Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

2. Basic configuration of EIGRP configuration experiment

2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

1. Experimental topology diagram

2. EIGRP workflow

Router A sends out the hello packet, and router B receives the hello packet from router An and adds it to the neighbor table.

Router B sends out the hello packet, and router A receives the hello packet from router B and adds it to the neighbor table.

Router B then sends its complete routing table information back to router A, which, when received, adds it to the topology table and responds to the ACK message.

Router A then sends its complete routing table information back to router B. after receiving it, router B adds it to the topology table and responds to the ACK message.

Most routers An and B add the optimal router entries to the routing table.

3. EIGRP encapsulation

4. Three tables

In the neighbor table, SRTT indicates the interval between the reliable message being sent and the ACK received, and RTO indicates the retransmission timeout. If the ACK is not received after the update is sent, the update is sent after the RTO. By default, the neighbor relationship is retransmitted 16 times, and the neighbor relationship is reset if the ACK is not received after 16 retransmissions.

Hold on = 3 * hello (Hellodefaults to 5s)

The hello interval can be modified using the command ip hello-interval eigrp 9010 in interface mode.

5. Metric calculation

Bandwidth K1 load K2 delay K3 Reliability K4 MTU K5

Metric = 256x (10 ^ 7 / minimum bandwidth + total delay / 10)

The bandwidth unit is kbps, the delay unit is usec, and the Metricvalue is the Metricvalue in the inflow direction of the route.

FD: the Metricvalue from the local to the target network

AD: advertised distance, the Metricvalue of the next hop to the destination network

6. Configuration

R3

Int s0/0

Ip add 13.1.1.3 255.255.255.0

No shut

Int lo0

Ip add 3.3.3.3 255.255.255.0

No shut

Router eigrp 90

Network 3.3.3.0 0.0.0.255

Network 13.1.1.0 0.0.0.255

No auto-summary

R1

Int s0/0

Ip add 13.1.1.1 255.255.255.0

No shut

Int s0/1

Ip add 12.1.1.1 255.255.255.0

No shut

Int lo0

Ip add 1.1.1.1 255.255.255.0

No shut

Router eigrp 90

Network 1.1.1.0 0.0.0.255

Network 12.1.1.0 0.0.0.255

Network 13.1.1.0 0.0.0.255

No auto-summary

R2

Int s0/1

Ip add 12.1.1.2 255.255.255.0

No shut

Int lo0

Ip add 2.2.2.2 255.255.255.0

No shut

Router eigrp 90

Network 2.2.2.0 0.0.0.255

Network 12.1.1.0 0.0.0.255

No auto-summary

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 238

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report