So, in order for the global routing table to have EIGRP routes in it, EIGRP has to first be enabled, then go through a process through with it determines which routes are Feasible successors (Best routes) and only then install them to the global routing table.
EIGRP has five basic messages it uses for this EIGRP collaboration between its neighbors.
When EIGRP is up and operational, unicast and multicast EIGRP packets or constantly flooding the network to make sure EIGRP routes are up and are using the best path. These packets are important but not always necessary. There are situations when disabling an interfaces ability to spam the network with EIGRP packets is appropriate and will still allow for a fully operational EIGRP convergence. The way to achieve this is by configuring an interface to passive mode. EIGRP will still advertise the network/subnet configured on that interface, however, the interface will not participate in sending or processing of EIGPR packets.
Here is an example:
EIGRP is a Cisco proprietary protocol. If you don’t mind being locked in using a vendor specific protocol you will then enjoy using a robust, well-developed protocol that will meet most enterprise network needs. Here are a few basic bullet points about EIGPR:
Configuring a basic EIGRP network:
Network Design (I’m using sub-interfaces on my equipment, as I have other traffic on other sub-interfaces):
Step 1) Enable EIGRP on every router:
CCNP Routing & Switching ROUTE 300-101 Chapters 3 & 4 Notes:
- IPv6 Address breakdown
- 32 hexadecimal numbers
- 8 quartets
- 4 hex digits separated by a colon
- 128-bit IPv6 address
With the depletion of IPv4 addresses IPv6 was created to solve that problem.
Pages 70 – 87 (1.5 hours)
CCNP Routing & Switching ROUTE 300-101 Chapters 1 & 2 Notes:
- There is a natural need for routing protocols
- The use of layer 3 devices
- The most common routing protocols used in an enterprise/campus networks are versions or RIP, EIGPR, OSPF
- Most common routing protocol used for external/untrust (Internet) networks is BGP
- There are 3 Routing Protocol Categories
- Distance Vector (Sends full copy of the routing table at certain interval)
- Distance-Vectore routing protocols use one of the following approaches to prevent routing loops:
- Split Horizon – This is when an interface is prevented to advertise a route which it already learned on that interface.
- Poison Reverse – This is when an interface receives a route advertisement but then re-advertises the same route out with a metric considered infinite.
PING is one of the most used tools in networking, there are two main uses for the “ping” tool:
1. Troubleshooting: Ping is used to confirm whether or not you are able to reach a particular layer 3 device. It also give you the round trip time between to end points to confirm the reliability of a circuits path.
2. Monitoring: Ping is used to monitor links/interfaces to make sure a circuit is up.