Lecure#8 - Network Layer
Lecure#8 - Network Layer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Path Determination
Two Functions of a Router
§ The interface that the router uses to forward the packet may be the final destination, or
it may be a network connected to another router that is used to reach the destination
network.
§ Each network that a router connects to typically requires a separate interface, but this
may not always be the case.
• The primary function of a router are to determine the best path to forward
packets based on the information in its routing table, and to forward packets
toward their destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Path Determination
Router Functions Example
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Path Determination
Best Path Equals Longest Match
The best path in the routing table is also known as the longest match.
• The routing table contains route entries consisting of a prefix (network address) and
prefix length.
• For there to be a match between the destination IP address of a packet and a route in
the routing table, a minimum number of far-left bits must match between the IP
address of the packet and the route in the routing table.
• The prefix length of the route in the routing table is used to determine the minimum
number of far-left bits that must match.
• The longest match is the route in the routing table that has the greatest number of
far-left matching bits with the destination IP address of the packet. The longest match
is always the preferred route.
Note: The term prefix length will be used to refer to the network portion of both IPv4 and
IPv6 addresses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Path Determination
IPv4 Longest Match Example
In the table, an IPv4 packet has the destination IPv4 address 172.16.0.10. The router has
three route entries in its IPv4 routing table that match this packet: 172.16.0.0/12,
172.16.0.0/18, and 172.16.0.0/26. Of the three routes, 172.16.0.0/26 has the longest
match and would be chosen to forward the packet. For any of these routes to be
considered a match there must be at least the number of matching bits indicated by the
subnet mask of the route.
Destination IPv4 Address Address in Binary
172.16.0.10 10101100.00010000.00000000.00001010
1 172.16.0.0/12 10101100.00010000.00000000.00001010
2 172.16.0.0/18 10101100.00010000.00000000.00001010
3 172.16.0.0/26 10101100.00010000.00000000.00001010
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Path Determination
IPv6 Longest Match Example
An IPv6 packet has the destination IPv6 address 2001:db8:c000::99. This example shows
three route entries, but only two of them are a valid match, with one of those being the
longest match. The first two route entries have prefix lengths that have the required
number of matching bits as indicated by the prefix length. The third route entry is not a
match because its /64 prefix requires 64 matching bits.
Destination 2001:db8:c000::99/48
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Path Determination
Build the Routing Table
• Directly Connected Networks: Added to the routing table when a local interface is
configured with an IP address and subnet mask (prefix length) and is active (up and
up).
• Remote Networks: Networks that are not directly connected to the router. Routers
learn about remote networks in two ways:
§ Static Routes - Added to the routing table when a route is manually configured.
§ Dynamic Routes - Added to the routing table when routing protocols dynamically
learn about the remote network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Path Determination
Build the Routing Table (cont.)
• Default Route: Specifies a next-hop router to use when the routing table does not
contain a specific route that matches the destination IP address. The default route can
be entered manually as a static route, or learned automatically from a dynamic routing
protocol.
• A default route has a /0 prefix length. This means that no bits need to match the
destination IP address for this route entry to be used. If there are no routes with a
match longer than 0 bits, the default route is used to forward the packet. The default
route is sometimes referred to as a gateway of last resort.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
8.1.2 Packet Forwarding
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Packet Forwarding
Packet Forwarding Decision Process
1) The data link frame with an encapsulated IP packet arrives on the ingress interface.
2) The router examines the destination IP address in the packet header and consults its IP
routing table.
3) The router finds the longest matching prefix in the routing table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Packet Forwarding
Packet Forwarding Decision Process (Cont.)
After a router has determined the best path, it could do the following:
• If the route entry indicates that the egress interface is a directly connected
network, the packet can be forwarded directly to the destination device. Typically
this is an Ethernet LAN.
• To encapsulate the packet in the Ethernet frame, the router needs to determine
the destination MAC address associated with the destination IP address of the
packet. The process varies based on whether the packet is an IPv4 or IPv6
packet.
• If the route entry indicates that the destination IP address is on a remote network,
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Packet Forwarding
Packet Forwarding Decision Process (Cont.)
meaning a device on network that is not directly connected. The packet must be
forwarded to the next-hop router. The next-hop address is indicated in the route
entry.
• If the forwarding router and the next-hop router are on an Ethernet network, a
similar process (ARP and ICMPv6 Neighbor Discovery) will occur for determining
the destination MAC address of the packet as described previously. The
difference is that the router will search for the IP address of the next-hop router in
its ARP table or neighbor cache, instead of the destination IP address of the
packet.
• If there is no match between the destination IP address and a prefix in the routing
table, and if there is no default route, the packet will be dropped
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Packet Forwarding
End-to-End Packet Forwarding Just Definition
§ For example, the data link frame format for a serial link could be Point-to-Point (PPP)
protocol, High-Level Data Link Control (HDLC) protocol, or some other Layer 2 protocol.
§ The more efficiently a router can perform this task, the faster packets can be forwarded
by the router.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Packet Forwarding
Packet Forwarding Mechanisms (Cont.)
Process Switching : An older packet forwarding mechanism still available for Cisco
routers.
It is important to understand that the router does this for every packet, even if the
destination is the same for a stream of packets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Packet Forwarding
Packet Forwarding Mechanisms (Cont.)
Fast Switching : Another, older packet forwarding mechanism which is the successor
to process switching. Fast switching uses a fast-switching cache to store next-hop
information.
The flow information for the packet is then stored in the fast-switching cache. If
another packet going to the same destination arrives on an interface, the next-hop
information in the cache is re-used without CPU intervention.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Packet Forwarding
Packet Forwarding Mechanisms (Cont.)
Cisco Express Forwarding (CEF) : The most recent and default Cisco IOS packet-
forwarding mechanism. CEF builds a Forwarding Information Base (FIB), and an
adjacency table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
8.1.3 IP Routing Table
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
IP Routing Table
Route Sources
A routing table contains a list of routes to known networks (prefixes and prefix lengths).
The source of this information is derived from the following:
• Directly connected networks
• Static routes
• Dynamic routing protocols
The source for each route in the routing table is identified by a code. Common codes
include the following:
• L - Identifies the address assigned to a router interface.
• C - Identifies a directly connected network.
• S - Identifies a static route created to reach a specific network.
• O - Identifies a dynamically learned network from another router using the OSPF routing protocol.
• * - This route is a candidate for a default route.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
IP Routing Table
Routing Table Principles
There are three routing table principles as described in the table. These are issues that
are addressed by the proper configuration of dynamic routing protocols or static routes
on all the routers between the source and destination devices.
Every router makes its decision alone, •R1 can only forward packets using its own routing table.
based on the information it has in its own •R1 does not know what routes are in the routing tables of other routers
routing table. (e.g., R2).
The information in a routing table of one Just because R1 has route in its routing table to a network in the
router does not necessarily match the internet via R2, that does not mean that R2 knows about that same
routing table of another router. network.
R1 receives a packet with the destination IP address of PC1 and the
source IP address of PC3. Just because R1 knows to forward the
Routing information about a path does not
packet out its G0/0/0 interface, doesn’t necessarily mean that it knows
provide return routing information.
how to forward packets originating from PC1 back to the remote
network of PC3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
IP Routing Table
Routing Table Entries
In the figure, the numbers identify the following information:
• Route source - This identifies how the route was learned.
• Destination network (prefix and prefix length) - This
identifies the address of the remote network.
• Administrative distance - This identifies the trustworthiness of
the route source. Lower values indicate preferred route source.
• Metric - This identifies the value assigned to reach the remote
network. Lower values indicate preferred routes.
• Next-hop - This identifies the IP address of the next router to
which the packet would be forwarded.
• Route timestamp - This identifies how much time has passed
since the route was learned.
• Exit interface - This identifies the egress interface to use for
outgoing packets to reach their final destination.
Note: The prefix length of the destination network specifies the minimum number of far-left bits that must
match between the IP address of the packet and the destination network (prefix) for this route to be used.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
IP Routing Table
Directly Connected Networks
To learn about any remote networks, the router must have at least one active interface
configured with an IP address and subnet mask (prefix length). This is known as a
directly connected network or a directly connected route.
Routers add a directly connected route to its routing table when an interface is configured
with an IP address and is activated.
• A directly connected network is denoted by a status code of C in the routing table. The route
contains a network prefix and prefix length.
• The routing table also contains a local route for each of its directly connected networks,
indicated by the status code of L.
• For IPv4 local routes the prefix length is /32 and for IPv6 local routes the prefix length is
/128. This means the destination IP address of the packet must match all the bits in the
local route for this route to be a match. The purpose of the local route is to efficiently
determine when it receives a packet for the interface instead of a packet that needs to be
forwarded.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
IP Routing Table
Static Routes
After directly connected interfaces are configured and added to the routing table, static or
dynamic routing can be implemented for accessing remote networks. Static routes are
manually configured.
• They define an explicit path between two networking devices.
• They are not automatically updated and must be manually reconfigured if the network
topology changes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
IP Routing Table
Static Routes in the IP Routing Table
The topology in the figure is simplified to show only one LAN attached to each router.
The figure shows IPv4 and IPv6 static routes configured on R1 to reach the
10.0.4.0/24 and 2001:db8:acad:4::/64 networks on R2.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
IP Routing Table
Dynamic Routing Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
IP Routing Table
Dynamic Routes in the Routing Table
OSPF is now being used in our sample topology to dynamically learn all the networks
connected to R1 and R2. The routing table entries use the status code of O to indicate the
route was learned by the OSPF routing protocol. Both entries also include the IP address
of the next-hop router, via ip-address.
Note: IPv6 routing protocols use the link-local address of the next-hop router.
Note: OSPF routing configuration for IPv4 and IPv6 is beyond the scope of this course.
R1# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP,
EX - EIGRP external, O - OSPF, IA - OSPF inter area
(output omitted for brevity)
O 10.0.4.0/24 [110/50] via 10.0.3.2, 00:24:22, Serial0/1/1
O 10.0.5.0/24 [110/50] via 10.0.3.2, 00:24:15, Serial0/1/1
R1# show ipv6 route
IPv6 Routing Table - default - 10 entries
(Output omitted)
NDr - Redirect, RL - RPL, O - OSPF Intra, OI - OSPF Inter
O 2001:DB8:ACAD:4::/64 [110/50]
via FE80::2:C, Serial0/1/1
O 2001:DB8:ACAD:5::/64 [110/50]
via FE80::2:C, Serial0/1/1
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
IP Routing Table
Default Route
The default route specifies a next-hop router to use when the routing table does not
contain a specific route that matches the destination IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
IP Routing Table
Structure of an IPv4 Routing Table
IPv4 was standardized using the now obsolete classful addressing architecture. The
IPv4 routing table is organized using this same classful structure.
Although the lookup process no longer uses classes, the structure of the IPv4 routing
table still retains in this format.
• An indented entry is known as a child route. A route entry is indented if it is the subnet of a
classful address (class A, B or C network).
• Directly connected networks will always be indented (child routes) because the local
address of the interface is always entered in the routing table as a /32.
• The child route will include the route source and all the forwarding information such as the
next-hop address. The classful network address of this subnet will be shown above the route
entry, less indented, and without a source code. That route is known as a parent route.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
IP Routing Table
Structure of an IPv4 Routing Table
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
IP Routing Table
Structure of an IPv6 Routing Table
R1# show ipv6 route
(output omitted for brevity)
The concept of classful OE2 ::/0 [110/1], tag 2
via FE80::2:C, Serial0/0/1
addressing was never C 2001:DB8:ACAD:1::/64 [0/0]
part of IPv6, so the via GigabitEthernet0/0/0, directly connected
L 2001:DB8:ACAD:1::1/128 [0/0]
structure of an IPv6 via GigabitEthernet0/0/0, receive
routing table is very C 2001:DB8:ACAD:2::/64 [0/0]
straight forward. Every via GigabitEthernet0/0/1, directly connected
L 2001:DB8:ACAD:2::1/128 [0/0]
IPv6 route entry is via GigabitEthernet0/0/1, receive
formatted and aligned C 2001:DB8:ACAD:3::/64 [0/0]
via Serial0/1/1, directly connected
the same way. L 2001:DB8:ACAD:3::1/128 [0/0]
via Serial0/1/1, receive
O 2001:DB8:ACAD:4::/64 [110/50]
via FE80::2:C, Serial0/1/1
O 2001:DB8:ACAD:5::/64 [110/50]
via FE80::2:C, Serial0/1/1
L FF00::/8 [0/0]
via Null0, receive
R1#
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
IP Routing Table
Administrative Distance
A route entry for a specific network address (prefix and prefix length) can only appear
once in the routing table. However, it is possible that the routing table learns about the
same network address from more than one routing source. Except for very specific
circumstances, only one dynamic routing protocol should be implemented on a router.
Each routing protocol may decide on a different path to reach the destination based on
the metric of that routing protocol.
Cisco IOS uses what is known as the administrative distance (AD) to determine the route
to install into the IP routing table. The AD represents the "trustworthiness" of the route.
The lower the AD, the more trustworthy the route source.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
IP Routing Table
Administrative Distance (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
8.1.4 Static and Dynamic Routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Static and Dynamic Routing
Static or Dynamic?
Static and dynamic routing are not mutually exclusive. Rather, most networks use a
combination of dynamic routing protocols and static routes.
Static routes are useful for smaller networks with only one path to an outside network.
They also provide security in a larger network for certain types of traffic, or links to other
networks that need more control.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Static and Dynamic Routing
Static or Dynamic? (Cont.)
Dynamic routing protocols are implemented in any type of network consisting of more
than just a few routers.
• Dynamic routing protocols are scalable and automatically determine better routes if
there is a change in the topology.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Static and Dynamic Routing Important
Static or Dynamic? (Cont.)
The table shows a comparison of some the differences between dynamic and static
routing.
Feature Dynamic Routing Static Routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Static and Dynamic Routing
Dynamic Routing Evolution
Dynamic routing protocols have been used in networks since the late 1980s. One of the
first routing protocols was RIP. RIPv1 was released in 1988, but some of the basic
algorithms within the protocol were used on the Advanced Research Projects Agency
Network (ARPANET) as early as 1969. As networks evolved and became more complex,
new routing protocols emerged.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Static and Dynamic Routing
Dynamic Routing Evolution (Cont.)
The table classifies the current routing protocols. Interior Gateway Protocols (IGPs) are
routing protocols used to exchange routing information within a routing domain
administered by a single organization. There is only one EGP and it is BGP. BGP is used
to exchange routing information between different organizations, known as autonomous
systems (AS). BGP is used by ISPs to route packets over the internet. Distance vector,
link-state, and path vector routing protocols refer to the type of routing algorithm used to
determine best path.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Static and Dynamic Routing
Dynamic Routing Protocol Concepts
A routing protocol is a set of processes, algorithms, and messages that are used to
exchange routing information and populate the routing table with the choice of best
paths.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Static and Dynamic Routing
Dynamic Routing Protocol Concepts (Cont.)
The main components of dynamic routing protocols include the following:
• Data structures - Routing protocols typically use tables or databases for their operations.
This information is kept in RAM.
• Routing protocol messages - Routing protocols use various types of messages to
discover neighboring routers, exchange routing information, and other tasks to learn and
maintain accurate information about the network.
• Algorithm - An algorithm is a finite list of steps used to accomplish a task. Routing
protocols use algorithms for facilitating routing information and for the best path
determination.
Routing protocols determine the best path, or route, to each network. That route is then
offered to the routing table. The route will be installed in the routing table if there is not
another routing source with a lower AD.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Static and Dynamic Routing
Best Path
The best path is selected by a routing protocol based on the value or metric it uses to
determine the distance to reach a network. A metric is the quantitative value used to
measure the distance to a given network. The best path to a network is the path with the
lowest metric.
Dynamic routing protocols typically use their own rules and metrics to build and update
routing tables. The following table lists common dynamic protocols and their metrics.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Static and Dynamic Routing
Load Balancing
When a router has two or more paths to a destination with equal cost metrics, then the
router forwards the packets using both paths equally. This is called equal cost load
balancing.
• The routing table contains the single destination network, but has multiple exit
interfaces, one for each equal cost path. The router forwards packets using the
multiple exit interfaces listed in the routing table.
• If configured correctly, load balancing can increase the effectiveness and performance
of the network.
• Equal cost load balancing is implemented automatically by dynamic routing protocols.
It is enabled with static routes when there are multiple static routes to the same
destination network using different next-hop routers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Lecture#8: Network Layer
Routing & Reporting : Error Reporting (ICMP)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
ICMP Messages
ICMPv4 and ICMPv6 Messages
• Internet Control Message Protocol (ICMP) provides feedback about issues related
to the processing of IP packets under certain conditions.
§ ICMPv4 is the messaging protocol for IPv4.
§ ICMPv6 is the messaging protocol for IPv6 and includes additional functionality.
Note: ICMPv4 messages are not required and are often not allowed within a network for
security reasons.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
ICMP Messages
Host Reachability
ICMP Echo Message can be used to test the reachability of a host on an IP network.
In the example:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
ICMP Messages
Destination or Service Unreachable
• An ICMP Destination Unreachable message can be used to notify the source that a
destination or service is unreachable.
• The ICMP message will include a code indicating why the packet could not be delivered.
• Note: ICMPv6 has similar but slightly different codes for Destination Unreachable messages.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
ICMP Messages
Time Exceeded
ICMPv6 has new features and improved functionality not found in ICMPv4, including four
new protocols as part of the Neighbor Discovery Protocol (ND or NDP).
Messaging between an IPv6 router and an Messaging between IPv6 devices, including
IPv6 device, including dynamic address duplicate address detection and address
allocation are as follows: resolution are as follows:
• Router Solicitation (RS) message • Neighbor Solicitation (NS) message
• Router Advertisement (RA) message • Neighbor Advertisement (NA) message
Note: ICMPv6 ND also includes the redirect message, which has a similar function to the
redirect message used in ICMPv4.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
ICMP Messages
ICMPv6 Messages (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
ICMP Messages
ICMPv6 Messages (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
ICMP Messages
ICMPv6 Messages (Cont.)
• A device assigned a global IPv6 unicast or link-local unicast address, may perform
duplicate address detection (DAD) to ensure that the IPv6 address is unique.
Note: DAD is not required, but RFC 4861 recommends that DAD is performed on unicast
addresses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
ICMP Messages
ICMPv6 Messages (Cont.)
• To determine the MAC address for the destination, the device will send an NS
message to the solicited node address.
• The message will include the known (targeted) IPv6 address. The device that has
the targeted IPv6 address will respond with an NA message containing its Ethernet
MAC address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
8.2.2 Ping and Traceroute Tests
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Ping and Traceroute Tests
Ping – Test Connectivity
• The ping command is an IPv4 and IPv6 testing utility that uses ICMP echo request and
echo reply messages to test connectivity between hosts and provides a summary that
includes the success rate and average round-trip time to the destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Ping and Traceroute Tests
Ping the Loopback
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Ping and Traceroute Tests
Ping the Default Gateway
The ping command can be used to test the ability of a host to communicate on the local
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Ping and Traceroute Tests
Ping a Remote Host
Ping can also be used to test the ability of a local host to communicate across an
internetwork.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Ping and Traceroute Tests
Traceroute – Test the Path
• Traceroute (tracert) is a utility that is used to test the path between two hosts and
provide a list of hops that were successfully reached along that path.
• Traceroute provides round-trip time for each hop along the path and indicates if a
hop fails to respond. An asterisk (*) is used to indicate a lost or unreplied packet.
• Note: Traceroute makes use of a function of the TTL field in IPv4 and the Hop Limit
field in IPv6 in the Layer 3 headers, along with the ICMP Time Exceeded message.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Ping and Traceroute Tests
Traceroute – Test the Path (Cont.)
• The first message sent from traceroute will have a TTL field value of 1. This causes
the TTL to time out at the first router. This router then responds with a ICMPv4
Time Exceeded message.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Ping and Traceroute Tests
Packet Tracer – Verify IPv4 and IPv6 Addressing
In this Packet Tracer, you will do the following:
• Complete the Addressing Table Documentation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Ping and Traceroute Tests
Packet Tracer – Use Ping and Traceroute to Test Network
Connectivity
In this Packet Tracer, you will do the following:
• Test and Restore IPv4 Connectivity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62