SlideShare une entreprise Scribd logo
1  sur  54
www.professordkinney.com
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Lessons Summary:
Implementing EIGRP
Troubleshooting EIGRP
 Implementing EIGRP for IPv6
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Implementing an EIGRP-Based Solution
EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Roots of EIGRP: IGRP
-Developed in 1985 to overcome
RIPv1’s limited hop count
-Distance vector routing protocol
-Metrics used by IGRP
 bandwidth (used by default)
 Delay (used by default)
 reliability
 load
-Discontinued support starting
with IOS 12.2(13)T & 12.2(R1s4)S
EIGRP Message Format
EIGRP Header
 Data link frame header - contains source and
destination MAC address
 IP packet header - contains source & destination IP
address
 EIGRP packet header - contains AS number
 Type/Length/Field - data portion of EIGRP message
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP packet header contains
– Opcode field
– Autonomous System number
EIGRP Parameters contains
– Weights
– Hold time
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Protocol Dependent Modules (PDM)
EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk
PDMs are responsible for the specific routing task for each network layer
protocol
Reliable Transport Protocol (RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of EIGRP packet
 Reliable delivery requires acknowledgment from destination
 Unreliable delivery does not require an acknowledgement from
destination
– Packets can be sent
 Unicast
 Multicast
– Using address 224.0.0.10
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Reliable Transport Protocol
(RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP
packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of
EIGRP packet
 Reliable delivery requires acknowledgment
from destination
 Unreliable delivery does not require an
acknowledgement from destination
– Packets can be sent
 Unicast
 Multicast
– Using address 224.0.0.10
Implementing an EIGRP-Based Solution
EIGRP’s 5 Packet Types
Hello packets
– Used to discover & form adjacencies with neighbors
Query & Reply packets
– Used by DUAL for searching for networks
– Query packets
-Can use
– Unicast
– Multicast
Reply packet
– -Use only
– unicast
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Purpose of Hello Protocol
– To discover & establish adjacencies with neighbor routers
Characteristics of hello protocol
– Time interval for sending hello packet
 Most networks it is every 5 seconds
 Multipoint non broadcast multi-access networks
– Unicast every 60 seconds
-Holdtime
 This is the maximum time router should wait before declaring a neighbor
down
 Default holdtime
– 3 times hello interval
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Bounded Updates
EIGRP only sends update when there is a change in
route status
Partial update
– A partial update includes only the route information
that has changed – the whole routing table is NOT sent
Bounded update
– When a route changes, only those devices that are
impacted will be notified of the change
EIGRP’s use of partial bounded updates minimizes
use of bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Diffusing Update Algorithm (DUAL)
– Purpose
• EIGRP’s primary method for preventing routing loops
– Advantage of using DUAL
• Provides for fast convergence time by keeping a list of loop-
free backup routes
Administrative Distance (AD)
– Defined as the trustworthiness of the source route
 EIGRP default administrative distances
– Summary routes = 5
– Internal routes = 90
– Imported routes = 170
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Authentication
 EIGRP can
– Encrypt routing information
– Authenticate routing information
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Network Topology
We will use the below topology for our EIGRP
configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP will
automatically
summarize routes at
classful boundaries
Implementing an EIGRP-Based
Solution
Autonomous System (AS) & Process IDs
– This is a collection of networks under the control of a single authority
(reference RFC 1930)
– AS Numbers are assigned by IANA
– Entities needing AS numbers
 ISP
 Internet Backbone prodiers
 Institutions connecting to other institutions using AS numbers
Implementing an EIGRP-Based Solution
Instructional Design-Computer Networking -
Bridges Educational Group08/28/13
Basic EIGRP Configuration
 EIGRP autonomous system number actually functions as a process ID
 Process ID represents an instance of the routing protocol running on a router
 Example
Router(config)#router
eigrp autonomous-system
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The router eigrp command
 The global command that enables eigrp is
 router eigrp autonomous-system
 -All routers in the EIGRP routing domain must use the same process ID
number (autonomous-system number)
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The Network Command
 Functions of the network command
– Enables interfaces to transmit & receive EIGRP updates
– Includes network or subnet in EIGRP updates
 Example
– Router(config-router)#network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
The network Command with a Wildcard Mask
-This option is used when you want to configure EIGRP
to advertise specific subnets
-Example
 Router(config-router)#network network-address
[wildcard-mask]
Implementing an EIGRP-Based Solution
Verifying EIGRP
EIGRP routers must establish adjacencies with their neighbors before any
updates can be sent or received
Command used to view neighbor table and verify that EIGRP has established
adjacencies with neighbors is
show ip eigrp neighbors
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The show ip protocols
command is also used to
verify that EIGRP is
enabled
Implementing an
EIGRP-Based Solution
Examining the Routing Table
 The show ip route command is also used to verify EIGRP
 EIGRP routes are denoted in a routing table by the letter “D”
 By default , EIGRP automatically summarizes routes at major network
boundary
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Introducing the Null0 Summary Route
– Null0 is not a physical interface
– In the routing table summary routes are sourced from Null0
 Reason: routes are used for advertisement purposes
– EIGRP will automatically include a null0 summary route as child route
when 2 conditions are met
 At least one subnet is learned via EIGRP
 Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
R3’s routing table shows that the 172.16.0.0/16
network is automatically summarized by R1 & R3
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Metric Calculation
EIGRP Composite Metric & the K Values
 EIGRP uses the following values in its composite metric
 -Bandwidth, delay, reliability, and load
 The composite metric used by EIGRP
– formula used has values K1 K5
 K1 & K3 = 1
 all other K values = 0
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Use the sh ip protocols command to verify the K
values
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Metrics
Use the show interfaces command to view metrics
EIGRP Metrics
Bandwidth – EIGRP uses a static bandwidth to calculate metric
Most serial interfaces use a default bandwidth value of 1.544Mbos (T1)
EIGRP Metrics
 Delay is the defined as the measure of time it takes for a
packet to traverse a route
-it is a static value based on link type to which interface
is connected
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Reliability (not a default EIGRP metric)
-A measure of the likelihood that a link will fail
-Measure dynamically & expressed as a fraction of 255
 the higher the fraction the better the reliability
Load (not a default EIGRP metric)
– A number that reflects how much traffic is using a
link
– Number is determined dynamically and is expressed
as a fraction of 255
 The lower the fraction the less the load on the link
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Using the Bandwidth Command
Modifying the interface bandwidth
-Use the bandwidth command
-Example
 Router(config-if)#bandwidth kilobits
Verifying bandwidth
– Use the show interface command
Note – bandwidth command
does not change the
link’s physical
bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
– The EIGRP metric can be determined by examining the
– bandwidth delay
– EIGRP uses the lowest bandwidth (BW)in its metric calculation
– Calculated BW = reference BW / lowest BW(kbps)
– Delay – EIGRP uses the cumulative sum of all outgoing interfaces
– Calculated Delay = the sum of outgoing interface delays
– EIGRP Metric = calculated BW + calculated delay
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
DUAL Concepts
The Diffusing Update Algorithm (DUAL) is used to
prevent looping
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Successor
The best least cost route to a destination found in the
routing table
Feasible distance
The lowest calculated metric along a path to a destination
network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
 Feasible Successor
-This is a loop free backup route to same
destination as successor route
Reported distance (RD)
-The metric that a router reports to a neighbor about its own
cost to that network
Feasibility Condition (FC)
-Met when a neighbor’s RD is less than the local router’s
FD to the same destination network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
 Topology Table: Successor & Feasible Successor
 EIGRP Topology table
– Viewed using the show ip eigrp topology command
 Contents of table include:
– all successor routes
– all feasible successor routes
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Topology Table: No Feasible Successor
A feasible successor may not be present because the feasibility condition may not be met
-In other words, the reported distance of the neighbor is greater than or equal to the
current feasible distance
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Finite Sate Machine (FSM)
– An abstract machine that defines a set of possible states
something can go through, what event causes those
states and what events result form those states
– FSMs are used to describe how a device, computer
program, or routing algorithm will react to a set of input
events
DUAL FSM
– Selects a best loop-free path to a destination
– Selects alternate routes by using information in EIGRP
tables
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Finite State Machines (FSM)
To examine output from EIGRP’s finite state machine
us the debug eigrp fsm command
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The Null0 Summary Route
By default, EIGRP uses the Null0 interface to discard
any packets that match the parent route but do not
match any of the child routes
EIGRP automatically includes a null0 summary route
as a child route whenever both of the following
conditions exist
– One or subnets exists that was learned via EIGRP
– Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The Null0 Summary Route
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Disabling Automatic Summarization
 The auto-summary command permits EIGRP to automatically summarize at
major network boundaries
 The no auto-summary command is used to disable automatic summarization
– This causes all EIGRP neighbors to send updates that will not be
automatically summarized
 this will cause changes to appear in both
 -routing tables
 -topology tables
Manual Summarization
 Manual summarization can include supernets
 Reason: EIGRP is a classless routing protocol & include subnet mask in
update
 Command used to configure manual summarization
– Router(config-if)#ip summary-address eigrp as-number
network-address subnet-mask
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Configuring a summary route in EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Default Routes
“quad zero” static default route
 -Can be used with any currently supported routing protocol
 -Is usually configured on a router that is connected a network outside the
EIGRP domain
 EIGRP & the “Quad zero” static default route
– Requires the use of the redistribute static command to disseminate default
route in EIGRP updates
Fine-Tuning EIGRP
 EIGRP bandwidth utilization
 -By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP
information
 -The command to change the percentage of bandwidth used by EIGRP is
 Router(config-if)#ip bandwidth-percent eigrp as-
number percent
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Configuring Hello Intervals and Hold Times
-Hello intervals and hold times are configurable on a per-interface basis
-The command to configure hello interval is
Router(config-if)#ip hello-interval eigrp as-number seconds
Changing the hello interval also requires changing the hold time to a value
greater than or equal to the hello interval
-The command to configure hold time value is
Router(config-if)#ip hold-time eigrp as-number seconds
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Troubleshooting EIGRP
Normal EIGRP operation is stable, efficient in bandwidth utilization, and
relatively simple to monitor and troubleshoot.
Some possible reasons why EIGRP might not work correctly are as follows:
■ Layer 1 or Layer 2 connectivity issues exist.
■ AS numbers on EIGRP routers are mismatched.
■ The link might be congested or down.
■ The outgoing interface is down.
■ The advertised network interface is down.
■ Auto summarization is enabled on routers with discontiguous subnets. Use the
no auto summary command to disable automatic network summarization
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
One of the most common reasons for a missing neighbor is a failure on the actual
link. Another possible cause of missing neighbors is an expired hold-down
timer. Because hellos are sent every 5 seconds on most networks, the hold
time value in a show ip eigrp neighbors command output should normally be a
value between 10 and 15.
The debug ip eigrp privileged EXEC command helps you analyze the packets
pertaining to EIGRP routing that are sent and received on an interface, as
Example below
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Because the debug ip eigrp command generates a substantial amount of output,
use it only when traffic on the network is light. Table below describes some
fields in the output from the debug ip eigrp command shown in Example on
last slide
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The debug eigrp fsm command is used for EIGRP debugging. This command
displays information on DUAL feasible successor metrics and helps network
engineers analyze the packets that are sent and received on an interface.
Implementing EIGRP for IPv6
The configuration of EIGRP for IPv6 is not overly complicated; there are a few
changes to the process of configuration compared with EIGRP (for IPv4). Since
EIGRP is a highly implemented protocol, it will not be hard to understand that
as the implementation of IPv6 becomes more prevalent, the implementation
of EIGRP for IPv6 will become highly implemented as well. Table 1 shows the
commands required to configure EIGRP for IPv6 on a network device.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Those familiar with EIGRP (for IPv4) will notice that the network commands are
no longer used to indicate which interfaces will be entered into the EIGRP
process; because of this, every interface that needs to be configured with
EIGRP for IPv6 needs its own configuration statements.
EIGRP for IPv6 uses multicast like EIGRP (for IPv4) to communicate between
local EIGRP neighbors; the multicast address used is referred to as the All
EIGRP routers address of FF02::10 (very similar to the previous 224.0.0.10). The
configuration of general EIGRP for IPv6 options which were previously
completed in EIGRP (for IPv4) router configuration mode still are, however,
the command that is used to enter EIGRP for IPv6 router configuration mode
has been changed. Table below shows the commands required to enter EIGRP
for IPv6 router configuration mode.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP for IPv6 Configuration Example
The basic configuration of EIGRP for IPv6 is not overly complex, but it often
helps to see a working configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The example configuration shown in Table below uses the topology that is shown
in Figure before as a basis. In the figure, it shows two routers that need to be
configured with EIGRP for IPv6; the configuration will use default parameters.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
Lessons Learned:
EIGRP configuring and troubleshooting for IPV4
EIGRP configuring For IPV6
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution

Contenu connexe

Tendances

Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guideAbel Saduwa
 
Deploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringDeploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringAPNIC
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)mohibullah70
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesEricsson
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 

Tendances (20)

Mpls vpn toi
Mpls vpn toiMpls vpn toi
Mpls vpn toi
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
Mpls te
Mpls teMpls te
Mpls te
 
Voice over MPLS
Voice over MPLSVoice over MPLS
Voice over MPLS
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
Mpls
MplsMpls
Mpls
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
Deploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringDeploy MPLS Traffic Engineering
Deploy MPLS Traffic Engineering
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Mpls
MplsMpls
Mpls
 
Mpls concepts. Time to Certify
Mpls concepts. Time to CertifyMpls concepts. Time to Certify
Mpls concepts. Time to Certify
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - Services
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 

Similaire à Implementing an EGIRP Based Solution

EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)Netwax Lab
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)CCNAResources
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9Joshua Torres
 
EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1NetworKingStudy
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)CCNAResources
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesJohn Berry
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6Chaing Ravuth
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
Paper id 21201449
Paper id 21201449Paper id 21201449
Paper id 21201449IJRAT
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7Chaing Ravuth
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocolssul6an14
 

Similaire à Implementing an EGIRP Based Solution (20)

Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
 
6978106.ppt
6978106.ppt6978106.ppt
6978106.ppt
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9
 
EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
Eigrp new
Eigrp newEigrp new
Eigrp new
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS Differences
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
EIGRP Project Report
EIGRP Project ReportEIGRP Project Report
EIGRP Project Report
 
Paper id 21201449
Paper id 21201449Paper id 21201449
Paper id 21201449
 
EIGRP Protocol.pptx
EIGRP Protocol.pptxEIGRP Protocol.pptx
EIGRP Protocol.pptx
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocols
 

Plus de Arnold Derrick Kinney (11)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Implementing an EGIRP Based Solution

  • 2. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 3. Lessons Summary: Implementing EIGRP Troubleshooting EIGRP  Implementing EIGRP for IPv6 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 4. Implementing an EIGRP-Based Solution EIGRP 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Roots of EIGRP: IGRP -Developed in 1985 to overcome RIPv1’s limited hop count -Distance vector routing protocol -Metrics used by IGRP  bandwidth (used by default)  Delay (used by default)  reliability  load -Discontinued support starting with IOS 12.2(13)T & 12.2(R1s4)S
  • 5. EIGRP Message Format EIGRP Header  Data link frame header - contains source and destination MAC address  IP packet header - contains source & destination IP address  EIGRP packet header - contains AS number  Type/Length/Field - data portion of EIGRP message 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 6. EIGRP packet header contains – Opcode field – Autonomous System number EIGRP Parameters contains – Weights – Hold time 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 7. Protocol Dependent Modules (PDM) EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk PDMs are responsible for the specific routing task for each network layer protocol Reliable Transport Protocol (RTP) Purpose of RTP – Used by EIGRP to transmit and receive EIGRP packets Characteristics of RTP – Involves both reliable & unreliable delivery of EIGRP packet  Reliable delivery requires acknowledgment from destination  Unreliable delivery does not require an acknowledgement from destination – Packets can be sent  Unicast  Multicast – Using address 224.0.0.10 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 8. Reliable Transport Protocol (RTP) Purpose of RTP – Used by EIGRP to transmit and receive EIGRP packets Characteristics of RTP – Involves both reliable & unreliable delivery of EIGRP packet  Reliable delivery requires acknowledgment from destination  Unreliable delivery does not require an acknowledgement from destination – Packets can be sent  Unicast  Multicast – Using address 224.0.0.10 Implementing an EIGRP-Based Solution
  • 9. EIGRP’s 5 Packet Types Hello packets – Used to discover & form adjacencies with neighbors Query & Reply packets – Used by DUAL for searching for networks – Query packets -Can use – Unicast – Multicast Reply packet – -Use only – unicast 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 10. Purpose of Hello Protocol – To discover & establish adjacencies with neighbor routers Characteristics of hello protocol – Time interval for sending hello packet  Most networks it is every 5 seconds  Multipoint non broadcast multi-access networks – Unicast every 60 seconds -Holdtime  This is the maximum time router should wait before declaring a neighbor down  Default holdtime – 3 times hello interval 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 11. EIGRP Bounded Updates EIGRP only sends update when there is a change in route status Partial update – A partial update includes only the route information that has changed – the whole routing table is NOT sent Bounded update – When a route changes, only those devices that are impacted will be notified of the change EIGRP’s use of partial bounded updates minimizes use of bandwidth 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 12. Diffusing Update Algorithm (DUAL) – Purpose • EIGRP’s primary method for preventing routing loops – Advantage of using DUAL • Provides for fast convergence time by keeping a list of loop- free backup routes Administrative Distance (AD) – Defined as the trustworthiness of the source route  EIGRP default administrative distances – Summary routes = 5 – Internal routes = 90 – Imported routes = 170 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 13. Authentication  EIGRP can – Encrypt routing information – Authenticate routing information 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 14. Network Topology We will use the below topology for our EIGRP configuration. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 15. EIGRP will automatically summarize routes at classful boundaries Implementing an EIGRP-Based Solution
  • 16. Autonomous System (AS) & Process IDs – This is a collection of networks under the control of a single authority (reference RFC 1930) – AS Numbers are assigned by IANA – Entities needing AS numbers  ISP  Internet Backbone prodiers  Institutions connecting to other institutions using AS numbers Implementing an EIGRP-Based Solution Instructional Design-Computer Networking - Bridges Educational Group08/28/13
  • 17. Basic EIGRP Configuration  EIGRP autonomous system number actually functions as a process ID  Process ID represents an instance of the routing protocol running on a router  Example Router(config)#router eigrp autonomous-system 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 18. The router eigrp command  The global command that enables eigrp is  router eigrp autonomous-system  -All routers in the EIGRP routing domain must use the same process ID number (autonomous-system number) 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 19. The Network Command  Functions of the network command – Enables interfaces to transmit & receive EIGRP updates – Includes network or subnet in EIGRP updates  Example – Router(config-router)#network 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 20. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group The network Command with a Wildcard Mask -This option is used when you want to configure EIGRP to advertise specific subnets -Example  Router(config-router)#network network-address [wildcard-mask] Implementing an EIGRP-Based Solution
  • 21. Verifying EIGRP EIGRP routers must establish adjacencies with their neighbors before any updates can be sent or received Command used to view neighbor table and verify that EIGRP has established adjacencies with neighbors is show ip eigrp neighbors 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 22. The show ip protocols command is also used to verify that EIGRP is enabled Implementing an EIGRP-Based Solution
  • 23. Examining the Routing Table  The show ip route command is also used to verify EIGRP  EIGRP routes are denoted in a routing table by the letter “D”  By default , EIGRP automatically summarizes routes at major network boundary 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 24. Introducing the Null0 Summary Route – Null0 is not a physical interface – In the routing table summary routes are sourced from Null0  Reason: routes are used for advertisement purposes – EIGRP will automatically include a null0 summary route as child route when 2 conditions are met  At least one subnet is learned via EIGRP  Automatic summarization is enabled 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 25. R3’s routing table shows that the 172.16.0.0/16 network is automatically summarized by R1 & R3 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 26. EIGRP Metric Calculation EIGRP Composite Metric & the K Values  EIGRP uses the following values in its composite metric  -Bandwidth, delay, reliability, and load  The composite metric used by EIGRP – formula used has values K1 K5  K1 & K3 = 1  all other K values = 0 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 27. Use the sh ip protocols command to verify the K values 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 28. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution EIGRP Metrics Use the show interfaces command to view metrics EIGRP Metrics Bandwidth – EIGRP uses a static bandwidth to calculate metric Most serial interfaces use a default bandwidth value of 1.544Mbos (T1)
  • 29. EIGRP Metrics  Delay is the defined as the measure of time it takes for a packet to traverse a route -it is a static value based on link type to which interface is connected 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 30. Reliability (not a default EIGRP metric) -A measure of the likelihood that a link will fail -Measure dynamically & expressed as a fraction of 255  the higher the fraction the better the reliability Load (not a default EIGRP metric) – A number that reflects how much traffic is using a link – Number is determined dynamically and is expressed as a fraction of 255  The lower the fraction the less the load on the link 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 31. Using the Bandwidth Command Modifying the interface bandwidth -Use the bandwidth command -Example  Router(config-if)#bandwidth kilobits Verifying bandwidth – Use the show interface command Note – bandwidth command does not change the link’s physical bandwidth 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 32. – The EIGRP metric can be determined by examining the – bandwidth delay – EIGRP uses the lowest bandwidth (BW)in its metric calculation – Calculated BW = reference BW / lowest BW(kbps) – Delay – EIGRP uses the cumulative sum of all outgoing interfaces – Calculated Delay = the sum of outgoing interface delays – EIGRP Metric = calculated BW + calculated delay 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 33. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 34. DUAL Concepts The Diffusing Update Algorithm (DUAL) is used to prevent looping 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 35. Successor The best least cost route to a destination found in the routing table Feasible distance The lowest calculated metric along a path to a destination network 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 36.  Feasible Successor -This is a loop free backup route to same destination as successor route Reported distance (RD) -The metric that a router reports to a neighbor about its own cost to that network Feasibility Condition (FC) -Met when a neighbor’s RD is less than the local router’s FD to the same destination network 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 37.  Topology Table: Successor & Feasible Successor  EIGRP Topology table – Viewed using the show ip eigrp topology command  Contents of table include: – all successor routes – all feasible successor routes 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 38. Topology Table: No Feasible Successor A feasible successor may not be present because the feasibility condition may not be met -In other words, the reported distance of the neighbor is greater than or equal to the current feasible distance 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 39. Finite Sate Machine (FSM) – An abstract machine that defines a set of possible states something can go through, what event causes those states and what events result form those states – FSMs are used to describe how a device, computer program, or routing algorithm will react to a set of input events DUAL FSM – Selects a best loop-free path to a destination – Selects alternate routes by using information in EIGRP tables 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 40. Finite State Machines (FSM) To examine output from EIGRP’s finite state machine us the debug eigrp fsm command 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 41. The Null0 Summary Route By default, EIGRP uses the Null0 interface to discard any packets that match the parent route but do not match any of the child routes EIGRP automatically includes a null0 summary route as a child route whenever both of the following conditions exist – One or subnets exists that was learned via EIGRP – Automatic summarization is enabled 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 42. The Null0 Summary Route 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 43. Disabling Automatic Summarization  The auto-summary command permits EIGRP to automatically summarize at major network boundaries  The no auto-summary command is used to disable automatic summarization – This causes all EIGRP neighbors to send updates that will not be automatically summarized  this will cause changes to appear in both  -routing tables  -topology tables Manual Summarization  Manual summarization can include supernets  Reason: EIGRP is a classless routing protocol & include subnet mask in update  Command used to configure manual summarization – Router(config-if)#ip summary-address eigrp as-number network-address subnet-mask 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 44. Configuring a summary route in EIGRP 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 45. EIGRP Default Routes “quad zero” static default route  -Can be used with any currently supported routing protocol  -Is usually configured on a router that is connected a network outside the EIGRP domain  EIGRP & the “Quad zero” static default route – Requires the use of the redistribute static command to disseminate default route in EIGRP updates Fine-Tuning EIGRP  EIGRP bandwidth utilization  -By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP information  -The command to change the percentage of bandwidth used by EIGRP is  Router(config-if)#ip bandwidth-percent eigrp as- number percent 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 46. Configuring Hello Intervals and Hold Times -Hello intervals and hold times are configurable on a per-interface basis -The command to configure hello interval is Router(config-if)#ip hello-interval eigrp as-number seconds Changing the hello interval also requires changing the hold time to a value greater than or equal to the hello interval -The command to configure hold time value is Router(config-if)#ip hold-time eigrp as-number seconds 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 47. Troubleshooting EIGRP Normal EIGRP operation is stable, efficient in bandwidth utilization, and relatively simple to monitor and troubleshoot. Some possible reasons why EIGRP might not work correctly are as follows: ■ Layer 1 or Layer 2 connectivity issues exist. ■ AS numbers on EIGRP routers are mismatched. ■ The link might be congested or down. ■ The outgoing interface is down. ■ The advertised network interface is down. ■ Auto summarization is enabled on routers with discontiguous subnets. Use the no auto summary command to disable automatic network summarization 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 48. One of the most common reasons for a missing neighbor is a failure on the actual link. Another possible cause of missing neighbors is an expired hold-down timer. Because hellos are sent every 5 seconds on most networks, the hold time value in a show ip eigrp neighbors command output should normally be a value between 10 and 15. The debug ip eigrp privileged EXEC command helps you analyze the packets pertaining to EIGRP routing that are sent and received on an interface, as Example below 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 49. Because the debug ip eigrp command generates a substantial amount of output, use it only when traffic on the network is light. Table below describes some fields in the output from the debug ip eigrp command shown in Example on last slide 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution The debug eigrp fsm command is used for EIGRP debugging. This command displays information on DUAL feasible successor metrics and helps network engineers analyze the packets that are sent and received on an interface.
  • 50. Implementing EIGRP for IPv6 The configuration of EIGRP for IPv6 is not overly complicated; there are a few changes to the process of configuration compared with EIGRP (for IPv4). Since EIGRP is a highly implemented protocol, it will not be hard to understand that as the implementation of IPv6 becomes more prevalent, the implementation of EIGRP for IPv6 will become highly implemented as well. Table 1 shows the commands required to configure EIGRP for IPv6 on a network device. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 51. Those familiar with EIGRP (for IPv4) will notice that the network commands are no longer used to indicate which interfaces will be entered into the EIGRP process; because of this, every interface that needs to be configured with EIGRP for IPv6 needs its own configuration statements. EIGRP for IPv6 uses multicast like EIGRP (for IPv4) to communicate between local EIGRP neighbors; the multicast address used is referred to as the All EIGRP routers address of FF02::10 (very similar to the previous 224.0.0.10). The configuration of general EIGRP for IPv6 options which were previously completed in EIGRP (for IPv4) router configuration mode still are, however, the command that is used to enter EIGRP for IPv6 router configuration mode has been changed. Table below shows the commands required to enter EIGRP for IPv6 router configuration mode. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 52. EIGRP for IPv6 Configuration Example The basic configuration of EIGRP for IPv6 is not overly complex, but it often helps to see a working configuration. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 53. The example configuration shown in Table below uses the topology that is shown in Figure before as a basis. In the figure, it shows two routers that need to be configured with EIGRP for IPv6; the configuration will use default parameters. 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution
  • 54. Lessons Learned: EIGRP configuring and troubleshooting for IPV4 EIGRP configuring For IPV6 08/28/13 Instructional Design-Computer Networking - Bridges Educational Group Implementing an EIGRP-Based Solution