The document discusses implementing an EIGRP-based solution for computer networking. It covers topics such as EIGRP configuration, metrics, neighbor discovery, route summarization, and troubleshooting. Specific configuration commands are provided for enabling EIGRP routing, verifying neighbor relationships, and modifying interface metrics. The routing protocol's use of DUAL, finite state machines, and automatic summarization are also explained.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
IGRP and EIGRP.
Comparison between traditional Distance Vector Routing Protocols and Enhanced Distance Vector Routing Protocols.
EIGRP Message Format and Packet Header.
EIGRP Parameters (K1,K2, K3, K4, K5, Reserved, and Hold Time).
Protocol Dependent Modules (PDM).
Reliable Transport Protocol (RTP).
EIGRP Packet Types (Hello Packets, Update packets, Acknowledgment packets, Query and Reply packets).
EIGRP Bounded Updates.
Introduction to DUAL Algorithm.
EIGRP Administrative Distance.
The router eigrp Command, the network command with a Wildcard Mask, Verifying EIGRP and using the Bandwidth command
EIGRP Metric Calculation, EIGRP uses Bandwidth, delay, reliability, and load in its metric.
DUAL Concepts, successor, Feasible distance (FD), Feasible successor (FS), Reported distance (RD)/ AD and Feasibility Condition (FC).
DUAL Finite State Machine, Null0 Summary Route, Disabling Automatic Summarization, Manual Summarization and EIGRP default route
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...QADay
Lviv Direction QADay 2024 (Professional Development)
КАТЕРИНА АБЗЯТОВА
«Ефективне планування тестування ключові аспекти та практичні поради»
https://linktr.ee/qadayua
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
4. Implementing an EIGRP-Based Solution
EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Roots of EIGRP: IGRP
-Developed in 1985 to overcome
RIPv1’s limited hop count
-Distance vector routing protocol
-Metrics used by IGRP
bandwidth (used by default)
Delay (used by default)
reliability
load
-Discontinued support starting
with IOS 12.2(13)T & 12.2(R1s4)S
5. EIGRP Message Format
EIGRP Header
Data link frame header - contains source and
destination MAC address
IP packet header - contains source & destination IP
address
EIGRP packet header - contains AS number
Type/Length/Field - data portion of EIGRP message
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
6. EIGRP packet header contains
– Opcode field
– Autonomous System number
EIGRP Parameters contains
– Weights
– Hold time
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
7. Protocol Dependent Modules (PDM)
EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk
PDMs are responsible for the specific routing task for each network layer
protocol
Reliable Transport Protocol (RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of EIGRP packet
Reliable delivery requires acknowledgment from destination
Unreliable delivery does not require an acknowledgement from
destination
– Packets can be sent
Unicast
Multicast
– Using address 224.0.0.10
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
8. Reliable Transport Protocol
(RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP
packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of
EIGRP packet
Reliable delivery requires acknowledgment
from destination
Unreliable delivery does not require an
acknowledgement from destination
– Packets can be sent
Unicast
Multicast
– Using address 224.0.0.10
Implementing an EIGRP-Based Solution
9. EIGRP’s 5 Packet Types
Hello packets
– Used to discover & form adjacencies with neighbors
Query & Reply packets
– Used by DUAL for searching for networks
– Query packets
-Can use
– Unicast
– Multicast
Reply packet
– -Use only
– unicast
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
10. Purpose of Hello Protocol
– To discover & establish adjacencies with neighbor routers
Characteristics of hello protocol
– Time interval for sending hello packet
Most networks it is every 5 seconds
Multipoint non broadcast multi-access networks
– Unicast every 60 seconds
-Holdtime
This is the maximum time router should wait before declaring a neighbor
down
Default holdtime
– 3 times hello interval
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
11. EIGRP Bounded Updates
EIGRP only sends update when there is a change in
route status
Partial update
– A partial update includes only the route information
that has changed – the whole routing table is NOT sent
Bounded update
– When a route changes, only those devices that are
impacted will be notified of the change
EIGRP’s use of partial bounded updates minimizes
use of bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
12. Diffusing Update Algorithm (DUAL)
– Purpose
• EIGRP’s primary method for preventing routing loops
– Advantage of using DUAL
• Provides for fast convergence time by keeping a list of loop-
free backup routes
Administrative Distance (AD)
– Defined as the trustworthiness of the source route
EIGRP default administrative distances
– Summary routes = 5
– Internal routes = 90
– Imported routes = 170
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
13. Authentication
EIGRP can
– Encrypt routing information
– Authenticate routing information
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
14. Network Topology
We will use the below topology for our EIGRP
configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
16. Autonomous System (AS) & Process IDs
– This is a collection of networks under the control of a single authority
(reference RFC 1930)
– AS Numbers are assigned by IANA
– Entities needing AS numbers
ISP
Internet Backbone prodiers
Institutions connecting to other institutions using AS numbers
Implementing an EIGRP-Based Solution
Instructional Design-Computer Networking -
Bridges Educational Group08/28/13
17. Basic EIGRP Configuration
EIGRP autonomous system number actually functions as a process ID
Process ID represents an instance of the routing protocol running on a router
Example
Router(config)#router
eigrp autonomous-system
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
18. The router eigrp command
The global command that enables eigrp is
router eigrp autonomous-system
-All routers in the EIGRP routing domain must use the same process ID
number (autonomous-system number)
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
19. The Network Command
Functions of the network command
– Enables interfaces to transmit & receive EIGRP updates
– Includes network or subnet in EIGRP updates
Example
– Router(config-router)#network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
20. 08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
The network Command with a Wildcard Mask
-This option is used when you want to configure EIGRP
to advertise specific subnets
-Example
Router(config-router)#network network-address
[wildcard-mask]
Implementing an EIGRP-Based Solution
21. Verifying EIGRP
EIGRP routers must establish adjacencies with their neighbors before any
updates can be sent or received
Command used to view neighbor table and verify that EIGRP has established
adjacencies with neighbors is
show ip eigrp neighbors
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
22. The show ip protocols
command is also used to
verify that EIGRP is
enabled
Implementing an
EIGRP-Based Solution
23. Examining the Routing Table
The show ip route command is also used to verify EIGRP
EIGRP routes are denoted in a routing table by the letter “D”
By default , EIGRP automatically summarizes routes at major network
boundary
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
24. Introducing the Null0 Summary Route
– Null0 is not a physical interface
– In the routing table summary routes are sourced from Null0
Reason: routes are used for advertisement purposes
– EIGRP will automatically include a null0 summary route as child route
when 2 conditions are met
At least one subnet is learned via EIGRP
Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
25. R3’s routing table shows that the 172.16.0.0/16
network is automatically summarized by R1 & R3
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
26. EIGRP Metric Calculation
EIGRP Composite Metric & the K Values
EIGRP uses the following values in its composite metric
-Bandwidth, delay, reliability, and load
The composite metric used by EIGRP
– formula used has values K1 K5
K1 & K3 = 1
all other K values = 0
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
27. Use the sh ip protocols command to verify the K
values
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
28. 08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Metrics
Use the show interfaces command to view metrics
EIGRP Metrics
Bandwidth – EIGRP uses a static bandwidth to calculate metric
Most serial interfaces use a default bandwidth value of 1.544Mbos (T1)
29. EIGRP Metrics
Delay is the defined as the measure of time it takes for a
packet to traverse a route
-it is a static value based on link type to which interface
is connected
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
30. Reliability (not a default EIGRP metric)
-A measure of the likelihood that a link will fail
-Measure dynamically & expressed as a fraction of 255
the higher the fraction the better the reliability
Load (not a default EIGRP metric)
– A number that reflects how much traffic is using a
link
– Number is determined dynamically and is expressed
as a fraction of 255
The lower the fraction the less the load on the link
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
31. Using the Bandwidth Command
Modifying the interface bandwidth
-Use the bandwidth command
-Example
Router(config-if)#bandwidth kilobits
Verifying bandwidth
– Use the show interface command
Note – bandwidth command
does not change the
link’s physical
bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
32. – The EIGRP metric can be determined by examining the
– bandwidth delay
– EIGRP uses the lowest bandwidth (BW)in its metric calculation
– Calculated BW = reference BW / lowest BW(kbps)
– Delay – EIGRP uses the cumulative sum of all outgoing interfaces
– Calculated Delay = the sum of outgoing interface delays
– EIGRP Metric = calculated BW + calculated delay
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
34. DUAL Concepts
The Diffusing Update Algorithm (DUAL) is used to
prevent looping
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
35. Successor
The best least cost route to a destination found in the
routing table
Feasible distance
The lowest calculated metric along a path to a destination
network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
36. Feasible Successor
-This is a loop free backup route to same
destination as successor route
Reported distance (RD)
-The metric that a router reports to a neighbor about its own
cost to that network
Feasibility Condition (FC)
-Met when a neighbor’s RD is less than the local router’s
FD to the same destination network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
37. Topology Table: Successor & Feasible Successor
EIGRP Topology table
– Viewed using the show ip eigrp topology command
Contents of table include:
– all successor routes
– all feasible successor routes
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
38. Topology Table: No Feasible Successor
A feasible successor may not be present because the feasibility condition may not be met
-In other words, the reported distance of the neighbor is greater than or equal to the
current feasible distance
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
39. Finite Sate Machine (FSM)
– An abstract machine that defines a set of possible states
something can go through, what event causes those
states and what events result form those states
– FSMs are used to describe how a device, computer
program, or routing algorithm will react to a set of input
events
DUAL FSM
– Selects a best loop-free path to a destination
– Selects alternate routes by using information in EIGRP
tables
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
40. Finite State Machines (FSM)
To examine output from EIGRP’s finite state machine
us the debug eigrp fsm command
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
41. The Null0 Summary Route
By default, EIGRP uses the Null0 interface to discard
any packets that match the parent route but do not
match any of the child routes
EIGRP automatically includes a null0 summary route
as a child route whenever both of the following
conditions exist
– One or subnets exists that was learned via EIGRP
– Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
42. The Null0 Summary Route
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
43. Disabling Automatic Summarization
The auto-summary command permits EIGRP to automatically summarize at
major network boundaries
The no auto-summary command is used to disable automatic summarization
– This causes all EIGRP neighbors to send updates that will not be
automatically summarized
this will cause changes to appear in both
-routing tables
-topology tables
Manual Summarization
Manual summarization can include supernets
Reason: EIGRP is a classless routing protocol & include subnet mask in
update
Command used to configure manual summarization
– Router(config-if)#ip summary-address eigrp as-number
network-address subnet-mask
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
44. Configuring a summary route in EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
45. EIGRP Default Routes
“quad zero” static default route
-Can be used with any currently supported routing protocol
-Is usually configured on a router that is connected a network outside the
EIGRP domain
EIGRP & the “Quad zero” static default route
– Requires the use of the redistribute static command to disseminate default
route in EIGRP updates
Fine-Tuning EIGRP
EIGRP bandwidth utilization
-By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP
information
-The command to change the percentage of bandwidth used by EIGRP is
Router(config-if)#ip bandwidth-percent eigrp as-
number percent
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
46. Configuring Hello Intervals and Hold Times
-Hello intervals and hold times are configurable on a per-interface basis
-The command to configure hello interval is
Router(config-if)#ip hello-interval eigrp as-number seconds
Changing the hello interval also requires changing the hold time to a value
greater than or equal to the hello interval
-The command to configure hold time value is
Router(config-if)#ip hold-time eigrp as-number seconds
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
47. Troubleshooting EIGRP
Normal EIGRP operation is stable, efficient in bandwidth utilization, and
relatively simple to monitor and troubleshoot.
Some possible reasons why EIGRP might not work correctly are as follows:
■ Layer 1 or Layer 2 connectivity issues exist.
■ AS numbers on EIGRP routers are mismatched.
■ The link might be congested or down.
■ The outgoing interface is down.
■ The advertised network interface is down.
■ Auto summarization is enabled on routers with discontiguous subnets. Use the
no auto summary command to disable automatic network summarization
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
48. One of the most common reasons for a missing neighbor is a failure on the actual
link. Another possible cause of missing neighbors is an expired hold-down
timer. Because hellos are sent every 5 seconds on most networks, the hold
time value in a show ip eigrp neighbors command output should normally be a
value between 10 and 15.
The debug ip eigrp privileged EXEC command helps you analyze the packets
pertaining to EIGRP routing that are sent and received on an interface, as
Example below
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
49. Because the debug ip eigrp command generates a substantial amount of output,
use it only when traffic on the network is light. Table below describes some
fields in the output from the debug ip eigrp command shown in Example on
last slide
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The debug eigrp fsm command is used for EIGRP debugging. This command
displays information on DUAL feasible successor metrics and helps network
engineers analyze the packets that are sent and received on an interface.
50. Implementing EIGRP for IPv6
The configuration of EIGRP for IPv6 is not overly complicated; there are a few
changes to the process of configuration compared with EIGRP (for IPv4). Since
EIGRP is a highly implemented protocol, it will not be hard to understand that
as the implementation of IPv6 becomes more prevalent, the implementation
of EIGRP for IPv6 will become highly implemented as well. Table 1 shows the
commands required to configure EIGRP for IPv6 on a network device.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
51. Those familiar with EIGRP (for IPv4) will notice that the network commands are
no longer used to indicate which interfaces will be entered into the EIGRP
process; because of this, every interface that needs to be configured with
EIGRP for IPv6 needs its own configuration statements.
EIGRP for IPv6 uses multicast like EIGRP (for IPv4) to communicate between
local EIGRP neighbors; the multicast address used is referred to as the All
EIGRP routers address of FF02::10 (very similar to the previous 224.0.0.10). The
configuration of general EIGRP for IPv6 options which were previously
completed in EIGRP (for IPv4) router configuration mode still are, however,
the command that is used to enter EIGRP for IPv6 router configuration mode
has been changed. Table below shows the commands required to enter EIGRP
for IPv6 router configuration mode.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
52. EIGRP for IPv6 Configuration Example
The basic configuration of EIGRP for IPv6 is not overly complex, but it often
helps to see a working configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
53. The example configuration shown in Table below uses the topology that is shown
in Figure before as a basis. In the figure, it shows two routers that need to be
configured with EIGRP for IPv6; the configuration will use default parameters.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
54. Lessons Learned:
EIGRP configuring and troubleshooting for IPV4
EIGRP configuring For IPV6
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution