Showing posts with label cisco router. Show all posts
Showing posts with label cisco router. Show all posts

Tuesday, March 12, 2013

Cisco CCNP Router – BGP Troubleshooting



Every time you troubleshoot your BGP (Border Gateway Protocol), always follow a tried and tested troubleshooting model. That way, you can work more efficiently and probably even resolve the problem much faster. We usually follow an 8-point troubleshooting model like the one below:
u      Define the problem
u      Gather the facts
u      Document the facts
u      Consider the possibilities
u      Create an action plan
u      Implement the action plan
u      Repeat until resolution
u      Document the solution

Just like in most protocols, there are some very specific, common issues and problems, as well as their corresponding solutions. Here in our article on BGP troubleshooting, we’ll be looking at these four potential problems/issues:
  1. Neighbor relationship problems
  2. Route advertisement issues
  3. Routes missing from the table
  4. Address summarization problems

Neighbor Relationship Problems
There are a number of possible reasons that may prevent neighbors from establishing a relationship. Here are some of the most common causes of neighbor relationship problems:Possible Cause: Layer 2 or Interface is down

If the Layer 2 process or Interface is down, it may prevent a neighbor relationship from forming. The easiest way to determine that this is the problem when it’s stuck in the Active or Idle state is by executing the show interface <slot/port>. For example, execute: show interfaces fastethernet 0/0 or show interfaces gigabitethernet 0/0 When the output is displayed, look at the interface that’s facing the BGP peer. You should be able to see a line where it says something like:
Fast Ethernet 0/0 is up, line protocol is up.

The first part (Fast Ethernet 0/0 is up) is talking about the physical hardware portion, while the second part (line protocol is up) is talking about the Layer 2 process.

So if you see something like: Fast Ethernet 0/0 is up, line protocol is down, that means the physical interface is fine but Ethernet keepalive are not sent/received on the interface. Sometimes, the reason is that something isn’t plugged-in on the other side. Another reason could be you simply have a bad cable.

If, however, the interface shows to be administratively down, then you can remedy that by simply issuing the no shutdown command on the interface.

In figuring out Layer 1 and Layer 2 problems, always start at Layer 1 and work your way up. Troubleshoot and solve the Layer 1 and Layer 2 issues on that particular interface. If it’s a hardware failure, if it’s a cable failure, or something more subtle, this method will be the best way to take care of this particular cause. Possible Cause: Incorrect IP address used in neighbor statement in BGP An incorrect IP address in the neighbor statement in BGP may also cause neighbor relationship problems.

Consider this diagram: 

So, for example, in router R1, the configuration should be: router bgp 65001 neighbor 10.99.99.6 remote-as 65006 (this is the neighbor statement for R6, for peering)

Conversely, on router R6, the statement in the configuration should be: router bgp 65006neighbor 10.99.99.1 remote-as 65001 If, for example, the IP address on either R1 or R6 is wrong, the relationship will not form. So the easiest way to figure out if there’s a problem is to first execute the show ipbgp summary command. It will show you the state of the neighbor relationship, how many prefixes if any are being received, and whether the neighbor is stuck in Idle or Active state.

In addition to that, you can also execute the show running config command to verify that the peer address in the neighbor statements are correctly configured in BGP.

One of the things that’s going to be helpful is to: go in using PuTTY, SecureCRT, Tera Term or whatever terminal services program you’re most comfortable with; highlight the BGP section; paste the configuration into Notepad; and then go into the neighbor router and do the same thing. See if the neighbor configuration statements are in fact correct. If they’re not correct, delete the neighbor statement and recreate them with the correct IP addresses.   Possible Cause: Configured eBGP peers are not directly connected although eBGP peers that aren’t directly connected can still have neighbor relationships, an additional command must be used and a special path must be in place for the neighbor relationship to work.

You can determine whether the neighbor is more than one hop away by executing thetraceroute<peer ip> command. You’ll be able to tell very easily by the number of different sections and hops shown in the output.

Once you discover that the neighbor is in fact more than one hop away, you can go back into the BGP configuration and put in the statement: neighbor <peer ip>ebgp-multihop<ttl>ttlstands for time-to-live, which can be a value from 1 to 255 and which refers to the maximum number of hops that can be taken to reach the peer. If it’s 2 hops away, you put 2. If it’s 3 hops away, you put 3, and so on. You may also leave that parameter blank. If you do that, the default value of 255 will be applied.

Another thing you can use is the show tcp command, which you execute in the command-line. It will show you whether a TCP connection is up and in progress with that particular neighbor. Subsequently, it will allow you to verify establishment of a TCP session on port 179 toward a BGP peer. Possible Cause: Misconfigured neighbor authentication Another cause that’s very common for neighbor relationships not forming in BGP is the failure to configure the correct key in the password statement.

If you do a show ipbgp summary and you see that the neighbor relationships are indeed stuck in Active or Idle, the easiest way to resolve this is to execute the show running configcommand and then verify that the neighbor <peer ip> password <key> command is present on both peers and that the configured keys match.

Again, it would help if you copy those snippets and paste them into Notepad. That way, you can view the snippets all by themselves as you try to compare them and spot anything missing or mistyped. Remember that the key is case-sensitive. If that statement is incorrect, you don’t have to delete the entire configuration. Just recreate the neighbor <peer ip> password <key> statements on both BGP peers. Possible Cause: Unicast traffic being blocked between devices this possible cause for neighbor relationships not forming is not as common as those mentioned earlier. However, it’s still a possible cause nevertheless. In this case, Unicast traffic between the peers is being blocked. Blocking can be caused by a firewall, an access list, or a variety of different things.

Most likely, it’s going to be something configured on one or the other peers that may be blocking it but if there’s an intermediate device, then you’ll have to take a good look at that device’s configuration as well.

But in the particular device in question, execute the show ip interface and show access listcommands. Look at all the access lists, see if anything is being applied on the interface facing that particular neighbor, and if there is, either alters the access list to allow the traffic or you may have to alter it altogether.

Once you’re done with that, make sure everything is correct, make sure that the statements for peering are correct, and make sure show interface shows up/up. Possible Cause: Neighbor statement misconfigured under BGP There may be other things in the neighbor statement that may cause problems in neighbor relationships. For instance, timers may be mismatched.

To check whether something’s incorrect with the neighbor statement in BGP, start by executing the show ipbgp summary.  You’ll want to know first whether the neighbor relationships aren’t even shown. If they aren’t shown, then that means the neighbor relationship is not being established and it has not been configured at all.

If it has been configured, you’re going to see at least Active or Idle as a result of that command. At that point, you can also execute the show running-config in order to be able to go through and parse through the configuration. If there are only a few entries, this task is going to be very easy.

However, if it’s really long, then it can be difficult. If so, then paste it to Notepad so you can use the search function to find specifically what you’re looking for. If you know a specific IP that’s correct, you can go to that particular IP where you’ll find the entire string of numbers and commands, which will be listed in order. From that you can gather some information and determine possible causes.

Once you’ve pinpointed what’s wrong, you can delete and recreate the neighbor statements with the correct IP address combinations.

Route Advertisement Issues
Possible Cause: Automatic network summarization is in effect Although there can be a number of things that may prevent routes from being advertised correctly, one of the primary culprits is the auto-summary command.

Both BGP and EIGRP have automatic summarization enabled by default. If you don’t execute the no-auto summary command when you configure BGP, it’s going to automatically summarize into a classical boundary.

To check whether summarization is enabled, use the show ip protocols command. Look for the statement that says, Automatic route summarization is <disabled | enabled>. In EIGRP, it will say, “... is in effect” or “... is not in effect”.

So in BGP, you’ll want to see “disabled”. If it says something different, then you will need to go back into the BGP router configuration and execute the no auto-summary command.Possible Cause: The advertisement does not match a route in the IP routing table If the particular route being injected into BGP by the network statement is not matching a route in the IP routing table, then you can encounter route advertisement problems.

To remedy this, execute the show ip route command to discover whether the route exists in the current routing table. If it is not there, troubleshoot the local router and the IGP to determine the cause. See whether it was even configured in the router or check the IGP to see if there is a particular issue that’s preventing the route from being installed in the routing table.

Once you see the cause of the problem, correct it. Possible Cause: Route synchronization is enabled By default, route synchronization is enabled in BGP. Synchronization means that it has to exist in the IP routing table through an IGP, static routes, or other means, or BGP will not advertise the route.

To solve this problem, first execute the show ip protocols command and check whether the statement says IGP synchronization is enabled. If so, go back into the BGP configuration and put in the no synchronization command in order for that behavior to be turned off. Possible Cause: Route redistribution is not configured or is misconfigured One more cause for a problem with route advertisement issues may have to do with redistribution. Basically, if redistribution has not been configured, BGP won’t pull those routes in. The table has to be populated either through direct injection into BGP using the network statement or through redistribution.

You may use the show ip protocols command and look to see if redistribution has been configured. If it has, then investigate some more to see where the problem lies. It could be that you may have put in an incorrect AS number or a process ID relating to OSPF.

Routes Missing from Table
Now, aside from routes not being advertised correctly in BGP, you may find that certain routes are not showing up in the routing table, which is a little bit of a different issue. They sound the same but route advertisement is actually the BGP process announcing something out, and whether or not something’s being installed in the routing table is a separate issue altogether.Possible Cause: Default route misconfigured If the default route is not showing up, then it’s probably simply because it was not configured correctly. To investigate, execute the show iproute and see whether there is a route to 0.0.0.0 network to begin with. If it’s missing from the table, it won’t be injected or advertised from BGP.

You may also execute the show running-config and verify whether the network 0.0.0.0 and the default-information originate statements are existing and correctly configured in BGP. Add those statements if you find them missing. Possible Cause: Route synchronization is enabled We discussed this earlier as a possible cause for route advertisement issues, so just review that section if you want. Possible Cause: iBGP neighbors not fully meshed You may have a problem with iBGP neighbors because these neighbors are not full meshed. Remember, when the routes are being advertised among iBGP peers, it has a ttl of 1. If they’re not all fully meshed, you won’t be able to propagate routes correctly.

To verify that peerings are happening correctly, use the show ipbgp neighbors command. You may also use the show running-config command and do a little bit more investigative work in order to determine whether or not the neighbors are in fact fully meshed.

If there are connections that are missing, configure them using the <peer ip> remote-as <ASN> command. For example, let’s bring back the diagram we showed you earlier. 
If these were IBGP routers and there were direct connections between the Internet Router and Router 1 as well as between Router 1 and Router 6, but there was no connection between the Internet Router and Router 6, that would be a missing leg to a fully-meshed environment.

So if you have that kind of missing connection, you can then use the <peer ip> remote-as <ASN> command to remedy the problem.

Finally, execute the show ipbgp summary command, make sure that all the other peers that you’re looking for are indeed there and that each one of the neighbors shows all the other peers that are required. That will be your best way of determining whether or not a fully meshed relationship has been configured. Possible Cause: iBGP next-hop is not reachable One of the ways for you to check whether this is an issue is to do the show ip route command and examine the IP routing table for the required static/IGP route. And this is true with even eBGP. If the next-hop route is not reachable, it’s not going to be advertised.

If a static route is required, configure it using the ip route <prefix><mask><next-hop>command. Now, if for some reason, the IGP is failing to install the route leading to the iBGP next-hop address, you may have a whole other set of issues just related to the IGP.

In that instance, you have to make sure you’re looking at BGP as one sort of troubleshooting domain and the IGP as another. They depend on each other but they can have different issues.

Address Summarization Problems
Possible Cause: No subnets in the routing table in the range of the aggregate address In terms of address summarization problems, one common cause for an aggregate not being advertised is because there isn’t some part of the IP address range within the aggregate that exists already in the routing table.

The easiest way to check that is to execute the show ip route. See if any networks within that range currently exist. If you were advertising an aggregate address 216.145.0.0 and the mask is 255.255.252.0 and there are no 216.145-any type addresses in terms of the routing table, it’s not going to advertise the aggregate.

Execute the show running-config to verify that the aggregate address statement is correctly configured. If it is not, delete and recreate the statement that need corrections.

Relevant Debug and Show Commands
The troubleshooting process in BGP requires the use of several Show and a couple of Debugcommands that you should be familiar with. BGP Show Commands Show ip protocols This will show the BGP status of your neighbor, your Autonomous System Number (ASN), timer intervals, networks being advertised, and neighbors/gateways. Consequently, it will be helpful in troubleshooting neighbor relationships, missing routes, summarization issues, and filtering problems.

Here’s a portion of an output resulting from a show ip protocols command: 
Show ip route bgp This will show BGP routes advertised by neighbors, the administrative distance, MED value (if any), and the route source/interface. These information will be helpful in troubleshooting missing routes, summarization issues, filtering problems, and general troubleshooting tasks. 
Show ipbgpsummaryThis will show your configured peer IP addresses, your ASN, the number of messages received and sent, how long the session has been up, the state (Active, Idle, etc.), and prefixes received. This will be helpful in troubleshooting neighbor relationship issues, local configuration issues, and routing problems.

 Show ipbgpneighborsThere are two forms of this command. The first one is just show ipbgp neighbors, which will show you the IP address of neighbors, router ID of neighbors, state of a neighbor, peer-group (if configured), BGP messages/types received, and so forth.

However, you can also specify the peer ip address and then add either of these two optional parameters received-routes and advertised-routes. Received-routes is for routes being received by that particular neighbor, while advertised-routes is for routes advertised out to a particular neighbor.

Here’s the syntax: show ipbgp neighbors [peer ip address] {received-routes | advertised-routes} That will show you how many routes you are actually advertising or receiving and can be extremely helpful in attacking problems associated with routes missing and so forth. It can also be helpful in troubleshooting neighbor relationships, local configuration issues, and other issues associated with BGP routes.

Here’s part of what I got when I issued the command: show ipbgp neighbors 10.6.6.6 
Now, here’s part of what I got when I used show ipbgp neighbors 10.6.6.6
advertised-routes instead: 
Notice the default route that’s being advertised at the top, followed by a whole host of prefixes.

Lastly, here’s part of what I got when I used show ipbgp neighbors 10.6.6.6 received-routes 

 It’s practically the same type of information but it’s showing what’s being received. Show ipbgp This shows the entire contents of the routing information base. It will show your network mask/prefix, next-hop router, MED value, Local Preference Value, Weight Value, AS path, and so forth.

In turn, that information is going to be helpful in troubleshooting missing routes, filtering problems, and general troubleshooting tasks.
Now we go to the Debug commands.

BGP Debug Commands Debug commands display results that are more real-time views of the situation compared to the results of the show commands, which mostly allow you only to look at settings.
  
debugipbgp<peer ip> updates This will show you everything that has to do with neighbor adjacencies and relationships. So it’s good for troubleshooting neighbor relationships and routing update issues.

debugipbgp events

This is helpful in looking at different network events like interfaces that go up and down, processes that change, neighbor relationships that change, and so forth. It can help in troubleshooting routing update issues, convergence issues, and interface flapping.

Conclusion
That wraps up our discussion on BGP troubleshooting. I hope you learned a lot and I look forward to having you here again.

More Cisco Certification Info, please visit Router-switch.com

Tuesday, April 10, 2012

Cisco Router Products Feature

Cisco routers are for teleworkers, small offices, small to medium-sized businesses, and enterprise branch and head offices.
Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications.
Cisco Integrated Services Routers: Cisco 860, 880, 890, Cisco 1800 (fixed), Cisco 1800 (modular), Cisco 1900, Cisco 2800, 2900, 3800, 3900 Series
Cisco Aggregation Routers: Cisco 7200, 7301, 7304, ASR 1000, Cisco 7600, Catalyst 6500 Series
   
Cisco Integrated Services Routers: Increase the power of the network and optimize branch services on a single platform, while gaining a superior user experience.
Featured Cisco Routers: Cisco ISR G2
Cisco 3900 Series, for Medium-sized to Large Businesses and Enterprise Branch Offices
•    Delivers scalable rich-media services including TelePresence, highest density of service virtualization, and lowest TCO with energy efficiency
•    Ideal for high-end deployments requiring business continuity, WAN flexibility, superior collaboration capabilities, and investment protection
•    Field-upgradeable motherboard, circuit-speed WAN performance up to 350 Mbps with services such as security, mobility, WAN optimization, unified communications, video, and customized applications
•    3 RU modular form factor

Cisco 2900 Series, for Small- to Medium-sized and Enterprise Branch Offices
•    Provides rich-media services including TelePresence, service virtualization, and lower TCO with energy efficiency
•    Ideal for mid-range deployments requiring business agility, WAN flexibility, and secure collaboration
•    Circuit-speed WAN performance up to 75 Mbps with services such as security, mobility, WAN optimization, unified communications, video, and customized applications
•    1-2 RU modular form factor

Cisco 1900 Series, Small Offices and Small Enterprise Branch Offices
•    Entry-level secure WAN deployments, offers service virtualization, and low TCO
•    Ideal for small offices requiring modular flexibility for highly secure mobility and customizable applications
•    Circuit-speed performance up to 25 Mbps with concurrent services
•    Factory-selectable 802.11n access point and double-wide HWIC support; desktop form factor

Cisco 800 Series, for Small Offices and Teleworker Deployments
•    Provides secure WAN connectivity with desktop form factor
•    Ideal for telecommuters and small offices
•    Wire-speed performance with secure data services for xDSL, cable, and Ethernet WAN environments
•    Factory-selectable 802.11n access point, 3G WAN, and Survivable Remote Site Telephony (SRST) options

Cisco Integrated Services Routers G1:
Cisco 1800 Integrated Services Routers:
•    Designed for small to medium-sized businesses and small enterprise branch offices
•    Available in both fixed and modular configurations
•    Wire-speed performance with secure data services enabled at up to T1,E1, or xDSL rates
•    Business-class security with stateful firewall with URL filtering, VPN 3DES encryption and Advanced Encryption Standard (AES), Dynamic Multipoint VPN, IPS, and secure wireless LAN option
•    Secure WLAN option for simultaneous 802.11a and 802.11b/g operation with use of multiple antennas

Cisco 2800 Series Integrated Services Routers
•    Designed for small to medium-sized businesses and enterprise branch offices
•    Wire-speed performance up to multiple T1/E1/ xDSL rates, increased services density for security, voice, caching, video, network analysis, and L2; and switching
•    Security features include hardware-based VPN acceleration antivirus defense, IPS, and SDM support

Cisco 3800 Series Integrated Services Routers
•    Designed for medium-sized to large businesses and enterprise branch offices
•    Wire-speed performance with services enabled at up to T3/E3 rates; increased services density for security, voice, caching, video, network analysis, and L2
•    Security features include hardware-based VPN acceleration, antivirus defense through Network Admission Control, IPS, and SDM support

Cisco Aggregation Routers:Differentiate your service portfolio and increase revenues by delivering end-to-end scalable solutions and subscriber-aware services.
Cisco 7200 Series Routers
•    Application versatility supports managed network services, WAN and broadband aggregation, MPLS, VPN, QoS, and multiservice environments
•    Business-class security includes stateful inspection firewall, software and hardware VPN encryption, service-level validation features, and intrusion detection
•    Multiservice data/voice features include analog and digital voice, Survivable Remote Site Telephony, and multiservice interchange (MIX)-enabled backplane

Cisco 7600 Series Routers
•    Ideal for enterprise wide-area or metropolitan-area network aggregation or service-provider environments
•    Business-class security supports services modules including IPSec, firewall, SSL VPN, and IPS
•    Supports up to four slots for redundant supervisors and line cards; 6-, 9-, and 13-slot chassis available
•    Support for up to 12 Shared Port Adapter (SPA) bays and SPA Interface Processors (SIP) for intelligent services

Cisco ASR 1000 Series Routers
•    Ideal for service providers and enterprises seeking leading performance with compact form factor
•    Allows current and future services to be switched on instantly, at line rate, without compromising network performance or availability, using the Innovative Cisco QuantumFlow processor
•    Delivers highly secure, high-performance, and integrated software-enabled services (no service blades required), including multi-gigabit encryption, broadband, 20 and 40 Gbps firewall, Network- Based Application Recognition (NBAR), Flexible Packet Matching and session border control
•    Establishes new price and performance class for edge routers that deliver service integration for personalized, residential "any play" and complex business services
•    Provides powerful resiliency with convenient and cost-saving in-service software upgrade (ISSU) capability
•    Offers software redundancy on non-redundant hardware with ASR 1002 and ASR 1004 routers
•    Offers highly scalable, redundant hardware and 40 Gbps services and interface processors in the ASR 1006 and ASR 1013 routers

ASR 9000 Series Aggregation Services Routers
•    Offers nonstop video, enhanced scalability, and reduced carbon footprint
•    Ideal for carriers offering residential, mobile and business services
•    Scales up to 96 Tbps per system with comprehensive system redundancy
•    Offers unique service- and application-level intelligence

Cisco XR 12000/12000 Series Router
•    Extends highly secure virtualization and integral service delivery
•    Ideal for large enterprises and service providers
•    Features Cisco I-Flex (PDF - 677 KB), which prioritizes voice, video, and data services
•    Offers continuous system operation and multiservice scale

Friday, April 6, 2012

How to Use Cisco Static Routes?

Static cisco routes while manually intensive to keep up, are a very quick and effective way to route data from one subnet to different subnet. Let’s start with the basics.

What is a static router?
- a static route is a hard coded path in the router that specifies how the router will get to a certain subnet by using a certain path.

What do you mean by "hard coded"?
- you or someone has typed in the network ID and the next hop to get to the network specified

How do I add a static route into my Cisco router?
- Pretty simple
router# config t ; get into the configuration mode
router(config)# ip route A.B.C.D (destination network/host) A.B.C.D (mask) A.B.C.D (next hop); this is a simple static route

Are there any other ways to name the next hop except by using an IP address?
- Yes, you can use the port name i.e. ethernet0, E0, S0 and so on

What is "distance metric" that I can add at the end of the command?
- All routes have a value that allows the router to give a priority to which type of routing is used first. In static routes, the value is 1 which means no matter what other protocol you may have running like OSPF or RIP, the static route will always be used first. This can be changed to special needs. for example, if you have a frame link with ISDN back up, you can static routes for the frame and a second set of the same static router but with a distance matric of 255. This means while the frame is up, it goes first but when the frame goes down, the router will try to use the 2nd static which is normally ignored due to the 255 value.

Why do I want to use static routes when there are neat routing protocols like OSPF?
- static routes are easy, no overhead either on the link or the the CPU of the router. They also offer good security when coupled with a tight IP mask like 252 which gives only 2 hosts on a given link

If static routes are so easy, why not use them all the time?
- Static routes while easy can be overwhelming in a large or complicated network. Each time there is a change, someone must manually make changes to reflect the change. If a link goes down, even if there is a second path, the router would ignore it and consider the link down.

One of the most common uses of a static map is the default classless route
- ip classless
- ip route 0.0.0.0 0.0.0.0 [next hop]

This static map says that everything is remote and should be forwarded to the next hop( or supernet) which will take care fo the routing.

Dial on demand is also a big user of static routes. Many times with dial up or ISDN, you do not have the bandwidth or you do not want to pay the connection fees for routing updates so you use static routes.

Static routes allow you to set up load balancing after a fashion. Keep in mind that the IOS load balances across routes first and not interfaces. The easiest way to configure multiple routes on the same interface is to use the secondary IP command

Router 1
!
interface serial 0
 ip address 192.0.0.1 255.255.255.0
 ip address 192.0.0.2 255.255.255.0 secondary ! second route on same interface

interface serial 1
 ip address 192.1.0.1 255.255.255.0
 ip address 192.1.0.2 255.255.255.0 secondary

ip route 200.2.0.0 255.255.255.0 196.0.0.4; goes to serial 0
ip route 200.2.0.0 255.255.255.0 196.0.0.5; goes to serial 0
ip route 200.2.0.0 255.255.255.0 196.1.0.4; goes to serial 1

Router 2
!
interfaceethernet 0
 ip address 200.2.0.1 255.255.255.0
!
interface serial 0
 ip address 196.0.0.4 255.255.255.0
 ip address 196.0.0.5 255.255.255.0 secondary
!
interface serial 1
 ip address 196.1.0.4 255.255.255.0
 ip address 196.1.0.5 255.255.255.0 secondary

The traffic would go out router 1 across the two IPs on serial 0 first then across 1 IP on serial 1
This gives you unequal load balancing.

Notes: This is just the basics of static routing. You can get very creative if you want and take things further then described here. I would suggest "Routing TCP/IP Vol 1" from Cisco Press for more information.

Thursday, September 22, 2011

DoS Protection on Cisco Routers


The Cisco router is one of the most versatile High End routing machines. It is one of enterprise’s networking devices. If you take a look at Cisco website under the Routers Product Category, you will notice that the Cisco 7600 can be used in Data Centers, in Service Provider networks, in WAN aggregation or as Internet Edge router. In Service Providers can be used as Provider Edge (PE) in IP MPLS networks aggregating many Customer Edge (CE) router devices. Its modularity and high port capacity allows the 7600 to work as both Layer2 aggregation and as Layer3 high performance router.
In Service Provider networks one of the main concerns of network administrators is to protect the networking infrastructure from Denial of Service attacks. These DoS attacks are actually the most serious and popular security threat against Service Providers. buy used router Botnets are frequently the main source of such attacks. ICMP flooding, UDP flooding, spoofed addresses DoS, SYN attacks etc are a few examples of DoS or DDos (Distributed Denial of Service) attacks. Fortunately the Cisco 7600 router has many robust features and mechanisms to protect itself from such attacks.
In the company that I work (Service Provider) we have already implemented several security protection features on 7600 which are really effective against DoS attacks. A summary of the DoS protection mechanisms on 7600 follows below:
  • Security Access Control Lists (ACL): Applied on interfaces to block traffic at Layer3/4 layers.
  • QoS Rate Limiting: Using class-maps and policy-maps you can apply rate limiting to specific type of traffic (e.g ICMP)
  • uRPF (unicast Reverse Path Forwarding): protects against spoofing attacks. sell cisco routers
  • Traffic Storm Control: Protects against broadcast storm attacks.
  • TCP Intercept: Protects against SYN attacks.
  • Hardware-Based Rate Limiters: Work on PFC3 engines. These rate limiters protect the MSFC routing engine from various packets that can overload its CPU (configured with the mls rate-limit command)
  • Control Plane Policing (CoPP): Again used for protection of the MSFC routing engine by applying rate limiting to packets that flow from the data plane to the control plane.
Of course in addition to the above you must not forget other important security mechanisms such as strong password policy, proper Authentication and Accounting, refurbished cisco router logging, SNMP security, Routing Protocols security (MD5 authentication in OSPF, BGP etc) etc. All of these technical issues must be based on a thorough and carefully written security policy.
Tips: If you need to know more about Cisco 7600 series, such as key features, specs, related software and price, or wannato buy cisco refurbished routers, you can visit router-switch.com to see more news and info of Cisco network equipment. Also,Cisco blog at router-switch.com share all kinds of news and info related to Cisco, computer and technology, hardware, networking, CISCO network equipment, cloud computing, etc. with all the Cisco fans and networking lovers…