Sei sulla pagina 1di 18

EIGRP

Distance Vector Routing Protocol EIGRP


Features Path Calculation, packets EIGRP Metrics, load balancing Authentication

EIGRP
EIGRP- Enhanced version of Distance

Vector Routing Protocol IGRP IGRP- Interior Gateway Routing Protocol Cisco proprietary protocol Uses 224.0.0.10 multicast packet format

EIGRP
Faster Convergence
VLSM Support Partial Updates Support for multiple Network Layer

protocols Supports unequal load balancing

EIGRP
Represented by D in RT, Max. Hop count -100 By default, supports auto summarization at

network boundaries AD- EIGRP(int)-90, EIGRP(ext)-170 Lower value in RT, that RP is preferred Null0 interface/ software interface prevents router from trying to forward packets to other routers in search of more precise match. Unmatched packets sent to null0 interface -> dropped-> prevents routing loops

EIGRP- Features
Neighbor Discovery/ Recovery:
Send Hello packets periodically

Reliable Transport Protocol:


Supports multicast, unicast packets, on multi-access networks (Ethernet) sends multi-cast packets to everyone (Acknowledgement is not necessary)

DUAL:
Helps in selecting loop free, low cost path

EIGRP- Features
Protocol Dependent Module:
Specific to Network Layer. IP-EIGRP module informs DUAL of new info received -> DUAL selects best path -> Routing Table

OPERATIONS: Neighbor Table Topology Table Routing Table

EIGRP: Path Calculation


Advertised Distance: Cost between next hop router
and destination

Feasible Distance: Cost between local router and


next hop router and AD

Successor: Neighboring router having least cost to


destination By default, 4 successors can be added in RT.

Feasible Successor: AD of feasible successor < FD


of current successor

EIGRP Functioning
IP EIGRP Neighbor Table

IP EIGRP Topology Table

IP Routing Table

EIGRP Packets
Hello: Used for neighbor discovery

(unicast/ multicast) Update: reliable update (unicast), multicast (multi-access network) Query: sent reliably (multicast) to neighbors to check feasible successor Reply: Query reply (unicast) Acknowledge: Acks for update, query and reply.

EIGRP -Metrics
Bandwidth: Lowest bandwidth between src

& destination Delay: Cumulative delay along the path Reliability: worst between source & destination Load: Worst load based on configured b/w on interface & packet rate MTU: Maximum Transmission Unit, smallest MTU in the path

EIGRP - Metric
EIGRP Metric: Bandwidth (Slowest link) + Delay (sum of

delays) Delay: Sum of delays * 256 Bandwidth: 10 7 / min. bandwidth along the path * 256 Default weight variables: K1, K2, K3, K4, K5 where K1=K3=1, K2=K4=K5=0 Metric= K1* Bandwidth + K2*Bandwidth/ (256-Load) + K3*Delay K5 is not equal to 0, Metric = Metric * [ K5/ Reliability+K4]

EIGRP Metric
EIGRP metric -256 times IGRP metric

Router#configure terminal Router(config)#router eigrp AS Router(config-router)#network Network Number wildcard mask In wildcard mask, 0 match, 1- not to be matched Bandwidth can be set on a particular interface Router(config-if)#bandwidth kilobits

EIGRP: Bandwidth
Serial Interfaces (PPP/HDLC)

Use line speed for bandwidth FR on point to point interfaces Set to CIR (Committed Information Rate) FR on multipoint: Sum of CIRs PVC( Permanent Virtual Circuit) each having different CIRs. Lowest CIR* No. of PVC on multiple connection By Default, EIGRP uses 50% of b/w of interface Changed using ip bandwidth-percent eigrp AS percentage

EIGRP Load balancing


Variance: balance traffic across multiple

routes. Value ranges between 1 -128 Load balancing uses feasible paths --Path feasible should be closer to next router than existing router --Metric of next router < variance * current router FD

EIGRP Authentication
MD 5 (Message Digest 5) used

Key, Key ID( password) configured Kinds of authentication: Simple, MD 5 Simple: Key is sent b/w sender & receiver MD5: Hash exchanged b/w sender & receiver Hash created using message, key and key ID

EIGRP Authentication
Key ID is stored locally. Key ID & interface

identifies authentication algorithm and MD5 key in use Key maintained using key chains, during one time, packets sent with activated key Key activation times should overlap to avoid packet loss/ network outage

EIGRP Authentication
Router(config-if)#ip authentication mode eigrp AS

md5 Router(config-if)#ip authentication key-chain eigrp AS name-of-chain Router(config)#key chain name-of-chain Router(config-key chain)#key key-id Router(config-keychain-key)#key-string text Router(config-keychain-key)#accept-lifetime start-time duration infinite| end-time duration

Imp. EIGRP Commands


sh ip protocols
sh ip eigrp interface sh ip eigrp neighbors sh ip eigrp topology sh ip eigrp traffic

Potrebbero piacerti anche