SlideShare uma empresa Scribd logo
1 de 42
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 8: EIGRP
Advanced
Configurations and
Troubleshooting
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8
8.1 Advanced EIGRP Configurations
8.2 Troubleshooting EIGRP
8.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Objectives
After completing this chapter, you will be able to:
 Configure EIGRP automatic summarization.
 Configure EIGRP manual summarization.
 Configure a router to propagate a default route in an EIGRP
network.
 Modify EIGRP interface settings to improve network performance.
 Configure EIGRP authentication to ensure secure routing updates.
 Explain the process and tools used to troubleshoot an EIGRP
network.
 Troubleshoot neighbor adjacency issues in an EIGRP network.
 Troubleshoot missing route entries in an EIGRP routing table.
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
Network Technology
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
EIGRP Automatic Summarization
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
Configuring EIGRP Automatic Summarization
 EIGRP for IPv4 automatic summarization is disabled, by default,
beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to
this, automatic summarization was enabled, by default.
 To enable automatic summarization for EIGRP, use the auto-
summary command in router configuration mode.
R1(config)# router eigrp autonomous-system
R1(config-router)# auto-summary
 Use the no form of this command to disable autosummarization.
R1(config)# router eigrp autonomous-system
R1(config-router)# no auto-summary
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: show ip
protocols
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: Topology
Table
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: Routing
Table
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Summary Route
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Summary Route (cont.)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Manual Summary Routes
 EIGRP can be configured to summarize routes, whether or not
autosummarization is enabled.
 Because EIGRP is a classless routing protocol and includes the
subnet mask in the routing updates, manual summarization can
include supernet routes.
 A supernet is an aggregation of multiple major classful network
addresses.
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Configuring EIGRP Manual Summary Routes
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Verifying Manual Summary Routes
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
EIGRP for IPv6: Manual Summary Routes
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Propagating a Default Static Route
 Using a static route to 0.0.0.0/0 as a default route is not routing
protocol-dependent.
 The quad zero static default route can be used with any currently
supported routing protocols.
 The static default route is usually configured on the router that has
a connection to a network outside the EIGRP routing domain, for
example, to an ISP.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Verifying the Propagated Default Route
The entry for the EIGRP-learned default route is identified by the
following:
 D – This route was learned from an EIGRP routing update.
 * – The route is a candidate for a default route.
 EX – The route is an external EIGRP route; in this case, a static
route outside of the EIGRP routing domain.
 170 – This is the administrative distance of an external EIGRP
route.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
EIGRP for IPv6- Default Route
Note: Some IOSs may require that the redistribute static command
include the EIGRP metric parameters and maximum transmission
unit (MTU) before the static route can be redistributed. These
parameters may vary, but an example for this scenario would be:
R2(config)# ipv6 router eigrp 2
R2(config-router)# redistribute static metric 64 2000
255 1 1500
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
EIGRP Bandwidth Utilization
EIGRP Bandwidth for IPv4
 By default, EIGRP uses only up to 50% of an interface’s bandwidth
for EIGRP information, which prevents the EIGRP process from
overutilizing a link and not allowing enough bandwidth for the
routing of normal traffic.
 The ip bandwidth-percent eigrp command can be used to
configure the percentage of bandwidth that may be used by EIGRP
on an interface.
Router(config-if)# ip bandwidth-percent eigrp as-number
percent
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
EIGRP Bandwidth Utilization (cont.)
EIGRP Bandwidth for IPv6
To configure the percentage of bandwidth that may be used by
EIGRP for IPv6 on an interface, use the ipv6 bandwidth-percent
eigrp command in interface configuration mode. To restore the
default value, use the no form of this command.
Router(config-if)# ipv6 bandwidth-percent eigrp as-
number percent
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Hello and Hold Timers
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Load Balancing IPv4
 Equal-cost load balancing is the ability of a router to distribute
outbound traffic using all interfaces that have the same metric from
the destination address.
 The Cisco IOS will, by default, allow load balancing using up to
four equal-cost paths; however, this can be modified. Using the
maximum-paths router configuration mode command, up to 32
equal-cost routes can be kept in the routing table.
Router(config-router)# maximum-paths value
 If the value is set to 1, load balancing is disabled.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Load Balancing IPv6
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Routing Protocol Authentication Overview
 Network administrators must be aware that routers are at risk from
attack just as much as end-user devices. Anyone with a packet
sniffer, such as Wireshark, can read information propagating
between routers.
 A method to protect routing information on the network is to
authenticate routing protocol packets using the Message Digest 5
(MD5) algorithm.
 Routing protocols, such as RIPv2, EIGRP, OSPF, IS-IS, and BGP
all support various forms of MD5 authentication.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Configuring EIGRP with MD5 Authentication
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
EIGRP Authentication Example
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
EIGRP Authentication Example (cont.)
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Verifying Authentication
 Adjacencies are only formed when both connecting devices have
authentication configured.
 To verify that the correct EIGRP adjacencies were formed after
being configured for authentication, use the show ip eigrp
neighbors command on each router.
 To verify the neighbor adjacencies EIGRP for IPv6, use the show
ipv6 eigrp neighbors command.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
8.2 Troubleshooting EIGRP
Scaling Networks
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting EIGRP
Basic EIGRP Troubleshooting Commands
EIGRP for IPv4
 Router# show ip eigrp neighbors
 Router# show ip route
 Router# show ip protocols
EIGRP for IPv6
 Router# show ipv6 eigrp neighbors
 Router# show ipv6 route
 Router# show ipv6 protocols
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting EIGRP
Components
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
Layer 3 Connectivity
A prerequisite for a neighbor adjacency to form between
two directly connected routers is Layer 3 connectivity.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
EIGRP Parameters
When troubleshooting an EIGRP network, one of the first things to
verify is that all routers that are participating in the EIGRP network
are configured with the same autonomous system number.
EIGRP for IPv4
 Router# show ip protocols
EIGRP for IPv6
 Router# show ipv6 protocols
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
EIGRP Interfaces
 In addition to verifying the autonomous system number, it is
necessary to verify that all interfaces are participating in the EIGRP
network.
 The network command that is configured under the EIGRP routing
process indicates which router interfaces participate in EIGRP.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Passive Interface
 One reason that route tables may not reflect the correct routes is
due to the passive-interface command.
 The show ip protocols can be used to check if an interface is
configured as passive.
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Passive Interface
 With EIGRP running on a network, the passive-interface
command stops both outgoing and incoming routing updates. For
this reason, routers do not become neighbors.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement (cont.)
10.10.10.0/24 R1 Updates
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement (cont.)
Add Missing Network Statement
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting EIGRP Routing Table Issues
Autosummarization
 Another issue that may create problems for the network
administrator is EIGRP autosummarization.
 EIGRP for IPv4 can be configured to automatically summarize
routes at classful boundaries. If there are discontiguous networks,
autosummarization causes inconsistent routing.
 Classful networks do not exist in IPv6; therefore, EIGRP for IPv6
does not support autosummarization. All summarization must be
accomplished using EIGRP manual summary routes.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary
 EIGRP is one of the routing protocols commonly used in large
enterprise networks.
 Modifying EIGRP features and troubleshooting problems is one of
the most essential skills for a network engineer involved in the
implementation and maintenance of large, routed enterprise
networks that use EIGRP.
 Summarization decreases the number of entries in routing updates
and lowers the number of entries in local routing tables. It also
reduces bandwidth utilization for routing updates and results in faster
routing table lookups.
 EIGRP for IPv4 autosummarization is disabled, by default, beginning
with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this,
autosummarization was enabled, by default.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPVuz Dở Hơi
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control liststeknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfVuz Dở Hơi
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 

Mais procurados (20)

CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control lists
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 

Destaque

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4Vuz Dở Hơi
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregationJosue Wuezo
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancyJosue Wuezo
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 

Destaque (19)

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 

Semelhante a CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting

CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7Chaing Ravuth
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6Chaing Ravuth
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9Joshua Torres
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6Waqas Ahmed Nawaz
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5Irsandi Hasan
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3Chaing Ravuth
 
Week6 2017(1)
Week6 2017(1)Week6 2017(1)
Week6 2017(1)trayyoo
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesJohn Berry
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2Andy Juan Sarango Veliz
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 

Semelhante a CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting (20)

CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
Eigrp
EigrpEigrp
Eigrp
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
Week6 2017(1)
Week6 2017(1)Week6 2017(1)
Week6 2017(1)
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS Differences
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 

Mais de Vuz Dở Hơi

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyVuz Dở Hơi
 

Mais de Vuz Dở Hơi (20)

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 

Último

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Último (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8 8.1 Advanced EIGRP Configurations 8.2 Troubleshooting EIGRP 8.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Objectives After completing this chapter, you will be able to:  Configure EIGRP automatic summarization.  Configure EIGRP manual summarization.  Configure a router to propagate a default route in an EIGRP network.  Modify EIGRP interface settings to improve network performance.  Configure EIGRP authentication to ensure secure routing updates.  Explain the process and tools used to troubleshoot an EIGRP network.  Troubleshoot neighbor adjacency issues in an EIGRP network.  Troubleshoot missing route entries in an EIGRP routing table.
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization Network Technology
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization EIGRP Automatic Summarization
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization Configuring EIGRP Automatic Summarization  EIGRP for IPv4 automatic summarization is disabled, by default, beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this, automatic summarization was enabled, by default.  To enable automatic summarization for EIGRP, use the auto- summary command in router configuration mode. R1(config)# router eigrp autonomous-system R1(config-router)# auto-summary  Use the no form of this command to disable autosummarization. R1(config)# router eigrp autonomous-system R1(config-router)# no auto-summary
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: show ip protocols
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: Topology Table
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: Routing Table
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Summary Route
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Summary Route (cont.)
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Manual Summary Routes  EIGRP can be configured to summarize routes, whether or not autosummarization is enabled.  Because EIGRP is a classless routing protocol and includes the subnet mask in the routing updates, manual summarization can include supernet routes.  A supernet is an aggregation of multiple major classful network addresses.
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Configuring EIGRP Manual Summary Routes
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Verifying Manual Summary Routes
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization EIGRP for IPv6: Manual Summary Routes
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Propagating a Default Static Route  Using a static route to 0.0.0.0/0 as a default route is not routing protocol-dependent.  The quad zero static default route can be used with any currently supported routing protocols.  The static default route is usually configured on the router that has a connection to a network outside the EIGRP routing domain, for example, to an ISP.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Verifying the Propagated Default Route The entry for the EIGRP-learned default route is identified by the following:  D – This route was learned from an EIGRP routing update.  * – The route is a candidate for a default route.  EX – The route is an external EIGRP route; in this case, a static route outside of the EIGRP routing domain.  170 – This is the administrative distance of an external EIGRP route.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation EIGRP for IPv6- Default Route Note: Some IOSs may require that the redistribute static command include the EIGRP metric parameters and maximum transmission unit (MTU) before the static route can be redistributed. These parameters may vary, but an example for this scenario would be: R2(config)# ipv6 router eigrp 2 R2(config-router)# redistribute static metric 64 2000 255 1 1500
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces EIGRP Bandwidth Utilization EIGRP Bandwidth for IPv4  By default, EIGRP uses only up to 50% of an interface’s bandwidth for EIGRP information, which prevents the EIGRP process from overutilizing a link and not allowing enough bandwidth for the routing of normal traffic.  The ip bandwidth-percent eigrp command can be used to configure the percentage of bandwidth that may be used by EIGRP on an interface. Router(config-if)# ip bandwidth-percent eigrp as-number percent
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces EIGRP Bandwidth Utilization (cont.) EIGRP Bandwidth for IPv6 To configure the percentage of bandwidth that may be used by EIGRP for IPv6 on an interface, use the ipv6 bandwidth-percent eigrp command in interface configuration mode. To restore the default value, use the no form of this command. Router(config-if)# ipv6 bandwidth-percent eigrp as- number percent
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Hello and Hold Timers
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Load Balancing IPv4  Equal-cost load balancing is the ability of a router to distribute outbound traffic using all interfaces that have the same metric from the destination address.  The Cisco IOS will, by default, allow load balancing using up to four equal-cost paths; however, this can be modified. Using the maximum-paths router configuration mode command, up to 32 equal-cost routes can be kept in the routing table. Router(config-router)# maximum-paths value  If the value is set to 1, load balancing is disabled.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Load Balancing IPv6
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Routing Protocol Authentication Overview  Network administrators must be aware that routers are at risk from attack just as much as end-user devices. Anyone with a packet sniffer, such as Wireshark, can read information propagating between routers.  A method to protect routing information on the network is to authenticate routing protocol packets using the Message Digest 5 (MD5) algorithm.  Routing protocols, such as RIPv2, EIGRP, OSPF, IS-IS, and BGP all support various forms of MD5 authentication.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Configuring EIGRP with MD5 Authentication
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP EIGRP Authentication Example
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP EIGRP Authentication Example (cont.)
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Verifying Authentication  Adjacencies are only formed when both connecting devices have authentication configured.  To verify that the correct EIGRP adjacencies were formed after being configured for authentication, use the show ip eigrp neighbors command on each router.  To verify the neighbor adjacencies EIGRP for IPv6, use the show ipv6 eigrp neighbors command.
  • 29. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 8.2 Troubleshooting EIGRP Scaling Networks
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting EIGRP Basic EIGRP Troubleshooting Commands EIGRP for IPv4  Router# show ip eigrp neighbors  Router# show ip route  Router# show ip protocols EIGRP for IPv6  Router# show ipv6 eigrp neighbors  Router# show ipv6 route  Router# show ipv6 protocols
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting EIGRP Components
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues Layer 3 Connectivity A prerequisite for a neighbor adjacency to form between two directly connected routers is Layer 3 connectivity.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues EIGRP Parameters When troubleshooting an EIGRP network, one of the first things to verify is that all routers that are participating in the EIGRP network are configured with the same autonomous system number. EIGRP for IPv4  Router# show ip protocols EIGRP for IPv6  Router# show ipv6 protocols
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues EIGRP Interfaces  In addition to verifying the autonomous system number, it is necessary to verify that all interfaces are participating in the EIGRP network.  The network command that is configured under the EIGRP routing process indicates which router interfaces participate in EIGRP.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Passive Interface  One reason that route tables may not reflect the correct routes is due to the passive-interface command.  The show ip protocols can be used to check if an interface is configured as passive.
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Passive Interface  With EIGRP running on a network, the passive-interface command stops both outgoing and incoming routing updates. For this reason, routers do not become neighbors.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement (cont.) 10.10.10.0/24 R1 Updates
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement (cont.) Add Missing Network Statement
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting EIGRP Routing Table Issues Autosummarization  Another issue that may create problems for the network administrator is EIGRP autosummarization.  EIGRP for IPv4 can be configured to automatically summarize routes at classful boundaries. If there are discontiguous networks, autosummarization causes inconsistent routing.  Classful networks do not exist in IPv6; therefore, EIGRP for IPv6 does not support autosummarization. All summarization must be accomplished using EIGRP manual summary routes.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary  EIGRP is one of the routing protocols commonly used in large enterprise networks.  Modifying EIGRP features and troubleshooting problems is one of the most essential skills for a network engineer involved in the implementation and maintenance of large, routed enterprise networks that use EIGRP.  Summarization decreases the number of entries in routing updates and lowers the number of entries in local routing tables. It also reduces bandwidth utilization for routing updates and results in faster routing table lookups.  EIGRP for IPv4 autosummarization is disabled, by default, beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this, autosummarization was enabled, by default.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential