The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A
ABR 5-4
address formats
IPv4 2-2
IPv6 3-2
IPv6 (table) 3-2
address resolution protocol. See ARP
administrative distance
description 1-7
static routing 11-2
aggregatable global addresses. See IPv6
areas 6-5
ARP
caching 2-3
configuring gratuitous ARP 2-13
configuring Local Proxy ARP 2-12
configuring Proxy ARP 2-11
configuring static ARP entries 2-10
description 2-3
gratuitous ARP 2-5
Local Proxy ARP 2-5
process (figure) 2-3
Proxy ARP 2-5
Reverse ARP 2-4
ASBR 5-5
AS confederations
configuring 9-24
description 9-4
AS numbers
4-byte support. 1-5
ranges (table) 1-5
AS-path lists
configuring 14-8
description 14-3
autonomous system
description 1-5
B
bandwidth 1-4
BDR 5-3
BFD
BGP 9-8
EIGRP 7-7
BGP 8-7
administrative distances (table) 8-2
BFD 9-8
clearing neighbors 8-17
conditional advertisement 9-7
conditional advertisement example 9-31
configuration modes 8-8
configuring conditional advertisement 9-29
configuring dynamic capability 9-28
configuring maximum prefixes 9-28
configuring prefix peering 9-19
configuring route dampening 9-27
disable the feature 8-11
displaying statistics 8-22, 9-38
eBGP 9-3
enable the feature 8-10
example configuration 8-22
generic specific extended community lists 14-4
iBGP 9-3
licensing requirements 8-7, 9-9
modifying next-hop address 9-21
MP-BGP 9-9
next-hop address tracking 9-7
path selection 8-4
router ID 8-3
speakers 8-1
tuning 9-32
unicast RIB 8-7
verifying configuration 8-20, 9-37
virtualization support 8-7, 9-9
BGP aggregate addresses
configuring 9-28
BGP AS-path lists
configuring 14-8
description 14-3
BGP authentication
configuring 9-20
description 9-2
BGP autonomous systems
description 8-2
BGP capabilities negotiation
description 9-5
disabling 9-22
BGP community lists
description 14-4
BGP extended community lists
description 14-4
BGP instance
creating 8-11
deleting 8-13
restarting 8-13
BGP load balancing
configuring 9-27
BGP loadsharing
description 9-6
BGP multipath. See BGP loadsharing
BGP peers
authentication (note) 9-2
description 8-3
BGP route aggregation
description 9-7
BGP route dampening 9-6
BGP route redistribution
configuring 9-31
description 9-8
BGP sessions
reset options 9-3
resetting 9-20
route policies 9-3
BGP templates
configuring peer-policy templates 9-14
configuring peer templates 9-16
configuring session templates 9-12
description 9-2
peer-policy templates 9-2
peer-session templates 9-2
peer template 9-2
Border Gateway Protocol. See BGP
C
CDP 3-12
communication cost 1-4
community lists
description 14-4
comparing
link-state and distance vector routing algorithms 1-9
D
default gateway
description 1-8
default settings
EIGRP 7-8
GLBP 4-7
HSRP 17-9
IP 2-7
IPv6 3-18
IS-IS 16-7
object tracking 19-3
OSPF 5-13
OSPFv3 6-12
policy-based routing 15-3
RIP 10-4
Route Policy Manager 14-5
static routing 11-4
VRF 12-6
VRRP 18-7
delay 1-4
distance vector routing algorithms 1-9
distribution
RIP 10-3
DR 5-3
E
eBGP
configuring 9-22
configuring AS confederations 9-24
configuring multihop 9-23
description 9-3
disabling fast external failover 9-23
disabling single-hop checking 9-22
limiting the AS-path attribute 9-24
eBGP AS confederations. See AS confederations
ECMP. See equal cost multipath
EIGRP
authentication 7-5
BFD 7-7
configuring a summary address 7-17
configuring authentication 7-14
configuring hello interval 7-22
configuring load balancing 7-21
configuring route redistribution 7-17
configuring stub routing 7-16
creating an instance 7-10
default settings 7-8
deleting an instance 7-12
description7-1to ??
disabling an instance 7-12
disabling split horizon 7-23
disabling the feature 7-10
displaying statistics 7-28
DUAL algorithm 7-2
ECMP 7-6
enabling the feature 7-9
example configuration 7-28
external route metrics 7-4
guidelines 7-7
hold time 7-2
internal route metrics 7-3
licensing requirements 7-7
limitations 7-7
limit redistributed routes 7-19
load balancing 7-6
neighbor discovery 7-2
prerequisites 7-7
restarting an instance 7-12
route redistribution 7-6
route summarization 7-6
route updates 7-3
shutting down on an interface 7-13
split horizon 7-6
stub routers 7-5
tuning 7-23
unicast RIB 7-4
verifying configuration 7-27
virtualization support 7-7
eigrp
passive interface 7-13
equal cost multipath 1-6
extended community lists
description 14-4
F
FIB
clearing routes 13-5
displaying 13-3
licensing requirements 13-2
verifying 13-7
VRFs 1-11
forwarding
adjacency manager 1-11
FIB 1-11
unicast forwarding distribution module 1-11
forwarding information base. See FIB
G
GLBP
default settings 4-7
verifying configuration 4-13
graceful restart
configuring in IS-IS 16-26
configuring in OSPFv3 6-36
gratuitous ARP
configuring 2-13
description 2-5
H
Hot Standby Router Protocol. See HSRP
HSRP
addressing 17-3
configuring a group 17-10
configuring an IPv6 group 17-12
configuring priority 17-16
customizing 17-17
default settings 17-9
disabling the feature 17-10
enabling the feature 17-9
example configuration 17-19
guidelines 17-8
licensing requirements 17-7
limitations 17-8
load sharing 17-6
messages 17-5
prerequisites 17-8
standby router 17-2
verifying configuration 17-18
virtualization support 17-7
vPC support 17-7
HSRP authentication
configuring 17-14
description 17-5
HSRP object tracking
description 17-6
HSRP versions
configuring 17-10
description 17-5
HSRP virtual MAC address
configuring 17-14
description 17-2
I
iBGP
configuring route reflector 9-25
description 9-3
iBGP route reflector. See route reflector
ICMP
description 2-6
with local proxy ARP (note) 2-6
ICMPv6 3-13
packet header format (figure) 3-13
IDS, enabling 3-24
Intermediate System-to-Intermediate System. See IS-IS
Internet Control Message Protocol. See ICMP
IP
addresses 2-2
configuring addresses 2-8
configuring secondary addresses 2-9
default settings 2-7
example configuration 2-18
guidelines 2-7
licensing requirements 2-6
limitations 2-7
packet header 3-9
prerequisites 2-7
secondary addresses (note) 2-2
subnet masks 2-1
verifying configuration 2-18
virtualization support 2-6
IPv6
addresses compatible with IPv4 3-5
address formats 3-2
address formats (table) 3-2
anycast addresses 3-6
CDP 3-12
configuring addresses 3-19
configuring neighbor discovery 3-21
default settings 3-18
enabling IDS checks 3-24
enabling packet verification 3-24
EUI-64 format 3-4
example configuration 3-24
guidelines 3-18
ICMP 3-13
interface ID 3-4
licensing requirements 3-17
limitations 3-18
link-local addresses 3-5
loopback address (note) 3-3
multicast addresses 3-7
neighbor discovery 3-13
neighbor redirect message 3-16
neighbor solicitation message 3-14
packet header 3-10
path MTU discovery 3-12
prerequisites 3-18
router advertisement message 3-15
site-local address 3-6
subnet ID 3-4
unicast addresses 3-3
unique local addresses 3-6
unspecified address (note) 3-3
verifying configuration 3-24
virtualization support 3-17
IS-IS
address families 16-9
administrative distance 16-5
clearing statistics 16-33
configuration modes 16-8
configuring default passive interfaces 16-14
configuring dynamic host exchange 16-18
configuring on an interface 16-12
configuring the administrative distance 16-24
default settings 16-7
disabling strict adjacency mode 16-25
displaying statistics 16-33
example configuration 16-33
guidelines 16-7
IPv6 support 16-1
licensing requirements 16-7
limitations 16-7
limit redistributed routes 16-23
LSPs 16-2
NET 16-3
shut down an interface 16-14
system ID 16-3
tuning 16-30
verifying configuration 16-32
IS-IS areas
description 16-2
IS-IS authentication
configuring in an area 16-16
configuring on an interface 16-17
description 16-3
IS-IS designated intermediate system 16-3
configuring 16-18
IS-IS graceful restart
configuring 16-26
IS-IS instances
configuring optional parameters 16-11
creating 16-9
deleting 16-10
multiple instance support 16-6
restarting 16-12
IS-IS load balancing
configuring 16-11
description 16-5
IS-IS mesh group
configuring 16-18
IS-IS mess group
description 16-4
IS-IS overload bit
configuring 16-19
description 16-4
IS-IS route redistribution
configuring 16-21
description 16-5
IS-IS route summarization
configuring 16-20
description 16-4
L
licensing requirements 8-7
BGP 9-9
EIGRP 7-7
FIB 13-2
HSRP 17-7
IP 2-6
IPv6 3-17
IS-IS 16-7
object tracking 19-3
OSPF 5-12
OSPFv3 6-11
policy-based routing 15-2
RIP 10-4
Route Policy Manager 14-5
static routing 11-3
uRIB 13-2
VRF 12-5
VRRP 18-6
link-state advertisements 5-1
link-state routing algorithms 1-9
load 1-4
load balancing 1-6
Local Proxy ARP
configuring 2-12
description 2-5
LSAs 6-5
for OSPFv3 (table) 6-6
M
MAC lists
description 14-2
MIBs
OSPFv3 6-42
MP-BGP 9-9
Multiprotocol BGP
N
ND
configuring 3-21
description 3-13
neighbor redirect message 3-16
next hop 1-2
NSSA 5-9
configuring 5-26
description for OSPFv3 6-9
O
object tracking
configuring a delay 19-10
configuring a track list with boolean expression 19-6
configuring a track list with percentage 19-7, 19-8
configuring for a nonDefault VRF 19-12
configuring for route reachability 19-5
configuring on an interface 19-4
default settings 19-3
description 19-1
example configuration 19-13
guidelines 19-3
licensing requirements 19-3
limitations 19-3
track list 19-2
verifying configuration 19-13
virtualization support 19-2
Open Shortest Path First. See OSPF
Open Shortest Path First version 3. See OSPFv3
OSPF
area border router 5-4
AS border router 5-5
authentication 5-7
backup designated router 5-3
configuring area authentication 5-19
configuring a totally stubby area 5-25
configuring authentication 5-18
configuring authentication on an interface 5-20
configuring DR priority 5-18
configuring ECMP 5-16
configuring filter lists 5-23
configuring load balancing 5-16
configuring MD5 authentication 5-20
configuring networks 5-16
configuring NSSA 5-26
configuring on an interface 5-16
configuring optional parameters on an interface 5-17
configuring redistribution 5-30
configuring route summarization 5-34
configuring simple password authentication 5-20
configuring stub areas 5-24
configuring stub route advertisements 5-35
configuring the hello interval 5-18
configuring virtual links 5-28
configuring with VRFs 5-39
creating an instance 5-14
dead interval 5-2
default settings 5-13
delete an instance 5-15
description5-1to ??
designated router 5-3
disable the feature 5-14
displaying statistics 5-42
enable the feature 5-13
example configuration 5-42
guidelines 5-12
hello interval 5-2
hello packet 5-2
licensing requirements 5-12
limitations 5-12
link cost 5-6
link-state database 5-7
LSA 5-1
LSA flooding 5-6
LSA pacing 5-6
LSA types (table) 5-6
modifying default timers 5-36
multiple instances 5-11
neighbors 5-2
not-so-stubby area 5-9
NSSA 5-9
opaque LSAs 5-7
prerequisites 5-12
redistributed routes 5-32
restarting an instance 5-39
route redistribution
description 5-10
route summarization
description 5-10
shutting down an instance 5-18
SPF optimization 5-11
stub area 5-8
stub area (figure) 5-9
stub router advertisements
description 5-11
unicast RIB 5-7
verifying configuration 5-41
virtualization support 5-12
virtual link 5-9
virtual link (figure) 5-10
OSPFv2 (Open Shortest Path First Version 2)
description 6-1
OSPFv3
address families 6-8
adjacency 6-3
areas 6-5
comparison to OSPFv2 6-2
configuring ECMP 6-16
configuring filter lists 6-20
configuring graceful restart 6-36
configuring load balancing 6-16
configuring networks 6-17
configuring NSSA 6-23
configuring redistribution 6-28
configuring route summarization 6-32
configuring stub areas 6-21
configuring totally stubby areas 6-22
configuring virtual links 6-26
configuring with VRFs 6-38
creating an instance 6-14
default settings 6-12
description6-1to ??
displaying statistics 6-40
enabling the feature 6-13
example configuration 6-41
guidelines 6-12
licensing requirements 6-11
limitations 6-12
link cost 6-6
link-state database 6-7
LSA flooding 6-7
LSA pacing 6-7
LSAs 6-5
LSA types (table) 6-6
MIBs 6-42
modifying default timers 6-34
multiple instances 6-11
neighbors 6-3
NSSA 6-9
prerequisites 6-12
redistributed routes 6-30
restarting an instance 6-37
RFC 6-2
route redistribution 6-10
route summarization 6-10
SPF optimization 6-11
unicast RIB 6-8
verifying configuration 6-40
virtualization support 6-11
virtual links 6-10
P
path length 1-4
path MTU discovery 3-12
policy-based routing
configuring a route policy 15-4
configuring match parameters 15-5
configuring set parameters 15-6
default settings 15-3
description 15-1
disabling 15-4
enabling 15-3
example configuration 15-7
guidelines 15-3
licensing requirements 15-2
limitations 15-3
prerequisites 15-2
route maps 15-2
set criteria 15-2
verifying configuration 15-6
policy route maps
description 15-2
prefix lists
configuring 14-6
description 14-1
Proxy ARP
configuring 2-11
description 2-5
R
redistiribution
description 1-6
redistribution 1-5
BGP 9-8
configuring for OSPF 5-30
configuring for OSPFv3 6-28
configuring in BGP 9-31
configuring in IS-IS 16-21
configuring in RIP 10-12
configuring on EIGRP 7-17
EIGRP 7-6
IS-IS 16-5
maximum limit for EIGRP 7-19
maximum limit for IS-IS 16-23
maximum limit for OSPF 5-32
maximum limit for OSPFv3 6-30
with route maps 14-4
reliability 1-4
Reverse ARP
description 2-4
limitations 2-5
RFC 2-4
RIB
RIP
clearing statistics 10-18
configuring a passive interface 10-11
configuring on an interface 10-8
default settings 10-4
description 10-2
disable the feature 10-6
displaying statistics 10-17
enabling the feature 10-5
example configuration 10-18
guidelines 10-4
licensing requirements 10-4
limitations 10-4
prerequisites 10-4
route filtering 10-3
tuning 10-16
verifying configuration 10-17
virtualization support 10-4
RIP authentication
configuring 10-9
description 10-2
RIP instance
creating 10-6
deleting 10-7
optional parameters 10-7
restarting 10-8
RIP load balancing
configuring 10-7
description 10-3
RIP route distribution
description 10-3
RIP route redistribution
configuring 10-12
RIP route summarization
configuring 10-11
description 10-3
RIP split horizon
configuring with poison reverse 10-11
description 10-2
route maps
configuring 14-12
configuring match parameters 14-13
configuring set parameters 14-15
description 14-2
example configuration 14-18
for policy -based routing 15-2
match criteria 14-2
redistribution 14-4
set changes 14-3
route metric
bandwidth 1-4
communication cost 1-4
delay 1-4
load 1-4
path length 1-4
reliability 1-4
route policy
configuring 15-4
configuring match parameters 15-5
configuring set parameters 15-6
description 15-1
example configuration 15-7
Route Policy Manager
default settings 14-5
example configuration 14-18
guidelines 14-5
licensing requirements 14-5
limitations 14-5
route policy manager
description14-1to ??
verifying configuration 14-17
router advertisement message 3-15
route redistribution
OSPFv3 6-10
route reflector
configuring 9-25
description 9-5
router ID
description 1-5
routes, estimating memory requirements 13-6
route summarization
configuring 5-34
configuring in IS-IS 16-20
configuring on EIGRP 7-17
EIGRP 7-6
ISIS 16-4
RIP 10-3
route table
description 1-2
routing algorithms
distance vector 1-9
link-state 1-9
Routing Information Protocol. See RIP
routing metrics
description 1-2
routing protocols
administrative distance 1-7
comparing link-state algorithms to distance vector algorithms 1-9
convergence. convergence 1-6
distance vector 1-9
link-state 1-9
next hop 1-2
virtualization 1-10
S
static routes
description 1-8
virtualization support 11-3
with ARP 2-4
static routing
administrative distance 11-2
configuring 11-4
configuring with VRFs 11-5
default settings 11-4
description 11-1
example configuration 11-6
guidelines 11-3
licensing requirements 11-3
limitations 11-3
prerequisites 11-3
verifying configuration 11-6
stub routing
description 1-7
U
uRIB
clearing routes 13-6
description 13-1
displaying 13-4
displaying (example) 13-5
licensing requirements 13-2
verifying 13-7
V
virtualization
description 1-10
Virtual Router Redundancy Protocol. See VRRP
VRF
assigning an interface to a VRF 12-8
configuring routing parameters 12-9
creating 12-6
default settings 12-6
deleting 12-7
example configuration 12-13
guidelines 12-5
licensing requirements 12-5
limitations 12-5
setting the routing context 12-12
setting the scope 12-12
verifying configuration 12-13
VRF-aware services
configuring 12-11
description 12-3
VRF filtering
description 12-4
example configuration 12-12
VRF-Lite
description 12-2
guidelines 12-5
limitations 12-5
VRF reachability
description 12-4
example configuration 12-12
VRRP
benefits 18-3
configuring time intervals for advertisement packets 18-13
default settings 18-7
disabling the feature 18-8
displaying statistics 18-18
enabling the feature 18-8
example configuration 18-18
guidelines 18-6
licensing requirements 18-6
limitations 18-6
verifying configuration 18-17
virtualization support 18-6
vPC support 18-5
VRRP advertisements
description 18-5
VRRP authentication
configuring 18-11
description 18-5
VRRP groups
configuring 18-8
description 18-3
VRRP priority
configuring 18-9
description 18-4
disabling preemption 18-14
preemption 18-4
VRRP tracking
configuring 18-15
description 18-5
W