Router Configuration Management Tools

Slides:



Advertisements
Similar presentations
Routing Registries1 Abha Ahuja
Advertisements

APNIC Internet Routing Registry Routing SIG APNIC-15, Taipei 26 February 2003.
CCNP Network Route BGP Part -I BGP : Border Gateway Protocol. It is a distance vector protocol It is an External Gateway Protocol and basically used for.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 RIP version 1 Routing Protocols and Concepts – Chapter 5.
Routing Registries What are they, how do they work, and why should I care? Larry Blunk, Merit Network, Inc.The Quilt Peering Workshop, Fall 2006.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Lab 4-1 Debrief.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
Routing problems are easy to cause, and hard to diagnose (“Happy operators make happy packets”) Jennifer Rexford AT&T Labs—Research
1 Using RPSL in Practice Chun Zhang Nov 2, 2000 ECE 697F: Special Topics - Internet Routing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Configuring and Verifying.
DASAN NETWORKS GPON Training
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
The RPLS ‘via’ attributes IETF89, London RPLS-VIA - IETF89 - Job Snijders Hibernia Networks.
RPSL - Practical Tool for ISPs? 14th APNIC Open Policy Meeting Kitakyushu, Japan Andy Linton.
Fundamentals of Networking Discovery 2, Chapter 6 Routing.
OSPF To route, a router needs to do the following: Know the destination address Identify the sources it can learn from Discover possible.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Inter-VLAN Routing Chapter 6 Modified.
Basic Router Configuration Warren Toomey GCIT. Introduction A Cisco router is simply a computer that receives packets and forwards them on based on what.
CISCO NETWORKING ACADEMY Chabot College ELEC IP Routing Protocol Highlights.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
CCNA Journal Sample. Index Basic Ethernet Serial Router Rip.
CCNA Configuration Journal Sample. Index Basic Ethernet Serial Router Rip …
1 Bulk Administration Tool BAT Installation and Configuration By Prof. Valencia Community College.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 Module Summary  A WAN allows the transmission of data across broad geographic distances.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
Operations in HEAnet Brian Nisbet NOC Manager. Operational Overview 30+ Technical Staff. – 75% of whom participate in NOC Duty. 60+ Clients. Expanding.
Module 4: Learning about Other Devices These Labs can be performed using the following topology or using the ones in the lab books: Creating a Network.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Internet Exchange Points (IXPs) Philip Smith E2 Workshop, AfNOG 2005.
Enterprise Network Security Accessing the WAN – Chapter 4.
Distance Vector Routing Protocols Dynamic Routing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-5 Debrief.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Route Selection Using Policy Controls
VoIP Journal Sample. Network Sample Icons Index Basic Config Ethernet Serial Router Rip Router OSPF Rip / OSPF.
Lab6 Configure Dynamic route.  RIP(Routing information protocol)  IGRP(interior gate way routing protocol)
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Lab 2-4 Debrief.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—1-1 Planning Routing Services Lab 1-1 Debrief.
The APNIC Internet Routing Registry Database SIG APRICOT, Bangkok 5 March 2002.
Cisco 3 - Switch Perrine. J Page 17/3/2016 Chapter 3 Which of the following are found in the EIGRP neighbor table? (Choose two.) 1.routes installed by.
Chapter Objectives In this chapter, you will learn:
Enterprise Network Security
CCNA Routing and Switching Routing and Switching Essentials v6.0
CCNA Configuration Journal Sample
Chapter 10: DHCP Routing & Switching Chapter 10: DHCP
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 2: Basic Switching Concepts and Configuration
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) practice-questions.html.
Malwarebytes Software Updating and Upgrading
Malwarebytes Installation Error Number
Malwarebytes Configuration Support Number
Malwarebytes Installation Errors
Malwarebytes Settings and Configuration Issues
Malwarebytes troubleshooting Support Number
Chapter 10: Device Discovery, Management, and Maintenance
Enterprise Network Security
Improving reliability of IRR database
© 2006 ITT Educational Services Inc.
Enterprise Network Security
Local configuration global effect
Improvement of Consistency among AS Policies on IRR Database
Validating MANRS of a network
Presentation transcript:

Router Configuration Management Tools

Why should I use router config tools? Limits human configuration errors Saves staff from hand-editing thousands of router configs Automatically implements changes in Internet topology Synchronizes router updates Makes it possible to use tools for analysis and debugging

Why should I use the IRR troubleshooting and debugging of routing policy allows use of router configuration toos use of IRR with auto-config tools protects your network from bogus routing info

What tools should I use? RtConfig by ISI RAToolSet (

How does RtConfig work? Register your policy in the IRR Create an RtConfig template RtConfig will output your config file –rsd –gated –Cisco

Info about the IRR run a local database to speed up the configuration process

How do I register my policy in the IRR? Register maintainer Register AS and policy information Register routes

What about RPSL? Currently the RADB supports RIPE-181 migrating to RPSL!