SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 8: EIGRP
Advanced
Configurations and
Troubleshooting
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8
8.1 Advanced EIGRP Configurations
8.2 Troubleshooting EIGRP
8.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Objectives
After completing this chapter, you will be able to:
 Configure EIGRP automatic summarization.
 Configure EIGRP manual summarization.
 Configure a router to propagate a default route in an EIGRP
network.
 Modify EIGRP interface settings to improve network performance.
 Configure EIGRP authentication to ensure secure routing updates.
 Explain the process and tools used to troubleshoot an EIGRP
network.
 Troubleshoot neighbor adjacency issues in an EIGRP network.
 Troubleshoot missing route entries in an EIGRP routing table.
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
Network Technology
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
EIGRP Automatic Summarization
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Automatic Summarization
Configuring EIGRP Automatic Summarization
 EIGRP for IPv4 automatic summarization is disabled, by default,
beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to
this, automatic summarization was enabled, by default.
 To enable automatic summarization for EIGRP, use the auto-
summary command in router configuration mode.
R1(config)# router eigrp autonomous-system
R1(config-router)# auto-summary
 Use the no form of this command to disable autosummarization.
R1(config)# router eigrp autonomous-system
R1(config-router)# no auto-summary
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: show ip
protocols
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: Topology
Table
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Verifying Autosummarization: Routing
Table
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Summary Route
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Autosummarization
Summary Route (cont.)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Manual Summary Routes
 EIGRP can be configured to summarize routes, whether or not
autosummarization is enabled.
 Because EIGRP is a classless routing protocol and includes the
subnet mask in the routing updates, manual summarization can
include supernet routes.
 A supernet is an aggregation of multiple major classful network
addresses.
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Configuring EIGRP Manual Summary Routes
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
Verifying Manual Summary Routes
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Manual Summarization
EIGRP for IPv6: Manual Summary Routes
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Propagating a Default Static Route
 Using a static route to 0.0.0.0/0 as a default route is not routing
protocol-dependent.
 The quad zero static default route can be used with any currently
supported routing protocols.
 The static default route is usually configured on the router that has
a connection to a network outside the EIGRP routing domain, for
example, to an ISP.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Verifying the Propagated Default Route
The entry for the EIGRP-learned default route is identified by the
following:
 D – This route was learned from an EIGRP routing update.
 * – The route is a candidate for a default route.
 EX – The route is an external EIGRP route; in this case, a static
route outside of the EIGRP routing domain.
 170 – This is the administrative distance of an external EIGRP
route.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
EIGRP for IPv6- Default Route
Note: Some IOSs may require that the redistribute static command
include the EIGRP metric parameters and maximum transmission
unit (MTU) before the static route can be redistributed. These
parameters may vary, but an example for this scenario would be:
R2(config)# ipv6 router eigrp 2
R2(config-router)# redistribute static metric 64 2000
255 1 1500
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
EIGRP Bandwidth Utilization
EIGRP Bandwidth for IPv4
 By default, EIGRP uses only up to 50% of an interface’s bandwidth
for EIGRP information, which prevents the EIGRP process from
overutilizing a link and not allowing enough bandwidth for the
routing of normal traffic.
 The ip bandwidth-percent eigrp command can be used to
configure the percentage of bandwidth that may be used by EIGRP
on an interface.
Router(config-if)# ip bandwidth-percent eigrp as-number
percent
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
EIGRP Bandwidth Utilization (cont.)
EIGRP Bandwidth for IPv6
To configure the percentage of bandwidth that may be used by
EIGRP for IPv6 on an interface, use the ipv6 bandwidth-percent
eigrp command in interface configuration mode. To restore the
default value, use the no form of this command.
Router(config-if)# ipv6 bandwidth-percent eigrp as-
number percent
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Hello and Hold Timers
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Load Balancing IPv4
 Equal-cost load balancing is the ability of a router to distribute
outbound traffic using all interfaces that have the same metric from
the destination address.
 The Cisco IOS will, by default, allow load balancing using up to
four equal-cost paths; however, this can be modified. Using the
maximum-paths router configuration mode command, up to 32
equal-cost routes can be kept in the routing table.
Router(config-router)# maximum-paths value
 If the value is set to 1, load balancing is disabled.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning EIGRP Interfaces
Load Balancing IPv6
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Routing Protocol Authentication Overview
 Network administrators must be aware that routers are at risk from
attack just as much as end-user devices. Anyone with a packet
sniffer, such as Wireshark, can read information propagating
between routers.
 A method to protect routing information on the network is to
authenticate routing protocol packets using the Message Digest 5
(MD5) algorithm.
 Routing protocols, such as RIPv2, EIGRP, OSPF, IS-IS, and BGP
all support various forms of MD5 authentication.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Configuring EIGRP with MD5 Authentication
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
EIGRP Authentication Example
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
EIGRP Authentication Example (cont.)
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure EIGRP
Verifying Authentication
 Adjacencies are only formed when both connecting devices have
authentication configured.
 To verify that the correct EIGRP adjacencies were formed after
being configured for authentication, use the show ip eigrp
neighbors command on each router.
 To verify the neighbor adjacencies EIGRP for IPv6, use the show
ipv6 eigrp neighbors command.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
8.2 Troubleshooting EIGRP
Scaling Networks
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting EIGRP
Basic EIGRP Troubleshooting Commands
EIGRP for IPv4
 Router# show ip eigrp neighbors
 Router# show ip route
 Router# show ip protocols
EIGRP for IPv6
 Router# show ipv6 eigrp neighbors
 Router# show ipv6 route
 Router# show ipv6 protocols
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting EIGRP
Components
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
Layer 3 Connectivity
A prerequisite for a neighbor adjacency to form between
two directly connected routers is Layer 3 connectivity.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
EIGRP Parameters
When troubleshooting an EIGRP network, one of the first things to
verify is that all routers that are participating in the EIGRP network
are configured with the same autonomous system number.
EIGRP for IPv4
 Router# show ip protocols
EIGRP for IPv6
 Router# show ipv6 protocols
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Neighbor Issues
EIGRP Interfaces
 In addition to verifying the autonomous system number, it is
necessary to verify that all interfaces are participating in the EIGRP
network.
 The network command that is configured under the EIGRP routing
process indicates which router interfaces participate in EIGRP.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Passive Interface
 One reason that route tables may not reflect the correct routes is
due to the passive-interface command.
 The show ip protocols can be used to check if an interface is
configured as passive.
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Passive Interface
 With EIGRP running on a network, the passive-interface
command stops both outgoing and incoming routing updates. For
this reason, routers do not become neighbors.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement (cont.)
10.10.10.0/24 R1 Updates
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot EIGRP Routing Table Issues
Missing Network Statement (cont.)
Add Missing Network Statement
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting EIGRP Routing Table Issues
Autosummarization
 Another issue that may create problems for the network
administrator is EIGRP autosummarization.
 EIGRP for IPv4 can be configured to automatically summarize
routes at classful boundaries. If there are discontiguous networks,
autosummarization causes inconsistent routing.
 Classful networks do not exist in IPv6; therefore, EIGRP for IPv6
does not support autosummarization. All summarization must be
accomplished using EIGRP manual summary routes.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary
 EIGRP is one of the routing protocols commonly used in large
enterprise networks.
 Modifying EIGRP features and troubleshooting problems is one of
the most essential skills for a network engineer involved in the
implementation and maintenance of large, routed enterprise
networks that use EIGRP.
 Summarization decreases the number of entries in routing updates
and lowers the number of entries in local routing tables. It also
reduces bandwidth utilization for routing updates and results in faster
routing table lookups.
 EIGRP for IPv4 autosummarization is disabled, by default, beginning
with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this,
autosummarization was enabled, by default.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control lists
teknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
Nil Menon
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
Nil Menon
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
Muhd Mu'izuddin
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
Vuz Dở Hơi
 

What's hot (20)

CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control lists
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 

Viewers also liked

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
Vuz Dở Hơi
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
Vuz Dở Hơi
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
Josue Wuezo
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
Josue Wuezo
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
Josue Wuezo
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
Ospf.ppt
Ospf.pptOspf.ppt
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 

Viewers also liked (19)

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 

Similar to CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting

CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
Chaing Ravuth
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
Chaing Ravuth
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9
Joshua Torres
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
Chaing Ravuth
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Waqas Ahmed Nawaz
 
Eigrp
EigrpEigrp
Eigrp
Abhi Kumar
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5
Irsandi Hasan
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
CYBERINTELLIGENTS
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
 
Week6 2017(1)
Week6 2017(1)Week6 2017(1)
Week6 2017(1)
trayyoo
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS Differences
John Berry
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
Visalini Kumaraswamy
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
Andy Juan Sarango Veliz
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
 

Similar to CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting (20)

CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
Eigrp
EigrpEigrp
Eigrp
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
Week6 2017(1)
Week6 2017(1)Week6 2017(1)
Week6 2017(1)
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS Differences
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 

More from Vuz Dở Hơi

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
Vuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
Vuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Vuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
Vuz Dở Hơi
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
Vuz Dở Hơi
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
Vuz Dở Hơi
 

More from Vuz Dở Hơi (20)

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 

Recently uploaded

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 

Recently uploaded (20)

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 

CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8 8.1 Advanced EIGRP Configurations 8.2 Troubleshooting EIGRP 8.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Objectives After completing this chapter, you will be able to:  Configure EIGRP automatic summarization.  Configure EIGRP manual summarization.  Configure a router to propagate a default route in an EIGRP network.  Modify EIGRP interface settings to improve network performance.  Configure EIGRP authentication to ensure secure routing updates.  Explain the process and tools used to troubleshoot an EIGRP network.  Troubleshoot neighbor adjacency issues in an EIGRP network.  Troubleshoot missing route entries in an EIGRP routing table.
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization Network Technology
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization EIGRP Automatic Summarization
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Automatic Summarization Configuring EIGRP Automatic Summarization  EIGRP for IPv4 automatic summarization is disabled, by default, beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this, automatic summarization was enabled, by default.  To enable automatic summarization for EIGRP, use the auto- summary command in router configuration mode. R1(config)# router eigrp autonomous-system R1(config-router)# auto-summary  Use the no form of this command to disable autosummarization. R1(config)# router eigrp autonomous-system R1(config-router)# no auto-summary
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: show ip protocols
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: Topology Table
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Verifying Autosummarization: Routing Table
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Summary Route
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Autosummarization Summary Route (cont.)
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Manual Summary Routes  EIGRP can be configured to summarize routes, whether or not autosummarization is enabled.  Because EIGRP is a classless routing protocol and includes the subnet mask in the routing updates, manual summarization can include supernet routes.  A supernet is an aggregation of multiple major classful network addresses.
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Configuring EIGRP Manual Summary Routes
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization Verifying Manual Summary Routes
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Manual Summarization EIGRP for IPv6: Manual Summary Routes
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Propagating a Default Static Route  Using a static route to 0.0.0.0/0 as a default route is not routing protocol-dependent.  The quad zero static default route can be used with any currently supported routing protocols.  The static default route is usually configured on the router that has a connection to a network outside the EIGRP routing domain, for example, to an ISP.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Verifying the Propagated Default Route The entry for the EIGRP-learned default route is identified by the following:  D – This route was learned from an EIGRP routing update.  * – The route is a candidate for a default route.  EX – The route is an external EIGRP route; in this case, a static route outside of the EIGRP routing domain.  170 – This is the administrative distance of an external EIGRP route.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation EIGRP for IPv6- Default Route Note: Some IOSs may require that the redistribute static command include the EIGRP metric parameters and maximum transmission unit (MTU) before the static route can be redistributed. These parameters may vary, but an example for this scenario would be: R2(config)# ipv6 router eigrp 2 R2(config-router)# redistribute static metric 64 2000 255 1 1500
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces EIGRP Bandwidth Utilization EIGRP Bandwidth for IPv4  By default, EIGRP uses only up to 50% of an interface’s bandwidth for EIGRP information, which prevents the EIGRP process from overutilizing a link and not allowing enough bandwidth for the routing of normal traffic.  The ip bandwidth-percent eigrp command can be used to configure the percentage of bandwidth that may be used by EIGRP on an interface. Router(config-if)# ip bandwidth-percent eigrp as-number percent
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces EIGRP Bandwidth Utilization (cont.) EIGRP Bandwidth for IPv6 To configure the percentage of bandwidth that may be used by EIGRP for IPv6 on an interface, use the ipv6 bandwidth-percent eigrp command in interface configuration mode. To restore the default value, use the no form of this command. Router(config-if)# ipv6 bandwidth-percent eigrp as- number percent
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Hello and Hold Timers
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Load Balancing IPv4  Equal-cost load balancing is the ability of a router to distribute outbound traffic using all interfaces that have the same metric from the destination address.  The Cisco IOS will, by default, allow load balancing using up to four equal-cost paths; however, this can be modified. Using the maximum-paths router configuration mode command, up to 32 equal-cost routes can be kept in the routing table. Router(config-router)# maximum-paths value  If the value is set to 1, load balancing is disabled.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning EIGRP Interfaces Load Balancing IPv6
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Routing Protocol Authentication Overview  Network administrators must be aware that routers are at risk from attack just as much as end-user devices. Anyone with a packet sniffer, such as Wireshark, can read information propagating between routers.  A method to protect routing information on the network is to authenticate routing protocol packets using the Message Digest 5 (MD5) algorithm.  Routing protocols, such as RIPv2, EIGRP, OSPF, IS-IS, and BGP all support various forms of MD5 authentication.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Configuring EIGRP with MD5 Authentication
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP EIGRP Authentication Example
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP EIGRP Authentication Example (cont.)
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure EIGRP Verifying Authentication  Adjacencies are only formed when both connecting devices have authentication configured.  To verify that the correct EIGRP adjacencies were formed after being configured for authentication, use the show ip eigrp neighbors command on each router.  To verify the neighbor adjacencies EIGRP for IPv6, use the show ipv6 eigrp neighbors command.
  • 29. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 8.2 Troubleshooting EIGRP Scaling Networks
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting EIGRP Basic EIGRP Troubleshooting Commands EIGRP for IPv4  Router# show ip eigrp neighbors  Router# show ip route  Router# show ip protocols EIGRP for IPv6  Router# show ipv6 eigrp neighbors  Router# show ipv6 route  Router# show ipv6 protocols
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting EIGRP Components
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues Layer 3 Connectivity A prerequisite for a neighbor adjacency to form between two directly connected routers is Layer 3 connectivity.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues EIGRP Parameters When troubleshooting an EIGRP network, one of the first things to verify is that all routers that are participating in the EIGRP network are configured with the same autonomous system number. EIGRP for IPv4  Router# show ip protocols EIGRP for IPv6  Router# show ipv6 protocols
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Neighbor Issues EIGRP Interfaces  In addition to verifying the autonomous system number, it is necessary to verify that all interfaces are participating in the EIGRP network.  The network command that is configured under the EIGRP routing process indicates which router interfaces participate in EIGRP.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Passive Interface  One reason that route tables may not reflect the correct routes is due to the passive-interface command.  The show ip protocols can be used to check if an interface is configured as passive.
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Passive Interface  With EIGRP running on a network, the passive-interface command stops both outgoing and incoming routing updates. For this reason, routers do not become neighbors.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement (cont.) 10.10.10.0/24 R1 Updates
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot EIGRP Routing Table Issues Missing Network Statement (cont.) Add Missing Network Statement
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting EIGRP Routing Table Issues Autosummarization  Another issue that may create problems for the network administrator is EIGRP autosummarization.  EIGRP for IPv4 can be configured to automatically summarize routes at classful boundaries. If there are discontiguous networks, autosummarization causes inconsistent routing.  Classful networks do not exist in IPv6; therefore, EIGRP for IPv6 does not support autosummarization. All summarization must be accomplished using EIGRP manual summary routes.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary  EIGRP is one of the routing protocols commonly used in large enterprise networks.  Modifying EIGRP features and troubleshooting problems is one of the most essential skills for a network engineer involved in the implementation and maintenance of large, routed enterprise networks that use EIGRP.  Summarization decreases the number of entries in routing updates and lowers the number of entries in local routing tables. It also reduces bandwidth utilization for routing updates and results in faster routing table lookups.  EIGRP for IPv4 autosummarization is disabled, by default, beginning with Cisco IOS Release 15.0(1)M and 12.2(33). Prior to this, autosummarization was enabled, by default.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential