Split DNS
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contents
Split DNSLast Updated: May 03, 2011
The Split DNS feature enables a Cisco router to respond to Domain Name System (DNS) queries using a specific configuration and associated host table cache that are selected based on certain characteristics of the queries. In a Split DNS environment, multiple DNS databases can be configured on the router, and the Cisco IOS software can be configured to choose one of these DNS name server configurations whenever the router must respond to a DNS query by forwarding or resolving the query. Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Split DNSNo special equipment or software is needed to use the Split DNS feature. To use Split DNS to forward incoming DNS queries, you must have a client that issues DNS queries, a DNS caching name server on which the Split DNS features are to be configured, and a back-end DNS name server. Both of the DNS name server components reside in a Cisco router running the Cisco IOS DNS subsystem software. An example of this basic topology is illustrated in the figure below. Restrictions for Split DNSData Link Layer RedirectionThe DNS forwarding functionality provided by Split DNS to the DNS server subsystem of the Cisco IOS software is available only for DNS packets that are directed to one of the IP addresses of the router that serves as the DNS caching name server. Split DNS does not support processing of packets intercepted at the data link layer (Layer 2) and then redirected to the DNS caching name server. Information About Split DNS
Split DNS Feature OverviewThe Split DNS feature enables a Cisco router to answer DNS queries using the internal DNS hostname cache specified by the selected virtual DNS name server or, for queries that cannot be answered from the information in the hostname cache, direct queries to specific, back-end DNS servers. The virtual DNS name server is selected based on certain characteristics of each query. Split DNS commands are used to configure a customer premise equipment (CPE) router that serves as the DNS server and forwarder for queries from hosts and as the DNS server and resolver for queries originated by the router itself. The following sections summarize Split DNS features: Split DNS Use to Respond to DNS Queries BenefitsThe following sections describe the primary Split DNS features:
Selection of Virtual DNS Caching Name Server ConfigurationsTo configure a Split DNS environment, configure multiple DNS databases on the router and then configure the router to choose one of these virtual DNS server configurations whenever the router must respond to a DNS query by looking up or forwarding the query. The router that acts as the DNS forwarder or resolver is configured with multiple virtual DNS caching name server configurations, each associated with restrictions on the types of DNS queries that can be handled using that name server. The router can be configured to select a virtual forwarding or resolving DNS server configuration based on any combination of the following criteria:
When the router must respond to a query, the Cisco IOS software selects a DNS name server by comparing the characteristics of the query to a list of name servers and their configured restrictions. After the appropriate name server is selected, the router addresses the query using the associated host table cache or forwarding parameters that are defined for that virtual name server. Ability to Offload Internet Traffic from the Corporate DNS ServerWhen deployed in an enterprise network that supports many remote hosts with Internet VPN access to the central site, the Split DNS features of the Cisco IOS software enable the router to be configured to direct Internet queries to the Internet service provider (ISP) network, thus reducing the load on the corporate DNS server. Compatibility with NAT and PATSplit DNS is compatible with Network Address Translation (NAT) and Cisco IOS Port Address Translation (PAT) upstream interfaces. If NAT or PAT is enabled on the CPE router, DNS queries are translated (by address translation or port translation) to the appropriate destination address, such as an ISP DNS server or a corporate DNS server. When using split tunneling, the remote router routes the Internet-destined traffic directly, not forwarding it over the encrypted tunnel. With a remote client that uses split tunneling, it is possible for the router to direct DNS queries destined for the corporate DNS server to the pushed DNS server list from the central site if the tunnel is up and to direct DNS queries destined for the ISP DNS server to the outside public interface address if the tunnel is down.
Split DNS OperationA basic network topology for using Split DNS is illustrated in the figure below. The network diagram shows a CPE router that connects to both an ISP DNS name server and a corporate DNS name server. The diagram also shows three of the CPE client machines that access the router. The following sections summarize the network activities in a basic Split DNS environment:
CPE Router ConfigurationConfiguration of the CPE router consists of defining DNS caching name server configurations and defining sets of rules for selecting one of the configurations to use for a given DNS query.
DNS Query Issued by a CPE ClientThe CPE client can issue DNS queries that request access to the Internet or to the corporate site. The basic network topology in the figure above shows a CPE router that receives incoming DNS queries from three clients, through interfaces that are enabled with NAT. The three client machines represent typical users of a corporate network:
The clients access the corporate network through a VPN tunnel that originates at the corporate VPN gateway and terminates in the CPE router. Virtual DNS Name Server SelectionGiven an incoming DNS query, the Cisco IOS software uses either the default selection rules or the interface-specific selection rules (depending on the interface on which the query arrived) to select one of the DNS name server configurations in the list. To make the selection, the Cisco IOS software matches the query characteristics to the usage restrictions for each DNS name server configuration in the list. The selected configuration specifies both a host table cache and forwarding parameters, and the router uses this information to handle the query. Response to the Client-issued DNS QueryThe router handles the DNS query using the parameters specified by the selected DNS name server configuration:
DNS ViewsA DNS view is a set of parameters that specify how to handle a DNS query. A DNS view defines the following information:
The following sections describe DNS views in further detail.
View Use Is Restricted to Queries from the Associated VRFA DNS view is always associated with a VRF, whether it is the global VRF (the VRF whose name is a NULL string) or a named VRF. The purpose of this association is to limit the use of the view to handling DNS queries that arrive on an incoming interface matches a particular VRF:
Parameters for Resolving Internally Generated DNS QueriesThe following parameters define how to resolve internally generated DNS queries:
Parameters for Forwarding Incoming DNS QueriesThe following parameters define how to forward incoming DNS queries:
Sometimes, when a source interface is configured on a router with the split DNS feature to forward DNS queries, the router does not forward the DNS queries through the configured interface. Hence, consider the following points while forwarding the DNS queries using the source interface:
DNS View ListsA DNS view list is an ordered list of DNS views in which additional usage restrictions can be specified for any individual member in the list. The scope of these optional usage restrictions is limited to a specific member of a specific DNS view list. When the router must respond to a DNS query, the Cisco IOS software uses a DNS view list to select the DNS view that will be used to handle a DNS query. Order in Which to Check the Members of a DNS View ListWhen a DNS view list is used to select a DNS view for handling a given DNS query, the Cisco IOS software checks each member of the view list--in the order specified by the list--and selects the first view list member whose restrictions permit the view to be used with the query that needs to be handled. Usage Restrictions Defined for a DNS View in the View ListA DNS view list member can be configured with usage restrictions defined using access control lists (ACLs) that specify rules for selecting that view list member based on the query hostname or the query source host IP address. The two types of ACLs supported by the Split DNS view list definition are described in "DNS Name Groups". Selection of the DNS View ListWhen the router that is acting as the DNS caching name server needs to respond to a DNS query, the Cisco IOS software uses a DNS view list to determine which DNS view can be used to handle the query:
If the router is responding to an internally generated query, no DNS view list is used to select a view; the global DNS view is used to handle the query. The assignment of a DNS view list as the default or to an interface is described in "DNS View Groups". Selection of a DNS View List MemberThe view list members are compared, each in turn, to the characteristics of the DNS query that the router is responding to:
If the query list does not specify additional restrictions on the view, the view will be used to address the query, so the view-selection process is finished. If the view list does specify additional restrictions on the view, the query is compared to those restrictions:
The first DNS view list member that is found to have restrictions that match the query characteristics is used to handle the query. DNS Name GroupsThe Split DNS feature supports two types of ACLs that can be used to restrict the use of a DNS view. A DNS name list or a standard IP ACL (or both) can be applied to a DNS view list member to specify view-use restrictions in addition to the VRF-specific restriction that is a part of the view definition itself.
DNS View Usage Restrictions Based on the Query HostnameA DNS name list is a named set of hostname pattern-matching rules, with each rule specifying the type of action to be performed if a query hostname matches the text string pattern in the rule. In order for a query hostname to match a name list, the hostname must match a rule that explicitly permits a matching pattern but the hostname cannot match any rules that explicitly deny a matching pattern. DNS View Usage Restrictions Based on the Query Source IP AddressA standard IP ACL is a numbered or named set of host IP address-matching rules, with each rule specifying the type of action to be performed if an IP address matches the text string pattern in the rule. The Split DNS feature supports the use of a standard ACL as a view-use restriction based on the query source IP address. In order for a source IP address to match a name list, the IP address must match a rule that explicitly permits a matching pattern but the IP address cannot match any rules that explicitly deny a matching pattern. DNS View GroupsThe Split DNS feature provides two ways to specify the DNS view list that the Cisco IOS software is to use to select the DNS view that will be used to handle an incoming DNS query. For a query that arrives on an interface that is configured to use a particular DNS view list, the interface-specific DNS view list is used. Otherwise, the default DNS view list is used.
Interface-specific View ListsA DNS view list can be attached to a router interface. When an incoming DNS query arrives on that interface, the Cisco IOS software uses that view list to select a DNS view to use to handle the query. Default DNS View ListA DNS view list can be configured as the default DNS view list for the router. When an incoming DNS query arrives on an interface that is not configured to use a specific view list, the Cisco IOS software uses the default view list to select the DNS view to use to handle the query. Router Response to DNS Queries in a Split DNS EnvironmentBy introducing support of DNS views--and the ability to configure the router to select from a list of appropriate views for a given DNS query--the Split DNS feature enables different hosts and subsystems to use different virtual DNS caching name servers, each with their own, separate DNS cache and each accessible from a single router that acts as the DNS forwarder and resolver. Thus, each DNS view defines a different DNS database on a single router. Furthermore, because the Split DNS feature separates the configuration of DNS query forwarding and resolving parameters, it is a simple matter to configure the router to respond more freely to queries from internal clients while limiting response to queries from external clients. If the router receives a query other than a broadcast, it forwards the query as a broadcast under the VRF as defined in the interface view:
See "Specifying a DNS View List for a Router Interface" to specify a DNS view list for a particular router interface. The following sections provide detailed descriptions of how the router responds to DNS queries in a Split DNS environment.
Response to Incoming DNS Queries per the Forwarding Parameters of the Selected DNS ViewGiven an incoming DNS query, the Cisco IOS software uses the DNS view list configured for that interface to select the DNS view list to use to handle the query. If no view list is configured for the interface, the default DNS view list is used instead. Using the configured or default view list, the router software selects the first view list member that is associated with the same VRF as the query and whose usage restrictions match the query characteristics. After the DNS view is selected, the router handles the query according to the parameters configured in the selected view.
Otherwise, the view-selection process moves on to the next member of the view list. If no member of the default DNS view list is qualified to address the query, the router does nothing further with the query.
Response to Internally Generated DNS Queries per the Resolving Parameters of the Default Global DNS ViewGiven an internally generated DNS query to resolve, the Cisco IOS software uses the default DNS view to handle the query:
The router attempts to respond to the query using the DNS resolving parameters specified by that view:
How to Configure Split DNS
Enabling Split DNS Debugging OutputEnabling a Split DNS debug command enables output to be written at every occurrence of a DNS name list event, a DNS view event, or a DNS view list event. The router continues to generate such output until you enter the corresponding no debug command. You can use the output from the Split DNS debug commands to diagnose and resolve internetworking problems associated with Split DNS operations. A DNS name list event can be of any of the following:
A DNS view event can be any of the following:
A DNS view list event can be any of the following:
Perform this optional task if you want to enable the writing of an event message to syslog output for DNS name list events, view events, or view list events: DETAILED STEPS Defining a DNS Name ListPerform this optional task if you need to define a DNS name list. A DNS name list is a list of hostname pattern-matching rules that could be used as an optional usage restriction on a DNS view list member. DETAILED STEPS Defining a DNS ViewPerform this task to define a DNS view. A DNS view definition can be used to respond to either an incoming DNS query or an internally generated DNS query.
DETAILED STEPS Defining Static Entries in the Hostname Cache for a DNS ViewIt is easier to refer to network devices by symbolic names rather than numerical addresses (services such as Telnet can use hostnames or addresses). Hostnames and IP addresses can be associated with one another through static or dynamic means. Manually assigning hostnames-to-address mappings is useful when dynamic mapping is not available. Perform this optional task if you need to define static entries in the DNS hostname cache for a DNS view. DETAILED STEPS
Defining a DNS View ListPerform this task to define an ordered list of DNS views with optional, additional usage restrictions for each view list member. The router uses a DNS view list to select the DNS view that will be used to handle a DNS query. DETAILED STEPS
Modifying a DNS View ListTo provide for efficient management of the order of the members in a view list, each view list member definition includes the specification of the position of that member within the list. That is, the order of the members within a view list is defined by explicit specification of position values rather than by the order in which the individual members are added to the list. This enables you to perform either of the following tasks without having to remove all the view list members and then redefine the view list membership in the desired order:
Adding a Member to a DNS View List Already in UsePerform this optional task if you need to add another member to a DNS view list that is already in use. For example, suppose the DNS view list named userlist5 is already defined and in use as a default view list or as an interface-specific view list. Assume that the list consists of the following members:
If you need to add DNS view user4 as the second member of the list, add that view to the list with a position number value from 11 to 19. You do not need to remove the three existing members and then add all four members to the list in the desired order. DETAILED STEPS
Changing the Order of the Members of a DNS View List Already in UsePerform this optional task if you need to change the order of the members of a DNS view list that is already in use. For example, suppose the DNS view list named userlist5 is already defined and in use as a default view list or as an interface-specific view list. Assume that the list consists of the following members:
If you want to move DNS view user1 to the end of the list, remove that view from the list and then add it back to the list with a position number value greater than 30. You do not need to remove the three existing members and then add the members back to the list in the desired order. DETAILED STEPS
Specifying the Default DNS View List for the DNS Server of the RouterPerform this task to specify the default DNS view list for the routerâs DNS server. The router uses the default DNS view list to select a DNS view to use to handle an incoming DNS query that arrives on an interface for which no interface-specific DNS view list has been defined. DETAILED STEPS
Specifying a DNS View List for a Router InterfacePerform this optional task if you need to specify a DNS view list for a particular router interface. The router uses that view list to select a DNS view to use to handle a DNS query that arrives on that interface. DETAILED STEPS
Specifying a Source Interface to Forward DNS Queries
SUMMARY STEPS
DETAILED STEPS
Configuration Examples for Split DNS
Split DNS View Limited to Queries from a Specific VRF ExampleThe following example shows how to define two different VRFs and then define two different DNS views that are associated with those VRFs: ip vrf vpn101 description VRF vpn101 for example purposes rd 10:112 exit ! ip vrf vpn102 description VRF vpn102 for example purposes rd 10:128 exit ! ip dns view vrf vpn101 . . . exit ! ip dns view vrf vpn102 user1 . . . exit The two DNS views are both named user1, but each view is associated with a different VRF.
The two DNS views in this example can be configured with the same DNS resolving and forwarding parameters, or they can be configured with different DNS resolving and forwarding parameters. Split DNS View with Dynamic Name Server Configuration ExampleThe following example shows how to populate the list of resolving name servers for the default DNS view in the global namespace with three statically defined IP addresses. The example also shows how to configure the router to be able to dynamically acquire, through DHCP or PPP interaction on FastEthernet slot 0, port 1, name server IP addresses to add to the list of resolving name servers for that view: ip dns view default domain lookup domain name-server 192.168.2.204 domain name-server 192.168.2.205 domain name-server 192.168.2.206 domain name-server interface FastEthernet0/0 Split DNS View with Statically Configured Hostname Cache Entries ExampleThe following example shows how to statically add three hostname-to-address mappings for the host www.example.com in the DNS hostname cache for the DNS view user5 that is associated with VRF vpn101: clear host all * ip host vrf vpn101 view user5 www.example.com 192.168.2.10 192.168.2.20 192.168.2.30 exit show hosts vrf vpn101 view user5
Split DNS View with Round-Robin Rotation of Hostname Cache Entries ExampleWhen resolving DNS queries using a DNS view for which the hostname cache contains hostnames that are associated with multiple IP addresses, the router sends those queries to the first associated IP address in the hostname cache. By default, the other associated addresses in the hostname cache are used only in the event of host failure. The round-robin rotation of hostname cache entries specifies that each time a hostname in the internal cache is accessed, the list of IP addresses associated with that hostname should be rotated such that the second IP address in the list becomes the first one and the first one is moved to the end of the list. For a more detailed description of round-robin functionality, see the description of the ip domain round-robin command in the Cisco IOS IP Addressing Services Command Reference . The following example shows how to define the hostname www.example.com with three IP addresses and then enable round-robin rotation for the default DNS view associated with the global VRF. Each time that hostname is referenced internally or queried by a DNS client sending a query to the Cisco IOS DNS server on this system, the order of the IP addresses associated with the host www.example.com will be changed. Because most client applications look only at the first IP address associated with a hostname, this results in different clients using each of the different addresses and thus distributing the load among the three different IP addresses. ip host view www.example.com 192.168.2.10 192.168.2.20 192.168.2.30 ! ip dns view default domain lookup domain round-robin Split DNS Configuration of ACLs That Can Limit DNS View Use ExampleThe following example shows how to configure one DNS name list and one standard IP ACL:
Both types of lists can be used to limit the types of DNS queries that a DNS view is allowed to handle. ! Define a DNS name-list ! ip dns name-list 151 deny .*.example1.net ! (Note: The view fails this list if the query hostname matches this) ! ip dns name-list 151 permit .*.example1.com ip dns name-list 151 permit www.example1.org ! (Note: All other access implicitly denied) ! ! Define a standard IP ACL ! access-list 71 deny 192.168.2.64 0.0.0.63 ! (Note: The view fails this list if the query source IP matches this) ! access-list 71 permit 192.168.2.128 0.0.0.63 ! (Note: All other access implicitly denied) Using this configuration example, suppose that the first member of a DNS view list is configured to use DNS name list 151 as a usage restriction. Then, if the router were to use that DNS view list to select the DNS view to use to handle a given DNS query, the view-selection steps would begin as follows:
Continuing to use this configuration example, suppose that this same DNS view list member is also configured to use standard IP ACL 71 as a usage restriction. Then, even if the query hostname matched DNS name list 151, the query source IP address would have to match standard IP ACL 71 before that view would be selected to handle the query. To validate this second usage restriction, the DNS view-selection steps would continue as follows:
Split DNS View Lists Configured with Different View-use Restrictions ExampleThe following example shows how to define two DNS view lists, userlist1 and userlist2. Both view lists comprise the same three DNS views:
Both view lists contain the same DNS views, specified in the same order: ip dns view-list userlist15 view vrf usergroup100 user1 10 restrict name-group 121 exit view vrf usergroup200 user2 20 restrict name-group 122 exit view vrf usergroup300 user3 30 restrict name-group 123 exit ! exit ip dns view-list userlist16 view vrf usergroup100 user1 10 restrict name-group 121 restrict source access-group 71 exit view vrf usergroup200 user2 20 restrict name-group 122 restrict source access-group 72 exit view vrf usergroup300 user3 30 restrict name-group 123 restrict source access-group 73 exit exit The two DNS view lists differ, though, in the usage restrictions placed on their respective view list members. DNS view list userlist15 places only query hostname restrictions on its members while view list userlist16 restricts each of its members on the basis of the query hostname and the query source IP address:
Split DNS Configuration of Default and Interface-specific View Lists ExampleThe following example shows how to configure the default DNS view list and two interface-specific view lists: ip dns server view-group userlist1 ! interface FastEthernet 0/0 ip dns view-group userlist2 exit ! interface FastEthernet 0/1 ip dns view-group userlist3 exit The Cisco IOS software uses the DNS view list named userlist1 to select the DNS view to use to respond to incoming queries that arrive on router interfaces that are not configured to use a specific view list. View list userlist1 is configured as the default DNS view list for the router. The Cisco IOS software uses the DNS view list named userlist2 to select the DNS view to use for incoming queries that arrive on port 0 of the FastEthernet card in slot 0. The Cisco IOS software uses the DNS view list named userlist3 to select the DNS view to use for incoming queries that arrive on port 1 of the FastEthernet card in slot 0. Additional ReferencesRelated Documents
MIBsTechnical Assistance
Feature Information for Split DNSThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
GlossaryAAA --authentication, authorization, and accounting. ACL --access control list. A list kept by routers to control access to or from the router for a number of services (for example, to prevent packets with a certain IP address from leaving a particular interface on the router). access control list --See ACL. address resolution --Generally, a method for resolving differences between computer addressing schemes. Address resolution usually specifies a method for mapping network layer (Layer 3) addresses to data link layer (Layer 2) addresses. authentication --In security, the verification of the identity of a person or a process. bridge --Device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the data link layer (Layer 2) of the OSI reference model. In general, a bridge filters, forwards, or floods an incoming frame based on the MAC address of that frame. See also relay. broadcast address --A special address reserved for sending a message to all stations. CE router --Customer edge router, an edge router in the C network, defined as a C router which attaches directly to a P router. client --Any host requesting configuration parameters. C network --Customer (enterprise or service provider) network. CPE --customer premises equipment. C router --Customer router, a router in the C network. DDR --dial-on-demand routing. Technique whereby a router can automatically initiate and close a circuit-switched session as transmitting stations demand. The router spoofs keepalives so that end stations treat the session as active. DDR permits routing over ISDN or telephone lines using an external ISDN terminal adapter or modem. DHCP --Dynamic Host Configuration Protocol. Provides a mechanism for allocating IP addresses dynamically so that addresses can be reused when hosts no longer need them. DNS --Domain Name System. System used on the Internet for translating names of network nodes into addresses. DNS name group --Association of a DNS view list member with a restriction that limits the view to handling DNS queries whose queried domain name matches a DNS name list. See also DNS source access group. DNS name list --A named set of a domain name pattern-matching rules, with each rule specifying the type of action to be performed on a DNS query if a queried domain name matches the text string pattern. DNS proxy --Feature that allows a router to act as a proxy for devices on the LAN by sending its own LAN address to devices that request DNS server IP addresses and forwarding DNS queries to the real DNS servers after the WAN connection is established. DNS server view group --A DNS view list that has been configured as the default DNS view list for the router. The Cisco IOS software uses the default DNS view list to determine which DNS view to use to handle resolution of incoming DNS queries that arrive on an interface not configured with a DNS view list. See also DNS view group. DNS source access group --Association of a DNS view list member with a restriction that limits the view to handling DNS queries whose source IP address matches a standard access control list (ACL).See also DNS name group. DNS spoofing --Scheme used by a router to act as a proxy DNS server and âspoofâ replies to any DNS queries using either the configured IP address in the ip dns spoofing command or the IP address of the incoming interface for the query. This functionality is useful for devices where the interface toward the ISP is not up. Once the interface to the ISP is up, the router forwards DNS queries to the real DNS servers. The router will respond to the DNS query with the configured IP address when queried for any hostname other than its own but will respond to the DNS query with the IP address of the incoming interface when queried for its own hostname. The hostname used in the DNS query is defined as the exact configured hostname of the router specified by the hostname command, with no default domain appended. DNS view --A named set of virtual DNS servers. Each DNS view is associated with a VRF and is configured with DNS resolver and forwarder parameters. DNS view group --Association of a DNS view list with a router interface. The Cisco IOS software uses this view list to determine which DNS view to use to handle resolution of incoming DNS queries that arrive on that interface. See also DNS server view group. DNS view list --A named set of DNS views that specifies the order in which the view list members should be checked and specifies usage restrictions for each view list member. DNS view list member --A named set of DNS views that specifies the order in which the view list members should be checked and specifies usage restrictions for each view list member. domain --On the Internet, a portion of the naming hierarchy tree that refers to general groupings of networks based on organization type or geography. domain name --The style of identifier--a sequence of case-insensitive ASCII labels separated by dots--defined for subtrees in the Internet Domain Name System (R1034) and used in other Internet identifiers, such as hostnames, mailbox names, and URLs. enterprise network --Large and diverse network connecting most major points in a company or other organization. Differs from a WAN in that it is privately owned and maintained. gateway --In the IP community, an older term referring to a routing device. Today, the term router is used to describe nodes that perform this function, and gateway refers to a special-purpose device that performs an application-layer conversion of information from one protocol stack to another. Compare with router. ISP --Internet service provider. Company that provides Internet access to other companies and individuals. LAN --local-area network. High-speed, low-error data network covering a relatively small geographic area (up to a few thousand meters). LANs connect workstations, peripherals, terminals, and other devices in a single building or other geographically limited area. LAN standards specify cabling and signaling at the physical and data link layers of the OSI model. Ethernet, FDDI, and Token Ring are widely used LAN technologies. Compare with MAN and WAN. MAN --metropolitan-area network. Network that spans a metropolitan area. Generally, a MAN spans a larger geographic area than a LAN, but a smaller geographic area than a WAN. Compare with LAN and WAN. MPLS --Multiprotocol Label Switching. Switching method that forwards IP traffic using a label. This label instructs the routers and the switches in the network where to forward the packets based on preestablished IP routing information. multicast address --Single address that refers to multiple network devices. Synonymous with group address. name caching --Method by which remotely discovered hostnames are stored by a router for use in future packet-forwarding decisions to allow quick access. name resolution --Generally, the process of associating a name with a network location. name server --Server connected to a network that resolves network names into network addresses. namespace --Commonly distributed set of names in which all names are unique. PE router --Provider edge router, an edge router in the P network, defined as a P router which attaches directly to a C router. P network --MPLS-capable service provider core network. P routers perform MPLS. P router --Provider router, a router in the P network. relay --OSI terminology for a device that connects two or more networks or network systems. A data link layer (Layer 2) relay is a bridge; a network layer (Layer 3) relay is a router. See also bridge and router. router --Network layer device that uses one or more metrics to determine the optimal path along which network traffic should be forwarded. Routers forward packets from one network to another based on network layer information. Occasionally called a gateway (although this definition of gateway is becoming increasingly outdated). Compare with gateway. See also relay. server --Any host providing configuration parameters. spoofing --Scheme used by routers to cause a host to treat an interface as if it were up and supporting a session. The router spoofs replies to keepalive messages from the host in order to convince that host that the session still exists. Spoofing is useful in routing environments, such as DDR, in which a circuit-switched link is taken down when there is no traffic to be sent across it in order to save toll charges. SSM --Source Specific Multicast. A datagram delivery model that best supports one-to-many applications, also known as broadcast applications. SSM is the core networking technology for the Cisco implementation of the IP Multicast Lite suite of solutions targeted for audio and video broadcast application environments. tunnel --Secure communication path between two peers, such as two routers. VPN --Virtual Private Network. Framework that consists of multiple peers transmitting private data securely to one another over an otherwise public infrastructure. A VPN protects inbound and outbound network traffic by using protocols that tunnel and encrypt all data at the IP level. This framework permits networks to extend beyond their local topology, while remote users are provided with the appearance and functionality of a direct network connection. Enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses âtunnelingâ to encrypt all information at the IP level. VRF --VPN routing and forwarding instance. A VRF consists of an IP routing table, a derived forwarding table, a set of interfaces that use the forwarding table, and a set of rules and routing protocols that determine what goes into the forwarding table. In general, a VRF includes the routing information that defines a customer VPN site that is attached to a PE router. Each VPN instantiated on the PE router has its own VRF. WAN --wide-area network. Data communications network that serves users across a broad geographic area and often uses transmission devices provided by common carriers. Frame Relay, SMDS, and X.25 are examples of WANs. Compare with LAN and MAN. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||