| 0 comments ]

Configuring and Verifying EIGRP Authentication

Add a note hereYou can prevent your router from receiving fraudulent route updates by configuring neighbor router authentication. You can configure EIGRP neighbor authentication (also called neighbor router authentication or route authentication) such that routers can participate in routing based on predefined passwords.

Add a note hereThis section first describes router authentication in general, followed by a discussion of how to configure and troubleshoot EIGRP message digest 5 (MD5) authentication.

Add a note here Router Authentication

Add a note hereYou can configure neighbor router authentication such that routers only participate in routing based on predefined passwords.

Add a note hereBy default, no authentication is used for routing protocol packets. Without neighbor authentication, unauthorized or deliberately malicious routing updates could compromise the security of network traffic. For example, an unauthorized router connected to the network (by someone with malicious or innocent intentions) could send a fictitious routing update to convince your router to send traffic to an incorrect destination.

Add a note hereWhen neighbor router authentication has been configured on a router, the router authenticates the source of each routing protocol packet that it receives. This is accomplished by the exchange of an authentication key (also called a password) that is known to both the sending and the receiving router.

Add a note here Simple Authentication Versus MD5 Authentication

Add a note hereRouters use two types of authentication:

  • Add a note here Simple password authentication (also called plain-text authentication)— Supported by Integrated System-Integrated System (IS-IS) Protocol, OSPF, and Routing Information Protocol Version 2 (RIPv2)

  • Add a note here MD5 authentication— Supported by OSPF, RIPv2, BGP, and EIGRP


Note

Add a note hereThis book covers authentication for EIGRP, OSPF, and BGP.

Add a note hereBoth forms of authentication work in the same way, with the exception that MD5 sends a message digest rather than the authenticating key itself. The message digest is created using the key (and a key ID with some protocols) and a message, but the key itself is not sent, preventing it from being read while it is being transmitted. Simple password authentication sends the authenticating key itself over the wire.


Note

Add a note hereSimple password authentication is not recommended for use as part of your security strategy because it is vulnerable to passive attacks. Anybody with a link analyzer could easily view the password on the wire. The primary use of simple password authentication is to avoid accidental changes to the routing infrastructure. Using MD5 authentication, however, is a recommended security practice.


Caution

Add a note hereAs with all keys, passwords, and other security secrets, it is imperative that you closely guard the keys used in neighbor authentication. The security benefits of this feature are reliant upon keeping all authenticating keys confidential. Also, when performing router management tasks via Simple Network Management Protocol (SNMP), do not ignore the risk associated with sending keys using nonencrypted SNMP.

Add a note hereWith simple password authentication, a password (key) is configured on a router; each participating neighbor router must be configured with the same key. When a packet is sent, the password is included in plain text.

Add a note hereMD5 authentication, described in RFC 1321, The MD5 Message-Digest Algorithm, is a cryptographic authentication. A key (password) and key ID are configured on each router. The router uses an algorithm based on the routing protocol packet, the key, and the key ID to generate a message digest (also called a hash) that is appended to the packet. Unlike the simple authentication, the key is not exchanged over the wire—the message digest is sent instead of the key, which ensures that nobody can eavesdrop on the line and learn keys during transmission.


Note

Add a note hereMD5 provides authentication but does not provide confidentiality. The contents of routing protocol packets are not encrypted.

Add a note here MD5 Authentication for EIGRP

Add a note here By default, no authentication is used for EIGRP packets. You can configure EIGRP to use MD5 authentication.

Add a note hereWhen EIGRP neighbor authentication has been configured on a router, the router authenticates the source of each routing protocol packet that it receives. The MD5 keyed digest in each EIGRP packet prevents the introduction of unauthorized or false routing messages from unapproved sources.

Add a note hereFor EIGRP MD5 authentication, you must configure an authenticating key and a key ID on both the sending router and the receiving router. Each EIGRP router takes the key and key ID and generates message digest that is appended to each routing protocol packet and sent to the neighbor. The receiving router computes the MD5 hash from the received EIGRP information. If the hash matches with the value received, the packet is accepted. If there is no match, the packet is silently dropped.

Add a note hereEach key has its own key ID, which is stored locally. The combination of the key ID and the interface associated with the message uniquely identifies the authentication algorithm and MD5 authentication key in use.

Add a note hereYou can increase the security of EIGRP MD5 authentication by making frequent key changes. You can define and activate multiple keys based on time, as defined in the configuration. Transition between the keys is implemented in such way that it allows a nondisruptive operation of EIGRP exchanges. The key changes must be well planned and supported by time synchronization between the routers. The rollover to a new key works only if the time on adjacent routers is synchronized.


Note

Add a note hereEIGRP routers need to know the time to be able to rotate through keys in synchronization with the other participating routers, to ensure that all routers are using the same key at the same moment. Several mechanisms can be used for time synchronization; Network Time Protocol (NTP) is the most common.

Add a note hereEIGRP allows multiple keys to be managed using key chains. Each key definition within the key chain can include a time interval for which that key will be activated (known as its lifetime). Then, during a given key’s lifetime, routing update packets are sent with this activated key. Only one authentication packet is sent, regardless of how many valid keys exist. When sending, the software examines the key numbers in order from lowest to highest, and it uses the first valid key it encounters. Incoming packets are checked using all valid keys.

Add a note hereWhen configuring EIGRP authentication, you specify the key ID (number), the key (password), and optionally the lifetime of the key.

Add a note hereThe first (by key ID), valid (by lifetime) key is used when sending packets. In other words, when sending EIGRP packets, the valid key with the lowest key number on the key chain is used. When packets are received, all currently valid keys are checked until a match is found.

Add a note hereKeys cannot be used during time periods for which they are not activated. Therefore, it is recommended that for a given key chain, key activation times overlap to avoid any period of time for which no key is activated. If a time period occurs during which no key is activated, neighbor authentication cannot occur, and therefore routing updates will fail.

Planning for EIGRP Authentication

Add a note here Before configuring EIGRP authentication, the network administrator must examine the existing EIGRP configuration and define the authentication requirements. The EIGRP authentication requirements include the authentication type (none or MD5), the number of keys used, and the optional lifetime parameters.

Add a note hereThe parameters must then be defined in enough details for the network operator to configure EIGRP authentication. These parameters include the following:

  • Add a note hereThe EIGRP autonomous system number

  • Add a note hereThe authentication mode (MD5)

  • Add a note hereThe definition of one or more keys to authenticate EIGRP packets, according to the network security plan

  • Add a note hereThe keys’ lifetime, if multiple keys are defined

Add a note hereAt a high level, configuring EIGRP MD5 authentication requires the following steps:

Add a note here Step 1

Add a note hereConfigure the authentication mode for EIGRP.

Add a note here Step 2

Add a note hereConfigure the key chain.

Add a note here Step 3

Add a note hereOptionally configure the keys’ lifetime parameters.

Add a note here Step 4

Add a note hereEnable authentication to use the keys in the key chain.

Add a note hereThe next section details how to configure EIGRP MD5 authentication.

Configuring EIGRP MD5 Authentication

Add a note hereMD5 authentication must be configured on all interfaces between two neighboring routers. To configure MD5 authentication for EIGRP, complete the following steps:

Add a note here Step 1

Add a note hereEnter configuration mode for the interface on which you want to enable authentication.

Add a note here Step 2

Add a note hereSpecify MD5 authentication for EIGRP packets using the ip authentication mode eigrp autonomous-system md5 interface configuration command. The autonomous-system is the EIGRP autonomous system number in which authentication is to be used.

Add a note here Step 3

Add a note hereEnter the key-chain configuration mode for the key chain (that you will later configure on the interface) using the key chain name-of-chain global configuration command.

Add a note here Step 4

Add a note hereIdentify a key ID to use and enter configuration mode for that key (the key-chain-key configuration mode) using the key key-id key-chain configuration command. The key-id is the ID number of an authentication key on a key chain. The range of keys is from 0 to 2147483647. The key ID numbers need not be consecutive.

Add a note here Step 5

Add a note here Identify the key string (the password) for this key using the key-string key key-chain-key configuration command. The key is the authentication key-string that is to be used to authenticate sent and received EIGRP packets. The key string can contain from 1 to 80 uppercase and lowercase alphanumeric characters, except that the first character cannot be a number. The key string for a given key ID must be the same on neighboring routers and is case sensitive.

Add a note here Step 6

Add a note hereOptionally specify the time period during which this key will be accepted for use on received packets using the accept-lifetime start-time {infinite | end-time | duration seconds} key-chain-key configuration command. Table 2-9 describes the parameters for this command.

Add a note here Table 2-9: accept-lifetime Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here start-time

Add a note hereBeginning time that the key specified by the key command is valid for use on received packets. The syntax can be either of the following:

Add a note herehh:mm:ss month date year
hh:mm:ss date month year

Add a note hereThe time and date syntax is described as follows:

Add a note herehh—hours
mm—minutes
ss—seconds
month—first three letters of the month
date—date (1-31)
year—year (four digits)

Add a note hereThe default start time and the earliest acceptable date is January 1, 1993.

Add a note here infinite

Add a note hereIndicates the key is valid for use on received packets from the start-time value on.

Add a note here end-time

Add a note hereIndicates the key is valid for use on received packets from the start-time value until the end-time value. The syntax is the same as that for the start-time value. The end-time value must be after the start-time value. The default end time is an infinite time period.

Add a note here seconds

Add a note hereLength of time (in seconds) that the key is valid for use on received packets. The range is from 1 to 2147483646.

Add a note here Step 7

Add a note hereOptionally specify the time period during which this key can be used for sending packets using the send-lifetime start-time {infinite | end-time | duration seconds} key-chain-key configuration command. Table 2-10 describes the parameters for this command.

Add a note here Table 2-10: send-lifetime Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here start-time

Add a note hereBeginning time that the key specified by the key command is valid to be used for sending packets. The syntax can be either of the following:

Add a note herehh:mm:ss month date year
hh:mm:ss date month year

Add a note hereThe time and date syntax is described as follows:

Add a note herehh—hours
mm—minutes
ss—seconds
month—first three letters of the month
date—date (1-31)
year—year (four digits)

Add a note hereThe default start time and the earliest acceptable date is January 1, 1993.

Add a note here infinite

Add a note here Indicates the key is valid to be used for sending packets from the start-time value on.

Add a note here end-time

Add a note hereIndicates the key is valid to be used for sending packets from the start-time value until the end-time value. The syntax is the same as that for the start-time value. The end-time value must be after the start-time value. The default end time is an infinite time period.

Add a note here seconds

Add a note hereLength of time (in seconds) that the key is valid to be used for sending packets. The range is from 1 to 2147483646.

Add a note here Step 8

Add a note hereEnable the authentication of EIGRP packets with a key specified in a key chain by using the ip authentication key-chain eigrp autonomous-system name-of-chain interface configuration command. The autonomous-system parameter specifies the EIGRP autonomous system number in which authentication is to be used. The name-of-chain parameter specifies the name of the configured key chain from which a key is to be obtained for this interface.


Note

Add a note hereIf the service password-encryption command is not used when implementing EIGRP authentication, the key string will be stored as plain text in the router configuration. If you configure the service password-encryption command, the key string will be stored and displayed in an encrypted form; when it is displayed, there will be an encryption-type of 7 specified before the encrypted key string.

MD5 Authentication Configuration Example

Add a note here Figure 2-41 shows the network used to illustrate the configuration, verification, and troubleshooting of MD5 authentication.

Click to collapse
Add a note hereFigure 2-41: Network for EIGRP Authentication Configuration Example.

Add a note here Example 2-50 shows the configuration of the R1 router.

Add a note here Example 2-50: Configuration of Router R1 in Figure 2-41

Add a note hereR1#show running-config

key chain R1chain
key 1
key-string firstkey
accept-lifetime 04:00:00 Jan 1 2009 infinite
send-lifetime 04:00:00 Jan 1 2009 04:00:00 Jan 31 2009
key 2
key-string secondkey
accept-lifetime 04:00:00 Jan 25 2009 infinite
send-lifetime 04:00:00 Jan 25 2009 infinite

interface FastEthernet0/0
ip address 172.16.1.1 255.255.255.0
!
interface Serial0/0/1
bandwidth 64
ip address 192.168.1.101 255.255.255.224
ip authentication mode eigrp 100 md5
ip authentication key-chain eigrp 100 R1chain
!
router eigrp 100
network 172.16.1.0 0.0.0.255
network 192.168.1.0
auto-summary

Add a note hereEIGRP autonomous system 100 is used in this network.

Add a note here MD5 authentication is configured on the serial 0/0/1 interface with the ip authentication mode eigrp 100 md5 command. When MD5 authentication is configured, an MD5 keyed digest is added to each EIGRP packet sent and is checked in each received EIGRP packet.

Add a note hereThe key chain R1chain command enters configuration mode for the R1chain key chain. Two keys are defined in this key chain. Each key has an authentication string and lifetime specified. The network administrator wants to change the keys on all the routers in the network each month to improve the security. The administrator configures an overlap of one week to change the keys on all the routers by configuring key 2 to be valid one week before key 1 expires.

Add a note hereKey 1 is set to firstkey with the key-string firstkey command. This key is acceptable for use on packets received by R1 from January 1, 2009 onward, as specified in the accept-lifetime 04:00:00 Jan 1 2009 infinite command. However, the send-lifetime 04:00:00 Jan 1 2009 04:00:00 Jan 31 2009 command specifies that this key was only valid for use when sending packets until January 31, 2009. It is no longer valid for use in sending packets after January 31 2009.

Add a note hereKey 2 is set to secondkey with the key-string secondkey command. This key is acceptable for use on packets received by R1 from January 25, 2009 onward, as specified in the accept-lifetime 04:00:00 Jan 25 2009 infinite command. This key can also be used when sending packets from January 25, 2009 onward, as specified in the send-lifetime 04:00:00 Jan 25 2009 infinite command.

Add a note hereThe ip authentication key-chain eigrp 100 R1chain command configured on the Serial 0/0/1 interface specifies that the EIGRP key chain R1chain is to be used on this interface.

Add a note hereRecall that the router uses the first, by key number, valid key for sending packets. As a result of this configuration, Router R1 will use key 1 for sending, from January 1 to 31, 2009, and will used key 2 for sending as of 4:00 a.m. on January 31, 2009. Router R1 will accept key 1 for received packets, from January 1, 2009, and will also accept key 2 for received packets, from January 25, 2009. All other MD5 packets will be dropped.

Add a note here Example 2-51 shows the configuration of the R2 router.

Add a note here Example 2-51: Configuration of Router R2 in Figure 2-41

Add a note hereR2#show running-config

key chain R2chain
key 1
key-string firstkey
accept-lifetime 04:00:00 Jan 1 2009 infinite
send-lifetime 04:00:00 Jan 1 2009 infinite
key 2
key-string secondkey
accept-lifetime 04:00:00 Jan 25 2009 infinite
send-lifetime 04:00:00 Jan 25 2009 infinite

interface FastEthernet0/0
ip address 172.17.2.2 255.255.255.0
!
interface Serial0/0/1
bandwidth 64
ip address 192.168.1.102 255.255.255.224
ip authentication mode eigrp 100 md5
ip authentication key-chain eigrp 100 R2chain
!
router eigrp 100
network 172.17.2.0 0.0.0.255
network 192.168.1.0
auto-summary

Add a note here MD5 authentication is configured on the Serial 0/0/1 interface with the ip authentication mode eigrp 100 md5 command.

Add a note hereThe key chain R2chain command enters configuration mode for the R2chain key chain. Two keys are defined. Key 1 is set to firstkey with the key-string firstkey command. This key is acceptable for use on packets received by R2 from January 1, 2009 onward, as specified in the accept-lifetime 04:00:00 Jan 1 2009 infinite command. This key can also be used when sending packets from January 1, 2009 onward, as specified in the send-lifetime 04:00:00 Jan 1 2009 infinite command.

Add a note hereKey 2 is set to secondkey with the key-string secondkey command. This key is acceptable for use on packets received by R2 from January 25, 2009 onward, as specified in the accept-lifetime 04:00:00 Jan 25 2009 infinite command. This key can also be used when sending packets from January 25, 2009 onward, as specified in the send-lifetime 04:00:00 Jan 25 2009 infinite command.

Add a note hereAs a result of this configuration, Router R2 will use key 1 for sending, from January 1, 2009, because it is the first valid key in the key chain. (Of course, if key 1 is deleted in the future, key 2 will be used for sending.) Router R2 will accept key 1 for received packets, from January 1, 2009, and will also accept key 2 for received packets, from January 25, 2009. All other MD5 packets will be dropped.

Add a note hereThe ip authentication key-chain eigrp 100 R2chain command configured on the Serial 0/0/1 interface specifies that the key chain R2chain is to be used on this interface.

Add a note here Verifying MD5 Authentication for EIGRP

Add a note hereThis section provides examples of MD5 authentication verification and troubleshooting.

EIGRP MD5 Authentication Verification

Add a note here Example 2-52 provides the output of the show ip eigrp neighbors and show ip route commands on the R1 router depicted in the network in Figure 2-41. The neighbor table indicates that the two routers have successfully formed an EIGRP adjacency. The routing table verifies that the 172.17.0.0 network has been learned via EIGRP over the serial connection. Example 2-52 also shows the results of a ping to the R2 Fast Ethernet interface address to illustrate that the link is working.

Add a note here Example 2-52: Output on Router R1 in Figure 2-41

Add a note hereR1#
*Apr 21 16:23:30.517: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 100: Neighbor 192.168.1.102
(Serial0/0/1) is up: new adjacency

R1#show ip eigrp neighbors
IP-EIGRP neighbors for process 100
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 192.168.1.102 Se0/0/1 12 00:03:10 17 2280 0 14
R1#show ip route

Gateway of last resort is not set
D 172.17.0.0/16 [90/40514560] via 192.168.1.102, 00:02:22, Serial0/0/1
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
D 172.16.0.0/16 is a summary, 00:31:31, Null0
C 172.16.1.0/24 is directly connected, FastEthernet0/0
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.96/27 is directly connected, Serial0/0/1
D 192.168.1.0/24 is a summary, 00:31:31, Null0
R1#ping 172.17.2.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.2.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 12/15/16 ms

Add a note hereYou can use the show key chain [name-of-chain] verification command to see the key chain, key string, and the lifetime of the keys configured under the key chain. Example 2-53 shows the keys on the R1 router. This command is useful to verify that the keys are the same on both neighbors and that the lifetime is set properly.

Add a note here Example 2-53: show key chain Command Output on Router R1 in Figure 2-41

Add a note hereR1#show key chain
Key-chain R1chain:
key 1 — text "firstkey"
accept lifetime (04:00:00 Jan 1 2009) - (always valid) [valid now]
send lifetime (04:00:00 Jan 1 2009) - (04:00:00 Jan 31 2009)
key 2 — text "secondkey"
accept lifetime (04:00:00 Jan 25 2009) - (always valid) [valid now]
send lifetime (04:00:00 Jan 25 2009) - (always valid) [valid now]

Add a note here Key chain R1chain and both keys key 1 (with authentication string firstkey) and key 2 (with authentication string secondkey) are displayed. Under each key, the lifetime of the key is also shown. By observing the same output from the neighboring Router R2, the configuration can be verified.

Add a note hereThe show ip eigrp interface detail command can also be used to display detailed information about the EIGRP interfaces for a specific EIGRP process, including the authentication mode and the key chain configured on the interface.

Troubleshooting MD5 Authentication

Add a note hereThis section provides some examples of how to troubleshoot EIGRP MD5 authentication.

Add a note hereAs discussed earlier, the debug eigrp packets command displays general debugging information and is useful for analyzing the messages traveling between the local and remote devices, including authentication messages.

Example of Successful MD5 Authentication

Add a note here Example 2-54 shows output from the debug eigrp packets command on R1, which displays that R1 is receiving EIGRP packets with MD5 authentication, with a key ID equal to 1, from R2.

Add a note here Example 2-54: debug eigrp packets Command Output on Router R1 in Figure 2-41

Add a note hereR1#debug eigrp packets
EIGRP Packets debugging is on
(UPDATE, REQUEST, QUERY, REPLY, HELLO, IPXSAP, PROBE, ACK, STUB, SIAQUERY,
SIAREPLY)
*Apr 21 16:38:51.745: EIGRP: received packet with MD5 authentication, key id = 1
*Apr 21 16:38:51.745: EIGRP: Received HELLO on Serial0/0/1 nbr 192.168.1.102
*Apr 21 16:38:51.745: AS 100, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
peerQ un/rely 0/0

Add a note hereSimilarly, the output of the debug eigrp packets command on R2 shown in Example 2-55 illustrates that R2 is receiving EIGRP packets with MD5 authentication, with a key ID equal to 2, from R1. (Router R1 is using key 2 because this output was taken in April, after key 1 expired for sending in Router R1.)

Add a note here Example 2-55: debug eigrp packets Command Output on Router R2 in Figure 2-41

Add a note hereR2#debug eigrp packets
EIGRP Packets debugging is on
(UPDATE, REQUEST, QUERY, REPLY, HELLO, IPXSAP, PROBE, ACK, STUB, SIAQUERY,
SIAREPLY)
R2#
*Apr 21 16:38:38.321: EIGRP: received packet with MD5 authentication, key id = 2
*Apr 21 16:38:38.321: EIGRP: Received HELLO on Serial0/0/1 nbr 192.168.1.101
*Apr 21 16:38:38.321: AS 100, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
peerQ un/rely 0/0

Example of Troubleshooting MD5 Authentication Problems

Add a note here For this example, the key string for Router R1’s key 2, the one that it uses when sending EIGRP packets, is changed to be different from the key string that Router R2 is expecting. Example 2-56 shows the changes to the configuration for R1.

Add a note here Example 2-56: Changes to the Configuration of Router R1 in Figure 2-41

Add a note hereR1(config-if)#key chain R1chain
R1(config-keychain)#key 2
R1(config-keychain-key)#key-string wrongkey

Add a note hereThe output of the debug eigrp packets command on R2 shown in Example 2-57 illustrates that R2 is receiving EIGRP packets with MD5 authentication, with a key ID equal to 2, from R1, but that there is an authentication mismatch. The EIGRP packets from R1 are ignored, and the neighbor relationship is declared to be down. The output of the show ip eigrp neighbors command confirms that R2 does not have any EIGRP neighbors.

Add a note here Example 2-57: Output on Router R2 in Figure 2-41

Add a note hereR2#debug eigrp packets
EIGRP Packets debugging is on
(UPDATE, REQUEST, QUERY, REPLY, HELLO, IPXSAP, PROBE, ACK, STUB, SIAQUERY,
SIAREPLY)
R2#
*Apr 21 16:50:18.749: EIGRP: pkt key id = 2, authentication mismatch
*Apr 21 16:50:18.749: EIGRP: Serial0/0/1: ignored packet from 192.168.1.101,
opcode = 5 (invalid authentication)
*Apr 21 16:50:18.749: EIGRP: Dropping peer, invalid authentication
*Apr 21 16:50:18.749: EIGRP: Sending HELLO on Serial0/0/1
*Apr 21 16:50:18.749: AS 100, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
*Apr 21 16:50:18.753: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 100: Neighbor 192.168.1.101
(Serial0/0/1) is down: Auth failure
R2#show ip eigrp neighbors
IP-EIGRP neighbors for process 100
R2#

Add a note here The two routers keep trying to reestablish their neighbor relationship. Because of the different keys used by each router in this scenario, R1 will authenticate hello messages sent by R2 using key 1. When R1 sends a hello message back to R2 using key 2, however, an authentication mismatch exists. From R1’s perspective, the relationship appears to be up for a while, but then it times out, as illustrated by the messages received on R1 shown in Example 2-58. The output of the show ip eigrp neighbors command on R1 also illustrates that R1 does have R2 in its neighbor table for a short time.

Add a note here Example 2-58: Output on Router R1 in Figure 2-41

Add a note hereR1#
*Apr 21 16:54:09.821: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 100: Neighbor 192.168.1.102
(Serial0/0/1) is down: retry limit exceeded
*Apr 21 16:54:11.745: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 100: Neighbor 192.168.1.102
(Serial0/0/1) is up: new adjacency
R1#show ip eigrp neighbors
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 192.168.1.102 Se0/0/1 13 00:00:38 1 5000 1 0

Add a note hereThis section dealt with EIGRP authentication. The following section provides information on other features that can be implemented in EIGRP to optimize its operation.


Optimizing EIGRP Implementations

Add a note hereEIGRP is a scalable routing protocol that ensures that as a network grows larger, it operates efficiently and adjusts rapidly to changes. This section describes practical EIGRP-specific techniques to implement an effective, scalable enterprise network.

Add a note here EIGRP Scalability in Large Networks

Add a note hereOperating one large flat EIGRP network is normally not scalable. Some issues to consider include the following:

  • Add a note hereLarge routing tables that need to be processed

  • Add a note hereHigh memory demands resulting from a large topology table, a large number of routes in a routing table, and in some environments (for example, on central site concentration routers), a large number of neighbors in the neighbor table

  • Add a note hereHigh bandwidth demands resulting from the exchange of a large number of routing updates, and sending many queries and replies within a large EIGRP domain (which possibly includes links with low bandwidth and links with a significant number of transmission errors)

Add a note here The following are some of the many variables that affect network scalability:

  • Add a note here The amount of information exchanged between neighbors— If more information than necessary for routing to function correctly is exchanged between EIGRP neighbors, unnecessary work during routing startup and topology changes results.

  • Add a note here The number of routers— When a topology change occurs, the amount of resources consumed by EIGRP is directly related to the number of routers that must be involved in the change.

  • Add a note here The topology’s depth— The topology’s depth can affect the convergence time. Depth refers to the number of hops that information must travel to reach all routers. For example, a multinational network without route summarization has a large depth and therefore increased convergence time.

    Add a note hereA three-tiered network design (as described in Chapter 1) is highly recommended for all IP routing environments. The recommendation is that there should not be more than seven hops between any two routing devices on an enterprise internetwork because the propagation delay and the query process across multiple hops when changes occur can slow down the convergence of the network when routes are lost.

  • Add a note here The number of alternative paths through the network— A network should provide alternative paths to avoid single points of failure. However, too many alternative paths can create problems with EIGRP convergence, because the EIGRP routing process, using queries, needs to explore all possible paths for lost routes. This complexity creates an ideal condition for a router to become stuck-in-active (SIA)—described in the next section—as it awaits a response to queries that are being propagated through these many alternative paths.

Add a note hereWhen implementing EIGRP as the routing protocol, some design challenges need to be addressed. Three major factors are:

  • Add a note hereThe size of the topology and routing tables, which is affected by the number of neighboring routers.

  • Add a note hereThe number of changes in the network.

  • Add a note hereThe EIGRP load on the WAN.

Add a note hereThese three factors dictate the EIGRP design and where query boundaries should be introduced (using summarization, redistribution, and so on, as described later in this chapter). Without any boundaries, queries are propagated throughout the EIGRP domain, and very often, all the routers become involved in a DUAL computation, resulting in high bandwidth utilization and CPU load. Frequent DUAL computations have an effect on all tables maintained by the routers, including EIGRP tables and the caches built during the forwarding process.

Add a note here EIGRP Queries and Stuck-in-Active

Add a note here As an advanced distance vector routing protocol, EIGRP relies on its neighbors to provide routing information. Recall that when a router loses a route and does not have an FS in its topology table, it looks for an alternative path to the destination. This is known as going active on a route. (Recall that a route is considered passive when a router is not recomputing that route.) Recomputing a route involves sending query packets to all neighbors on interfaces other than the one used to reach the previous successor (because of split horizon), inquiring whether they have a route to the given destination. If a router has an alternative route, it answers the query with a reply packet and does not propagate the query further. The reply includes the alternate route. If a neighbor does not have an alternative route, it queries each of its own neighbors for an alternative path. The queries then propagate through the network, thus creating an expanding tree of queries. When a router answers a query, it stops the spread of the query through that branch of the network. However, the query can still spread through other portions of the network as other routers attempt to find alternative paths, which might not exist.

Add a note here Figure 2-42 presents a network example where a single lost route might result in an enormous number of queries sent throughout the EIGRP domain. The route to the network 10.1.1.0 on Router R1 is lost and Router R1 sends a query to all neighboring routers on all interfaces except the interface of the successor (because of split horizon). In this case, the query is sent to Router R2. Router R2 cascades the query to its neighbors because it has no information about the lost route, and so on. Each query requires a reply from the neighbor, and the amount of EIGRP traffic increases. In this network topology, no redundant path to network 10.1.1.0 is available, and the EIGRP query propagation process is far from being efficient. Many queries are sent, and each query is followed by a reply. Several solutions exist to optimize the query propagation process and to limit the amount of unnecessary EIGRP load on the links, including summarization, redistribution, and using the EIGRP stub routing feature.

Click to collapse
Add a note hereFigure 2-42: EIGRP Query Process.

Note

Add a note hereEIGRP summarization and stub routing features are explored later in this chapter. Details of how routes are redistributed are covered in Chapter 4.

Add a note hereThe following sections describe how EIGRP may get stuck in the active state for a route, and how to prevent this from happening.

Stuck-in-Active Connections in EIGRP

Add a note hereBecause of the reliable multicast approach used by EIGRP when searching for an alternative to a lost route, it is imperative that a reply be received for each query generated in the network. In other words, when a route goes active and queries are initiated, the only way this route can come out of the active state and transition to passive state is by receiving a reply for every generated query.

Add a note here If the router does not receive a reply to all the outstanding queries within 3 minutes (the default time), the route goes to the SIA state.


Note

Add a note hereYou can change the active-state time limit from its default of 3 minutes using the timers active-time [time-limit | disabled] router configuration command. The time-limit is in minutes.

Add a note hereWhen a route goes to SIA state, the router resets the neighbor relationships for the neighbors that failed to reply. This causes the router to recompute all routes known through that neighbor and to readvertise all the routes it knows about to that neighbor.

Add a note hereThe most common reasons for SIA routes are as follows:

  • Add a note here The router is too busy to answer the query— Generally resulting from high CPU usage or memory problems; the router cannot allocate memory to process the query or build the reply packet.

  • Add a note here The link between the two routers is not good— This issue results in lost packets between the routers. The router receives an adequate number of packets to maintain the neighbor relationship, but does not receive all queries or replies.

  • Add a note here A failure causes traffic on a link to flow in only one direction— This is called a unidirectional link.


Note

Add a note here Use the eigrp log-neighbor-changes command to enable logging of neighbor adjacency changes, to monitor the routing system’s stability and to help detect problems related to SIA.

Add a note hereOne erroneous approach for decreasing the chances of an SIA route is to use multiple EIGRP autonomous systems to bound the query range. Many networks have been implemented using multiple EIGRP autonomous systems (to somewhat simulate OSPF areas), with mutual redistribution between the different autonomous systems. Although this approach changes how the network behaves, it does not always achieve the results intended. If a query reaches the edge of the autonomous system (where routes are redistributed into another autonomous system), the original query is answered. However, the edge router then initiates a new query in the other autonomous system. Therefore, the query process has not been stopped, and the querying continues in the other autonomous system, where the route can potentially go in SIA.

Add a note hereAnother misconception about autonomous system boundaries is that implementing multiple autonomous systems protects one autonomous system from route flaps in another autonomous system. If routes are redistributed between autonomous systems, route transitions from one autonomous system are detected in the other autonomous systems.

Preventing SIA Connections

Add a note hereSIA-Query and SIA-Reply are two new additions to the Type, Length, Value (TLV) triplets in the EIGRP packet header. These packets are generated automatically with no configuration required, from Cisco IOS Software Release 12.1(5) and later, with the Active Process Enhancement feature. This feature enables an EIGRP router to monitor the progression of the search for a successor route and ensure that the neighbor is still reachable. The result is improved network reliability by reducing the unintended termination of neighbor adjacency.

Add a note hereThe diagram on the left in Figure 2-43 illustrates what would happen before this feature was introduced. Router A sends a query for network 10.1.1.0/24 to Router B when it loses its connection to that network. Router B has no entry for this network, so it queries Router C. If problems exist between Router B and C, the reply packet from Router C to Router B might be delayed or lost. Router A has no visibility of downstream progress and assumes that no response indicates problems with Router B. After Router A’s 3-minute active timer expires, the neighbor relationship with Router B is reset, along with all known routes from Router B.

Click to collapse
Add a note hereFigure 2-43: Cisco IOS Active Process Enhancement.

Add a note hereIn contrast, with the Active Process Enhancement feature, as illustrated in the diagram on the right in Figure 2-43, Router A queries downstream Router B (with an SIA-Query) at the midway point of the active timer (1.5 minutes by default) about the status of the route. Router B responds (with an SIA-Reply) that it is searching for a replacement route. Upon receiving this SIA-Reply response packet, Router A validates the status of Router B and does not terminate the neighbor relationship.

Add a note hereMeanwhile, Router B will send up to three SIA-Queries to Router C. If they go unanswered, Router B will terminate the neighbor relationship with Router C. Router B will then update Router A with an SIA-Reply indicating that the network 10.1.1.0/24 is unreachable. Routers A and B will remove the active route from their topology tables. The neighbor relationship between Routers A and B remains intact.

Add a note here EIGRP Query Range

Add a note here Limiting the scope of query propagation through the network (the query range), also known as query scoping, helps reduce incidences of SIA. Keeping the query packets close to the source reduces the chance that an isolated failure in another part of the network will restrict the convergence (query/reply) process. This section introduces an example that examines how to manage the query range.

Add a note hereRemote routers rarely need to know all the routes advertised in an entire network. Therefore, it is the network manager’s responsibility to look at what information is necessary to properly route user traffic and to consider the use of a default route.

Add a note hereFor example, in Figure 2-44, Router B notices the loss of network 10.1.8.0 and sends a query to Routers A, C, D, and E. In turn, these routers send queries to their neighbors, looking for a route to 10.1.8.0. When the query process starts, each path receives duplicate queries because of the redundant topology. Therefore, not only are the remote routers required to respond to queries from the regional offices, but they also continue the search by reflecting the queries back toward the other regional office’s router. This significantly complicates the convergence process on the network.

Click to collapse
Add a note hereFigure 2-44: Effect of the EIGRP Update and Query Process.

Add a note here In this sample network with only two regional and three remote routers, the problem might not be very significant. In a network with hundreds of remote offices, the problem can be severe.

Add a note hereExamine the query process for the 10.1.8.0/24 subnet. Initially, Router B advertises 10.1.8.0/24 to all other routers. The best path for Router A to reach 10.1.8.0/24 is over the Ethernet link to Router B. The remote routers (C, D, and E) use the serial link to Router B as their preferred path to reach 10.1.8.0/24 but still learn about an alternative path through Router A. For this example, assume that the EIGRP metric for Ethernet is 1000, and the metric for a serial link is 100,000.

Add a note here Table 2-11 shows the content of the IP EIGRP topology table on Routers C, D, and E for network 10.1.8.0/24. Table 2-12 shows the content of the IP EIGRP topology table on Router A for network 10.1.8.0/24.

Add a note here Table 2-11: IP EIGRP Topology Table for 10.1.8.0/24 on Routers C, D, and E in Figure 2-44
Open table as spreadsheet

Add a note here Neighbor

Add a note hereFD

Add a note hereAD

Add a note hereRouter A

Add a note here102,000

Add a note here2000

Add a note hereRouter B

Add a note here101,000

Add a note here1000

Add a note here Table 2-12: IP EIGRP Topology Table for 10.1.8.0/24 on Router A in Figure 2-44
Open table as spreadsheet

Add a note hereNeighbor

Add a note hereFD

Add a note hereAD

Add a note hereRouter B

Add a note here2000

Add a note here1000

Add a note hereRouter C

Add a note here201,000

Add a note here101,000

Add a note hereRouter D

Add a note here201,000

Add a note here101,000

Add a note hereRouter E

Add a note here201,000

Add a note here101,000

Add a note hereNote that Routers C, D, and E determine that for network 10.1.8.0/24, Router B is the successor and Router A is an FS (because the AD is 2000 through Router A, which is less than the FD through Router B). Also, note that Router A does not have an FS, because all paths through the remote routers have an AD larger than the FD through Router B.

Add a note hereWhen Router B loses the path to network 10.1.8.0/24, it queries all four of its neighbors. When the remote sites receive this query, they automatically install the path through Router A in their routing tables and respond to Router B with their supposedly good path through Router A. They also remove the bad path through Router B from their topology tables.

Add a note hereRouter B now has responses to three of its four queries, but it must wait until Router A responds, too.

Add a note hereWhen Router A receives the query from Router B for network 10.1.8.0/24, Router A creates a query and sends it to Routers C, D, and E, because Router A does not have an FS but knows that a path exists through each remote site to reach 10.1.8.0/24.

Add a note hereRouters C, D, and E receive the query from Router A. They now know that their path through Router A is not good, so they check their topology tables for alternative paths. However, none of these routers currently has another path, because Router B has just informed them that it does not have a path to this network. Because the remote routers do not have an answer to the query from Router A, Routers C, D, and E create a query and send it to all neighbors except the neighbor (interface) that these routers received the original query from. In this case, the remote routers send the query only to Router B.

Add a note here Router B learns from these queries that none of the remote routers has a path to network 10.1.8.0/24, but it cannot respond that it does not know of a path, because Router B is waiting for Router A to reply to a query. Router A is waiting for either Router C, D, or E to reply to its query, and these remote sites are waiting for Router B to reply to their queries. Because Router B sent out the first query, its SIA timer expires first, and Router B reaches the SIA state for network 10.1.8.0/24 first (in 3 minutes by default). Router B resets its neighbor relationship with Router A. As soon as the neighbor relationship goes down, Router B can respond to Routers C, D, and E immediately, saying that Router B does not have a path to 10.1.8.0/24. Routers C, D, and E can then respond to Router A that they do not have a path.

Add a note hereAfter the EIGRP neighbor relationship between Routers A and B is reestablished (just after the adjacency is reset), Router B, which no longer has a path to 10.1.8.0/24, does not pass the 10.1.8.0/24 network to Router A. Router A learns that the remote sites do not have a path to 10.1.8.0/24, and the new relationship with Router B does not include a path to 10.1.8.0/24, so Router A removes the 10.1.8.0 network from its IP EIGRP topology table.

Add a note hereIn the network in Figure 2-44, redundancy is provided with dual links from the regional offices to the remote sites. The network architect does not intend for the traffic to go from a regional office to a remote office and back to a regional office, but unfortunately this is the situation. The design of the network shown in Figure 2-44 is sound, but because of EIGRP behavior, remote routers are involved in the convergence process.

Add a note hereIf the remote sites are not supposed to act as transit sites between the regional sites, the regional routers can be configured to announce only a default route to the remote routers, and the remote routers can be configured to announce only their directly connected stub network to the regional routers, to reduce the complexity and the EIGRP topology table and routing table size.

Add a note hereThe following sections describe other solutions for limiting the EIGRP query range.

Limiting the EIGRP Query Range

Add a note hereThe network manager must determine the information necessary to properly route user traffic to the appropriate destination. The amount of information needed by the remote routers to achieve the desired level of path selection must be balanced against the bandwidth used to propagate this information. To achieve maximum stability and scalability, the remote routers can use a default route to reach the core. If some specific networks need knowledge of more routes to ensure optimum path selection, the administrator must determine whether the benefits of propagating the additional routing information outweigh the additional bandwidth required to achieve this goal.

Add a note hereIn a properly designed network, each remote site has redundant WAN links to separate distribution sites. If both distribution sites pass a default route to the remote sites, the remote sites load balance to all networks behind the distribution site routers. This maximizes bandwidth utilization and allows the remote router to use less CPU and memory, which means that a smaller and less-expensive remote router can be used at that site.

Add a note here If the remote site can see all routes, the router can select a path that is best to reach a given network. However, depending on the number of routes in the internetwork and the amount of bandwidth connecting the remote site to the distribution sites, this approach can mean that higher-bandwidth links or large routers are needed to handle the additional overhead.

Add a note hereAfter you determine the minimum routing requirements, you can make EIGRP more scalable. Two of the best options are the following:

  • Add a note hereConfigure route summarization using the ip summary-address eigrp command on the outbound interfaces of the appropriate routers.

  • Add a note hereConfigure the remote routers as stub EIGRP routers.

Add a note hereThese methods are described in the next two sections.

Add a note hereOther methods to limit query range include route filtering and interface packet filtering. For example, if specific EIGRP routing updates are filtered to a router and that router receives a query about those filtered (blocked) networks, the router indicates that the network is unreachable and does not extend the query any further.

Limiting Query Range with Summarization

Add a note hereRoute summarization is most effective with a sound address allocation. Having a two- or three-layer hierarchical network design, with routers summarizing between the layers greatly assists traffic flow and route distribution.


Note

Add a note hereFor a full discussion of internetwork design, see Authorized Self-Study Guide: Designing for Cisco Internetwork Solutions (DESGN), Second Edition (Cisco Press, 2008).

Add a note here Figure 2-45 shows the topology of a nonscalable internetwork in which addresses (subnets) are either randomly assigned or assigned by historical requirements. In this example, multiple subnets from different major networks are located in each cloud, requiring many subnet routes to be injected into the core. In addition, because of the random assignment of addresses, query traffic cannot be localized to any portion of the network, thus increasing convergence time. Administration and troubleshooting are also more complex in this scenario.

Click to collapse
Add a note hereFigure 2-45: Nonscalable Internetwork.

Add a note here Figure 2-46 illustrates a better-designed network. Subnet addresses from individual major networks are localized within each cloud, allowing summary routes to be injected into the core. As an added benefit, the summary routes act as a boundary for the queries generated by a topology change.

Click to collapse
Add a note hereFigure 2-46: Scalable Internetwork.

Add a note here Figure 2-47 shows an example network to illustrate how EIGRP summarization can limit the query range. Router B sends a summary route of 172.30.0.0/16 to Router A. When network 172.30.1.0/24 goes down, Router A receives a query from Router B about that network. Because Router A has received only a summary route, that specific network is not in its routing table and so Router A replies to the query with a “network 172.30.1.0/24 unreachable” message and does not extend the query any further. Notice that the query stops at the router that receives the summary route (Router A in this example), not at the router that sends the summary route (Router B in this example). A remote router extends the query about a network only if it has an exact match for the network in its routing table.

Click to collapse
Add a note hereFigure 2-47: EIGRP Summarization Can Limit Query Range.

Add a note here Summarization minimizes the size of the routing table, which means less CPU and memory usage to manage it and less bandwidth to transmit the information. Summarization also reduces the chance of networks becoming SIA because it reduces the number of routers that see each query, so the chance of a query encountering one of these issues is also reduced.

Add a note here Figure 2-48 illustrates how route summarization can affect the network shown earlier in Figure 2-44. The ip summary-address eigrp command is configured on the outbound interfaces of Routers A and B so that Routers A and B advertise the 10.0.0.0/8 summary route to the remote Routers C, D, and E.

Click to collapse
Add a note hereFigure 2-48: Limiting Updates and Queries Using Summarization.

Add a note hereThe 10.1.8.0/24 network is not advertised to the remote routers. Therefore, the remote routers (C, D, and E) do not extend the queries about the 10.1.8.0/24 network back to the other regional routers, reducing the convergence traffic (queries and replies) caused by the redundant topology. When Routers A and B send the query for 10.1.8.0/24 to Routers C, D, and E, these routers immediately reply that the destination is unreachable. Queries for the lost 10.1.8.0/24 networks are not propagated beyond the remote sites, preventing Routers A and B from becoming SIA waiting for the query process to receive all the replies.

Limiting Query Range Using a Stub

Add a note here Hub-and-spoke network topologies commonly use stub routing. In this topology, the remote router forwards all traffic that is not local to a hub router, so the remote router does not need to retain a complete routing table. Generally, the hub router needs to send only a default route to the remote routers.

Add a note hereIn a hub-and-spoke topology, having a full routing table on the remote routers serves no functional purpose because the path to the corporate network and the Internet is always through the hub router. In addition, having a full routing table at the spoke routers increases the amount of memory required.

Add a note hereTraffic from a hub router should not use a remote router as a transit path. A typical connection from a hub router to a remote router has significantly less bandwidth than a connection at the network core. Attempting to use the connection to a remote router as a transit path typically results in excessive congestion. The EIGRP stub routing feature can prevent this problem by restricting the remote router from advertising the hub router’s routes back to other hub routers. For example, in Figure 2-48, routes recognized by the remote router from hub Router A are not advertised to hub Router B. Because the remote router does not advertise the hub routes back to the hub routers, the hub routers do not use the remote routers as a transit path. Using the EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies stub router configuration.

Add a note hereThe EIGRP stub feature was first introduced in Cisco IOS Release 12.0(7)T.

Add a note hereOnly the remote routers are configured as stubs. The stub feature does not prevent routes from being advertised to the remote router.

Add a note hereA stub router indicates in the hello packet to all neighboring routers its status as a stub router. Any router that receives a packet informing it of its neighbor’s stub status does not query the stub router for any routes. Therefore, a router that has a stub peer does not query that peer.

Add a note hereThus, it is important to note that stub routers are not queried. Instead, hub routers connected to the stub router answer the query on behalf of the stub router.

Add a note hereThe EIGRP stub routing feature also simplifies the configuration and maintenance of hub-and-spoke networks, improves network stability, and reduces resource utilization. When stub routing is enabled in dual-homed remote configurations, you do not have to configure filtering on remote routers to prevent them from appearing as transit paths to the hub routers.


Caution

Add a note here EIGRP stub routing should be used on stub routers only. A stub router is defined as a router connected to the network core or hub layer, and through which core transit traffic should not flow. A stub router should have only hub routers for EIGRP neighbors. Ignoring this restriction causes undesirable behavior.

Add a note hereWhen planning for EIGRP stub configuration, complete the following steps:

  • Add a note hereExamine the topology and the existing EIGRP configuration.

  • Add a note hereDefine requirements, including which routers will be configured as stub routers, and whether redistribution and summarization will be deployed.

  • Add a note hereDesign the network.

  • Add a note hereCreate an implementation plan.

  • Add a note hereConfigure and verify the configuration.

Add a note hereTo configure a router as an EIGRP stub, use the eigrp stub [receive-only | connected | static | summary | redistributed] router configuration command. A router configured as a stub with the eigrp stub command shares information about connected and summary routes with all neighbor routers by default. Table 2-13 describes the four optional keywords that can be used with the eigrp stub command to modify this behavior.

Add a note here Table 2-13: eigrp stub Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here receive-only

Add a note hereThe receive-only keyword restricts the router from sharing any of its routes with any other router within an EIGRP autonomous system. This keyword does not permit any other keyword to be specified, because it prevents any type of route from being sent. Use this option if there is a single interface on the router.

Add a note here connected

Add a note hereThe connected keyword permits the EIGRP stub routing feature to send connected routes. If a network command does not include the connected routes, it might be necessary to redistribute connected routes with the redistribute connected command under the EIGRP process. This option is enabled by default and is the most widely practical stub option.

Add a note here static

Add a note hereThe static keyword permits the EIGRP stub routing feature to send static routes. Redistributing static routes with the redistribute static command is still necessary.

Add a note here summary

Add a note hereThe summary keyword permits the EIGRP stub routing feature to send summary routes. You can create summary routes manually with the ip summary-address eigrp command or automatically at a major network border router with the auto-summary command enabled. This option is enabled by default.

Add a note here redistributed

Add a note hereThe redistribute option permits the EIGRP stub routing feature to send redistributed routes. Redistributing routes with the redistribute command is still necessary.

Add a note hereThe optional parameters in this command can be used in any combination, with the exception of the receive-only keyword. If any of the keywords (except receive-only) is used individually, the connected and summary routes are not sent automatically.

Add a note hereIn Example 2-59, the eigrp stub command is used to configure the router as a stub that advertises connected and summary routes.

Add a note here Example 2-59: eigrp stub Command to Advertise Connected and Summary Routes

Add a note hereRouter(config)#router eigrp 1
Router(config-router)#network 10.0.0.0
Router(config-router)#eigrp stub

Add a note hereIn Example 2-60, the eigrp stub receive-only command is used to configure the router as a stub for which connected, summary, and static routes are not sent.

Add a note here Example 2-60: eigrp stub Command to Receive Only Routes

Add a note hereRouter(config)#router eigrp 1
Router(config-router)#network 10.0.0.0 eigrp
Router(config-router)#eigrp stub receive-only

Add a note here The EIGRP stub feature does not enable route summarization on the hub router. The network administrator should configure route summarization on the hub routers if desired. Cisco highly recommends using both EIGRP route summarization and EIGRP stub features to provide the best scalability.

Add a note hereIf a true stub network is required, the hub router can be configured to send a default route to the spoke routers. This approach is the simplest and conserves the most bandwidth and memory on the spoke routers.


Note

Add a note hereAlthough EIGRP is a classless routing protocol, it has classful behavior by default, such as having automatic summarization on by default. When you configure the hub router to send a default route to the remote router, ensure that the ip classless command on the remote router. By default, the ip classless command is enabled in all Cisco IOS images that support the EIGRP stub routing feature.

Add a note here Figure 2-49 illustrates how using the EIGRP stub feature affects the network shown earlier in Figure 2-44. Each of the remote routers is configured as a stub. Queries for network 10.1.8.0/24 are not sent to Routers C, D, or E, thus reducing the bandwidth used and the chance of the routes being SIA.

Click to collapse
Add a note hereFigure 2-49: Limiting Updates and Queries Using the EIGRP Stub Feature.

Add a note here Using the EIGRP stub feature at the remote sites allows the hub (regional offices) sites to immediately answer queries without propagating the queries to the remote sites, saving CPU cycles and bandwidth, and lessening convergence time even when the remote sites are dual-homed to two or more hub sites.

Add a note here Figure 2-50 illustrates another example network; Example 2-61 shows part of the configuration for Router B.

Image from book
Add a note hereFigure 2-50: Network for eigrp stub Command Example.
Add a note here Example 2-61: Configuration for Router B in Figure 2-50

Add a note hereRouterB#show running-config

ip route 10.1.4.0 255.255.255.0 10.1.3.10
!
interface ethernet 0
ip address 10.1.2.1 255.255.255.0
!
interface ethernet 1
ip address 10.1.3.1 255.255.255.0
!
interface serial 0
ip address 10.2.2.3 255.255.255.254
ip summary-address eigrp 100 10.1.2.0 255.255.254.0
!
router eigrp 100
redistribute static 1000 1 255 1 1500
network 10.2.2.2 0.0.0.1
network 10.1.2.0 0.0.0.255

Add a note here Using this example network and configuration, consider which networks Router B will advertise to Router A when the various options of the eigrp stub command are also configured on Router B:

  • Add a note hereWith the eigrp stub connected command, Router B will advertise only 10.1.2.0/24 to Router A. Notice that although 10.1.3.0/24 is also a connected network, it is not advertised to Router A because it is not advertised in a network command, and connected routes are not redistributed.

  • Add a note hereWith the eigrp stub summary command, Router B will advertise only 10.1.2.0/23, the summary route that is configured on the router, to Router A.

  • Add a note hereWith the eigrp stub static command, Router B will advertise only 10.1.4.0/24, the static route that is configured on the router, to Router A. (Note that the redistribute static command is configured on Router B.)


    Note

    Add a note hereWithout the static option, EIGRP will not send any static routes, including internal static routes that normally would be automatically redistributed.

  • Add a note hereWith the eigrp stub receive-only command, Router B will not advertise anything to Router A.

  • Add a note hereWith the eigrp stub redistributed command, Router B will advertise only 10.1.4.0/24, the redistributed static route, to Router A.

Add a note here Graceful Shutdown

Add a note here Graceful shutdown, implemented with the goodbye message feature, is designed to improve EIGRP network convergence.

Add a note hereIn Figure 2-51, Router A is using Router B as the successor for several routes. Router C is the feasible successor for the same routes. Router B normally would not tell Router A if the EIGRP process on Router B was going down (for example, if Router B was being reconfigured). Router A would have to wait for its hold timer to expire before it would discover the change and react to it. Packets sent during this time would be lost.

Image from book
Add a note hereFigure 2-51: Graceful Shutdown Causes the Router to Say Goodbye.

Add a note hereWith graceful shutdown, a goodbye message is broadcast when an EIGRP routing process is shut down, to inform adjacent peers about the impending topology change. This feature allows supporting EIGRP peers to synchronize and recalculate neighbor relationships more efficiently than would occur if the peers discovered the topology change after the hold timer expired.

Add a note hereThe goodbye message is supported in Cisco IOS Software Release 12.3(2), 12.3(3)B, and 12.3(2)T and later.

Add a note hereInterestingly, goodbye messages are sent in hello packets. EIGRP sends an interface goodbye message with all K values set to 255 when taking down all peers on an interface.

Add a note hereThe following message is displayed by routers that support goodbye messages when one is received:

Add a note here*Apr 26 13:48:42.523: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.1.1.1
(Ethernet0/0) is down: Interface Goodbye received

Add a note hereA Cisco router that runs a software release that does not support the goodbye message will misinterpret the message as a K value mismatch and therefore display the following message:

Add a note here*Apr 26 13:48:41.811: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.1.1.1
(Ethernet0/0) is down: K-value mismatch

Note

Add a note here The receipt of a goodbye message by a nonsupporting peer does not disrupt normal network operation. The nonsupporting peer will terminate the session when the hold timer expires. The sending and receiving routers will reconverge normally after the sender reloads.


Note

Add a note hereAn EIGRP router will send a goodbye message on an interface if the network command (under the EIGRP process) that encompasses the network on that interface is removed (with the no network command). An EIGRP router sends a goodbye message on all interfaces if the EIGRP process is shut down (with the no router eigrp command). An EIGRP router will not, however, send a goodbye message if an interface is shut down or the router is reloaded.


Summary

Add a note hereIn this chapter, you learned about Cisco’s EIGRP, an advanced distance vector routing protocol. The chapter focused on the following topics:

  • Add a note hereFeatures of EIGRP, including fast convergence, use of partial updates, multiple network layer support, use of multicast and unicast, VLSM support, seamless connectivity across all data link layer protocols and topologies, and sophisticated metrics.

  • Add a note hereEIGRP’s underlying processes and technologies—neighbor discovery/recovery mechanism, RTP, DUAL finite-state machine, and protocol-dependent modules.

  • Add a note hereEIGRP’s tables—neighbor table (containing all routers with which it has a neighbor relationship), topology table (containing all routes from all neighbors), and routing table (containing the best routes to each destination and used for forwarding packets).

  • Add a note hereEIGRP terminology

    • Add a note hereThe advertised distance (the metric for an EIGRP neighbor router to reach the destination, which is the metric between the next-hop router and the destination), the feasible distance (the sum of the AD from the next-hop neighbor plus the cost between the local router and the next-hop router), the successor (a neighboring router that has a least-cost loop-free path to a destination, the lowest FD), and the feasible successor (a neighboring router that has a loop-free backup path to a destination).

    • Add a note herePassive routes, those not undergoing recomputation; active routes, those undergoing recomputation. Passive is the operational, stable state.

  • Add a note hereThe five EIGRP packet types: hello, update, query, reply, and acknowledgment. Updates, queries, and replies are sent reliably.

  • Add a note here EIGRP initial route discovery process, started by a router sending hello packets. Neighboring routers reply with update packets, which populate the router’s topology table. The router chooses the successor routes and offers them to the routing table.

  • Add a note hereThe DUAL process including selecting FSs. To qualify as an FS, a next-hop router must have an AD less than the FD of the current successor route for the particular network, to ensure a loop-free network.

  • Add a note hereThe EIGRP metric calculation, which defaults to bandwidth (the slowest bandwidth between the source and destination) plus delay (the cumulative interface delay along the path).

  • Add a note herePlanning EIGRP implementations, including the IP addressing, network topology, and EIGRP traffic engineering. The list of tasks for each router in the network includes enabling the EIGRP routing protocol (with the correct autonomous system number), configuring the proper network statements, and optionally configuring the metric to appropriate interfaces.

  • Add a note hereBasic EIGRP configuration commands

    • Add a note here router eigrp autonomous-system-number global configuration command

    • Add a note here network network-number [wildcard-mask] interface configuration command

    • Add a note here bandwidth kilobits interface configuration command

  • Add a note hereCommands for verifying EIGRP operation

    • Add a note here show ip eigrp neighbors

    • Add a note here show ip route

    • Add a note here show ip route eigrp

    • Add a note here show ip protocols

    • Add a note here show ip eigrp interfaces

    • Add a note here show ip eigrp topology

    • Add a note here show ip eigrp traffic

    • Add a note here debug eigrp packets

    • Add a note here debug ip eigrp

    • Add a note here debug ip eigrp summary

    • Add a note here debug eigrp neighbors

  • Add a note hereUsing the passive-interface type number [default] router configuration command to prevent a routing protocol’s routing updates from being sent through the specified router interface. With EIGRP, hello messages are not sent out of the specified interface, so neighborships are not formed on that interface. However, the router will still advertise the network to its EIGRP neighbors.

  • Add a note here Creating a statically configured default route with the ip route 0.0.0.0 0.0.0.0 next-hop | interface global configuration command. Alternatively, any major network residing in the local routing table can become an EIGRP default route when used in the ip default-network network-number global configuration command.

  • Add a note hereEIGRP summarization: EIGRP automatically summarizes on the major network boundary by default (in some IOS versions). To turn off automatic summarization, use the no auto-summary router configuration command. Use the ip summary-address eigrp as-number address mask [admin-distance] interface configuration command to manually create a summary route at an arbitrary bit boundary, as long as a more specific route exists in the routing table.

  • Add a note hereEIGRP over Frame Relay, including

    • Add a note hereAn overview of Frame Relay, where PVCs are created by an SP and are identified by DLCIs, locally significant numbers between the router and the Frame Relay switch.

    • Add a note hereEIGRP over a physical interface using Inverse ARP dynamic mapping, the default

    • Add a note hereEIGRP over the physical interface using static maps with the frame-relay map protocol protocol-address dlci [broadcast] [ietf | cisco] [payload-compress {packet-by-packet | frf9 stac}] interface configuration command.

    • Add a note hereConfiguring subinterfaces with the interface serial number.subinterface-number {point-to-point | multipoint} command.

    • Add a note hereFrame Relay multipoint subinterfaces, on which the IP address-to-DLCI mapping is done by either specifying the local DLCI value (using the frame-relay interface-dlci dlci command) and relying on Inverse ARP, or using manual IP address-to-DLCI mapping.

    • Add a note hereFrame Relay point-to-point subinterfaces, on which the IP address-to-DLCI mapping is done by specifying the local DLCI value.

    • Add a note hereSplit horizon, which is disabled by default on most interfaces. Split horizon is enabled by default on Frame Relay multipoint interfaces. It can be disabled with the no ip split-horizon eigrp as-number command.

    • Add a note hereThe neighbor {ip-address | ipv6-address} interface-type interface-number router configuration command, used to define a neighboring EIGRP router. Instead of using multicast packets, EIGRP exchanges routing information with the specified neighbor using unicast packets.

  • Add a note hereEIGRP over MPLS, including

    • Add a note hereMPLS, which uses labels assigned to each packet at the edge of the network; MPLS nodes use the label to determine where to send the packet.

    • Add a note hereA Layer 2 MPLS VPN, which provides a Layer 2 service across the backbone, where customer routers are connected together on the same IP subnet. A type of AToM, called EoMPLS may be used. Customer routers may also be connected to MPLS edge routers via VLAN subinterfaces; different subinterfaces in the PE routers are used to connect to different VLANs.

    • Add a note here A Layer 3 MPLS VPN, which provides a Layer 3 service across the backbone, where customer routers are connected to ISP edge routers, and on each side, a separate IP subnet is used. The CE routers see the PE routers as another customer router in the path. PE routers maintain separate routing tables for each customer.

  • Add a note hereEIGRP load-balancing, including

    • Add a note hereEIGRP equal-cost load balancing that distributes traffic over all interfaces with the same metric for the destination address.

    • Add a note hereThe maximum-paths maximum-path router configuration command, to specify up to 16 equally good routes be kept in the routing table. Set maximum-path to 1 to disable load balancing.

    • Add a note hereEIGRP unequal-cost load balancing, across routes with different metrics, using the variance multiplier router configuration command and the traffic-share [balanced | min across-interfaces] router configuration command.

  • Add a note hereEIGRP operation in WAN environments

    • Add a note hereBy default, EIGRP uses up to 50 percent of the bandwidth declared on an interface or subinterface. EIGRP uses the bandwidth of the link set by the bandwidth command, or the link’s default bandwidth if none is configured, when calculating how much bandwidth to use. The ip bandwidth-percent eigrp as-number percent interface configuration command changes the percentage.

    • Add a note hereConfiguring multipoint interfaces: Configure the bandwidth to represent the minimum CIR times the number of circuits. For a small number of very low-speed circuits, define the interfaces as point-to-point so that their bandwidth can be set to match the provisioned CIR.

  • Add a note hereConfiguring, verifying, and troubleshooting EIGRP MD5 authentication, including the following commands

    • Add a note here ip authentication mode eigrp autonomous-system md5 interface configuration command

    • Add a note here key chain name-of-chain global configuration command

    • Add a note here key key-id key-chain configuration command

    • Add a note here key-string key key-chain-key configuration command

    • Add a note here accept-lifetime start-time {infinite | end-time | duration seconds} key-chain-key configuration command

    • Add a note here send-lifetime start-time {infinite | end-time | duration seconds} key-chain-key configuration command

    • Add a note here ip authentication key-chain eigrp autonomous-system name-of-chain interface configuration command

    • Add a note here show ip eigrp neighbors

    • Add a note here show ip route

    • Add a note here show key chain

    • Add a note here debug eigrp packets

  • Add a note hereEIGRP scalability factors, including the amount of information exchanged, the number of routers, the depth of the topology, and the number of alternative paths through the network.

  • Add a note hereThe SIA state: If an EIGRP router does not receive a reply to all the outstanding queries within 3 minutes (the default time) it goes into SIA state, and the router resets the neighbor relationships for the neighbors that failed to reply. Reasons for going into SIA include: router is too busy, the link between the routers is not good, or the link has a unidirectional failure.

  • Add a note hereThe Active Process Enhancement feature that adds SIA-Query and SIA-Reply to ensure that only appropriate neighbor relationships are reset.

  • Add a note hereLimiting the query range to help reduce SIAs, which can be accomplished by

    • Add a note hereOnly announcing default routes to remote routers, which are configured to announce only their directly connected networks.

    • Add a note hereConfiguring route summarization using the ip summary-address eigrp command on the outbound interfaces of the appropriate routers

    • Add a note hereRoute and interface packet filtering.

    • Add a note hereConfiguring the remote routers as stub EIGRP routers so that they will not be queried, using the eigrp stub [receive-only | connected | static | summary | redistributed] router configuration command.

    • Add a note hereUsing both EIGRP route summarization and EIGRP stub features is recommended, to provide the best scalability.

  • Add a note hereGraceful shutdown, which broadcasts a goodbye message (in a hello packet, with all K values set to 255) when an EIGRP routing process is shut down, to inform neighbors.


0 comments

Post a Comment