SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 7: Enhanced
Interior Gateway
Protocol (EIGRP)
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7
7.0 Introduction
7.1 Characteristics of EIGRP
7.2 Configuring EIGRP for IPv4
7.3 Operation of EIGRP
7.4 Configuration of EIGRP for IPv6
7.5 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7: Objectives
 Describe the features and operation of EIGRP.
 Examine the different EIGRP packet formats.
 Calculate the composite metric used by the Diffusing Update
Algorithm (DUAL).
 Describe the concepts and operation of DUAL.
 Examine the commands to configure and verify basic EIGRP
operations for IPv4 and IPv6.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
7.1 Characteristics of EIGRP
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Basic Features of EIGRP
Features of EIGRP
 Released in 1992 as a Cisco proprietary protocol.
 2013 basic functionality of EIGRP released as an open standard.
 Advanced Distance Vector routing protocol.
 Uses the Diffusing Update Algorithm (DUAL) to calculate paths and
back-up paths.
 Establishes Neighbor Adjacencies.
 Uses the Reliable Transport Protocol to provide delivery of EIGRP
packets to neighbors.
 Partial and Bounded Updates. Send updates only when there is a
change and only to the routers that need the information.
 Supports Equal and Unequal Cost Load Balancing.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Basic Features of EIGRP
Protocol Dependent Modules
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Basic Features of EIGRP
Reliable Transport Protocol
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Basic Features of EIGRP
Authentication
 EIGRP can be
configured to
authenticate routing
information.
 Ensures routers only
accept updates from
routers that have
been configured with
the correct
authentication
information.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of EIGRP Packets
EIGRP Packet Types
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of EIGRP Packets
EIGRP Hello Packets
 Used to discover EIGRP neighbors.
 Used to form and maintain EIGRP neighbor adjacencies.
 Sent as IPv4 or IPv6 multicasts.
 IPv4 multicast address 224.0.0.10.
 IPv6 multicast address FF02::A.
 Unreliable delivery.
 Sent every 5 seconds (every 60 seconds on low-speed NBMA
networks).
 EIGRP uses a default Hold timer of three times the Hello
interval before declaring neighbor unreachable.
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of EIGRP Packets
EIGRP Update & Acknowledgement Packets
 Update packets are sent to
propagate routing
information, only when
necessary.
 Sends Partial updates – only
contains information about
route changes.
 Sends Bounded updates-
sent only to routers affected
by the change.
 Updates use reliable
delivery, therefore, require
an acknowledgement.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of EIGRP Packets
EIGRP Query and Reply Packets
 Used when searching for networks.
 Queries use reliable delivery, which can be multicast or unicast.
 Replies use reliable delivery.
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP Messages
Encapsulating EIGRP Messages
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP Messages
EIGRP Packet Header and TLV
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
7.2 Configuring EIGRP for IPv4
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
EIGRP Network Topology
This course uses the topology that configures EIGRP with IPv4.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Autonomous System Numbers
 The router eigrp autonomous-system command enables
the EIGRP process.
 The autonomous system number is only significant to the EIGRP
routing domain.
 The EIGRP autonomous system number is not associated with the
Internet Assigned Numbers Authority (IANA) globally assigned
autonomous system numbers used by external routing protocols.
 Internet Service Providers (ISPs) require an autonomous system
number from IANA.
 ISPs often use the Border Gateway Protocol (BGP), which does
use the IANA autonomous system number in its configuration.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Router EIGRP Command
Router(config)# router eigrp autonomous-system
To completely remove the EIGRP routing process from a device,
use the no router eigrp autonomous-system command.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
EIGRP Router ID
Used in both EIGRP and OSPF routing protocols, the router ID’s
role is more significant in OSPF.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Configuring the EIGRP Router ID
 Configuring the EIGRP router ID
Router(config)# router eigrp autonomous-system
Router(config-router)# eigrp router-id ipv4-address
 The IPv4 loopback address can be used as the router ID.
 If the eigrp router-id value is not configured, the highest
loopback address is selected as the router ID.
 Configuring a loopback interface
Router(config)# interface loopback number
Router(config-if)# ip addressipv4-address subnet-mask
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Network Command
 Enables any interface on this router that matches the network
address in the network router configuration mode command to
send and receive EIGRP updates.
 These networks are included in EIGRP routing updates.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Network Command
The eigrp log-neighbor-changes router configuration mode
• On by default
• Displays changes in neighbor adjacencies
• Verifies neighbor adjacencies during configuration
• Indicates when any adjacencies have been removed
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
The Network Command and Wildcard Mask
 To configure EIGRP to advertise specific subnets only, use the
wildcard-mask option with the network command.
Router(config-router)# network network
address [wildcard-mask]
 The wildcard mask is the inverse of the subnet mask.
 To calculate the wildcard mask, subtract the subnet mask from
255.255.255.255:
255.255.255.255
-- 255.255.255.252
0. 0. 0. 3 wildcard mask
 Note: Some IOS versions also let you enter the subnet mask
instead of a wildcard mask.
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Passive Interface
 Use the passive-interface command to:
 Prevent neighbor adjacencies
 Suppress unnecessary update traffic
 Increase security controls, such as preventing unknown rogue
routing devices from receiving EIGRP updates
 To configure:
Router(config)# router eigrp as-number
Router(config-router)# passive-
interface interface-type interface-number
 To verify:
Router# show ip protocols
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Verifying EIGRP: Examining Neighbors

Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Verifying EIGRP: show ip protocols Command
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP with IPv4
Verifying EIGRP: Examine the IPv4 Routing Table
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
7.3 Operation of EIGRP
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP Initial Route Discovery
EIGRP Neighbor Adjacency
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP Initial Route Discovery
EIGRP Topology Table
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP Initial Route Discovery
EIGRP Convergence
Convergence – All routers have the correct, most up-to-date
information about the network.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Metrics
EIGRP Composite Metric
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Metrics
Examining Interface Values
 BW – Bandwidth of the
interface (in Kilobits per
second).
 DLY – Delay of the
interface
(microseconds).
 Reliability – Reliability of
interface; by default, the
value is not included in
the computing metric.
 Txload, Rxload – By
default, the value is not
included in the
computing metric.
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Metrics
Bandwidth Metric
 Use the show interfaces command to verify bandwidth.
 Most serial bandwidths are set to 1,544 kb/s (default).
 A correct value for bandwidth is very important in order to calculate
the correct metric (both sides of link must have same bandwidth).
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Metrics
Delay Metric
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Metrics
Calculating the EIGRP Metric
Step 1. Determine the link with the slowest bandwidth. Use that value
to calculate bandwidth (10,000,000/bandwidth).
Step 2. Determine the delay value for each outgoing interface on the
way to the destination. Add the delay values and divide by 10
(sum of delay/10).
Step 3. Add the computed values for bandwidth and delay, and
multiply the sum by 256 to obtain the EIGRP metric.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and the Topology Table
DUAL Concepts
 Diffusing Update ALgorithm (DUAL) provides the following:
 Loop-free paths and loop-free backup paths
 Fast convergence
 Minimum bandwidth usage with bounded updates
 The decision process for all route computations is done by the
DUAL Finite State Machine (FSM)
 DUAL FSM tracks all routes.
 Uses EIGRP metrics to select efficient, loop-free paths.
 Identifies the routes with the least-cost path to be inserted into
the routing table.
 EIGRP maintains a list of backup routes that DUAL has already
determined that can be used immediately if the primary path fails.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and the Topology Table
Successor and Feasible Distance
 The Successor is the least-cost route to the destination network.
 The Feasible Distance (FD) is the lowest calculated metric to reach
the destination network.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Feasible Successors, Feasibility Condition,
and Reported Distance
 Feasible Successor (FS) is a neighbor that has a loop-free backup
path to the same network as the successor, and it satisfies the
Feasibility Condition (FC).
 Feasibility Condition (FC) is met when a neighbor’s Reported
Distance (RD) to a network is less than the local router’s feasible
distance to the same destination network.
 Reported Distance (RD) is an EIGRP neighbor’s feasible distance
to the same destination network.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and the Topology Table
Topology Table: show ip eigrp Command
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and the Topology Table
Topology Table: No Feasible Successor
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and Convergence
DUAL Finite State Machine (FSM)
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and Convergence
DUAL: Feasible Successor
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
DUAL and Convergence
DUAL: No Feasible Successor
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45
7.4 Configuration of EIGRP for IPv6
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP for IPv4 vs. IPv6
EIGRP for IPv6
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP for IPv4 vs. IPv6
Comparing EIGRP for IPv4 and IPv6
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
EIGRP for IPv4 vs. IPv6
IPv6 Link-local Addresses
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP for IPv6
EIGRP for IPv6 Network Topology
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP for IPv6
Configuring IPv6 Link-Local Addresses
Manually configuring link-local addresses
Verifying link-local addresses
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP for IPv6
Configuring EIGRP for the IPv6 Routing Process
 The ipv6 unicast-routing global configuration mode
command is required to enable any IPv6 routing protocol.
 Configuring EIGRP for IPv6
 The no shutdown command and a router ID are required for the
router to form neighbor adjacencies.
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring EIGRP for IPv6
ipv6 eigrp interface Command
Enabling EIGRP of IPv6 on an Interface
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: Examining Neighbors
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: show ip protocols Command
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: Examine the Routing Table
Use the show ipv6 route command to examine the
IPv6 routing table.
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7: Summary
 EIGRP is a classless, advanced distance vector routing protocol.
 EIGRP uses the source code of “D” for DUAL in the routing table.
 The default administrative distance of 90 is used for internal routes
and 170 for routes imported from an external source.
 Advanced features include DUAL, establishing neighbor
adjacencies, RTP, partial and bounded updates, and equal and
unequal cost load balancing.
 PDMs give EIGRP the capability to support different Layer 3
protocols.
 EIGRP Hello packets are used to discover neighbors.
 The show ip eigrp neighbors command is used to view
neighbor table and verify adjacencies.
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7: Summary (cont.)
 EIGRP sends partial bounded updates when a change occurs on
network.
 EIGRP composite metric uses bandwidth, delay, reliability and load
to determine the best path (by default, only bandwidth and delay are
used).
 DUAL FSM is used to determine best path; Successor and potential
backup path, FS to every destination network.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PDF
CCNAv5 - S2: Chapter 8 single area ospf
PPTX
Bgp protocol
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PDF
Bidirectional Forwarding Detection (BFD)
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 5
PPT
CCNA Exploration 2 - Chapter 11
PDF
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter 8 single area ospf
Bgp protocol
CCNA 1 Routing and Switching v5.0 Chapter 2
Bidirectional Forwarding Detection (BFD)
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA Exploration 2 - Chapter 11
CCNAv5 - S2: Chapter5 Inter Vlan Routing

What's hot (20)

PDF
Overview of Spanning Tree Protocol (STP & RSTP)
PPTX
Chapter 17 : static routing
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PDF
CCNAv5 - S2: Chapter4 Routing Concepts
PPT
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 6
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PDF
Deploy MPLS Traffic Engineering
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
Router & functionality
PDF
CCNAv5 - S2: Chapter1 Introsuction to switched networks
PPTX
Ethernet VPN (EVPN) EVerything Provider Needs
PPTX
PDF
11 palo alto user-id concepts
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PDF
CCNAv5 - S2: Chapter3 Vlans
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPTX
Vpc notes
Overview of Spanning Tree Protocol (STP & RSTP)
Chapter 17 : static routing
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNAv5 - S2: Chapter4 Routing Concepts
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 4
Deploy MPLS Traffic Engineering
CCNA v6.0 ITN - Chapter 10
Router & functionality
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Ethernet VPN (EVPN) EVerything Provider Needs
11 palo alto user-id concepts
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter3 Vlans
CCNA 1 Routing and Switching v5.0 Chapter 1
Vpc notes
Ad

Viewers also liked (20)

PDF
CCNAv5 - S3: Chapter6 Multiarea OSPF
PDF
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
PDF
CCNAv5 - S3: Chapter 4 Wireless Lans
PDF
CCNAv5 - S3: Chapter3 Link Aggregation
PDF
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
PDF
Chapter5 adjust and troubleshoot single area ospf
PDF
CCNAv5 - S3: Chapter2 Lan Redundancy
PDF
CCNAv5 - S3: Chapter9 IOS Images and Licensing
PDF
PDF
Eigrp
PDF
Chapter 1 introduction to scaling networks
PDF
Ceh v8 Labs - Module18: Buffer Overflow.
PDF
CCNAv5 - S4: Chapter 4 Frame Relay
PDF
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PDF
Chapter 3 link aggregation
PDF
CCNAv5 - S4: Chapter2 Connecting To The Wan
PDF
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
PPT
Eigrp
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Chapter5 adjust and troubleshoot single area ospf
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter9 IOS Images and Licensing
Eigrp
Chapter 1 introduction to scaling networks
Ceh v8 Labs - Module18: Buffer Overflow.
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter3 Point to-point Connections
Chapter 3 link aggregation
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Eigrp
Ad

Similar to CCNAv5 - S3: Chapter 7 EIGRP (20)

PPTX
CCNA3 Verson6 Chapter6
PPT
CCNA Exploration 2 - Chapter 9
PPT
Exploration routing chapter_9
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
DOCX
Eigrp
PPTX
CCNA3 Verson6 Chapter7
PPT
Day 11 eigrp
PPT
Day 11.2 enablingeigrp
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
PDF
ENARSI_Chapter_2 in PDF format easy to understand
PPTX
ENARSI_Chapter_2 in PPTX format easy to understand
PPTX
CCNP ROUTE V7 CH2
PPT
Eigrp authentication
PPTX
CCNA2 Verson6 Chapter1
PPT
1 Routing Concepts-students to download only.ppt
PPTX
Cisco packet tracerEIGRP Advanced Configurations and Troubleshooting
PPTX
CCNP v6 Route: Implementing IP Routing Chapter 2
PPTX
CCNP Route EIGRP Overview
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA3 Verson6 Chapter6
CCNA Exploration 2 - Chapter 9
Exploration routing chapter_9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Eigrp
CCNA3 Verson6 Chapter7
Day 11 eigrp
Day 11.2 enablingeigrp
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
ENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understand
CCNP ROUTE V7 CH2
Eigrp authentication
CCNA2 Verson6 Chapter1
1 Routing Concepts-students to download only.ppt
Cisco packet tracerEIGRP Advanced Configurations and Troubleshooting
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP Route EIGRP Overview
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3

More from Vuz Dở Hơi (20)

PDF
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
PDF
Cehv8 Labs - Module15: Hacking Wireless Networks.
PDF
Cehv8 Labs - Module14: SQL Injection
PDF
Cehv8 Labs - Module13: Hacking Web Applications.
PDF
Cehv8 Labs - Module12: Hacking Webservers.
PDF
Ceh v8 Labs - Module11: Session Hijacking.
PDF
Cehv8 Labs - Module10: Denial of Service.
PDF
Cehv8 Labs - Module09: Social Engineering.
PDF
Cehv8 Labs - Module08: Sniffers.
PDF
Cehv8 Labs - Module07: Viruses and Worms.
PDF
Cehv8 Labs - Module06: Trojans and Backdoors.
PDF
Cehv8 Labs - Module 05: System Hacking.
PDF
Cehv8 Labs - Module04: Enumeration
PDF
Cehv8 Labs - Module03: Scanning Networks.
PDF
Cehv8 Labs - Module02: Footprinting and Reconnaissance
PDF
Cehv8 - Labs Module 00
PDF
Cehv8 - Module18: Buffer overflow.
PDF
Cehv8 - references
PDF
Cehv8 - Module 20: penetration testing
PDF
Cehv8 - Module 19: Cryptography
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module12: Hacking Webservers.
Ceh v8 Labs - Module11: Session Hijacking.
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 - Labs Module 00
Cehv8 - Module18: Buffer overflow.
Cehv8 - references
Cehv8 - Module 20: penetration testing
Cehv8 - Module 19: Cryptography

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
01-Introduction-to-Information-Management.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Lesson notes of climatology university.
PPTX
Cell Structure & Organelles in detailed.
PPTX
Pharma ospi slides which help in ospi learning
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
GDM (1) (1).pptx small presentation for students
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Types and Its function , kingdom of life
Weekly quiz Compilation Jan -July 25.pdf
RMMM.pdf make it easy to upload and study
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
01-Introduction-to-Information-Management.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
O5-L3 Freight Transport Ops (International) V1.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Lesson notes of climatology university.
Cell Structure & Organelles in detailed.
Pharma ospi slides which help in ospi learning

CCNAv5 - S3: Chapter 7 EIGRP

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Enhanced Interior Gateway Protocol (EIGRP) Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7 7.0 Introduction 7.1 Characteristics of EIGRP 7.2 Configuring EIGRP for IPv4 7.3 Operation of EIGRP 7.4 Configuration of EIGRP for IPv6 7.5 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7: Objectives  Describe the features and operation of EIGRP.  Examine the different EIGRP packet formats.  Calculate the composite metric used by the Diffusing Update Algorithm (DUAL).  Describe the concepts and operation of DUAL.  Examine the commands to configure and verify basic EIGRP operations for IPv4 and IPv6.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 7.1 Characteristics of EIGRP
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Basic Features of EIGRP Features of EIGRP  Released in 1992 as a Cisco proprietary protocol.  2013 basic functionality of EIGRP released as an open standard.  Advanced Distance Vector routing protocol.  Uses the Diffusing Update Algorithm (DUAL) to calculate paths and back-up paths.  Establishes Neighbor Adjacencies.  Uses the Reliable Transport Protocol to provide delivery of EIGRP packets to neighbors.  Partial and Bounded Updates. Send updates only when there is a change and only to the routers that need the information.  Supports Equal and Unequal Cost Load Balancing.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Basic Features of EIGRP Protocol Dependent Modules
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Basic Features of EIGRP Reliable Transport Protocol
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Basic Features of EIGRP Authentication  EIGRP can be configured to authenticate routing information.  Ensures routers only accept updates from routers that have been configured with the correct authentication information.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of EIGRP Packets EIGRP Packet Types
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of EIGRP Packets EIGRP Hello Packets  Used to discover EIGRP neighbors.  Used to form and maintain EIGRP neighbor adjacencies.  Sent as IPv4 or IPv6 multicasts.  IPv4 multicast address 224.0.0.10.  IPv6 multicast address FF02::A.  Unreliable delivery.  Sent every 5 seconds (every 60 seconds on low-speed NBMA networks).  EIGRP uses a default Hold timer of three times the Hello interval before declaring neighbor unreachable.
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of EIGRP Packets EIGRP Update & Acknowledgement Packets  Update packets are sent to propagate routing information, only when necessary.  Sends Partial updates – only contains information about route changes.  Sends Bounded updates- sent only to routers affected by the change.  Updates use reliable delivery, therefore, require an acknowledgement.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of EIGRP Packets EIGRP Query and Reply Packets  Used when searching for networks.  Queries use reliable delivery, which can be multicast or unicast.  Replies use reliable delivery.
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP Messages Encapsulating EIGRP Messages
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP Messages EIGRP Packet Header and TLV
  • 15. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 7.2 Configuring EIGRP for IPv4
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 EIGRP Network Topology This course uses the topology that configures EIGRP with IPv4.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Autonomous System Numbers  The router eigrp autonomous-system command enables the EIGRP process.  The autonomous system number is only significant to the EIGRP routing domain.  The EIGRP autonomous system number is not associated with the Internet Assigned Numbers Authority (IANA) globally assigned autonomous system numbers used by external routing protocols.  Internet Service Providers (ISPs) require an autonomous system number from IANA.  ISPs often use the Border Gateway Protocol (BGP), which does use the IANA autonomous system number in its configuration.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Router EIGRP Command Router(config)# router eigrp autonomous-system To completely remove the EIGRP routing process from a device, use the no router eigrp autonomous-system command.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 EIGRP Router ID Used in both EIGRP and OSPF routing protocols, the router ID’s role is more significant in OSPF.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Configuring the EIGRP Router ID  Configuring the EIGRP router ID Router(config)# router eigrp autonomous-system Router(config-router)# eigrp router-id ipv4-address  The IPv4 loopback address can be used as the router ID.  If the eigrp router-id value is not configured, the highest loopback address is selected as the router ID.  Configuring a loopback interface Router(config)# interface loopback number Router(config-if)# ip addressipv4-address subnet-mask
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Network Command  Enables any interface on this router that matches the network address in the network router configuration mode command to send and receive EIGRP updates.  These networks are included in EIGRP routing updates.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Network Command The eigrp log-neighbor-changes router configuration mode • On by default • Displays changes in neighbor adjacencies • Verifies neighbor adjacencies during configuration • Indicates when any adjacencies have been removed
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 The Network Command and Wildcard Mask  To configure EIGRP to advertise specific subnets only, use the wildcard-mask option with the network command. Router(config-router)# network network address [wildcard-mask]  The wildcard mask is the inverse of the subnet mask.  To calculate the wildcard mask, subtract the subnet mask from 255.255.255.255: 255.255.255.255 -- 255.255.255.252 0. 0. 0. 3 wildcard mask  Note: Some IOS versions also let you enter the subnet mask instead of a wildcard mask.
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Passive Interface  Use the passive-interface command to:  Prevent neighbor adjacencies  Suppress unnecessary update traffic  Increase security controls, such as preventing unknown rogue routing devices from receiving EIGRP updates  To configure: Router(config)# router eigrp as-number Router(config-router)# passive- interface interface-type interface-number  To verify: Router# show ip protocols
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Verifying EIGRP: Examining Neighbors 
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Verifying EIGRP: show ip protocols Command
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP with IPv4 Verifying EIGRP: Examine the IPv4 Routing Table
  • 28. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 7.3 Operation of EIGRP
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP Initial Route Discovery EIGRP Neighbor Adjacency
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP Initial Route Discovery EIGRP Topology Table
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP Initial Route Discovery EIGRP Convergence Convergence – All routers have the correct, most up-to-date information about the network.
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Metrics EIGRP Composite Metric
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Metrics Examining Interface Values  BW – Bandwidth of the interface (in Kilobits per second).  DLY – Delay of the interface (microseconds).  Reliability – Reliability of interface; by default, the value is not included in the computing metric.  Txload, Rxload – By default, the value is not included in the computing metric.
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Metrics Bandwidth Metric  Use the show interfaces command to verify bandwidth.  Most serial bandwidths are set to 1,544 kb/s (default).  A correct value for bandwidth is very important in order to calculate the correct metric (both sides of link must have same bandwidth).
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Metrics Delay Metric
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Metrics Calculating the EIGRP Metric Step 1. Determine the link with the slowest bandwidth. Use that value to calculate bandwidth (10,000,000/bandwidth). Step 2. Determine the delay value for each outgoing interface on the way to the destination. Add the delay values and divide by 10 (sum of delay/10). Step 3. Add the computed values for bandwidth and delay, and multiply the sum by 256 to obtain the EIGRP metric.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and the Topology Table DUAL Concepts  Diffusing Update ALgorithm (DUAL) provides the following:  Loop-free paths and loop-free backup paths  Fast convergence  Minimum bandwidth usage with bounded updates  The decision process for all route computations is done by the DUAL Finite State Machine (FSM)  DUAL FSM tracks all routes.  Uses EIGRP metrics to select efficient, loop-free paths.  Identifies the routes with the least-cost path to be inserted into the routing table.  EIGRP maintains a list of backup routes that DUAL has already determined that can be used immediately if the primary path fails.
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and the Topology Table Successor and Feasible Distance  The Successor is the least-cost route to the destination network.  The Feasible Distance (FD) is the lowest calculated metric to reach the destination network.
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Feasible Successors, Feasibility Condition, and Reported Distance  Feasible Successor (FS) is a neighbor that has a loop-free backup path to the same network as the successor, and it satisfies the Feasibility Condition (FC).  Feasibility Condition (FC) is met when a neighbor’s Reported Distance (RD) to a network is less than the local router’s feasible distance to the same destination network.  Reported Distance (RD) is an EIGRP neighbor’s feasible distance to the same destination network.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and the Topology Table Topology Table: show ip eigrp Command
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and the Topology Table Topology Table: No Feasible Successor
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and Convergence DUAL Finite State Machine (FSM)
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and Convergence DUAL: Feasible Successor
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential DUAL and Convergence DUAL: No Feasible Successor
  • 45. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45 7.4 Configuration of EIGRP for IPv6
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP for IPv4 vs. IPv6 EIGRP for IPv6
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP for IPv4 vs. IPv6 Comparing EIGRP for IPv4 and IPv6
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EIGRP for IPv4 vs. IPv6 IPv6 Link-local Addresses
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP for IPv6 EIGRP for IPv6 Network Topology
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP for IPv6 Configuring IPv6 Link-Local Addresses Manually configuring link-local addresses Verifying link-local addresses
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP for IPv6 Configuring EIGRP for the IPv6 Routing Process  The ipv6 unicast-routing global configuration mode command is required to enable any IPv6 routing protocol.  Configuring EIGRP for IPv6  The no shutdown command and a router ID are required for the router to form neighbor adjacencies.
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring EIGRP for IPv6 ipv6 eigrp interface Command Enabling EIGRP of IPv6 on an Interface
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying EIGRP for IPv6 Verifying EIGRP for IPv6: Examining Neighbors
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying EIGRP for IPv6 Verifying EIGRP for IPv6: show ip protocols Command
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying EIGRP for IPv6 Verifying EIGRP for IPv6: Examine the Routing Table Use the show ipv6 route command to examine the IPv6 routing table.
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7: Summary  EIGRP is a classless, advanced distance vector routing protocol.  EIGRP uses the source code of “D” for DUAL in the routing table.  The default administrative distance of 90 is used for internal routes and 170 for routes imported from an external source.  Advanced features include DUAL, establishing neighbor adjacencies, RTP, partial and bounded updates, and equal and unequal cost load balancing.  PDMs give EIGRP the capability to support different Layer 3 protocols.  EIGRP Hello packets are used to discover neighbors.  The show ip eigrp neighbors command is used to view neighbor table and verify adjacencies.
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7: Summary (cont.)  EIGRP sends partial bounded updates when a change occurs on network.  EIGRP composite metric uses bandwidth, delay, reliability and load to determine the best path (by default, only bandwidth and delay are used).  DUAL FSM is used to determine best path; Successor and potential backup path, FS to every destination network.
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential