CCNP ROUTE Workbook
CCNP ROUTE Workbook
Task
Configure EIGRP on Routers-1, 2, and 4 using the following guidelines:
Classic-mode EIGRP configuration should be used (not Named Mode).
All routers should be in EIGRP Autonomous System 100.
Routes should not be summarized by any EIGRP router.
On Router-1, EIGRP should be activated on all physical interfaces using a
single "network" command without any wildcard mask.
On Router-2, EIGRP should be activated on all physical interfaces with two
distinct "network" commands utilizing specific wildcard masks that are the
inverse of the configured interface subnet masks.
On Router-4, use the command network 0.0.0.0 without any wildcard mask
to activate EIGRP on all interfaces.
Router-1 Configuration
Router-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-1(config)#router eigrp 100
Router-1(config-router)#no auto-summary
Router-1(config-router)#network 1.0.0.0
Router-1(config-router)#end
Router-1#
Router-2 Configuration
Router-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#router eigrp 100
Router-2(config-router)#no auto-summary
Router-2(config-router)#network 1.2.1.0 0.0.0.255
Router-2(config-router)#network 2.4.2.0 0.0.0.255
Router-2(config-router)#end
Router-2#
Router-4 Configuration
Router-4#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-4(config)#router eigrp 100
Router-4(config-router)#no auto-summary
Router-4(config-router)#network 0.0.0.0
Router-4(config-router)#end
Router-4#
Verification
At this point, each router should have two EIGRP neighbors, and each router should
have learned a single EIGRP route. Use the following "show" commands to verify
that you have successfully configured EIGRP on your routers:
Router-1 Verification
Router-1#show ip eigrp neighbor
EIGRP-IPv4 Neighbors for AS(100)
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num 1
1.4.1.4 Se1/3
14 00:04:37 10 1170 0 6
0 1.2.1.2 Fa0/0
12 00:06:20 3 100 0 8
Router-1#
Router-1#
Router-1#
Repeat the three commands above on Router-2 and Router-4. Both routers should
have two EIGRP neighbors and a single EIGRP-learned route in the IP Routing
Table.
CCNP ROUTE Workbook - EIGRP
EIGRP Neighborships
Load the task1-2 initial configurations before starting.
Task
In this task you will experience how various configuration changes affect EIGRP
neighborships. The idea is to intentionally implement a configuration change that will
break the EIGRP neighborship between two routers, view any syslogs and/or debug
output, and then resolve the problem.
On Router-2, copy the existing EIGRP configuration into a text editor and change the
Autonomous System to AS 200.
Remove the existing EIGRP configuration from Router-2 and paste in the revised
version (with the wrong Autonomous System number) back into Router-2.
Router-2 Configuration
Router-2#sh run | section eigrp
router eigrp 100
network 1.2.1.0 0.0.0.255
network 2.4.2.0 0.0.0.255
Router-2#
Router-2(config-router)#end
Verification
You should notice that when two routers have mismatched EIGRP Autonomous
Systems, there is absolutely no indication of that problem in any syslogs. And no
matter what debug you attempt to enable, you will not see any indication of this
problem.
Task
On Router-2, remove the existing EIGRP configuration and reconfigure it to be in the
proper Autonomous System (AS 100). Ensure that Router-2 has regained both of its
EIGRP neighbors before proceeding to the next bullet.
On Router-2, reconfigure interface FastEthernet0/0 with the following IP address
parameters:
An IP address of 2.2.2.2 /24 as the primary address.
An IP address of 1.2.1.2 as the secondary address.
Observe the affect (on both R1 and R2) that your IP addressing change has on the
EIGRP neighborship between routers R1 and R2.
Router-2 Configuration
Router-2(config-router)#int fast 0/0
Router-2(config-if)#ip address 2.2.2.2 255.255.255.0
Router-2(config-if)#
Dec 15 13:43:59.130: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.2.1.1 (FastEthernet0/0) is down: interface down
Router-2(config-if)#ip address 1.2.1.2 255.255.255.0 secondary
Router-2(config-if)#end
Router-2 Verification
On Router-2 you should notice that every few seconds it declares Router-1 as its
neighbor, and then a few seconds later the neighborship with Router-1 goes down
indicating that "retry limit exceeded".
Router-2#
Dec 15 13:45:38.246: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.2.1.1 (FastEthernet0/0) is up: new adjacency
Router-2#
Dec 15 13:46:57.774: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.2.1.1 (FastEthernet0/0) is down: retry limit exce
Router-2#
Dec 15 13:47:02.126: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.2.1.1 (FastEthernet0/0) is up: new adjacency
Router-2#
Router-1 Verification
On Router-1 you should notice that roughly every 15 seconds an error message is
reported indicating receipt of EIGRP Hello packets from a connected router that
does not share the same IP subnet as Router-1.
Router-1#
From Router-2's perspective, it is receiving EIGRP Hello packets sourced from the
primary (and only) IP address of Router-1 (1.2.1.1). Router-2 does have this subnet
configured on its interface as a secondary subnet so it attempts to send an EIGRP
Update packet to Router-1.
Router-1 (as is seen by the Syslogs) is blocking Router-2 because the source IP
address of Router-2's EIGRP Hello's (2.2.2.2) is not from a subnet that Router-1
recognizes on the link they share. So when Router-1 receives the EIGRP Update
from Router-2, it simply discards it without sending any kind of reply.
Because EIGRP has reliability built in to the protocol, Router-2 attempts to resend
the EIGRP Update to Router-1 several times before giving up, and bringing down
the neighborship with the message, "retry limit exceeded".
Task
On Router-2, remove all IP addresses from interface FastEthernet0/0 and
reconfigure the address of 1.2.1.2/24 as the primary (and only) IP address on this
interface.
On Router-2, issue the command show ip protocols and write down the values you
see under the EIGRP section, for Metric Weights.
On Router-2, change the metric weights (K-values) to anything other than the default
values and notice what happens to the EIGRP neighborship between R1 and R2.
Router-2 Configuration
Router-2#sho ip protocols
...
<output omitted for brevity>
...
Routing Protocol is "eigrp 100"
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
EIGRP-IPv4 Protocol for AS(100) Metric weight K1=1, K2=0, K3=1, K4=0, K5=0
Router-2 Configuration
Router-2(config)#router eigrp 100
Router-2(config-router)#metric weights 0 1 0 1 0 0
CCNP ROUTE Workbook - EIGRP
Task
In the topology diagram, notice that router R1 now has a Loopback interface. In this
task you will be advertising that loopback into EIGRP, and then manipulating the
EIGRP distance on Router-4 so that it load-balances traffic to this new network
across both the Serial and FastEthernet interfaces of router R4.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R1, add a new "network" command (along with a specific wildcard mask)
to your EIGRP process so that the network on your Loopback0 interface is
advertised into EIGRP.
View the IP routing table on router R4 and verify that the preferred path to reach this
new subnet is via the FastEthernet link leading upstream to router R2.
On router R4, view the EIGRP Topology table, specifically for network
111.111.111.0/29, and notice the difference between the current Feasible Distance
and the total Distance of the path to this same network via the Serial link.
Router-1 Configuration
Router-1(config)#router eigrp 100
Router-1(config-router)#network 111.111.111.0 0.0.0.7
Router-1(config-router)#end
Router-1#
Router-4#
Verification
Because there is such a huge difference between the Feasible Distance (158720)
and the total distance via the Serial interface (20640000), you hopefully came to the
conclusion that there is no way to manipulate just the delay or just the bandwidth of
the Serial interface to accomplish load-balancing.
Here is the EIGRP formula, reduced to only the portions that have non-zero K-
Values.
Notice that if we attempt to reduce just the delay, the delay would have to equate to
a negative number so that when added against the bandwidth (of 78,125) the total
equaled 620. Because there is no way to set an interface delay to a negative
number, the objective of equal-cost load-balancing is not achievable by just
manipulating the interface delay.
Using the same formula but trying to solve for a new Bandwidth gives us the same
dilemma. Any new bandwidth number added to the existing delay of 2500 would
have to equate to a negative value, which is impossible.
Task
On router, R4, change both the bandwidth and delay values of interface Serial1/3 to
accomplish equal-cost load-balancing across both FastEthernet0/1 and Serial1/3 for
any packets destined for 111.111.111.0/29.
Router-4 Configuration
Router-4(config)#int ser 1/3
Router-4(config-if)#bandwidth 100000
Router-4(config-if)#delay 20
Router-4(config-if)#end
Router-4 Verification
Router-4#shoW ip eigrp topology 111.111.111.0/29
EIGRP-IPv4 Topology Entry for AS(100)/ID(2.4.2.4) for 111.111.111.0/29
State is Passive, Query origin flag is 1, 2 Successor(s) , FD is 158720
Descriptor Blocks:
1.4.1.1 (Serial1/3), from 1.4.1.1, Send flag is 0x0 Composite metric is ( 158720
/128256), route is Internal
Vector metric:
Minimum bandwidth is 100000 Kbit
Total delay is 5200 microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 1
Originating router is 1.4.1.1
2.4.2.2 (FastEthernet0/1), from 2.4.2.2, Send flag is 0x0 Composite metric is ( 158720
/156160), route is Internal
Vector metric:
Minimum bandwidth is 100000 Kbit
Total delay is 5200 microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 2
Originating router is 1.4.1.1
Hopefully by now you have realized that if you want to manipulate EIGRP metrics to
accomplish deterministic path selection, changing bandwidth and/or delay variables
is a painful way to accomplish that objective.
In the next task you will see an alternative (and much easier) way to accomplish this
same objective by utilizing Offset-Lists.
CCNP ROUTE Workbook - EIGRP
Task
Notice in the topology diagram for this task that router R1 now has a second
Loopback interface (Loopback-1). The subnet on this loopback is already being
advertised into EIGRP and should be seen on routers R2 and R4.
In this task you will manipulate the EIGRP distance on Router-4 using an Offset-List
so that it load-balances traffic to this new network (111.111.111.8/29) across both
the Serial and FastEthernet interfaces of router R4, without affecting any other
EIGRP-learned routes.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
Router-4 Configuration
Router-4(config)#access-list 1 permit 111.111.111.8 0.0.0.7
Router-4(config)#router eigrp 100
Router-4(config-router)#offset-list 1 in 20481280 FastEthernet0/1
Router-4(config-router)#end
Router-4#
Verification on R4
Router-4#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
<output omitted for brevity>
...
Gateway of last resort is not set
EIGRP Stuck-In-Active
Load the task1-5 initial configurations before starting.
Task
Notice in the topology diagram for this task that router R2 now has a new Loopback
interface (Loopback-1) that is in the same subnet as the Loopback-1 interface of
router R1. The subnet on this loopback is already being advertised into EIGRP and
should be seen in the EIGRP topology tables of routers R1 and R4.
In this task you will artificially cause a route on router R2 to go into the Active state.
You will then induce a Stuck-In-Active condition between R2 and R4.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R2, view the EIGRP topology table for the specific subnet of
111.111.111.8/29.
Is router R1 (which also owns this subnet) listed as a Feasible Successor for
this route?
Why or why not?
Manipulate your EIGRP configuration so that when interface FastEthernet0/4 on
Switch-2 (connected to Router-4) becomes disabled, that router R2 will not detect the
loss of its EIGRP neighbor (router R4) for 600 seconds.
As you can see from the output above, Router-1 is not showing as a Feasible
Successor for the subnet of 111.111.111.8/29. This is because R1's Reported
Distance is exactly equal to R2's Feasible Distance for this same network. This
qualifies as a possible routing loop and does not pass the Feasibility Condition.
Router-2#sho ip eigrp topology all-links
Router-2#
Router-4(config-if)#end
Task
At the moment, Router-2 has a connected network to 111.111.111.8/29. If this
network were to fail (you shut down the loopback interface), Router-2 would send an
EIGRP Query to its neighbors about this network.
If your network was working as expected, Routers R1 and R4 would respond almost
instantly to this EIGRP Query with an EIGRP Reply. R4 would reply that it has no
alternative path to this network, and R1 would reply that it DID have an alternative
path to this network (because it also has a direct connection to that network). So it
would be virtually impossible to see (on Router-2) this network go into the "Active"
state because the Query/Reply process would be almost instantaneous.
Read through the following bullets before you take any further action,
so that you are familiar with what you will be doing and why.
View the EIGRP Topology table in R2 and verify that the entry for 111.111.111.8/29
is now in the Active state.
Examine how long it takes for Router-2 to receive an EIGRP Reply.
Verify that, even after the EIGRP Reply has been received from Router-1, the
following are true:
Router-2 still believes it has a neighbor with Router-4 (because the Hold-
Interval has not expired yet).
Router-2 continues to send EIGRP Queries to Router-4 about every 5
seconds.
Router-2 does not install the alternative path (via Router-1) to the
111.111.111.8/29 subnet into its IP Routing Table because it is waiting for
an EIGRP Reply from Router-4.
Watch as, after about 3 minutes, Router-2 places its neighbor, Router-4, into
the Stuck-In-Active state, which finally allows Router-2 to install the
alternative path to network 111.111.111.8/29 subnet via Router-1.
Configuration
Router-2#debug eigrp packet query reply
(QUERY, REPLY)
EIGRP Packet debugging is on
Router-2#
Sw-2(config-if)#end
Sw-2#
Router-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#interface loopback 1
Router-2(config-if)#shutdown
Router-2(config-if)#^Z
Router-2#
The entry in the EIGRP topology table should now reflect an Active state.
Notice that while the Queries are continually being re-sent by Router-2 toward
Router-4, the alternative path to network 111.111.111.8/29 (via Router-1) still has
not been installed into Router-2's IP Routing Table.
As you can see below, almost 3 minutes after the first EIGRP Query was sent to
Router-4 (the first EIGRP Query timestamp was 12:46:28.168), Router-2 still
believes that Router-4 is an EIGRP neighbor.
Dec 16 12:49:19.488: EIGRP: Sending QUERY on Fa0/1 - paklen 45 nbr 2.4.2.4, retry 42
, RTO 5000 tid 0
Dec 16 12:49:19.488: AS 100, Flags 0x0:(NULL), Seq 61/53 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/2 serno
Dec 16 12:49:24.488: EIGRP: Sending QUERY on Fa0/1 - paklen 45 nbr 2.4.2.4, retry 43
, RTO 5000 tid 0
Dec 16 12:49:24.488: AS 100, Flags 0x0:(NULL), Seq 61/53 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/2 serno
Router-2#
After 3 minutes you should have observed the following message indicating that
(from Router-2's perspective) Router-4 had gone into the Stuck-In-Active state, and
then the neighborship is finally taken down.
Router-2#
Immediately following the loss of R4 as a neighbor, R2 is able to place the
alternative route to 111.111.111.8/29 (via Router-1) into its Routing Table.
Router-2# un all
Task
Finally, change the Active Timer on R2 so that when any EIGRP entry goes into the
Active state, the router will only wait 1 minute for EIGRP Replies from any neighbor
(rather than 3 minutes) before declaring that neighbor as Stuck-In-Active.
Configuration
Router-2(config-if)# Router-2(config-if)#router eigrp 100
Router-2(config-router)#timers active ?
<1-65535> active state time limit in minutes
disabled disable time limit for active state
Router-2(config-router)#timers active 1
Router-2(config-router)#end
Verification
Router-2(config)#int loop 1
Router-2(config-if)#shut
Router-2#
CCNP ROUTE Workbook - EIGRP
Task
Notice in the topology diagram for this task that routers R1 and R4 now have new
Loopback interfaces that are already being advertised via EIGRP.
In this task you will practice EIGRP filtering techniques using Distribute-Lists that
reference Standard Access-Lists.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R2, create an EIGRP route filter that meets the following criteria:
This EIGRP filter should utilize a standard, numbered Access-List for route
matching.
This filter should only match on (and filter) the subnet 111.111.111.16/29. All
other subnets should not be filtered.
This filter should be configured in the inbound direction without referencing
any specific interface.
When you have completed this objective, R2 should not have any route or any
EIGRP Topology entry for 111.111.111.16/29.
Configuration on R2
Router-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#
access-list 1 deny 111.111.111.16 0.0.0.7
Router-2(config)#access-list 1 permit any
Router-2(config)#router eigrp 100
Router-2(config-router)#distribute-list 1 in
Router-2(config-router)#end
Router-2#
R2 Verification
Within EIGRP, the only tool available to accomplish route filtering is the Distribute-
List. When working with IPv4 routes, a Distribute-List must reference some other
feature for the matching of routes. Distribute-Lists can reference Access-Lists,
Prefix-Lists, or Route-Maps. Finally, when applying the Distribute-List within your
EIGRP process, you must specify a direction (inbound or outbound) and, optionally,
reference an interface.
Notice from the output below that when the Distribute-List is applied, the route to
111.111.111.16/29 no longer appears in the IP Routing Table or the EIGRP
Topology Table.
Router-2#show ip route eigrp
Task
In this task you will practice EIGRP filtering techniques using Distribute-Lists that
reference Extended Access-Lists.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R2, create an EIGRP route filter that meets the following criteria:
This EIGRP filter should utilize an extended, numbered Access-List for route
matching.
This filter should only match on (and filter) the subnet 111.111.111.0/29 if it
was advertised from router R4. All other subnets should not be filtered.
This filter should be configured in the inbound direction without referencing
any specific interface.
When you have completed this objective, R2 should only have a single EIGRP
Topology entry, and a single IP Route entry for 111.111.111.0/29 with R1 as the
next-hop.
Configuration on R2
Router-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#
access-list 101 deny ip host 2.4.2.4 111.111.111.0 0.0.0.7
Router-2(config)#access-list 101 permit ip any any
Router-2(config)# Router-2(config)#router eigrp 100
Router-2(config-router)#distribute-list 101 in
Router-2(config-router)#end
Router-2#
R2 Verification
When an EIGRP Distribute-List references an Extended Access-List the portion of
the ACL that one normally thinks of as referring to the "source" in this case
references the route source (or EIGRP neighbor advertising the route) and the
"destination" portion of the ACL matches on the Route that you want to filter.
After implementation of the Distribute-List, you can see that the route still exists in
the IP Routing Table, but now it only has a single next-hop of R1.
Within the EIGRP Topology Table, we can also verify that there is only a single
entry for this route with a next-hop of R1.
Task
In this task you will practice EIGRP filtering techniques using Distribute-Lists that
reference a Prefix-List.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R2, create an EIGRP route filter that meets the following criteria:
This EIGRP filter should utilize a Prefix-List named INE for route matching.
This filter should only match on (and filter) any subnet in which the first 25
bits of the prefix match 111.111.111.0 and the subnet mask is a /28 or /29.
The matching criteria above should be configured with just a single line of
your Prefix-List.
A second line of your Prefix-List should ensure that no other subnets are
filtered.
This filter should be configured in the inbound direction without referencing
any specific interface.
When you have completed this objective, R2 should no longer have any of the
following routes or EIGRP Topology entries:
111.111.111.32/28
111.111.111.16/29
111.111.111.0/29
Configuration on R2
Router-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#
ip prefix-list INE seq 10 deny 111.111.111.0/25 ge 28 le 29
Router-2(config)#ip prefix-list INE seq 20 permit 0.0.0.0/0 le 32
Router-2(config)# Router-2(config)#router eigrp 100
Router-2(config-router)#distribute-list prefix INE in
Router-2(config-router)#end
Router-2#
R2 Verification
Before implementing the Distribute-List on R2, this is what your IP Routing Table
should have looked like:
Task
In this task you will practice EIGRP filtering techniques using Distribute-Lists that
reference a Route-Map. Your Route-Map will, in turn, reference a Prefix-List as well
an Access-List.
This Route-Map will be admittedly complex, and not something you would design in
a production network. But the goal of this task is to ensure that you become familiar
with how Prefix-Lists and Access-Lists work in combination with a Route-Map.
If you are doing this lab on your own equipment, ensure that the
Bandwidth or clockrate of your Serial interface on R4 connecting to
R1 is set to 128 Kbps.
On router R2, create an EIGRP route filter that utilizes a Route-Map named INE for
route matching.
The Route-Map should only contain three sequence numbers.
The first sequence of the Route-Map called INE should filter all routes that match a
Prefix-List also called INE.
The Prefix-List should match any route in which the first 25 bits of the
prefix match 111.111.111.0 and the subnet mask is either a /27 or /28.
The above-mentioned criteria should be configured with only a single line of
your Prefix-List.
The next sequence of your Route-Map should filter any route that matches an
Access-List.
The matching Access-List should only contain a single line (Access-
Control Entry), and that single line should match on two routes,
111.111.111.0/29 and 111.111.111.16/29.
The third, and last, sequence of your Route-Map should permit all
remaining routes that weren't filtered by the previous sequences.
When you have completed this objective, R2 should only have TWO
EIGRP-learned routes in its Routing Table and EIGRP Topology Table of
1.4.1.0/24 and 111.111.111.24/30.
Configuration on R2
router eigrp 100 distribute-list route-map INE in
R2 Verification
Notice the wildcard mask in the Access-List. Wildcard masks are useful because
they can match on non-contiguous bits. In this particular ACL, the wildcard mask of
0.0.0.16 ensures that routes will only be matched if their binary pattern matches
111.111.111.000any0000. By wildcarding the 16th bit, the ACL allows that bit to be
a one or zero (so this ACL will match both 111.111.111.0 and 111.111.111.16), but
it will NOT match 111.111.111.24 because the mask forces the 8-bit to be a zero.
Before implementing the Distribute-List on R2, this is what your IP Routing Table
should have looked like:
After implementation of the Distribute-List, you should see that all of the routes that
have been highlighted above are now gone (have been filtered) and all that is left is
1.4.1.0/24 and 111.111.111.24/30.
Router-2#sho ip route eigrp
Task
In this task you will practice using the "auto-summary" feature of EIGRP to
summarize networks. You'll also gain exposure to which networks will (and won't) be
summarized by this command.
To begin, look at the existing EIGRP configurations of routers R1, R2, and R4 and
see if you can answer this question:
After you implement the "auto-summary" feature on all three routers, how
do you think it will affect the IP Routing Tables of your routers?
Within all three routers (R1, R2, and R4), configure the auto-summary feature.
View the IP Routing Tables of all three routers. Was your answer to the question
above correct?
Router-1(config-router)#end
Router-1#
Verification (R1)
Starting with the IP Routing Table of R1, we see that the only EIGRP-learned route
visible is the route to 2.0.0.0/8. This is the only route we see because:
All of the routes beginning with 111.111.111.x, as well as 1.2.1.0/24 and 1.4.1.0/24,
are directly connected to R1 and have a lower Administrative Distance than any
dynamically learned route.
The subnets of 111.111.111.x/y and 2.4.2.0/24 have been summarized by R2 down
to 111.0.0.0/8 and 2.0.0.0/8.
The routes of 111.0.0.0/8 and 1.0.0.0/8 are EIGRP Summary Routes that R1 created
itself. The rules of EIGRP state that when creating a Summary Route, an EIGRP
router must:
Advertise this route as an EIGRP Internal Route to its neighbors.
Install the route as an EIGRP Summary Route (with an Administrative
Distance of 5) within its own IP Routing Table for loop-prevention purposes.
Router-1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
Verification (R2)
Router-2's IP Routing Table indicates that this router has also created some EIGRP
Summary Routes: * 1.0.0.0/8 is an EIGRP Summary, which was advertised by R2
outbound on interface FastEthernet0/1. * 2.0.0.0/8 is an EIGRP Summary, which
was advertised by R2 outbound on interface FastEthernet0/0. * 111.0.0.0/8 is an
EIGRP Summary, which was advertised by R2 outbound on interfaces
FastEthernet0/0 as well as FastEthernet0/1.
The only EIGRP route that R2 has learned from another router is the route to
1.4.1.0/24, which was sent from R1. Because R1 and R2 share a segment that is in
the 1.x.x.x network, R1 sent the subnet on its Serial1/3 interface (1.4.1.0/24)
without summarizing it. Notice that R4 also is connected to this same subnet, but
R4 had to summarize that route down to 1.0.0.0./8 because R4 and R2 are
connected by a different, classfull network (the 2.x.x.x network).
R4's summarized route of 1.0.0.0/8 has not been installed into the IP Routing Table
of R2, but it can be seen in the output of show ip eigrp topology all-links.
Router-2#sho ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
Verification (R4)
Router-4's IP Routing Table is much like the table of R1. R4 doesn't have nearly the
quantity of Loopback interfaces that are configured in R1, so you don't see as many
connected routes for subnets of 111.x.x.x.
Here you can see that there are only two EIGRP routes that have been learned from
a neighbor. Those two routes are: * 1.2.1.0/24 (which was learned via R1 across the
Serial link) * 2.5.2.0/30 (which was learned via R2 across the FastEthernet0/1
interface)
Router-4#sho ip route
In this task you have seen how the auto-summary feature works. One of the major
limitations of using this feature to accomplish EIGRP route summarization is that
removes your control over routes will be summarized and which will not. Take, for
example, the existing topology. What if your objective were: * On R1, summarize all
the loopbacks containing a mask of /30, /29, and /28 down to a single route of
111.111.111.0 /26. * Advertise the subnet on Loopback-5 (111.111.111.64/27) as is,
without summarizing it.
Task
In this task you will practice using the manual-summarization technique of EIGRP to
summarize networks.
Verification (R2)
Router-2#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
Router-2#
Verification (R4)
Router-4#sho ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
Router-4#
CCNP ROUTE Workbook - EIGRP
In this task you will practice using the EIGRP Stub feature to limit the propagation
of EIGRP Query messages.
EIGRP routers that receive an EIGRP Query can take the following actions:
If the router that received the Query never had the lost route in its Routing Table or
EIGRP Topology Table, it will immediately send an EIGRP Reply to that Query and
stop any further propagation of that Query.
If the router that received the Query does have an alternative, loop-free path, it will
immediately reply to that Query and stop propagation of that Query.
If the router that received the Query has no alternative paths to that route, but it does
have other EIGRP downstream neighbors, it will generate its own Query for that lost
route and propagate that Query to its own downstream neighbors.
Task
Confirm that, at present, any Queries generated by R1 are currently being sent to
R2...and R2 is propagating its own Queries down to R4:
On R4, configure the following:
(config)#logging buffer debug
(config)#logging buffer 100000
debug eigrp packet query reply
On router R1, shut down the Loopback-0 interface (any Loopback could be used
for this demonstration).
Go back to router R4 and view your log file with the command show log and you
should see evidence that R4 received an EIGRP Query from R2, and R4 sent an
EIGRP Reply to that Query.
Verification
Router-4#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-4(config)#logging buffer debug
Router-4(config)#logging buffer 100000
Router-4(config)#end
Router-4# Router-4#debug eigrp packet query reply
(QUERY, REPLY)
EIGRP Packet debugging is on
Router-4#
Router-1#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-1(config)#int loop 0
Router-1(config-if)#shut
Router-1(config-if)#
Router-4#sho log
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 15 flushes, 0 overruns, xml disabled, filterin
Dec 18 08:08:10.158: %SYS-5-CONFIG_I: Configured from console by console Dec 18 08:08:31.030: EIGRP:
Received QUERY on Fa0/1 - paklen 45 nbr 2.4.2.2
Dec 18 08:08:31.030: AS 100, Flags 0x0:(NULL), Seq 106/0 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0
Dec 18 08:08:31.046: EIGRP: Enqueueing REPLY on Fa0/1 - paklen 0 nbr 2.4.2.2 tid 0 iidbQ un/rely 0/1 peerQ un/rely 0
Dec 18 08:08:31.054: EIGRP: Sending REPLY on Fa0/1 - paklen 45 nbr 2.4.2.2
tid 0
Dec 18 08:08:31.054: AS 100, Flags 0x0:(NULL), Seq 79/106 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/1 serno
Router-4#
Task
In this task your objective is to configure the EIGRP Stub feature on R4 so that if
router R2 receives an EIGRP Query (for any lost route) from router R1, router R2
should NOT propagate that Query to its downstream neighbor of R4.
Configuration (R4)
Router-4#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-4(config)#router eigrp 100
Router-4(config-router)#eigrp stub
Router-4(config-router)#end
Router-4#
Dec 18 08:25:58.222: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 2.4.2.2 (FastEthernet0/1) is down: peer info change
Dec 18 08:25:58.602: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 2.4.2.2 (FastEthernet0/1) is up: new adjacency
Router-4#
Verification (R4)
Router-4# Router-4#clear log
(QUERY, REPLY)
EIGRP Packet debugging is on
Router-4#
Router-4#
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#logging buffer debug
Router-2(config)#logging buffer 100000
Router-2(config)#exit
Router-2#
Dec 18 08:29:23.922: %SYS-5-CONFIG_I: Configured from console by console Router-2#
debug eigrp packet query reply
(QUERY, REPLY)
EIGRP Packet debugging is on Router-2#clear log
Router-1
(config)# Router-1(config)#interface loopback 0
Router-1(config-if)#shutdown
Router-1(config-if)#
Router-2#sho log
Dec 18 08:30:45.030: AS 100, Flags 0x0:(NULL), Seq 69/0 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0
Dec 18 08:30:45.046: EIGRP: Enqueueing REPLY on Fa0/0 - paklen 0 nbr 1.2.1.1 tid 0 iidbQ un/rely 0/1 peerQ un/rely 0
Dec 18 08:30:45.054: EIGRP: Sending REPLY on Fa0/0 - paklen 45 nbr 1.2.1.1
tid 0
Dec 18 08:30:45.054: AS 100, Flags 0x0:(NULL), Seq 112/69 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/1 serno
Router-2#
Router-4#sho log
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 15 flushes, 0 overruns, xml disabled, filterin
Task
In this task you will practice using the EIGRP Manual Summarization to limit the
propagation of EIGRP Query messages.
EIGRP routers that receive an EIGRP Query can take the following actions:
If the router that received the Query never had the lost route in its Routing Table or
EIGRP Topology Table, it will immediately send an EIGRP Reply to that Query and
stop any further propagation of that Query.
If the router that received the Query does have an alternative, loop-free path, it will
immediately reply to that Query and stop propagation of that Query.
If the router that received the Query has no alternative paths to that route, but it does
have other EIGRP downstream neighbors, it will generate its own Query for that lost
route and propagate that Query to its own downstream neighbors.
Confirm that, at present, any Queries generated by R1 are currently being sent to
R2...and R2 is propagating its own Queries down to R4:
On R4, configure the following:
(config)#logging buffer debug
(config)#logging buffer 100000
debug eigrp packet query reply
On router R1, shut down the Loopback-0 interface (any Loopback could be used
for this demonstration).
Go back to router R4 and view your log file with the command show log , and you
should see evidence that R4 received an EIGRP Query from R2, and R4 sent an
EIGRP Reply to that Query.
Verification
Router-4#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-4(config)#logging buffer debug
Router-4(config)#logging buffer 100000
Router-4(config)#end
Router-4# Router-4#debug eigrp packet query reply
(QUERY, REPLY)
EIGRP Packet debugging is on
Router-4#
Router-1#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-1(config)#int loop 0
Router-1(config-if)#shut
Router-1(config-if)#
Router-4#sho log
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 15 flushes, 0 overruns, xml disabled, filterin
Dec 18 08:08:10.158: %SYS-5-CONFIG_I: Configured from console by console Dec 18 08:08:31.030: EIGRP:
Received QUERY on Fa0/1 - paklen 45 nbr 2.4.2.2
Dec 18 08:08:31.030: AS 100, Flags 0x0:(NULL), Seq 106/0 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0
Dec 18 08:08:31.046: EIGRP: Enqueueing REPLY on Fa0/1 - paklen 0 nbr 2.4.2.2 tid 0 iidbQ un/rely 0/1 peerQ un/rely 0
Dec 18 08:08:31.054: EIGRP: Sending REPLY on Fa0/1 - paklen 45 nbr 2.4.2.2
tid 0
Dec 18 08:08:31.054: AS 100, Flags 0x0:(NULL), Seq 79/106 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/1 serno
Router-4#
Task
In this task your objective is to configure manual EIGRP summarization R1 so
that if router R2 receives an EIGRP Query (for any of the Loopback subnets) from
router R1, router R2 should NOT propagate that Query to its downstream
neighbor of R4.
Configuration (R1)
Router-1(config)#interface Fast0/0
Router-1(config-if)#ip summary-address eigrp 100 111.111.111.0 255.255.255.128
Dec 18 08:55:46.610: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.2.1.2 (FastEthernet0/0) is resync: summary config
Router-1(config-if)#end
Router-1#
Verification (R4)
Router-4# Router-4#clear log
(QUERY, REPLY)
EIGRP Packet debugging is on
Router-4#
Router-4#
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#logging buffer debug
Router-2(config)#logging buffer 100000
Router-2(config)#exit
Router-2#
Dec 18 08:29:23.922: %SYS-5-CONFIG_I: Configured from console by console Router-2#
debug eigrp packet query reply
(QUERY, REPLY)
EIGRP Packet debugging is on Router-2#clear log
Router-1
(config)# Router-1(config)#interface loopback 0
Router-1(config-if)#shutdown
Router-1(config-if)#
Router-2#sho log
Dec 18 08:30:45.030: AS 100, Flags 0x0:(NULL), Seq 69/0 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0
Dec 18 08:30:45.046: EIGRP: Enqueueing REPLY on Fa0/0 - paklen 0 nbr 1.2.1.1 tid 0 iidbQ un/rely 0/1 peerQ un/rely 0
Dec 18 08:30:45.054: EIGRP: Sending REPLY on Fa0/0 - paklen 45 nbr 1.2.1.1
tid 0
Dec 18 08:30:45.054: AS 100, Flags 0x0:(NULL), Seq 112/69 interfaceQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/1 serno
Router-2#
Router-4#sho log
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 15 flushes, 0 overruns, xml disabled, filterin
Task
In this task you will practice propagating a default route in EIGRP to give EIGRP
neighbors reachability to un-advertised networks.
Verify that this default route has been advertised to neighbor R2, and that R2 has
advertised it to R4.
Verify that both R2 and R4 can still ping any of the IP addresses configured on any of
R1's Loopbacks.
Configuration (R1)
Router-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-1(config)#
ip route 0.0.0.0 0.0.0.0 null0
Router-1(config)# Router-1(config)#router eigrp 100
Router-1(config-router)#redistribute static metric 10000 10 255 1 1500
Router-1(config-router)#end
Verification (R2)
Router-2#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Router-2#
Router-2#ping 111.111.111.65
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 111.111.111.65, timeout is 2 seconds:
!!!!! Success rate is 100 percent
(5/5), round-trip min/avg/max = 1/2/4 ms
Router-2#
Verification (R4)
Router-4#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Router-4#ping 111.111.111.9
Task
In this task you will practice another method of propagating a default route in EIGRP
to give EIGRP neighbors reachability to un-advertised networks.
Verification (R1)
Router-1#sho ip route 0.0.0.0
Routing entry for 0.0.0.0/0, supernet Known via "eigrp 100", distance 30
, metric 28160, candidate default path, type internal
Redistributing via eigrp 100
Routing Descriptor Blocks:
* directly connected, via Null0
Route metric is 28160, traffic share count is 1
Total delay is 100 microseconds, minimum bandwidth is 100000 Kbit
Reliability 255/255, minimum MTU 1500 bytes
Loading 1/255, Hops 0
Router-1#
Verification (R2)
Router-2#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Router-2#ping 111.111.111.65
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 111.111.111.65, timeout is 2 seconds:
!!!!! Success rate is 100 percent
(5/5), round-trip min/avg/max = 1/2/4 ms
Router-2#
Verification (R4)
Router-4#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Task
In this task you will practice configuring EIGRP on a router using Named
Configuration Mode.
Notice that in this task, R1 does not have any existing EIGRP
configuration.
On router R1, configure a named instance of EIGRP (use the name INE) following
these criteria:
R1 should be placed into EIGRP Autonomous System 100.
R1 should NOT advertise the subnet on Loopback-5 (111.111.111.64/27) to
any neighbors. You must NOT use a Distribute-List to accomplish this
objective.
R1 should implement an outbound Distribute-List to ensure that it does NOT
advertise the subnet on its Loopback-4 interface (111.111.111.32/28).
R1 should advertise a default route (0.0.0.0) only from interface Serial1/3.
Routers R2 and R4 will use this default route to have reachability to the ip
subnets on Loopback-4 and 5.
Verify that routers R2 and R4 can ping any of the IP addresses on the Loopback
interfaces of R1.
Configuration (R1)
router eigrp INE
! address-family ipv4 unicast autonomous-system 100
! af-interface Loopback5
shutdown
exit-af-interface
! af-interface Serial1/3
summary-address 0.0.0.0 0.0.0.0
exit-af-interface
! topology base
distribute-list 1 out
Verification (R1)
Router-1#sho ip eigrp neighbor
EIGRP-IPv4 VR(INE) Address-Family Neighbors for AS(100)
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num 1
1.4.1.4 Se1/3
13 00:05:23 11 1170 0 108 0 1.2.1.2 Fa0/0
12 00:06:43 2 100 0 165
Router-1#
Verification (R2)
Router-2#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
Router-2#ping 111.111.111.65
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 111.111.111.65, timeout is 2 seconds:
!!!!! Success rate is 100 percent
(5/5), round-trip min/avg/max = 1/2/4 ms
Router-2#
Verification (R4)
Router-4#sho ip route eigrp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Router-4#ping 111.111.111.9
Task
This task is a full-scale EIGRP CCNP Lab. None of the routers have any existing
EIGRP configuration. You will add EIGRP to each router given the criteria below.
R1 Configuration Criteria
R1 should summarize its locally connected Loopback-0, Loopback-1, Loopback-2,
and Loopback-3 networks into a single, summarized route that is only advertised
on interface Serial1/3.
R1 and R2 must be configured for EIGRP MD5 Authentication using a Key-Chain
called INE with a key (password) of Cisco.
R1 must filter the advertised, inbound Loopbacks of R4 using a Distribute List.
The Distribute-List must be applied in the inbound direction and only for
routes received on interface Serial1/3.
The Distribute-List must reference a Route-Map called INE.
The first sequence of the Route-Map must deny R4's subnets of its
Loopback-0, Loopback-1, and Loopback-2 interfaces. This must be done by
matching an Access-List.
The second sequence of the Route-Map must deny R4's subnets of its
Loopback-4 and Loopback-5 interfaces. This must be done by matching a
Prefix-List called INE.
Anything not filtered by the first two sequences of this Route-Map should be
permitted (not filtered by the Distribute-List).
R2 Configuration Criteria
R2 should advertise a default route (0.0.0.0/0) to all EIGRP Neighbors. You may not
use Manual-Summarization for this task.
See the criteria above in R1's section about EIGRP authentication between R2 and
R1.
R2 should filter R1's Loopback-0, Loopback-1, Loopback-2, and Loopback-3
subnets from any of its outbound EIGRP updates transmitted on interface
FastEthernet0/1.
R3 Configuration Criteria
R3 should be configured to have two equal-cost paths in its IP Routing Table to
reach the Loopback-0 subnet of R2 (2.5.2.0/30).
The next-hop of one of the routes should be R2.
The next-hop of the other route should be R4.
You may only use an EIGRP Offset-List on R3 to accomplish this objective.
Configuration (R1)
<Only the relevant EIGRP configuration is shown>
!
hostname Router-1
!
!
key chain INE
key 1
key-string Cisco
!
!
!
router eigrp INE
!
address-family ipv4 unicast autonomous-system 100
!
af-interface FastEthernet0/0
authentication mode md5
authentication key-chain INE
exit-af-interface
!
af-interface Serial1/3
summary-address 111.111.111.0 255.255.255.224
exit-af-interface
!
topology base
distribute-list route-map INE in Serial1/3
exit-af-topology
network 1.2.1.0 0.0.0.255
network 1.4.1.0 0.0.0.255
network 111.111.111.0 0.0.0.7
network 111.111.111.8 0.0.0.7
network 111.111.111.16 0.0.0.7
network 111.111.111.24 0.0.0.3
network 111.111.111.32 0.0.0.15
network 111.111.111.64 0.0.0.31
exit-address-family
!
!
ip prefix-list INE seq 10 permit 144.144.144.32/28
ip prefix-list INE seq 15 permit 144.144.144.64/27
!
route-map INE deny 10
match ip address 1
!
route-map INE deny 20
match ip address prefix-list INE
!
route-map INE permit 30
!
!
access-list 1 permit 144.144.144.16
access-list 1 permit 144.144.144.0 0.0.0.15
!
Configuration (R2)
<Only the relevant EIGRP configuration is shown>
!
key chain INE
key 1
key-string Cisco
!
!
!
router eigrp INE
!
address-family ipv4 unicast autonomous-system 100
!
af-interface FastEthernet0/0
authentication mode md5
authentication key-chain INE
exit-af-interface
!
topology base
distribute-list prefix INE out FastEthernet0/1
redistribute static metric 10000 10 255 1 1500
exit-af-topology
network 1.2.1.0 0.0.0.255
network 2.4.2.0 0.0.0.255
network 2.5.2.0 0.0.0.3
exit-address-family
!
!
ip route 0.0.0.0 0.0.0.0 Null0
!
!
ip prefix-list INE seq 10 deny 111.111.111.0/27 ge 29 le 30
ip prefix-list INE seq 15 permit 0.0.0.0/0 le 32
!
!
Configuration (R3)
<Only the relevant EIGRP configuration is shown>
!
router eigrp 100
distribute-list 101 in FastEthernet0/0
network 2.4.2.0 0.0.0.255
network 3.4.3.0 0.0.0.255
offset-list 2 in 2560 FastEthernet0/0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
!
!
!
access-list 2 permit 2.5.2.0 0.0.0.255
access-list 101 deny ip host 2.4.2.2 111.111.111.32 0.0.0.31
access-list 101 deny ip host 2.4.2.2 111.111.111.64 0.0.0.63
access-list 101 permit ip host 2.4.2.2 any
access-list 101 permit ip host 2.4.2.4 any
!
Configuration (R4)
<Only the relevant EIGRP configuration is shown>
!
interface FastEthernet0/0
ip address 3.4.3.4 255.255.255.0 delay 120
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 2.4.2.4 255.255.255.0 delay 11
duplex auto
speed auto
!
!
interface Serial1/3 bandwidth 100000
ip address 1.4.1.4 255.255.255.0 delay 10
!
!
!
router eigrp 100
variance 2
network 1.4.1.0 0.0.0.255
network 2.4.2.0 0.0.0.255
network 3.4.3.0 0.0.0.255
network 144.144.144.0 0.0.0.7
network 144.144.144.8 0.0.0.7
network 144.144.144.16 0.0.0.7
network 144.144.144.24 0.0.0.3
network 144.144.144.32 0.0.0.15
network 144.144.144.64 0.0.0.31
!
For the variance command to work (and not also include the route to 2.5.2.0/30 via
FastEthernet0/0), several things had to occur:
The Reported Distance of this route via Serial1/3 had to be LESS THAN the current
Feasible Distance of the best route (to meet the Feasibility Condition).
If a route does not meet the Feasibility Condition, it will never be a candidate
for Variance.
For this reason, the method selected here was to slightly increase the delay
on interface FastEthernet0/1.
This ensured that the Feasible Distance of the best route was slightly higher
than the Reported Distance of this same route from R1 (via Serial1/3).
To use a Variance of 2 would also have allowed the router to use FastEthernet0/0 as
its next-hop (which would have given three routes to this subnet), but that was
expressly prohibited in the instructions.
To prevent that, the delay of FastEthernet0/0 was greatly increased so that
the total distance to reach 2.5.2.0/30 via this interface was MORE than twice
the current Feasible Distance.
CCNP ROUTE Workbook - CCNP Route
Workbook Introduction
Welcome!
Thank you for using this workbook as part of your preparations for pursuing your
CCNP ROUTE certification. The sections and tasks within this workbook are
designed to give you hands-on experience with the majority of topics defined as "
Configure and verify" within the CCNP ROUTE version 2.0 blueprint.
Although it is advisable to begin with the first task in each section and then work
progressively through that section, the individual tasks were designed in such a way
that you can start with any task you wish without following any specific order. After
you have downloaded the initial configurations for a task, you may begin working on
that task, even if you have not completed the tasks that preceded it.
Diagrams
There are two main diagrams supplied with this workbook that should be used to
give you a complete understanding of the network topology. Often, you will find that
there are individual diagrams for each section, but these are all permutations of the
main diagrams shown below.
Aside from the links shown below, there are other links (not displayed in the
topology diagram) that lead to other devices not used in this workbook. To prevent
unexpected behavior, it is always recommended that you shut down all links on
all three switches in your LAN topology as your first step, and then enable
only those links displayed in the topology for any given task.
Tasks
When you load the initial configurations onto all devices for this task, all
devices will be:
Configure OSPF on the same three routers so that you obtain a full-mesh
(each router has an OSPF adjacency with the other two routers across the
Frame-Relay WAN).
It is advisable that before you move on to the next task, you save your
configurations for Routers-1, 3, and 4 into a local text file as you will need to
reconfigure the WAN links on these routers for subsequent tasks.
Router Configuration
Rtr-1(config)#int ser 1/0
Rtr-1(config-if)#ip address 1.3.4.1 255.255.255.0
Rtr-1(config-if)#exit
Rtr-1(config)#router ospf 1 Rtr-1(config-router)# network 1.3.4.0 0.0.0.255 area 0
Rtr-1(config-router)# neighbor 1.3.4.3
Rtr-1(config-router)# neighbor 1.3.4.4
Rtr-1(config-router)#end
Rtr-1#
Rtr-4(config-router)#end
Rtr-4#
#
CCNP ROUTE Workbook - OSPF
OSPF Virtual-Links
Load the CCNP ROUTE WB Task OSPF-1 Configs initial
configurations before starting.
Tasks
When you load the initial configurations onto all devices for this task, all
devices will be:
Configure OSPF on the same three routers so that you obtain a full-mesh
(each router has an OSPF adjacency with the other two routers across the
Frame-Relay WAN).
At the end of this task, you should have end-to-end IP connectivity between
Switch-1 and IP Subnets being advertised by the Backbone Router.
It is advisable that before you move on to the next task, you save your
configurations for Routers-1, 3, and 4 into a local text file as you will need to
reconfigure the WAN links on these routers for subsequent tasks.
Configuration
Rtr-4(config)#router ospf 1 Rtr-4(config-router)# area 2 virtual-link 1.1.1.22
Rtr-4(config-router)#end
Rtr-4#
Sw-2(config-router)#end
Sw-2#
Notice that Switch-2 is now acting as an OSPF Area Border Router. Because
Switch-2 is the termination point for one end of the virtual-link, this means that Area-
0 has now been "stretched" through this Virtual-Link and terminates on Switch-2.
As such, Switch-2 is now maintaining three (3) OSPF Databases...an Area-3 DB, an
Area-2 DB and an Area-0 DB.
Sw-2
#sho ip ospf database
Preliminary Tasks
When you load the initial configurations onto all devices for this task, all
devices will be:
New Tasks
Identify which device is the Designated Router for the segment shared between
Router-4 and Switch-2.
Issue a "show" command in Router-4 such that the only thing that is displayed, are
details about the Type-2 Network LSA generated from the Designated Router you
identified above. No other LSAs should be displayed in the output.
Make whatever configuration changes are needed so that the device that is NOT
currently the OSPF Designated Router, becomes the Designated Router.
It is advisable that before you move on to the next task, you save your
configurations for Routers-1, 3, 4, and Switch-2 into a local text file as you will
need to reconfigure the WAN links and Virtual-Links for subsequent tasks.
Note that in your topology, Router-4 may display as the OSPF Designated Router.
Issue a "show" command in Router-4 such that the only thing that is
displayed, are details about the Type-2 Network LSA generated from the
Designated Router you identified above. No other LSAs should be displayed
in the output.
Rtr-4#
Make whatever configuration changes are needed so that the device that is
NOT currently the OSPF Designated Router, becomes the Designated Router.
Rtr-4#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Rtr-4(config)#int fast0/1 Rtr-4(config-if)# ip ospf priority 2
The default OSPF interface priority is one (1). Here we are making the
interface priority on Router-4 higher than the default so that it will
become the DR.
Rtr-4(config-if)# shut
Rtr-4(config-if)#
May 4 12:25:42.955: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on FastEthernet0/1 from FULL to DOWN, Neighbor Down: In
Rtr-4(config-if)#
May 4 12:25:44.951: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
May 4 12:25:45.951: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down
Rtr-4(config-if)#
May 4 12:25:48.455: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on OSPF_VL0 from FULL to DOWN, Neighbor Down: Interface
Rtr-4(config-if)#
Rtr-4(config-if)# Rtr-4(config-if)# no shutdown
Rtr-4(config-if)#end
Rtr-4#
Rtr-4#
May 4 12:25:59.995: %SYS-5-CONFIG_I: Configured from console by console
Rtr-4#
May 4 12:26:01.175: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
May 4 12:26:02.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Rtr-4#
Rtr-4#
May 4 12:26:42.895: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on FastEthernet0/1 from LOADING to FULL, Loading Done
May 4 12:26:47.911: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on OSPF_VL0 from LOADING to FULL, Loading Done
Rtr-4# sho ip ospf interface Fast0/1
FastEthernet0/1 is up, line protocol is up
Internet Address 2.4.0.4/24, Area 2, Attached via Network Statement
Process ID 1, Router ID 1.1.1.4, Network Type BROADCAST, Cost: 1
Topology-MTID Cost Disabled Shutdown Topology Name
0 1 no no Base
Transmit Delay is 1 sec, State DR, Priority 2
Designated Router (ID) 1.1.1.4, Interface address 2.4.0.4
Preliminary Tasks
When you load the initial configurations onto all devices for this task, all devices will
be:
Preconfigured with IP addresses as shown in the topology diagram.
OSPF will already be activated on all links connecting to Areas 1, 2, and 3
(Loopbacks are not advertised by OSPF)
Routers 1, 3, and 4 will already have functional (full-mesh) Frame-Relay
PVCs between them.
New Tasks
Configure OSPF virtual-links between:
* Do you see any Summary LSAs from Advertising Router 1.1.1.22 (Switch-
2)? ______
Question-5: Have the same LSAs that Router-3 received in the question above,
been translated into OSPF routes in Router-3's IP Routing Table? ________
Question-6: Has Router-3 extracted any of the IP Prefix information from those
received LSAs (from Router-4 and Switch-2) and created its own Type-3 Summary
LSAs (for injection into Area-2) based on that information? ____
It is advisable that before you move on to the next task, you save
your configurations for Routers-1, 3, 4, and Switch-2 into a local
text file as you will need to reconfigure the WAN links and Virtual-
Links for subsequent tasks.
Rtr-1(config-subif)#exit
Rtr-1(config)#
Rtr-3(config-subif)#end
Rtr-3#
Rtr-4(config-subif)#end
Rtr-4#
Rtr-1#
Rtr-3
#sh run | sec ospf
router ospf 1
area 2 virtual-link 1.1.1.22
network 1.3.4.0 0.0.0.255 area 0
network 2.4.2.0 0.0.0.255 area 2 neighbor 1.3.4.1
Rtr-3#
Rtr-4
#sh run int ser 1/0.134
Building configuration...
Rtr-4
#show ip ospf neighbor
Rtr-1
#show ip ospf neighbor
Answers: Question-4
Look in the OSPF database of Router-3;
LS age: 360
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network) Link State ID: 2.4.0.0
(summary Network Number) Advertising Router: 1.1.1.4
LS Seq Number: 80000002
Checksum: 0x1717
Length: 28
Network Mask: /24
MTID: 0 Metric: 1
LS age: 1355 (DoNotAge)
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network) Link State ID: 2.4.0.0
(summary Network Number) Advertising Router: 1.1.1.22
Do you see any Summary LSAs from Advertising Router 1.1.1.22 (Switch-2)? YES
Rtr-3#
Answer(s): Question-5
Have the same LSAs that Router-3 received in the question above, been translated
into OSPF routes in Router-3's IP Routing Table? NO
As can be seen from the output above, even though Router-3 has received the
correct LSAs describing remote subnets in Areas-2 and 3, (such as network
2.4.0.0/24
) because of the network-type mismatch between this router and his neighbor who
flooded those LSAs (Router-4) they are not "believable" and have not been
translated into routes.
Answer(s): Question-6
Has Router-3 extracted any of the IP Prefix information from those received LSAs
(from Router-4 and Switch-2) and created its own Type-3 Summary LSAs (for
injection into Area-2) based on that information? NO
LS age: 63
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network)
Link State ID: 2.4.2.0 (summary Network Number)
Advertising Router: 1.1.1.3
LS Seq Number: 80000002
Checksum: 0x726
Length: 28
Network Mask: /24
MTID: 0 Metric: 1
LS age: 63
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network)
Link State ID: 1.2.0.0 (summary Network Number)
Advertising Router: 1.1.1.3
LS Seq Number: 80000002
Checksum: 0x588A
Length: 28
Network Mask: /24
MTID: 0 Metric: 845
LS age: 63
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network)
Link State ID: 1.2.1.0 (summary Network Number)
Advertising Router: 1.1.1.3
LS Seq Number: 80000002
Checksum: 0x4D94
Length: 28
Network Mask: /24
MTID: 0 Metric: 845
LS age: 63
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network)
Link State ID: 1.2.2.0 (summary Network Number)
Advertising Router: 1.1.1.3
LS Seq Number: 80000002
Checksum: 0xC4DB
Length: 28
Network Mask: /24
MTID: 0 Metric: 909
LS age: 63
Options: (No TOS-capability, DC, Upward)
LS Type: Summary Links(Network)
Link State ID: 1.3.4.0 (summary Network Number)
Advertising Router: 1.1.1.3
LS Seq Number: 80000002
Checksum: 0x826B
Length: 28
Network Mask: /24
MTID: 0 Metric: 64
Rtr-3#
Notice from the output above that the only Type-3 Summary LSAs that Router-3 has
created (for injection into Area-2) are LSAs describing prefixes in Area-1, and Area-
0. Even though LSAs HAVE been received describing prefixes in Area-2 and Area-
3, those LSAs:
Have NOT been generated into IP routes for Router-3's own, local routing table.
Have NOT been used as material for Type-3 (Summary LSA) generation by Router-3.
A network type mismatch between OSPF routers will not prevent a Full Adjacency
from being formed.
A network type mismatch between OSPF neighbors will not prevent OSPF LSA
flooding between those neighbors (remember the golden rule of OSPF, if you-and-I
have a Full Adjacency between us that means our OSPF Databases MUST match
for the area we have in common).
A network type mismatch between OSPF neighbors WILL prevent the generation of
IP routes.
A network type mismatch between OSPF neighbors WILL prevent the generation of
Type-3 Summary LSAs.
CCNP ROUTE Workbook - OSPF
Preliminary Tasks
When you load the initial configurations onto all devices for this task, all devices will
be:
Preconfigured with IP addresses as shown in the topology diagram.
OSPF will already be activated on all links and all Areas (Loopbacks are not
advertised by OSPF)
Routers 1, 3, and 4 will already have functional (full-mesh) Frame-Relay
PVCs between them with OSPF running across these links as point-to-
multipoint.
OSPF Virtual-Links will already be pre-configured as shown in the topology
diagram.
New Tasks
The objective of this task is to gain exposure to the various types of
OSPF Stub areas.
On Switch-1, issue the command "show ip route summary" and take note of the
quantity of subnets learned via OSPF, and the memory consumption (in bytes) used
by these OSPF subnets.
As you take the steps below, discover which of the Stub Area types
receive a dynamically-created default route.
Convert Area-3 to a Stub area and once again, view the IP Routing Table, output of "
show ip route summary", and OSPF Database of Switch-1. Notice any differences
from what the output of these commands displayed when Area-3 was a Normal Area.
Convert Area-3 to a Totally Stubby area and once again, view the IP Routing Table,
output of "show ip route summary", and OSPF Database of Switch-1. Notice any
differences from what the output of these commands displayed when Area-3 was a
Normal Area.
Convert Area-3 to a NSSA area and once again, view the IP Routing Table, output of
"show ip route summary", and OSPF Database of Switch-1. Notice any differences
from what the output of these commands displayed when Area-3 was a Normal Area.
Convert Area-3 to a Totally NSSA area and once again, view the IP Routing Table,
output of "show ip route summary", and OSPF Database of Switch-1. Notice any
differences from what the output of these commands displayed when Area-3 was a
Normal Area.
It is advisable that before you move on to the next task, you save
your configurations for Routers-1, 3, 4, and Switch-2 into a local
text file as you will need to reconfigure the WAN links and Virtual-
Links for subsequent tasks.
router ospf 1
log-adjacency-changes area 3 stub
Switch-2:
Notice in the output below that Switch-1 no longer has any OSPF External routes,
but still has IP connectivity to those external networks via a default-route.
Sw-2(config-router)#end
Sw-2#
*Mar 1 02:19:02.814: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on FastEthernet0/11 from FULL to DOWN, Neighbor Down:
*Mar 1 02:19:02.814: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.22 on FastEthernet0/10 from FULL to DOWN, Neighbor Down:
Sw-1(config-router)# area 3 nssa
Sw-1(config-router)#end
Sw-2
#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Sw-2(config)#router ospf 1 Sw-2(config-router)# no area 3 stub no-summary
Sw-2(config-router)# no area 3 stub
Sw-2(config-router)# area 3 nssa
Sw-2(config-router)#end
Sw-2#
The IP Routing Table for Switch-1 should now exactly match the same output as
what you saw when Area-3 was previously defined as a Stub area, with the notable
exception that there is no longer any default-route visible.
This means that the external networks advertised by the Backbone router are no
longer reachable via Switch-1.
Sw-1#sho ip route ospf
Sw-2(config-router)#end
Sw-2#
Sw-1#sho ip route ospf
O*IA 0.0.0.0/0
[110/2] via 3.2.0.2, 00:00:39, FastEthernet0/11
[110/2] via 3.1.0.2, 00:00:39, FastEthernet0/10
Sw-1#
Tasks
Configure OSPF as shown on the diagram. Manually configure router-id
Redistribute configured static routes on R1 into OSPF domain.
Summarize externally learned routes on R1 using most specific prefix-length.
Summarize inter-Area routes that R3 advertised using most specific prefix-length.
Restrict 1.1.1.1/32 route to be advertised into Area 1 using "filter-list" and "prefix-list".
Restrict 3.3.3.3/32 route to be advertised into Area 0 using "no-advertise" command
syntax.
Configuration
We have two OSPF areas in the above diagram and we have some static routes
preconfigured on the R1 as well. In order to redistribute them, we can simply use
"redistribute static" command under the OSPF instance. Since we just have two
route summarization points in OSPF, we can configure manual route summarization
on ABR and ASBR only. When summariziaing routes learned externally, we have to
calculate them using AND operation to figure out actual network-id and subnet mask.
0 => 00000000
4 => 00000100
8 => 00001000
12 => 00001100
--------
AND => 00000000
Once we have the result in bits, it can be converted back into decimal as 0. Now, we
need to find the actual prefix-length that can summarize all the networks as
mentioned above. The easiest way of finding additional network bits would be
counting similar higher order bits. In the above conversion table, 4 additional bits are
added in the existing 24 bits from previous octets, i.e. 28 bits in the network portion,
which means that the 172.16.10.0/28 will summarize all the prefixes learned
externally. The "summary-address " syntax is used for summarization on ASBR,
whereas the "area range" is used for ABR summarization. The summary calculation
for internally learnded routes would also be exactly similar to what we discussed
above.
In multi-area OSPF, ABR type 3 LSA filtering feature allows only specified prefixes
to be sent from one area to another area by restricting all other prefixes.
Additionally, the prefix 3.3.3.3/32 can be filtered using "area-range" syntax along
with the "not-advertise" keyword.
R1:
router ospf 1
router-id 1.1.1.1
summary-address 172.16.1.0 255.255.255.240
redistribute static subnets
network 1.1.1.1 0.0.0.0 area 0
network 10.1.12.1 0.0.0.0 area 0
network 10.1.14.1 0.0.0.0 area 0
R2:
ip prefix-list FILTER seq 5 deny 1.1.1.1/32
ip prefix-list FILTER seq 10 permit 0.0.0.0/0 le 32
!
router ospf 1
router-id 2.2.2.2
area 0 filter-list prefix FILTER out
area 1 range 3.3.3.3 255.255.255.255 not-advertise
area 1 range 192.168.10.0 255.255.255.224
network 2.2.2.2 0.0.0.0 area 1
network 10.1.12.2 0.0.0.0 area 0
network 10.1.23.2 0.0.0.0 area 1
R3:
router ospf 1
router-id 3.3.3.3
network 3.3.3.3 0.0.0.0 area 1
network 10.1.23.3 0.0.0.0 area 1
network 10.1.34.3 0.0.0.0 area 1
network 192.168.10.1 0.0.0.0 area 1
network 192.168.10.9 0.0.0.0 area 1
network 192.168.10.17 0.0.0.0 area 1
R4:
Verification:
As part of verification of this lab, we can check for the OSPF database as well as
routing table to figure out whether summarization is in effect or not. Addtionally, we
have applied filtering using "no-advertise" & "filter-list", which can also be verified by
looking into the OSPF database & routing table.
One of the important results that we can see in the routing table is the summary
route which is pointed towards Null0 automatically. Null0 route is auto generated by
the protocol on the summary point to avoid routing loops whenever specific route no
longer exists.
As we can see, the routes have been summarized with the prefix 172.16.1.0/28.
CCNP ROUTE Workbook - IGP Redistribution
Tasks
Configure named mode EIGRP with name "TEST", advertise networks as shown in
the diagram. Use most specific wildcard mask when advertising networks & disable
auto-summarization.
Configure RIPv2 & advertise networks as shown in the diagram. Disable auto-
summarization.
Configure R2 to redistribute routes between EIGRP & RIP. Use following values for
the seed metric:
RIP to EIGRP : Bandwidth=>1Mbps, Delay=>1000, Realibility=>255,
Load=>1, MTU=>1500
EIGRP to RIP : 1
Upon completing this task, the end-to-end reachability should be successful.
Configuration
In this lab, EIGRP is configured in named mode as opposed to the classic
numbered method. The named mode EIGRP allows us to have both IPv4 & IPv6
address families configured with unicast/multicast as well as AS number under the
same instance. Unlike earlier method of EIGRP configuration, the additional
commands like "no auto-summary", "redistribute" go under the "topology base"
mode under the ipv4 address family, which allows us to configure topology specific
components. When redistributing EIGRP into RIPv2, the seed metric is set as
infinite by default. Since the route with inifinite metric can not be installed on the
routing table, it is important to configure metric along with the redistribution
command. Similarly, redistributing into EIGRP also has similar kind of scenario as
the initial metric is set as infinite by default. However, the route with infinite metric is
installed on the EIGRP topology table.
Lets first configure routing protocol as per the task requirement & configure route
redistribution between named EIGRP and RIPv2. R2 will be configured with both the
protocols since it will be acting as a border router.
R1:
Verification:
In order to verify route redistribution, we should check the border router initially to
make sure that it has been able to learn routes from both the domains successfully.
The border router can't redistribute a particular route unless it has the prefix installed
on its routing table. As a final verification, we can check whether R1 & R3 learned
exeternal routes as expected or not. Additionally, initiation of ping with source of
loopback interafces will help us ensuring end-to-end reachability.
R2#show ip protocols
In the above output, R2 has successfully installed both the RIP and EIGRP routes
on its routing table. The additional components like auto-summary, redistribution
can also be verified in the above protocol specific output. Now, we can verify
whether they are exchanging routes externally.
As we can see, both the protocols are now able to reach external routes. Since RIP
doesn't keep external routes database, it treats all the routes in similar way due to
the fact that it has no capability to distinguish internal with external routes & doesn't
allocate specific routing codes for externally learned routes. Unlike RIP, EIGRP can
differentiate internal routes with external routes & the external routes are marked as
"D EX" with the AD value of 170.
Addtionally, we can see the transit networks 10.1.12.0/24 & 10.1.23.0/24 have been
redistributed, which may not be the requirement in most of the cases. In order to
filter those routes, we can use route filtering techniques like distribute-list/prefix-list
etc, which will be covered in advanced redistribution labs later in this lab workbook.
CCNP ROUTE Workbook - IGP Redistribution
Tasks
Configure EIGRP named as "CCNP" on R1 & R2 in AS number 100:
Advertise loopback networks as shown in the diagram.
Use specific wildcard mask when advertising networks.
Disable automatic route summarization.
Configure OSPF on R2 & R3 using process-id 100:
Advertise networks in OSPF Area 0 with specific wildcard mask.
DR/BDR shouldn't be elected between R2 & R3.
Configure R2 to redistribute routes between EIGRP & OSPF. Use route metric as
below:
EIGRP to OSPF : Metric=>100, route type=>E1.
OSPF to EIGRP : Bandwidth=>1000Kbps, Delay=>1000, Realibility=>255,
Load=>1, MTU=>1500
Upon completing this task, you should be able to ping both loopback interface
addresses of each others.
Configuration
Redistribution of an IGP/EGP into the OSPF domain has various options in terms of
external route attributes. Whenever we redistribute an IGP or EGP into OSPF, the
initial metric of 20 & the E2 route type are set by default. Optionally we can have
them configured manually as per the requirement. If there are two or more
redistribution points and different route types are coming form two border routers,
the E1 route type is always preffered over E2 routes. E1 route adds transit metric
with the initial metric but E2 route metric is not changed as they travel through the
OSPF domain. In contrast to the EIGRP external, the OSPF has similar
administrative distance value for internal & external routes.
When redistributing a classless prefix into OSPF, we had to add "subnets" keyword
along with the redsitribution syntax in older IOS versions. But in order to develop
this workbook, we have used IOS version 15.3 image that doesn't need explicit
"subnet" keyword for the same.
R1:
router eigrp CCNP
!
address-family ipv4 unicast autonomous-system 100
!
topology base
exit-af-topology
network 1.1.1.1 0.0.0.0
network 10.1.12.1 0.0.0.0
network 11.11.11.11 0.0.0.0
exit-address-family
R2:
interface FastEthernet0/1
ip ospf network point-to-point
!
router eigrp CCNP
!
address-family ipv4 unicast autonomous-system 100
!
topology base
redistribute ospf 1 metric 1000 1000 255 1 1500
exit-af-topology
network 10.1.12.2 0.0.0.0
exit-address-family
!
router ospf 1
redistribute eigrp 100 subnets metric 100 metric-type 1
network 10.1.23.2 0.0.0.0 area 0
R3:
interface FastEthernet0/1
ip ospf network point-to-point
!
router ospf 100
network 3.3.3.3 0.0.0.0 area 0
network 10.1.23.3 0.0.0.0 area 0
network 33.33.33.33 0.0.0.0 area 0
Verification
Before going through the redistribution verification, checking for the OSPF
neighborship would help us to make sure that it has not performed DR/BDR election
and the network type is set as point-to-point.
R2#sh ip protocols
Now, the routing table of R3 also shows that it has cumulative metric [initial metric
=> 100 + transit metric=> 1] of 101 as opposed to the E2 route type which doesn't
add initial metric with the transit costs.
If we remove the route-type metric from the redistribution configuration under the
OSPF, the initial metric is set to 20 by default & the route type is set as E2 when
OSPF advertises external routes to its neighbors. Upon receiving external route, R3
receives the route with the initial metric since the route type is E2.
Note: Do not forget to revert configuration into the route-type as E1 and metric 100.
Additionally, OSPF advertises external routes as a Type-5 LSA, which can be seen
in the OSPF database. We can also verify the initial metric and route-type in the
following command result.
The final verification of this task would be verifying routes & testing reachability.
Tasks
Configure RIPv2 on Sw1 & R1 and advertise networks as shown in the diagram.
Configure EIGRP AS 100 on R1, R2 & R4. Use specific wildcard mask when
advertising networks & disable auto-summarization.
Enable OSPF on R2, R3 & R4 in Area 0. Manually configure Loopback0
address as a router-id.
The initial task requirement has some routing configurations according to the
network diagram, which are easy and straightforward requirements since we have
similar configuration in the earlier labs as well.
Moreover, if we take a look into the diagram, the Sw1 is advertising 10.10.10.10/32
network via RIPv2, which will then be redistributed on R1 into EIGRP as an EIGRP
external with AD value of 170. Once we perform redistribution between EIGRP &
OSPF on both the boarder routers, they will receive 10.10.10.10/32 routes via both
routing protocols. For example: If R2 advertises this network to the OSPF
neighbors, R4 also receives it from both protocols and vice versa. Now, the route
coming from EIGRP & OSPF are compared on boarder routers, i.e. on R2 & R4
based on the AD value. In this point, OSPF has AD of 110 & EIGRP External has
170, which will allow the boarder routers to install route with lower AD value, i.e.
OSPF that cause routing loop since the route coming from EIGRP domain is getting
redistributed back to the EIGRP.
In order to prevent the routing loop discussed above, we can decrease AD value of
EIGRP external below 110 on the boarder routers or we can apply route-filtering like
route-map/route-tag/prefix-list etc. As per the task requirement, we are asked not to
use route-map to accomplish this task. So, the easy way to fix this issues is AD
manipulation.
R1:
router rip
version 2
network 10.0.0.0
no auto-summary
Verification:
As required, the final verification would be focusing on the results on what we
configured to achieve the goal as per the task instrucation. Lets first check starting
from Sw1.
As we can see, the route metric of externally learned routes are set to 10 as
required.
Now, we can check if R3 is receiving routes from both the boarder routers and the
correct route-type as well as route metric can be verified on the same.
In the above routing table, we can see only E1 routes with metric of 200, which
indicates that the routes with E1 tag are preferred over E2 or there might be issue
when E2 routes are being advertised from R4. Lets verify the OSPF database for
10.10.10.10/32 to figure out if this particular prefix is being learned from both the
boarder routers.
LS age: 763
Options: (No TOS-capability, DC, Upward)
LS Type: AS External Link
Link State ID: 10.10.10.10 (External Network Number ) Advertising Router: 4.4.4.4
LS Seq Number: 80000001
Checksum: 0xB003
Length: 36
Network Mask: /32 Metric Type: 2 (Larger than any link state path)
MTID: 0 Metric: 200
We can quickly figure out a couple of things like metric-type, value & router-id of the
advertising router from the above database. Basically, both the boarder routers are
advertising the route 10.10.10.10/32 along with the metric-type and value that we
configured on individual router. The advertising router refers to the router-id of the
boarder router, which is identified as a boarder router that advertised the particular
prefix.
Additionally, we can see the metric vlaue that R2 advertising is 199 but whenever
we see on the OSPF routing table of R3, we can see the route metric for external
routes as 200. This is because E1 adds the transit metric which is 1 for the
100Mbps link by default. For E2, it doesn't add transit metric and which is kept intact
as it passes through the transit OSPF routers. So, we can conclude that the E1
routes are being preferred over E2 even though the route metrics are same for both
the route types. We can check by shutting link down between R2 & R4 for the quick
verification.
R3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#inter fa0/0.23R3(config-subif)#shut
!R3#sh ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Now, we are able to see E2 routes coming from R4 with the metric of 200 as
expected.
Routing entry for 10.10.10.10/32 Known via "eigrp 100", distance 109 , metric 2560002816, type external
Redistributing via eigrp 100, ospf 1
Advertised by ospf 1 metric 199 metric-type 1 subnets
Last update from 10.1.12.1 on FastEthernet0/0.12, 08:33:07 ago
Routing Descriptor Blocks:
* 10.1.12.1, from 10.1.12.1, 08:33:07 ago, via FastEthernet0/0.12
Route metric is 2560002816, traffic share count is 1
Total delay is 110 microseconds, minimum bandwidth is 1 Kbit
Reliability 1/255, minimum MTU 1 bytes
Loading 1/255, Hops 1
!
R4#sh ip route 10.10.10.10
Routing entry for 10.10.10.10/32 Known via "eigrp 100", distance 109 , metric 2560002816, type external
Tasks
Configure RIPv2 on Sw1 & R1 and advertise networks as shown in the diagram.
Configure EIGRP AS 100 on R1, R2 & R4. Use specific wildcard mask when
advertising networks & disable auto-summarization.
Enable OSPF on R2, R3 & R4 in Area 0. Manually configure Loopback0
address as a router-id.
When redistributing RIP into EIGRP here, we are asked to allow only two specific
prefixes without any additional parameters set with them. Whereas, we can only
redistribute loopback networks into RIP along with the route metric of 10 for the
prefix 33.33.33.33/32 and the metric of 5 for reamining prefixes. In order to
accomplish these requirements, we are required to create two prefix-list sequences
to distinguish 33.33.33.33/32 from other networks and bind them into the route-map
as well as apply the route-map with redistribution.
Likewise, we are asked to configure mutual redistribution on R2 & R4, the ASBRs
for OSPF domain which are configured to advertise external type-1 metric with value
of 199. Unlike previous lab where we had optimized AD value to prevent routing
loop between OSPF & EIGRP, we are now required to use route-tag values along
with the route-map statements, so that the redistributed routes from EIGRP to OSPF
would not be looped readvertised to EIGRP routers.
R1:
R2:
router ospf 1
router-id 3.3.3.3
network 3.3.3.3 0.0.0.0 area 0
network 10.1.23.3 0.0.0.0 area 0
network 10.1.34.3 0.0.0.0 area 0
network 33.33.33.33 0.0.0.0 area 0
distribute-list 1 in
!
access-list 1 deny 1.1.1.1
access-list 1 permit any
R4:
router rip
version 2
network 10.0.0.0
no auto-summary
Verification:
There are a number of ways to verify the stuffs we configured above. We can first
check if the redistribution from EIGRP to RIP is successful with correct metric values
as applied or not.
Now, lets go to the R3 and check for the OSPF database as well as the routing table
to make sure of the fulfilment as per the task requirement.
As expected, all the external routes are tagged with type-1 metric & the transit
metric has been added onto the initial metric configured when redistributed.
Additionally, we can check whether the right tag values are being learned from the
boarder routers. We can also see the route 1.1.1.1/32 on OSPF database which is
restricted to get installed onto the routing table by distribute-list configuration.
As we can see that only two routes are being learned from R4 however we have
mutually redistributed them between EIGRP & OSPF. Lets verify the routing table of
R4 to figure out if the EIGRP external routes are being installed on the routing table
and then redistributed into OSPF.
R4#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
As per the combined routing table shown above, the prefixes 1.1.1.1/32 &
10.10.10.10/32 are getting preferred via OSPF as opposed to the EIGRP since they
were supposed to come to EIGRP domain first and then readvertised to the OSPF.
However, due to the fact that the AD value is compared between two routing
protocols, OSPF is preferred over EIGRP external routes which would have AD of
170. So, in order to fix this kind of situation, we have to manipulate AD value of
EIGRP external so that the routes mentioned above would be readvertised via both
the boarder routers mutually.
Lets decrease the AD value of EIGRP external on both the boarder routers.
On R2 & R4:
R2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#router eigrp 100
R2(config-router)#distance eigrp 90 109R2(config-router)#
Now, the EIGRP external routes can be seen as D EX & they can be seen on the
OSPF database of R3 as well.
R4#show ip route eigrp
Also, the OSPF external type-1 are being load shared between both boarder routers
because the route-type and metric are similar.
BGP - Lab1
Load the CCNP_ROUTE_WB_BGP_INITIAL initial configurations
before starting.
Tasks
Configure OSPF in Area 0 & advertise connected networks with specific wildcard
masks.
Configure full mesh iBGP peering using peer-group between R1,R2,R3 & R4 in AS
200.
Establish eBGP peering between Sw1 & R1 as per the diagram.
Advertise prefixes as below:
Advertise 10.10.10.10/32 prefix using network command on Sw1.
Advertise 11.11.11.11/32 prefix using redistribution on Sw1, it shouldn't
impact other connected prefixes.
Advertise 33.33.33.33/32 prefix using network command on R3.
Sw1 should be able to ping 33.33.33.33/32 when sourced from both the loopback
interfaces.
Configuration
BGP is an Exterior Gateway Protocol that works as an application, which runs on
top of TCP port 179. BGP has two types of implementation , iBGP & eBGP. In iBGP,
the peers don't have to be directly connected, however they should be reachable by
means of an IGP or static routing. Usually we use loopback interfaces when
configuring iBGP peering since this kind of implementation let us ensure
redundancy between two or more physical connectivity. When using loopback as a
peering address, we are required define "update-source" since the default source
for the routing update would be the physical interface. The remote peer wouldn't let
BGP establish if configured without update-source since the peering address
wouldn't be used until and unless we define source as loopback interface. In the
other hand, we have eBGP which should be directly connected technically because
the TTL value in BGP keepalives are set as 1 that can't go beyond one hop away. If
we were to configure indrect eBGP peering, we would need an additional parameter
in the neighbor statement which is called "ebgp-multihop", that would let us increase
TTL vlaue based on how many hops the eBGP peer is away from the local router.
In iBGP, we can combine a number of parameters under a single group called peer-
group, that allows us to simplify peer configuration overhead where we have a
number of peers with common configuration. We have R1,R2,R3 & R4 in the BGP
AS 200, where the very basic & common configuration would be AS number, update-
source & route-reflector etc, which can be defined under a single peer group and
apply the peer group to all the neighbors without having basic parameters to be
configured individually.
R1:
router ospf 1
network 1.1.1.1 0.0.0.0 area 0
network 10.1.12.1 0.0.0.0 area 0
network 10.1.14.1 0.0.0.0 area 0
!
router bgp 200
bgp log-neighbor-changes
neighbor INTERNAL peer-group
neighbor INTERNAL remote-as 200
neighbor INTERNAL update-source Loopback0
neighbor 2.2.2.2 peer-group INTERNAL
neighbor 3.3.3.3 peer-group INTERNAL
neighbor 4.4.4.4 peer-group INTERNAL
neighbor 10.1.110.10 remote-as 100
R2:
router ospf 1
network 2.2.2.2 0.0.0.0 area 0
network 10.1.12.2 0.0.0.0 area 0
network 10.1.23.2 0.0.0.0 area 0
!
router bgp 200
bgp log-neighbor-changes
neighbor INTERNAL peer-group
neighbor INTERNAL remote-as 200
neighbor INTERNAL update-source Loopback0
neighbor 1.1.1.1 peer-group INTERNAL
neighbor 3.3.3.3 peer-group INTERNAL
neighbor 4.4.4.4 peer-group INTERNAL
R3:
router ospf 1
network 3.3.3.3 0.0.0.0 area 0
network 10.1.23.3 0.0.0.0 area 0
network 10.1.34.3 0.0.0.0 area 0
!
router bgp 200
bgp log-neighbor-changes
network 33.33.33.33 mask 255.255.255.255
neighbor INTERNAL peer-group
neighbor INTERNAL remote-as 200
neighbor INTERNAL update-source Loopback0
neighbor 1.1.1.1 peer-group INTERNAL
neighbor 2.2.2.2 peer-group INTERNAL
neighbor 4.4.4.4 peer-group INTERNAL
R4:
router ospf 1
network 4.4.4.4 0.0.0.0 area 0
network 10.1.14.4 0.0.0.0 area 0
network 10.1.34.4 0.0.0.0 area 0
!
router bgp 200
bgp log-neighbor-changes
neighbor INTERNAL peer-group
neighbor INTERNAL remote-as 200
neighbor INTERNAL update-source Loopback0
neighbor 1.1.1.1 peer-group INTERNAL
neighbor 2.2.2.2 peer-group INTERNAL
neighbor 3.3.3.3 peer-group INTERNAL
Sw1:
Verification:
The initial verification of this task is to check for the BGP neighborship between
iBGP and eBGP peers. Once we verify neighborship between all the peers, we can
check for the BGP table and then routing table to figure out if the route has been
successfuly installed on the routing table.
In the first verification, we can see that the R1 has learned a prefix from R3 & 2
prefixes from 10.1.110.10, i.e. Sw1. When looking into the BGP table of R1, we can
see that Sw1 is advertising two routes with two differen origin codes. Since we have
advertised it in different way, the redistributed routes would have origin code of
incomplete (i) & the prefix adverised with network command would be set with origin
code of IGP(i).
R3#show ip bgp
In the above BGP table, there are two valid routes but not marked as a best route
for some reason. If we look into the next-hop section, we can see that the next-hop
is set in unexpected way as it should be set as loopback address of R1, but the next-
hop was unchanged due to BGP default order of operation. Whenever a prefix is
coming from eBGP peer & it is advertised to its iBGP neighbors, the next-hop
remains unchanged. The valid but not marked as best routes are never installed on
the BGP routing table.
We can solve the inaccessible next-hop scenario with the solution as listed below:
1. We can use native BGP solution with "next-hop-self" command to change the original
next-hop into loopack interface of R1, which is routable from R3 via OSPF.
2. Optionally, we can configure 10.1.110.0/24 network under the OSPF, thereby
allowing R3 to know the next-hop via OSPF.
3. Lastly, we can redistribute 10.1.110.0/24 into OSPF so that R3 would know the next-
hop as an OSPF external route.
In comparison, the easiest fix of inaccessible next-hop issue would be configuring
native BGP solution "next-hop-self" command under the peer-group.
R1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router bgp 200
R1(config-router)#neighbor INTERNAL next-hop-self
R1(config-router)#endR1#clear ip bgp *
Now, the next-hop for the eBGP routes should be changed with R1's Loopback0
address & R3 should be able to install external routes into its routing table.
Additionally, the end-to-end reachability should be fine.
R3#sh ip bgp
Network Next Hop Metric LocPrf Weight Path *>i 10.10.10.10/32 1.1.1.1
0 100 0 100 i *>i 11.11.11.11/32 1.1.1.1
0 100 0 100 ?
*> 33.33.33.33/32 0.0.0.0 0 32768 i
!
!R3#sh ip route 1.1.1.1
Routing entry for 1.1.1.1/32 Known via "ospf 1", distance 110, metric 3, type intra area
Last update from 10.1.34.4 on FastEthernet0/0.34, 02:03:32 ago
Routing Descriptor Blocks:
10.1.34.4, from 1.1.1.1, 02:03:32 ago, via FastEthernet0/0.34
Route metric is 3, traffic share count is 1
* 10.1.23.2, from 1.1.1.1, 02:04:37 ago, via FastEthernet0/0.23
Route metric is 3, traffic share count is 1
!
!R3#show ip route bgp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
BGP - Lab2
Load the CCNP ROUTE WB Task
CCNP_ROUTE_BGP_ADV_INITIAL initial configurations before
starting.
Tasks
Configure iBGP peering between R4, R3 & Sw1. Use Loopback interfaces as source
of BGP updates.
Configure eBGP peering between R1 & R3 as well as R2 & R4.
Advertise Loopback interfaces on R1 using network command & redistribute
Loopback interfaces on R2. Additionally, advertise 10.10.10.10/32 on Sw1 using
network command.
Sw1 & R3 should prefer the routes above /25 via R4, configure Local Preference to
accomplish this task.
R1 should receive 10.10.10.10/32 route with metric of 200. R2 should receive the
same prefix with additional 5 AS path information.
Configuration:
Unlike IGP metrics, BGP has a number of attributes, which are used to control BGP
path selection process based on the prefix/prefix-length information.
In this task, we have a bunch of routes which are coming from two different AS
numbers, i.e. AS 100 & 200. By default, the routes with IGP origin code are
preferred over the redistributed routes, which are marked as origin code of
"Incomplete".
In order to change the default route selection process, we can use some attributes
like weight, local-preference etc, which are used to manipulate the outgoing traffic.
The local preference value affects all the members within the AS. Whereas, the
Cisco proprietary weight attribute affects the local system only.
R1:
router bgp 100
network 172.16.10.0 mask 255.255.255.0
network 172.16.11.0 mask 255.255.255.128
network 172.16.12.0 mask 255.255.255.248
network 172.16.13.0 mask 255.255.255.224
neighbor 10.1.13.3 remote-as 300
R2:
route-map CONNECTED permit 10
match interface Loopback10 Loopback11 Loopback12 Loopback13
!
router bgp 200
redistribute connected route-map CONNECTED
neighbor 10.1.24.4 remote-as 300
R3:
ip prefix-list METRIC seq 5 permit 10.10.10.10/32
!
route-map METRIC permit 10
match ip address prefix-list METRIC
set metric 200
route-map METRIC permit 20
!
router bgp 300
neighbor 4.4.4.4 remote-as 300
neighbor 4.4.4.4 update-source Loopback0
neighbor 4.4.4.4 next-hop-self
neighbor 10.1.13.1 remote-as 100
neighbor 10.1.13.1 route-map METRIC out
neighbor 10.10.10.10 remote-as 300
neighbor 10.10.10.10 update-source Loopback0
neighbor 10.10.10.10 next-hop-self
R4:
ip prefix-list AS_PATH seq 5 permit 10.10.10.10/32
ip prefix-list TEST seq 5 permit 0.0.0.0/0 ge 25
!
route-map AS_PATH_PREPEND permit 10
match ip address prefix-list AS_PATH
set as-path prepend 300 300 300 300 300
route-map AS_PATH_PREPEND permit 20
route-map LP permit 10
match ip address prefix-list TEST
set local-preference 200
route-map LP permit 20
!
router bgp 300
neighbor 3.3.3.3 remote-as 300
neighbor 3.3.3.3 update-source Loopback0
neighbor 3.3.3.3 next-hop-self
neighbor 10.1.24.2 remote-as 200
neighbor 10.1.24.2 route-map LP in
neighbor 10.1.24.2 route-map AS_PATH_PREPEND out
neighbor 10.10.10.10 remote-as 300
neighbor 10.10.10.10 update-source Loopback0
neighbor 10.10.10.10 next-hop-self
Sw1:
Verification:
Lets first check whether the local preference is working, which is applied on the R4.
Sw1#show ip bgp
BGP table version is 15, local router ID is 10.10.10.10
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal,
r RIB-failure, S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
* 10.1.13.1 0 0 100 i
As we can see, the prefixes coming from R4 is being tagged with local preference
200, which is preferred over the default value of 100.
Since we have applied MED on R3 in the outgoing direction, the R1 should receive
metric of 200 for 10.10.10.10/32. Likewise, R2 should receive 10.10.10.10/32 with a
number of AS path information as it is being advertised by R4 with additional AS
path information.
As required, we can see that the metric of 200 has been added by R3 when
advertising 10.10.10.10/32 prefix to R1. Similarly, the addtional 5 AS path
information has been added on the existing BGP update when the same prefix is
being advertised to R2.