:01:40, Serial1/0
     150.9.0.0/24 is subnetted, 4 subnets
O       150.9.4.0 [110/782] via 174.9.234.4, 00:30:59, Serial1/0
C       150.9.3.0 is directly connected, Loopback0
O       150.9.2.0 [110/782] via 174.9.234.2, 00:30:59, Serial1/0
D       150.9.1.0 [120/409600] via 174.9.123.1, 00:30:49, Ethernet0/0
O E2 205.90.31.0/24 [180/20] via 174.9.234.4, 00:01:40, Serial1/0

Rack9R4#sh ip route | beg Gate
Gateway of last resort is not set

R    222.22.2.0/24 [120/7] via 192.10.9.254, 00:00:13, Ethernet0/0
R    220.20.3.0/24 [120/7] via 192.10.9.254, 00:00:13, Ethernet0/0
     174.9.0.0/24 is subnetted, 2 subnets
C       174.9.234.0 is directly connected, Serial0/0
O E2    174.9.123.0 [190/20] via 174.9.234.3, 00:01:41, Serial0/0
                    [190/20] via 174.9.234.2, 00:01:41, Serial0/0
C    192.10.9.0/24 is directly connected, Ethernet0/0
     150.9.0.0/24 is subnetted, 5 subnets
R       150.9.5.0 [120/8] via 192.10.9.5, 00:00:10, Ethernet0/0
C       150.9.4.0 is directly connected, Loopback0
O       150.9.3.0 [110/65] via 174.9.234.3, 00:48:25, Serial0/0
O       150.9.2.0 [110/65] via 174.9.234.2, 00:48:25, Serial0/0
O E2    150.9.1.0 [190/20] via 174.9.234.3, 00:01:41, Serial0/0
                  [190/20] via 174.9.234.2, 00:01:41, Serial0/0
R    205.90.31.0/24 [120/7] via 192.10.9.254, 00:00:13, Ethernet0/0

Rack9R5#sh ip route | beg Gate
Gateway of last resort is not set

R    222.22.2.0/24 [120/7] via 192.10.9.254, 00:00:07, Ethernet0/1
R    220.20.3.0/24 [120/7] via 192.10.9.254, 00:00:07, Ethernet0/1
     174.9.0.0/24 is subnetted, 2 subnets
R       174.9.234.0 [200/8] via 192.10.9.4, 00:00:27, Ethernet0/1
R       174.9.123.0 [200/12] via 192.10.9.4, 00:00:27, Ethernet0/1
C    192.10.9.0/24 is directly connected, Ethernet0/1
     150.9.0.0/24 is subnetted, 5 subnets
C       150.9.5.0 is directly connected, Loopback0
R       150.9.4.0 [200/8] via 192.10.9.4, 00:00:27, Ethernet0/1
R       150.9.3.0 [200/8] via 192.10.9.4, 00:00:27, Ethernet0/1
R       150.9.2.0 [200/8] via 192.10.9.4, 00:00:27, Ethernet0/1
R       150.9.1.0 [200/12] via 192.10.9.4, 00:00:27, Ethernet0/1
R    205.90.31.0/24 [120/7] via 192.10.9.254, 00:00:07, Ethernet0/1

0 comments:

About US

Network Bulls is Best Institute for Cisco CCNA, CCNA Security, CCNA Voice, CCNP, CCNP Security, CCNP Voice, CCIP, CCIE RS, CCIE Security Version 4 and CCIE Voice Certification courses in India. Network Bulls is a complete Cisco Certification Training and Course Coaching Institute in Gurgaon/Delhi NCR region in India. Network Bulls has Biggest Cisco Training labs in India. Network Bulls offers all Cisco courses on Real Cisco Devices. Network Bulls has Biggest Team of CCIE Trainers in North India, with more than 90% of passing rate in First Attempt for CCIE Security Version 4 candidates.
  • Biggest Cisco Training Labs in India
  • More than 90% Passing Rate in First Attempt
  • CCIE Certified Trainers for All courses
  • 24x7 Lab Facility
  • 100% Job Guaranteed Courses
  • Awarded as Best Network Security Institute in 2011 by Times
  • Only Institute in India, to provide CCIE Security Version 4.0 Training
  • CCIE Security Version 4 Training available
  • Latest equipments available for CCIE Security Version 4

Network Bulls Institute Gurgaon

Network Bulls Institute in Gurgaon is one of the best Cisco Certifications Training Centers in India. Network Bulls has Biggest Networking Training and Networking courses labs in North India. Network Bulls is offering Cisco Training courses on real Cisco Routers and Switches. Labs of Network Bulls Institute are 24x7 Available. There are many coaching Centers in Delhi, Gurgaon, Chandigarh, Jaipur, Surat, Mumbai, Bangalore, Hyderabad and Chennai, who are offering Cisco courses, but very few institutes out of that big list are offering Cisco Networking Training on real Cisco devices, with Live Projects. Network Bulls is not just an institute. Network Bulls is a Networking and Network Security Training and consultancy company, which is offering Cisco certifications Training as well support too. NB is awarded in January 2012, by Times, as Best Network Security and Cisco Training Institute for the year 2011. Network Bulls is also offering Summer Training in Gurgaon and Delhi. Network Bulls has collaboration with IT companies, from which Network Bulls is offering Networking courses in Summer Training and Industrial Training of Btech BE BCA MCA students on real Live projects. Job Oriented Training and Industrial Training on Live projects is also offered by network bulls in Gurgaon and Delhi NCR region. Network Bulls is also providing Cisco Networking Trainings to Corporates of Delhi, Gurgaon, bangalore, Jaipur, Nigeria, Chandigarh, Mohali, Haryana, Punjab, Bhiwani, Ambala, Chennai, Hyderabad.
Cisco Certification Exams are also conducted by Network Bulls in its Gurgaon Branch.
Network Bulls don't provide any Cisco CCNA, CCNP simulations for practice. They Provide High End Trainings on Real topologies for high tech troubleshooting on real Networks. There is a list of Top and best Training Institutes in India, which are providing CCNA and CCNP courses, but NB has a different image from market. Many students has given me their feedbacks and reviews about Network bulls Institute, but there were no complaints about any fraud from this institute. Network Bulls is such a wonderful place to get trained from Industry expert Trainers, under guidance of CCIE Certified Engineers.

About Blog

This Blog Contains Links shared by sites: Cisco Guides, Dumps collection, Exam collection, Career Cert, Ketam Mehta, GodsComp.co.cc.

NB

NB
Cisco Networking Certifications Training

Cisco Training in Delhi

ccna training in gurgaon. ccnp course institute in gurgaon, ccie coaching and bootcamp training near gurgaon and delhi. best institute of ccna course in delhi gurgaon india. network bulls provides ccna,ccnp,ccsp,ccie course training in gurgaon, new delhi and india. ccsp training new delhi, ccie security bootcamp in delhi.

Testimonials : Network Bulls

My Name is Rohit Sharma and i Have done CCNA and CCNP Training in Gurgaon Center of Network Bulls and it was a great experience for me to study in Network Bulls.

Cisco Networking Certifications

Myself Komal Verma and i took CCSP Training from Network Bulls in Gurgaon. The day i joined Network Bulls, the day i get addicted with Networking Technologies and I thank Mr. Vikas Sheokand for this wonderful session of Networking. :)
I must say that Network Bulls is Best Institute of CCNA CCNP CCSP CCIE Course Training in Gurgaon, New Delhi and in India too.
Komal Verma

About a wonderfull CCIE Training Institute in Gurgaon

I am Kiran shah from New Delhi. I have recently completed my CCNA CCNP & CCIE Training in Gurgaon from Network Bulls and i recommend Network Bulls for Cisco Training in India.

Kiran Shah

Cisco Coaching and Learning Center

Disclaimer: This site does not store any files on its server. I only index and link to content provided by other sites. If you see any file on server that is against copy right you can inform me at (sidd12341 [at] gmail.com). I will delete that materials within two days. This Website is not official Website of any Institute like INE, Network Bulls, IP Expert. Thanks

CCIE Security Version 4

Cisco Finally updated CCIE Security Lab exam blueprint. WSA Ironport and ISE devices are added in CCIE Security Version 4 Lab Exam Syllabus Blueprint. In Updated CCIE Security Version 4 Syllabus blueprint, new technologies like Mobile Security, VoIP Security and IPV6 Security along with Network Security, are added. As in CCIE Security Version 3 blueprint, Cisco had focused on Network Security only, but now as per market demand, Cisco is looking forward to produce Internet gear Security Engineer, not only Network Security engineers.
In CCIE Security Version 4 Bluerpint, Lab Exam is going to be more interested than before. What is Difference in CCIE Security Version 3 and Version 4? Just go through the CCIE Security Version 4 Lab Equipment and Lab Exam Syllabus Blueprints and find out!