Overview
25.1 EIGRP
Concepts
25.1.1 Comparing
EIGRP and IGRP
25.1.2 EIGRP
concepts and terminology
25.1.3 EIGRP
design features
25.1.4 EIGRP
technologies
25.1.5 EIGRP data
structure
25.1.6 EIGRP
algorithm
25.2 EIGRP
Configuration
25.2.1
Configuring EIGRP
25.2.2
Configuring EIGRP summarization
25.2.3 Verifying
basic EIGRP
25.2.4 Building
neighbor tables
25.2.5 Discover
routes
25.2.6 Select
routes
25.2.7
Maintaining routing tables
25.3
Troubleshooting Routing Protocols
25.3.1 Routing
protocol troubleshooting process
25.3.2
Troubleshooting RIP configuration
25.3.3
Troubleshooting IGRP configuration
25.3.4
Troubleshooting EIGRP configuration
25.3.5
Troubleshooting OSPF configuration
Summary
Overview
EIGRP is a
Cisco-proprietary routing protocol that is based on IGRP.
EIGRP supports
CIDR and VLSM which allows network designers to maximize address space. When
compared to IGRP which is a classful routing protocol, EIGRP boasts faster
convergence times, improved scalability, and superior management of routing
loops.
Furthermore,
EIGRP can replace Novell RIP and AppleTalk Routing Table Maintenance Protocol
(RTMP). EIGRP serves both IPX and AppleTalk networks with powerful efficiency.
EIGRP is often
described as a hybrid routing protocol that offers the best of distance vector
and link-state algorithms.
EIGRP is an
advanced routing protocol that relies on features commonly associated with
link-state protocols. Some of the best features of OSPF, such as partial
updates and neighbor discovery, are similarly put to use by EIGRP. However,
EIGRP is easier to configure than OSPF.
EIGRP is an ideal
choice for large, multi-protocol networks built primarily on Cisco routers.
This module
covers common EIGRP configuration tasks. The emphasis is on ways in which EIGRP
establishes relationships with adjacent routers, calculates primary and backup
routes, and responds to failures in known routes to a particular destination.
A network is made
up of many devices, protocols, and media that allow data communication to
occur. When a network component does not work correctly, it can affect the
entire network. In any case, network administrators must quickly identify and
troubleshoot problems when they arise. The following are some reasons why
network problems occur:
- Commands are entered
incorrectly
- Access lists are constructed or
placed incorrectly
- Routers, switches, or other
network devices are misconfigured
- Physical connections are bad
A network
administrator should troubleshoot in a methodical manner with the use a general
problem-solving model. It is often useful to check for physical layer problems
first and then move up the layers in an organized manner. Although this module
focuses on how to troubleshoot Layer 3 protocols, it is important to
troubleshoot and eliminate any problems that may exist at the lower layers.
This module
covers some of the objectives for the CCNA 640-801 and ICND 640-811 exams.
Students who
complete this module should be able to perform the following tasks:
- Describe the differences
between EIGRP and IGRP
- Describe the key concepts,
technologies, and data structures of EIGRP
- Understand EIGRP convergence
and the basic operation of the Diffusing Update Algorithm (DUAL)
- Perform basic EIGRP
configuration
- Configure EIGRP route summarization
- Describe the processes used by
EIGRP to build and maintain routing tables
- Verify EIGRP operations
- Describe the eight-step process
for general troubleshooting
- Apply a logical process to
troubleshoot routing
- Use the show and debug commands
to troubleshoot RIP
- Use the show and debug commands
to troubleshoot IGRP
- Use the show and debug commands
to troubleshoot EIGRP
- Use the show and debug commands
to troubleshoot OSPF
25.1
EIGRP Concepts
25.1.1
Comparing EIGRP and IGRP
Cisco released
EIGRP in 1994 as a scalable and improved version of its proprietary distance
vector routing protocol, IGRP. This page will explain how EIGRP and IGRP
compare to each other. The distance vector technology and distance information
found in IGRP is also used in EIGRP.
EIGRP has
improved convergence properties and operates more efficiently over IGRP. This
allows a network to have improved architecture as well as retain the current
investment in IGRP.
The comparisons
between EIGRP and IGRP fall into the following major categories:
- Compatibility mode
- Metric calculation
- Hop count
- Automatic protocol
redistribution
- Route tagging
IGRP and EIGRP
are compatible with each other. This compatibility provides seamless
interoperability with IGRP routers. This is important as users can take
advantage of the benefits of both protocols. EIGRP offers multiprotocol
support, but IGRP does not.
EIGRP and IGRP
use different metric calculations. EIGRP scales the metric of IGRP by a factor
of 256. That is because EIGRP uses a metric that is 32 bits long, and IGRP uses
a 24-bit metric. EIGRP can multiply or divide by 256 to easily exchange
information with IGRP.
IGRP has a
maximum hop count of 255. EIGRP has a maximum hop count limit of 224. This is
more than adequate to support large, properly designed internetworks.
To enable
dissimilar routing protocols such as OSPF and RIP to share information requires
advanced configuration. Redistribution, or route sharing, is automatic between
IGRP and EIGRP as long as both processes use the same AS number. In Figure ,
RTB automatically redistributes routes learned from EIGRP to the IGRP AS, and
vice versa.
EIGRP tags routes
learned from IGRP or any outside source as external because they did not
originate from EIGRP routers. IGRP cannot differentiate between internal and
external routes.
Notice that in
the show ip route command output for the routers in Figure , EIGRP routes are
flagged with D, and external routes are denoted by EX. RTA identifies the
difference between the 172.16.0.0 network, which was learned through EIGRP, and
the 192.168.1.0 network that was redistributed from IGRP. In the RTC table, the
IGRP protocol makes no such distinction. RTC, which uses IGRP only, just sees
IGRP routes, despite the fact that both 10.1.1.0 and 172.16.0.0 were
redistributed from EIGRP.
25.1
EIGRP Concepts
25.1.2
EIGRP concepts and terminology
This page will
discuss the three tables that EIGRP uses to store network information.
EIGRP routers
keep route and topology information readily available in RAM so they can react
quickly to changes. Like OSPF, EIGRP saves this information in several tables
and databases.
EIGRP saves
routes that are learned, in specific ways. Routes are given a particular status
and can be tagged to provide additional useful information.
The following
three tables are maintained by EIGRP:
- Neighbor table
- Topology table
- Routing table
The neighbor
table is the most important table in EIGRP. Each EIGRP router maintains a
neighbor table that lists adjacent routers. This table is comparable to the
adjacency database used by OSPF. There is a neighbor table for each protocol
that EIGRP supports.
When newly
discovered neighbors are learned, the address and interface of the neighbor is
recorded. This information is stored in the neighbor data structure. When a
neighbor sends a hello packet, it advertises a hold time. The hold time is the
amount of time a router treats a neighbor as reachable and operational. If a
hello packet is not received within the hold time, then the hold time expires.
When the hold time expires, the Diffusing Update Algorithm (DUAL), which is the
EIGRP distance vector algorithm, is informed of the topology change and must
recalculate the new topology.
The topology
table is made up of all the EIGRP routing tables in the autonomous system. DUAL
takes the information supplied in the neighbor table and the topology table and
calculates the lowest cost routes to each destination. EIGRP tracks this information so that EIGRP
routers can identify and switch to alternate routes quickly. The information
that the router learns from the DUAL is used to determine the successor route,
which is the term used to identify the primary or best route. This information
is also entered into the topology table.
Every EIGRP
router maintains a topology table for each configured network protocol. All
learned routes to a destination are maintained in the topology table.
The topology
table includes the following fields:
- Feasible distance (FD)
- This is the lowest calculated metric to each destination. For example,
the feasible distance to 32.0.0.0 is 2195456.
- Route source
- The identification number of the router that originally advertised that
route. This field is populated only for routes learned externally from the
EIGRP network. Route tagging can be particularly useful with policy-based
routing. For example, the route source to 32.0.0.0 is 200.10.10.10 through
200.10.10.10.
- Reported distance (RD)
- The distance reported by an adjacent neighbor to a specific destination.
For example, the reported distance to 32.0.0.0 is /281600 as indicated by
(2195456/281600).
- Interface information
- The interface through which the destination can be reached.
- Route status
- The status of a route. Routes are identified as being either passive,
which means that the route is stable and ready for use, or active, which
means that the route is in the the process of being recomputed by DUAL.
The EIGRP routing
table holds the best routes to a destination. This information is retrieved
from the topology table. EIGRP routers maintain a routing table for each
network protocol.
A successor is a
route selected as the primary route to reach a destination. DUAL identifies this route from the
information contained in the neighbor and topology tables and places it in the
routing table. There can be up to four successor routes for any particular
destination. These can be of equal or unequal cost and are identified as the
best loop-free paths to a given destination. A copy of the successor routes is
also placed in the topology table.
A feasible
successor (FS) is a backup route. These
routes are identified at the same time as the successors, but these routes are
only kept in the topology table. Multiple feasible successors for a destination
can be retained in the topology table although it is not mandatory.
A router views
the feasible successors as neighbors downstream, or closer to the destination
than it is. Feasible successor cost is computed by the advertised cost of the
neighbor router to the destination. If a successor route goes down, the router
will look for an identified feasible successor. This route will be promoted to
successor status. A feasible successor must have a lower advertised cost than
the current successor cost to the destination. If a feasible successor is not
identified from the current information, the router places an Active status on
a route and sends out query packets to all neighbors in order to recompute the
current topology. The router can identify any new successor or feasible
successor routes from the new data that is received from the reply packets that
answer the query requests. The router will then place a Passive status on the
route.
The topology
table can record additional information about each route. EIGRP classifies
routes as either internal or external. EIGRP adds a route tag to each route to
identify this classification. Internal routes originate from within the EIGRP
AS.
External routes
originate outside the EIGRP AS. Routes learned or redistributed from other
routing protocols, such as RIP, OSPF, and IGRP, are external. Static routes
that originate outside the EIGRP AS are external. The tag can be configured to
a number between 0-255 to customize the tag.
25.1
EIGRP Concepts
25.1.3
EIGRP design features
This page will
describe some key design features of EIGRP.
EIGRP operates
quite differently from IGRP. EIGRP is an advance distance vector routing
protocol, but also acts as a link-state protocol in the way that it updates
neighbors and maintains routing information. The following are advantages of
EIGRP over simple distance vector protocols:
- Rapid convergence
- Efficient use of bandwidth
- Support for VLSM and CIDR.
- Multiple network layer support
- Independence from routed
protocols.
Independence from
routed protocols means that protocol-dependent modules (PDMs) protect EIGRP
from lengthy revision. As routed protocols evolve, they may need new protocol
modules, but changes to EIGRP will not be necessary.
EIGRP routers converge
quickly because they rely on DUAL. DUAL guarantees loop-free operation
throughout a route computation which allows all routers involved in a topology
change to synchronize at the same time.
EIGRP sends
partial, bounded updates and makes efficient use of bandwidth. EIGRP uses
minimal bandwidth when the network is stable. EIGRP routers do not send the
complete tables, but instead, send partial, incremental updates. This is
similar to OSPF operation, except that EIGRP routers send these partial updates
only to the routers that need the information, not to all routers in an area.
For this reason, they are called bounded updates. Instead of timed routing
updates, EIGRP routers use small hello packets to keep in touch with each
other. Though exchanged regularly, hello packets do not use up a significant
amount of bandwidth.
EIGRP supports
IP, IPX, and AppleTalk through PDMs. EIGRP can redistribute IPX-RIP and IPX SAP
information to improve overall performance. In effect, EIGRP can take over for
these two protocols. EIGRP routers receive routing and service updates, and
update other routers only when changes in the SAP or routing tables occur. In
EIGRP networks, routing updates occur in partial updates.
EIGRP can also
take over for the AppleTalk RTMP. As a distance vector routing protocol, RTMP
relies on periodic and complete exchanges of routing information. To reduce
overhead, EIGRP uses event-driven updates to redistributes AppleTalk routing
information. EIGRP also uses a configurable composite metric to determine the
best route to an AppleTalk network. RTMP uses hop count, which can result in
suboptimal routing. AppleTalk clients expect RTMP information from local
routers, so EIGRP for AppleTalk should be run only on a clientless network,
such as a WAN link.
25.1
EIGRP Concepts
25.1.4
EIGRP technologies
This page will
discuss some of the new technologies that EIGRP includes. Each new technology
represents an improvement in EIGRP operation efficiency, speed of convergence,
or functionality relative to IGRP and other routing protocols. These
technologies fall into one of the following four categories:
- Neighbor discovery and recovery
- Reliable Transport Protocol
- DUAL finite-state machine
algorithm
- Protocol-dependent modules
Simple distance
vector routers do not establish any relationship with their neighbors. RIP and
IGRP routers merely broadcast or multicast updates on configured interfaces. In
contrast, EIGRP routers actively establish relationships with their neighbors,
much the same way that OSPF routers do.
EIGRP routers
establish adjacencies as described in Figure . EIGRP routers use small hello
packets to accomplish this. Hellos are sent by default every five seconds. An
EIGRP router assumes that as long as it receives hello packets from known
neighbors, those neighbors and their routes remain viable or passive. The
following are possible when EIGRP routers form adjacencies:
- Dynamically learn of new routes
that join the network
- Identify routers that become
either unreachable or inoperable
- Rediscover routers that had
previously been unreachable
Reliable
Transport Protocol (RTP) is a transport layer protocol that guarantees ordered
delivery of EIGRP packets to all neighbors. On an IP network, hosts use TCP to
sequence packets and ensure their timely delivery. However, EIGRP is
protocol-independent. This means it does not rely on TCP/IP to exchange routing
information the way that RIP, IGRP, and OSPF do. To stay independent of IP,
EIGRP uses RTP as its own proprietary transport layer protocol to guarantee
delivery of routing information.
EIGRP can call on
RTP to provide reliable or unreliable service as the situation warrants. For
example, hello packets do not require the overhead of reliable delivery because
they are frequent and should be kept small. The reliable delivery of other
routing information can actually speed convergence because then EIGRP routers
do not wait for a timer to expire before they retransmit.
With RTP, EIGRP
can multicast and unicast to different peers simultaneously. This allows for
maximum efficiency.
The centerpiece
of EIGRP is the DUAL, which is the EIGRP route-calculation engine. The full
name of this technology is DUAL finite-state machine (FSM). An FSM is an
algorithm machine, not a mechanical device with parts that move. FSMs define a
set of possible states that something can go through, the events that cause
those states, and the events that result from those states. Designers use FSMs
to describe how a device, computer program, or routing algorithm will react to
a set of input events. The DUAL FSM contains all the logic used to calculate
and compare routes in an EIGRP network.
DUAL tracks all
the routes advertised by neighbors. Composite metrics of each route are used to
compare them. DUAL also guarantees
that each path is loop free. DUAL inserts lowest cost paths into the routing
table. These primary routes are known as successor routes. A copy of the
successor routes is also placed in the topology table.
EIGRP keeps
important route and topology information readily available in a neighbor table
and a topology table. These tables supply DUAL with comprehensive route
information in case of network disruption. DUAL uses the information in these
tables to select alternate routes quickly. If a link goes down, DUAL looks for
an alternative route path, or feasible successor, in the topology table.
One of the best
features of EIGRP is its modular design. Modular, or layered designs, prove to
be the most scalable and adaptable. Support for routed protocols, such as IP,
IPX, and AppleTalk, is included in EIGRP through PDMs. In theory, EIGRP can add
PDMs to easily adapt to new or revised routed protocols such as IPv6.
Each PDM is
responsible for all functions related to its specific routed protocol. The IP-EIGRP
module is responsible for the following functions:
- Send and receive EIGRP packets
that bear IP data
- Notify DUAL of new IP routing
information that is received
- Maintain the results of DUAL
routing decisions in the IP routing table
- Redistribute routing
information that was learned by other IP-capable routing protocols
25.1
EIGRP Concepts
25.1.5
EIGRP data structure
Like OSPF, EIGRP
relies on different types of packets to maintain its tables and establish
relationships with neighbor routers. This page will describe these packet
types.
The following are
the five types of EIGRP packets:
- Hello
- Acknowledgment
- Update
- Query
- Reply
EIGRP relies on
hello packets to discover, verify, and rediscover neighbor routers. Rediscovery
occurs if EIGRP routers do not receive hellos from each other for a hold time
interval but then re-establish communication.
EIGRP routers
send hellos at a fixed, but configurable interval called the hello interval.
The default hello interval depends on the bandwidth of the interface. On IP networks, EIGRP routers send hellos to
the multicast IP address 224.0.0.10.
EIGRP routers
store information about neighbors in the neighbor table. The neighbor table
includes the Sequence Number (Seq No) field to record the number of the last
received EIGRP packet that each neighbor sent. The neighbor table also includes
a Hold Time field which records the time the last packet was received. Packets
should be received within the Hold Time interval period to maintain a Passive
state. The Passive state is a reachable and operational status.
If EIGRP does not
receive a packet from a neighbor within the hold time, EIGRP considers that
neighbor down. DUAL then steps in to re-evaluate the routing table. By default,
the hold time is three times the hello interval, but an administrator can
configure both timers as desired.
OSPF requires
neighbor routers to have the same hello and dead intervals to communicate.
EIGRP has no such restriction. Neighbor routers learn about each of the other
respective timers through the exchange of hello packets. They then use that
information to forge a stable relationship regardless of unlike timers.
Hello packets are
always sent unreliably. This means that no acknowledgment is transmitted.
EIGRP routers use
acknowledgment packets to indicate receipt of any EIGRP packet during a
reliable exchange. RTP provides reliable communication between EIGRP hosts. A
message that is received must be acknowledged by the recipient to be reliable.
Acknowledgment packets, which are hello packets without data, are used for this
purpose. Unlike multicast hellos, acknowledgment packets are unicast.
Acknowledgments can be attached to other kinds of EIGRP packets, such as reply
packets.
Update packets
are used when a router discovers a new neighbor. EIGRP routers send unicast
update packets to that new neighbor so that it can add to its topology table.
More than one update packet may be needed to convey all the topology
information to the newly discovered neighbor.
Update packets
are also used when a router detects a topology change. In this case, the EIGRP
router sends a multicast update packet to all neighbors, which alerts them to
the change. All update packets are sent reliably.
An EIGRP router
uses query packets whenever it needs specific information from one or all of
its neighbors. A reply packet is used to respond to a query.
If an EIGRP
router loses its successor and cannot find a feasible successor for a route,
DUAL places the route in the Active state. A query is then multicasted to all
neighbors in an attempt to locate a successor to the destination network.
Neighbors must send replies that either provide information on successors or
indicate that no information is available. Queries can be multicast or unicast,
while replies are always unicast. Both packet types are sent reliably.
25.1 EIGRP Concepts
25.1.6
EIGRP algorithm
This page will
describe the DUAL algorithm, which results in the exceptionally fast
convergence of EIGRP.
The sophisticated
DUAL algorithm results in the exceptionally fast convergence of EIGRP. To
better understand convergence with DUAL, consider the example in Figure . Each
router has constructed a topology table that contains information about how to
route to destination Network A.
Each topology
table identifies the following information:
- The routing protocol or EIGRP
- The lowest cost of the route,
which is called feasible distance (FD)
- The cost of the route as
advertised by the neighboring router, which is called reported distance
(RD)
The Topology
column identifies the primary route called the successor route (successor),
and, where identified, the backup route called the feasible successor (FS).
Note that it is not necessary to have an identified feasible successor.
The EIGRP network
follows a sequence of actions to allow convergence between the routers, which
currently have the following topology information:
- Router C has one successor
route by way of Router B.
- Router C has one feasible
successor route by way of Router D.
- Router D has one successor
route by way of Router B.
- Router D has no feasible
successor route.
- Router E has one successor
route by way of Router D.
- Router E has no feasible
successor.
The feasible
successor route selection rules are specified in Figure .
The following
example demonstrates how each router in the topology will carry out the
feasible successor selection rules when the route from Router D to Router B
goes down:
In Router D:
- Route by way of Router B is
removed from the topology table.
- This is the successor route.
Router D has no feasible successor identified.
- Router D must complete a new
route computation.
In Router C:
- Route to Network A by way of
Router D is down.
- Route by way of Router D is
removed from the table.
- This is the feasible successor
route for Router C.
In Router D:
- Router D has no feasible
successor. It cannot switch to an identified alternative backup route.
- Router D must recompute the
topology of the network. The path to destination Network A is set to Active.
- Router D sends a query packet
to all connected neighbors to request topology information.
- Router C does have a previous
entry for Router D.
- Router D does not have a
previous entry for Router E.
In Router E:
- Route to Network A through
Router D is down.
- The route by way of Router D is
removed from the table.
- This is the successor route for
Router E.
- Router E does not have a
feasible route identified.
- Note that the RD cost of
routing by way of Router C is 3. That is the same cost as the successor
route by way of Router D.
In Router C:
- Router E sends a query packet
to Router C.
- Router C removes Router E from
the table.
- Router C replies to Router D
with a new route to Network A.
In Router D:
- Route status to destination
Network A is still marked as Active. The computation has not been
completed yet.
- Router C has replied to Router
D to confirm that a route to destination Network A is available with a
cost of 5.
- Router D still waits for a
reply from Router E.
In Router E:
- Router E has no feasible
successor to reach destination Network A.
- Router E, therefore, tags the
status of the route to destination network as Active.
- Router E has to recompute the
network topology.
- Router E removes the route by
way of Router D from the table.
- Router E sends a query to
Router C, to request topology information.
- Router E already has an entry
by way of Router C. It is at a cost of 3, the same as the successor route.
In Router E:
- Router C replies with an RD of
3.
- Router E can now set the route
by way of Router C as the new successor with an FD of 4 and an RD of 3.
- Router E replaces the Active
status of the route to destination Network A with a Passive status. Note
that a route will have a Passive status by default as long as hello
packets are received. In this example, only Active status routes are
flagged.
In Router E:
- Router E sends a reply to
Router D to inform it of the Router E topology information.
In Router D:
- Router D receives the reply
packed from Router E.
- Router D enters this data for
the route to destination Network A by way of Router E.
- This route becomes an
additional successor route as the cost is the same as routing by way of
Router C and the RD is less than the FD cost of 5.
Convergence
occurs among all EIGRP routers that use the DUAL algorithm.
25.2
EIGRP Configuration
25.2.1
Configuring EIGRP
Despite the
complexity of DUAL, configuring EIGRP can be relatively simple. EIGRP
configuration commands vary depending on the protocol that is to be routed. Some
examples of these protocols are IP, IPX, and AppleTalk. This page describes
EIGRP configuration for the IP protocol.
Perform the
following steps to configure EIGRP for IP:
1.Use the following to enable
EIGRP and define the autonomous system:
router(config)#router
eigrp autonomous-system-number
The
autonomous system number is used to identify all routers that belong within the
internetwork. This value must match all routers within the internetwork.
2.Indicate
which networks belong to the EIGRP autonomous system on the local router by
using the following command:
router(config-router)#networknetwork-number
The
network-number is the network number that determines which interfaces of the
router are participating in EIGRP and which networks are advertised by the
router.
The
network command configures only connected networks. For example, network
3.1.0.0, which is on the far left of the main Figure, is not directly connected
to Router A. Consequently, that network is not part of the configuration of
Router A.
3.When
configuring serial links using EIGRP, it is important to configure the
bandwidth setting on the interface. If the bandwidth for these interfaces is
not changed, EIGRP assumes the default bandwidth on the link instead of the
true bandwidth. If the link is slower, the router may not be able to converge,
routing updates might become lost, or suboptimal path selection may result. To
set the interface bandwidth, use the following syntax:
router(config-if)#bandwidthkbps
The
bandwidth command is only used by the routing process and should be set to
match the line speed of the interface.
4.Cisco
also recommends adding the following command to all EIGRP configurations:
router(config-router)#eigrp
log-neighbor-changes
This
command enables the logging of neighbor adjacency changes to monitor the
stability of the routing system and to help detect problems.
25.2
EIGRP Configuration
25.2.2
Configuring EIGRP summarization
This page will
teach students how to manually configure summary addresses.
EIGRP
automatically summarizes routes at the classful boundary. This is the boundary
where the network address ends, as defined by class-based addressing. This
means that even though RTC is connected only to the subnet 2.1.1.0, it will
advertise that it is connected to the entire Class A network, 2.0.0.0. In most
cases auto summarization is beneficial because it keeps routing tables as
compact as possible.
However,
automatic summarization may not be the preferred option in certain instances.
For example, if there are discontiguous subnetworks auto-summarization must be
disabled for routing to work properly.
To turn off auto-summarization, use the following command:
router(config-router)#no
auto-summary
With EIGRP, a
summary address can be manually configured by configuring a prefix network.
Manual summary routes are configured on a per-interface basis, so the interface
that will propagate the route summary must be selected first. Then the summary
address can be defined with the ip summary-address eigrp command:
router(config-if)#ip
summary-address eigrpautonomous-system-number ip-address mask
administrative-distance
EIGRP summary
routes have an administrative distance of 5 by default. Optionally, they can be
configured for a value between 1 and 255.
In Figure , RTC
can be configured using the commands shown:
RTC(config)#router
eigrp 2446
RTC(config-router)#no
auto-summary
RTC(config-router)#exit
RTC(config)#interface
serial 0/0
RTC(config-if)#ip
summary-address eigrp 2446 2.1.0.0 255.255.0.0
Therefore, RTC
will add a route to its table as follows:
D 2.1.0.0/16 is a
summary, 00:00:22, Null0
Notice that the
summary route is sourced from Null0 and not from an actual interface. This is
because this route is used for advertisement purposes and does not represent a
path that RTC can take to reach that network. On RTC, this route has an
administrative distance of 5.
RTD is not aware
of the summarization but accepts the route. The route is assigned the
administrative distance of a normal EIGRP route, which is 90 by default.
In the
configuration for RTC, auto-summarization is turned off with the no
auto-summary command. If auto-summarization was not turned off, RTD would
receive two routes, the manual summary address, which is 2.1.0.0 /16, and the
automatic, classful summary address, which is 2.0.0.0 /8.
In most cases
when manually summarizing, the no auto-summary command should be issued.
25.2
EIGRP Configuration
25.2.3
Verifying basic EIGRP
This page will
explain how show commands can be used to verify EIGRP configurations.
Figure lists the key EIGRP show commands
and briefly discusses their functions.
The Cisco IOS
debug feature also provides useful EIGRP monitoring commands.
25.2
EIGRP Configuration
25.2.4
Building neighbor tables
This page will
explain how EIGRP builds neighbor tables. Students will also learn about the
information that is stored in a neighbor table and how it is used.
Simple distance
vector routers do not establish any relationship with their neighbors. RIP and
IGRP routers merely broadcast or multicast updates on configured interfaces. In
contrast, EIGRP routers actively establish relationships with their neighbors
as do OSPF routers.
The neighbor
table is the most important table in EIGRP. Each EIGRP router maintains a
neighbor table that lists adjacent routers. This table is comparable to the
adjacency database used by OSPF. There is a neighbor table for each protocol
that EIGRP supports.
EIGRP routers
establish adjacencies with neighbor routers by using small hello packets.
Hellos are sent by default every five seconds.
An EIGRP router assumes that, as long as it is receiving hello packets
from known neighbors, those neighbors and their routes remain viable or
passive. By forming adjacencies, EIGRP routers do the following:
- Dynamically learn of new routes
that join their network
- Identify routers that become
either unreachable or inoperable
- Rediscover routers that had
previously been unreachable
The following
fields are found in a neighbor table:
- Neighbor address - This is the
network layer address of the neighbor router.
- Hold time - This is the
interval to wait without receiving anything from a neighbor before
considering the link unavailable. Originally, the expected packet was a
hello packet, but in current Cisco IOS software releases, any EIGRP
packets received after the first hello will reset the timer.
- Smooth Round-Trip Timer (SRTT)
- This is the average time that it takes to send and receive packets from
a neighbor. This timer is used to determine the retransmit interval (RTO).
- Queue count (Q Cnt) - This is
the number of packets waiting in a queue to be sent. If this value is
constantly higher than zero, there may be a congestion problem at the
router. A zero means that there are no EIGRP packets in the queue.
- Sequence Number (Seq No) - This
is the number of the last packet received from that neighbor. EIGRP uses
this field to acknowledge a transmission of a neighbor and to identify
packets that are out of sequence. The neighbor table is used to support
reliable, sequenced delivery of packets and can be regarded as analogous
to the TCP protocol used in the reliable delivery of IP packets.
25.2
EIGRP Configuration
25.2.5
Discover routes
This page will
explain how EIGRP stores route and topology information. Students will also
learn how DUAL uses this information to route data.
EIGRP routers
keep route and topology information available in RAM, so changes can be reacted
to quickly. Like OSPF, EIGRP keeps this information in several tables or
databases.
The EIGRP
distance vector algorithm, DUAL, uses the information gathered in the neighbor
and topology tables and calculates the lowest cost route to the destination.
The primary route is called the successor route. When calculated, DUAL places
the successor route in the routing table and a copy in the topology table.
DUAL also
attempts to calculate a backup route in case the successor route fails. This is
called the feasible successor route. When calculated, DUAL places the feasible
route in the topology table. This route can be called upon if the successor
route to a destination becomes unreachable or unreliable.
25.2
EIGRP Configuration
25.2.6
Select routes
This page will
explain how DUAL selects an alternative route in the topology table when a link
goes down. - If a feasible successor is not found, the
route is flagged as Active, or unusable at present. Query packets are sent to
neighboring routers requesting topology information. DUAL uses this information
to recalculate successor and feasible successor routes to the destination.
Once DUAL has
completed these calculations, the successor route is placed in the routing
table. Then both the successor route and feasible successor route are placed in
the topology table. The route to the final destination will now pass from an
Active status to a Passive status. This means that the route is now operational
and reliable.
The sophisticated
algorithm of DUAL results in EIGRP having exceptionally fast convergence. To
better understand convergence using DUAL, consider the example in Figure . All
routers have built a topology table that contains information about how to
route to destination network Z.
Each table
identifies the following:
- The routing protocol or EIGRP
- The lowest cost of the route or
Feasible Distance (FD)
- The cost of the route as
advertised by the neighboring router or Reported Distance (RD)
The Topology
table identifies the preferred primary route, which is called the successor
route (Successor). If it is identified, the Topology table will also identify
the backup route, which is called the feasible successor (FS). Note that it is
not necessary to have an identified feasible successor.
25.2
EIGRP Configuration
25.2.7
Maintaining routing tables
This page will
explain how DUAL maintains and updates routing tables.
DUAL tracks all
routes advertised by neighbors using the composite metric of each route to
compare them. DUAL also guarantees that each path is loop-free.
Lowest-cost paths
are then inserted by the DUAL algorithm into the routing table. These primary
routes are known as successor routes. A copy of the successor paths is placed
in the topology table.
EIGRP keeps
important route and topology information readily available in a neighbor table
and a topology table. These tables supply DUAL with comprehensive route
information in case of network disruption. DUAL selects alternate routes
quickly by using the information in these tables.
If a link goes
down, DUAL looks for an alternative route path, or feasible successor, in the
topology table. If a feasible successor is not found, the route is flagged as
active, or unusable at present. Query packets are sent to neighboring routers
requesting topology information. DUAL uses this information to recalculate
successor and feasible successor routes to the destination.
Once DUAL has
completed these calculations, the successor route is placed in the routing
table. Then both the successor route and feasible successor route are placed in
the topology table. The route to the final destination will now pass from an
active status to a passive status. This means that the route is now operational
and reliable.
EIGRP routers
establish and maintain adjacencies with neighbor routers by using small hello
packets. Hellos are sent by default every five seconds. An EIGRP router assumes
that, as long as it is receiving hello packets from known neighbors, those
neighbors and their routes remain viable, or passive.
When newly
discovered neighbors are learned, the address and interface of the neighbor is
recorded. This information is stored in the neighbor data structure. When a
neighbor sends a hello packet, it advertises a hold time. The hold time is the
amount of time a router treats a neighbor as reachable and operational. In
other words, if a hello packet is not heard from within the hold time, the hold
time expires. When the hold time expires, DUAL is informed of the topology
change, and must recalculate the new topology.
In the example in
Figures - , DUAL must reconstruct the
topology following the discovery of a broken link between router D and router
B.
The new successor
routes will be placed in the updated routing table.
25.3
Troubleshooting Routing Protocols
25.3.1
Routing protocol troubleshooting process
This page will
explain the logical sequence of steps that should be used to troubleshoot all
routing protocols.
All routing
protocol troubleshooting should begin with a logical sequence, or process flow.
This process flow is not a rigid outline for troubleshooting an internetwork.
However, it is a foundation from which a network administrator can build a
problem-solving process to suit a particular environment.
1
When analyzing a network failure,
make a clear problem statement.
2
Gather the facts needed to help
isolate possible causes.
3
Consider possible problems based on
the facts that have been gathered.
4
Create an action plan based on the
remaining potential problems.
5
Implement the action plan,
performing each step carefully while testing to see whether the symptom
disappears.
6
Analyze the results to determine
whether the problem has been resolved. If it has, then the process is
complete.
7
If the problem has not been
resolved, create an action plan based on the next most likely problem in the
list. Return to Step 4, change one variable at a time, and repeat the process
until the problem is solved.
8
Once the actual cause of the problem
is identified, try to solve it.
Cisco routers
provide numerous integrated commands to assist in monitoring and
troubleshooting an internetwork:
- show commands help monitor
installation behavior and normal network behavior, as well as isolate
problem areas
- debug commands assist in the
isolation of protocol and configuration problems
- TCP/IP network tools such as
ping, traceroute, and telnet
Cisco IOS show
commands are among the most important tools for understanding the status of a
router, detecting neighboring routers, monitoring the network in general, and
isolating problems in the network.
EXEC debug
commands can provide a wealth of information about interface traffic, internal
error messages, protocol-specific diagnostic packets, and other useful
troubleshooting data. Use debug commands to isolate problems, not to monitor
normal network operation. Only use debug commands to look for specific types of
traffic or problems. Before using the debug command, narrow the problems to a
likely subset of causes. Use the show debugging command to view which debugging
features are enabled.
25.3
Troubleshooting Routing Protocols
25.3.2
Troubleshooting RIP configuration
This page will
discuss VLSM as the most common problem that occurs in RIP networks. VLSM
prevents the advertisement of RIP routes.
The most common
problem found in Routing Information Protocol (RIP) that prevents RIP routes
from being advertised is the variable-length subnet mask (VLSM). This is
because RIP Version 1 does not support VLSM. If the RIP routes are not being
advertised, check the following:
- Layer 1 or Layer 2 connectivity
issues exist.
- VLSM subnetting is configured.
VLSM subnetting cannot be used with RIP v1.
- Mismatched RIP v1 and RIP v2
routing configurations exist.
- Network statements are missing
or incorrectly assigned.
- The outgoing interface is down.
- The advertised network
interface is down.
The show ip
protocols command provides information about the parameters and current state
of the active routing protocol process. RIP sends updates to the interfaces in
the specified networks. If interface
FastEthernet 0/1 was configured but the network was not added to RIP routing,
no updates would be sent out or received from the interface.
Use the debug ip
rip EXEC command to display information on RIP routing transactions. The no
debug ip rip, no debug all, or undebug all commands will turn off all
debugging.
Figure shows that the router being debugged has
received an update from another router at source address 192.168.3.1. That
router sent information about two destinations in the routing table update. The
router being debugged also sent updates. Both routers broadcasted address
255.255.255.255 as the destination. The number in parentheses is the source
address encapsulated into the IP header.
An entry most
likely caused by a malformed packet from the transmitter is shown in the
following output:
RIP: bad version
128 from 160.89.80.43.
25.3
Troubleshooting Routing Protocols
25.3.3
Troubleshooting IGRP configuration
This page will
teach students how to troubleshoot IGRP. IGRP is an advanced distance vector
routing protocol that was developed by Cisco in the 1980s. IGRP has several
features that differentiate it from other distance vector routing protocols
such as RIP.
Use the router
igrpautonomous-system command to enable the IGRP routing process:
R1(config)#router
igrp 100
Use the router
configuration networknetwork-number command to enable interfaces to participate
in the IGRP update process:
R1(config-router)#network
172.30.0.0
R1(config-router)#network
192.168.3.0
Verify IGRP
configuration with the show running-configuration and show ip protocols
commands:
R1#show ip
protocols
Verify IGRP
operation with the show ip route command:
R1#show ip route
If IGRP does not
appear to be working correctly, check the following:
- Layer 1 or Layer 2 connectivity
issues exist.
- Autonomous system numbers on
IGRP routers are mismatched.
- Network statements are missing
or incorrectly assigned.
- The outgoing interface is down.
- The advertised network
interface is down.
To view IGRP
debugging information, use the following commands:
- debug ip igrp transactions
[host ip address] to view IGRP transaction information
- debug ip igrp events [host ip
address] to view routing update information
To turn off
debugging, use the no debug ip igrp command.
If a network
becomes inaccessible, routers running IGRP send triggered updates to neighbors
to inform them. A neighbor router will then respond with poison reverse updates
and keep the suspect network in a holddown state for 280 seconds.
25.3
Troubleshooting Routing Protocols
25.3.4
Troubleshooting EIGRP configuration
This page will
provide some commands that are used to troubleshoot EIGRP.
Normal EIGRP
operation is stable, efficient in bandwidth utilization, and relatively simple
to monitor and troubleshoot.
Use the router
eigrpautonomous-system command to enable the EIGRP routing process:
R1(config)#router
eigrp 100
To exchange
routing updates, each router in the EIGRP network must be configured with the
same autonomous system number.
Use the router
configuration networknetwork-number command to enable interfaces to participate
in the EIGRP update process:
R1(config-router)#network
172.30.0.0
R1(config-router)#network
192.168.3.0
Verify EIGRP
configuration with the show running-configuration and show ip protocols
commands:
R1#show ip
protocols
Some possible
reasons why EIGRP may not be working correctly are:
- Layer 1 or Layer 2 connectivity
issues exist.
- Autonomous system numbers on
EIGRP routers are mismatched.
- The link may be congested or
down.
- The outgoing interface is down.
- The advertised network
interface is down.
- Auto-summarization is enabled
on routers with discontiguous subnets. Use the no auto-summary command to
disable automatic network summarization.
One of the most
common reasons for a missing neighbor is a failure on the actual link. Another
possible cause of missing neighbors is an expired holddown timer. Since hellos
are sent every 5 seconds on most networks, the hold-time value in a show ip
eigrp neighbors command output should normally be a value between 10 and 15.
To effectively
monitor and troubleshoot an EIGRP network, use the commands described in
Figures - .
25.3
Troubleshooting Routing Protocols
25.3.5
Troubleshooting OSPF configuration
This page will
show students how to troubleshoot OSPF. OSPF is a link-state protocol.
Open Shortest
Path First (OSPF) is a link-state protocol. A link is an interface on a router.
The state of the link is a description of that interface and of its
relationship to its neighboring routers. For example, a description of the
interface would include the IP address, the mask, the type of network to which
it is connected, the routers connected to that network, and so on. This
information forms a link-state database.
The majority of
problems encountered with OSPF relate to the formation of adjacencies and the
synchronization of the link-state databases. The show ip ospf neighbor command
is useful for troubleshooting adjacency formation. The show commands that can
be used to troubleshoot OSPF are shown in Figure .
Use the debug ip
ospf events Privileged EXEC command to display the following information about
OSPF-related events:
- Adjacencies
- Flooding information
- Designated router selection
- Shortest path first (SPF)
calculation
If a router
configured for OSPF routing is not seeing an OSPF neighbor on an attached
network, perform the following tasks:
- Verify that both routers have
been configured with the same IP mask, OSPF hello interval, and OSPF dead
interval.
- Verify that both neighbors are
part of the same area.
To display
information about each Open Shortest Path First (OSPF) packet received, use the
debug ip ospf packet Privileged EXEC command. The no form of this command
disables debugging output.
The debug ip ospf
packet command produces one set of information for each packet received. The
output varies slightly, depending on which authentication is used.
Summary
This page
summarizes the topics discussed in this module.
Although IGRP and
EIGRP are compatible with each other, there are some differences. EIGRP offers
multiprotocol support, but IGRP does not. EIGRP and IGRP use different metric
calculations. IGRP has a maximum hop count of 255. EIGRP has a maximum hop
count limit of 224.
EIGRP routers
keep route and topology information readily available in RAM. Like OSPF, EIGRP
saves this information in three tables. The neighbor table lists adjacent
routers, the topology table which is made up of all the EIGRP routing tables in
the autonomous system, and the routing table which holds the best routes to a
destination. DUAL (the EIGRP distance vector algorithm) takes the information
supplied in the neighbor table and the topology table and calculates the lowest
cost routes to each destination. The preferred primary route is called the
successor route and the backup route is called the feasible successor (FS).
EIGRP is an
advanced distance vector routing protocol and acts as a link-state protocol
when updating neighbors and maintaining routing information. Advantages include
rapid convergence, efficient use of bandwidth, support for VLSM and CIDR,
support for multiple network layers, and independence from routed protocols.
The DUAL
algorithm results in the fast convergence of EIGRP. Each router has constructed
a topology table that contains information about how to route to specific
destinations. Each topology table identifies the routing protocol or EIGRP, the
lowest cost of the route, which is called Feasible Distance (FD), and the cost
of the route as advertised by the neighboring router called Reported Distance
(RD).
EIGRP
configuration commands vary depending on which protocol is used. Some examples
of these protocols are IP, IPX, and AppleTalk. The network command configures
only connected networks. EIGRP automatically summarizes routes at the classful
boundary. If there are discontiguous subnetworks, auto-summarization must be
disabled for routing to work properly. Verifying EIGRP operation is performed
by the use of various show commands.
The most
important table in EIGRP is the neighbor table that lists adjacent routers.
Hello packets are used to establish adjacencies with neighboring routers. By
default, hellos are sent every five seconds. Neighbor tables contain fields for
the neighbor address, hold time, smooth round-trip timer (SRTT), queue count (Q
Cnt), and a sequence number (Seq NO).
If a link goes
down, DUAL looks for an alternative route path, or feasible successor, in the
topology table. If a feasible successor is not found, the route is flagged as
active, or unusable at present. Query packets are sent to neighboring routers
requesting topology information. DUAL uses this information to recalculate successor
and feasible successor routes to the destination.
No comments:
Post a Comment