Overview
Introducing Routing
Routing is the process of selecting paths in a network along which data packets travel from the source to the
destination. Routers, which are specialized networking devices, perform the task of
routing, ensuring that data packets are forwarded correctly across different networks to their final destination.
Routing plays a crucial role in the functionality of the Internet and other networks, ensuring efficient and reliable
data delivery. It is essential for communication between devices across large, complex networks, whether it's local
area networks (LANs), wide area networks (WANs), or the global Internet.
Design Decisions for a Routing Solution
Number of Locations?
Number of Hosts at Each Location?
Routing Protocols Supported?
Secured Connectivity Between Private Networks?
Routing and Remote Access Features
Isolating and Securing the Private Network
Integrating with Existing Network Designs
Restricting Internet and Private Network Traffic
Supporting Multiple Protocols
Integration Benefits
Designing a Functional Routing Solution
Placing Routers Within a Network
Placing Routers Within the Private Network
Placing Routers at the Edge of the Private Network
Integrating the Router into the Existing Network
Interface Address and Subnet Mask
Interface Data Rate and the Persistence
Interface Security
Including Static Routing
Default Route Entry
Auto-Static Route Entries
Including the RIP-for-IP Routing Protocol
RIP Version Support
RIP Version 2 Options
Including the OSPF Routing Protocol
OSPF Autonomous System Design
OSPF Area Design
OSPF Network Design
Including the IGMP Routing Protocol
IGMP Router Mode Interface
IGMP Proxy Mode Interface
Including the DHCP Relay Agent
DHCP Servers and Clients Are on Isolated Subnets
Existing Routers Support DHCP or BOOTP Forwarding
Discussion: Designing Routing Solutions
Securing Private Network Connections
Restricting Traffic with IP Packet Filters
Restrict Using Routing and Remote Access Filters
Filter All Traffic Based on IP Address and Protocol
Protecting Confidential Data with IPSec Tunnels
Protecting Confidential Data with VPN Tunnels
Selecting VPN Tunnels to Authenticate and Encrypt
Specifying PPTP Tunnels Using MPPE for Encryption
Specifying L2TP Tunnels Using IPSec for Encryption
Authenticating Routers
Specifying RIP-for-IP or OSPF Passwords
Specifying Demand-Dial Authentication
Specifying IPSec Machine Certificates
Integrating Routers into Screened Subnets
Placing Routers to Establish Screened Subnets
Placing Routers to Route Between Screened Subnets
Enhancing a Routing Design for Availability and Performance
Dedicating a Computer
Selecting Persistent Connections
Providing Multiple Connections and Routers