Featured Article

Friday, 22 November 2013

How to Configure OSPF Router Protocol

 
Belong to a single autonomous system based on TCP/IP network as IGP expressly used to design an IETF open shortest path first (OSPF) Protocol. It was designed as a link-state protocol can be extended to all but the most complex networks.

OSPF operation created by the forming of adjacencies between routers and topology database that contains status information about all links in the OSPF network. This information includes links and interface-based type of bandwidth or by the network administrator to manually place the weights of the various interfaces. Internal path traversal cost determined by calculating the sum of the cost of each link in the database. At the lowest cost (shortest path) path is to select the best route. If there are multiple equal-cost paths, OSPF will load balance across up to 4 of these paths.

As long as the form or discard the adjacency update this database. Complete picture of the network maintained by each router adjacency of eye drops and the corrosponding links are no longer on our website all the time, from information already on your router you can quickly choose a new path. However, since it must hold a full copy of the topological database, the required memory is considerable.

In a large network, the number of links in the database can grow very large. In these cases, a single link to change the system has a significant impact on each router. Intermittantly links to our website support and unavailible all routers will result in high processor use, reduce network performance. OSPF provides a method to segment the network into several areas. These areas as described above, connected to the "backbone" (0). Area border routers, and each link state advertisement (LSA) as the backbone, describe their links to the region's unique propegate "Summary" advertizements propegating. This describes the region as a whole database in a single summary Advertisement message, thereby reducing the overhead of computing and memory usage. Were also reduced to divide the network into areas in a single router or change network effects in other countries. Only additional area paths through the router or interface must be recalculated.

Use stub zones and areas between the routing topology of the summary could also help to reduce the number of entries in the database, and needs to go further to reduce CPU and memory requirements when changes occur in the network path is recalculated. Stub zones do not receive external LSAs (those injected into OSPF via redistribution from another protocol such as RIP) does not need to maintain any links except in the State records in the stub zone.

Configure OSPF routers via multicast or unicast SPF router Hello data reporting for all (the multicast addresses 224.0.0.5) finds other OSPF routers. Hello datagram is used to form and maintain adjacencies between routers.

Adjacent cells automatically across a point-to-point link. In multiple access networks (such as an Ethernet "designated router" (DR) election. This multi-access network on the router forms adjacencies with all other routers, is responsible for the topological database for synchronization. In addition, the backup designated router (BDR) is also selected. If a failure occurs, disconnect from the network DR,BDR took over and elected the new BDR. Which reduces the traffic because each router on the network do not form an adjacency with each of the other routers. It also reduces CPU usage, in all other router cannot connect to this network through the router. "Show IP OSPF neighbor" or "show IP OSPF interface <interface>", you can decide which router is the DR and BDR.

OSPF is enabled by creating and specifying a process ID the OSPF routing process. "Network" (such as RIP or routing), run OSPF networks. At the same time, the networks area number assigned. Through the use of "neighbors" statement, implying that neighbor. Please note that a neighbor does not necessarily form an adjacency. "Show IP OSPF neighbor" exec command can be used to determine which routers are considered neighbors and link status (whether they are simple, neighbors, neighbors, neighbors, BDR and Dr). A simple OSPF configuration is shown below.

Interface Ethernet0/0
  ip address 1.1.1.1 255.255.255.0
 Interface Serial1/2
  ip address 1.1.2.1 255.255.255.0
 Interface Fddi2/0
  ip address 1.1.3.1 255.255.255.0

 router ospf 1234
  network 1.1.1.0 0.0.0.255 area 1
  network 1.1.2.0 0.0.0.255 area 2
  network 1.1.3.0 0.0.0.255 area 0


This sequence of commands configure OSPF interfaces listed on the three nodes assign area 1, Serial1/2 2, Ethernet0/0, and Fddi2/0 to the backbone area (area 0). Please note that network statement Fu Ping needed a wildcard to cover and not the network mask.

OSPF supports variable-length subnetting and routing area, although it must be configured to check. Between and into the OSPF backbone area area area. Abstract the configuration of the network is an area border router and "regional < ID> range < network shield > <network>" command. Using routing zone, can significantly reduce the topological database size reduced, need to do a course becomes inaccessible or the amount calculated when a topology change occurs. The backbone area should not be sumarized. If properly summarize all other areas, all backbone area will contain a summary of the course.

Similarly, sumarization can be done when another protocol is redistributed into OSPF with a "summary-address <network> <network mask>"

Thursday, 21 November 2013

How to Configuring Routing Protocols

Function of routing protocol services: let the router knows how to get near to them and their respective networks. There are two basic types of routing protocols: distance vector and link state agreements.

Most simply could be the classification as a distance vector Protocol. They made their routing decisions based on the number of intermediate routers along a given path. The advantages given to very few resources, but has the following disadvantages: does not take into account of the available link bandwidth, or load. When there are long distances, they are restricted. Path may be valid, but because Gao Yue points, router decided to the remote host or the network is unavailable. In addition, these types of agreements in the default time interval is typically broadcast their entire routing tables. This can take a considerable amount of time and consume a lot of bandwidth. RIP, routing and BGP protocols belonging to this category.

By maintaining a database, they have received from other routers advertising link state protocols called link state database. This means that each router is fully accountable to the given location to determine the best path, from its point of view and alternate paths that already had such an idea, and if so, should the first path is not available.

Configuring RIP:

Routing Information Protocol (RIP) routing protocol is perhaps the most simple. Its role through broadcasts its entire routing table to all those involved in the network once every 60 seconds the IP or IPX once every 90 seconds. Hear a route from a remote router, this metric is increased by 1. This number cannot exceed 15. Pointer: 16 description cannot access network.

The simplicity of this Protocol refers to very small router must do each update. This allows the processor to perform other tasks. At the same time, there is no database maintenance. It's all contained in the routing table. This simple yet of the need to increase bandwidth, because the complete routing table must be sent over the network. In a large network, this can take quite a long time. In addition, it was not uncommon to separate network to more than 15 hops. The end node cannot communicate because metrics beyond "unreachable".

Configuration is a 3 step process. First, create a RIP process and determine whether or not to distribute its courses that any other routing process (such as routing or OSPF). Second, specify which networks will receive RIP announcements. Third, configure any address of the neighbor.

A sample configuration might look like

router rip
  redistribute igrp 1000
  network 2.3.4.0
  network 4.5.3.0
  neighbor 4.5.5.2
  neighbor 4.5.5.3


Configuring IGRP:

Configuring IGRPInterior Gateway Routing protocols (routed) is designed by Cisco systems in the mid 1980 of the 20th century the dynamic distance vector routing protocols. More than the maximum diameter of RIP routing advantages include network. Network exceeds 15 hops will not be available for access control in RIP networks. Routing allows 100 per cent jump, by default, you can set up to accept the path to 255 hops away.

We use user-configurable metrics including Internet latency, bandwidth, reliability, and load combinations. RIP, different routing routing is shared by its costs, provide cost equal or not equal to the load balance up to 4 paths to a given destination. Can be specified using variance factor equal or not equal cost. Path to determine how inequality of variance can perform load balancing. 1 (default) specified variance of load balancing only when all paths are of equal cost. With the "traffic-sharing" command, you can override this behavior. To allow only at the lowest cost to use the path, specify "traffic share min". "Traffic share balance" is the default.

Basic routing configuration is very similar to RIP. Routing routing on the router must create and participate in the network list. Number of optional routes also autonomous system. When running on a non-broadcast network routing, you can use the "neighborhood" commands, RIP a single entry system, will receive updates. Interfaces should not be involved in the specified address range (for example, if the interface is via some other Protocol (such as management of OSPF) routed network statement, it can specify passive "passive interfaces" statement.

 Example configuration:

router igrp 1000
 variance 3
 network 203.4.22.0
 network 204.103.24.0
 neighbor 204.103.24.5
 neighbor 204.103.24.6
 neighbor 204.103.24.7
 passive-interface Ethernet4/1
 passive-interface Fddi3/0




Configuring Enhanced IGRP: 

Enhanced route is a route redesigned by Cisco. When it became apparent in order to overcome some of the route is placed in a large number of restrictions on its use. Is mainly focused in the improvement measures. To this end, a new kind of convergence algorithm, introduced the double (dispersion update algorithm). Gained a new algorithm is one of the advantages of EIGRP loop-free routing table where assurance of control protocols. EIGRP also introduces some updates. This small number allowed to route messages, in turn, uses less bandwidth, leaving free for user data path of the data exchanged between routers. Partial update also allows the receiving router to spend less time to recalculate the routing table, because the course is not included in the update, have not been recalculated.

EIGRP two key features are support for variable-length subnet masks and any summary of the course. These allow support for CIDR routes, reducing the size of the entire routing table, and allows you to more easily maintainable routing table "classfull" routes are removed. When EIGRP is able to automatically summarize into a common route of possible routes. You can specify "No auto-summary" to disable this feature in the EIGRP configuration. Summary of the router that is configured on a per-interface basis to perform additional, "summary of IP address EIGRP" statements in advertising for a particular aggregation as belonging to a given autonomous system, as shown in the following interface configuration command.


 interface Ethernet0
    ip summary-address eigrp 1234 201.200.8.0 255.255.224.0
The results of this command are, ad 201.200.8.0 network block is reduced to aggregations of individual ads. So instead of sending 32 class c network routing, RIP, covering all 32 network a single ad instead.

Hello message exchange another add to EIGRP is supported. When EIGRP process starts, the router sends hello datagram using the multicast datagram on all those involved in the interface at the appropriate time. Once the router determines that the other router is participating in EIGRP, you can begin the process of exchanging updates. This allows the router to quickly determine a new router is added to the network, or when an existing router is inaccessible.

Configuring Access Lists and Network Security

Once you have configured the router interface should be taken to determine whether any of these interfaces to connect to "safe" network. These networks can be a network with others or maybe the rest of the Internet connection in your enterprise workstations. They may also have a network of houses, providing specific services to the Internet community, but the server you want to protect as much as possible. WWW server is a good example of such a server for an SMTP gateway. The general public needs so that you can view your Web pages and send your message, but they do not need so that interractively can connect to these servers. Access control for other purposes may be from other parts of your company to protect parts of your company intranet. For example, if you have a research and Development Department, which is different is that you will give your sales staff to access details of the top secret project. Likewise, you don't want to do some clever accounting server to modify your research and Development Department.

The traditional way to protect this type of server is to use the access list. Access lists to filter Internet traffic and determine whether data has been reported to allow incoming or outgoing network. Ideas on how to access lists should be designed, where they should be placed, and how the physical structure should be allowed to properly filter without overloading the network router of the network link and they greatly varry. Some companies in the business, "the great firewall" into the product and other people will be implemented in all the minimal access control. Still others will invest in the hardware necessary for service access list on two levels (blocking access to itself and the interrior routers and, secondly, the interrior router blocked access to a router can only be accessed from inside of its own or even only from the console and provides the primary access to the list control. This router is typically nothing else except the filter the datagram and sends them to its default router, or localhost).

Which method you choose depends on your level of security required, your budget and needs to be protected for a specific application. However, led to a variety of program decisions are beyond the scope of this document. This lesson is intended to focus on general access list design and implementation.

Cisco has created two different types of access router in the list. First, the standard access list, only the source address on the filter. If you are using access numbers list (IOS 11.1 and earlier versions do not support named access lists), than the list numbered from 1 to 99. The second type of access list, extended access lists, is from 100 to 199 numberes, based on source address, destination address, Protocol, Protocol, port number, and a myriad of other features do not necessarily apply to filtering of IP communications in General.

Once you have created an access list, it must be tied to a single interface. Interface configuration view "audience" filter list. Inbound or outbound interface can access group. For example:

  Interface Serial0
  ip access-group 101 in
  ip access-group 6 out


Specify this set of commands entered must be handled by extended access list number 101 serial 0 traffic and outbound traffic before leaving the interface must be delivered through a standard access list 10.

By specifying a list of numbers, weather, traffic was allowed or denied, would result in the entry to match and being filtered by the host or the network, and with it (if it is a network or subnet) associated screen configuration the standard access list.
 
 access-list 10 permit 234.5.6.12
 access-list 10 deny 5.10.10.32 0.0.0.31
 access-list 10 permit 5.10.0.0 0.0.255.255
 access-list 10 permit 123.234.0.0 0.0.0.255
 
In the above example creates an access list configured on 4 and 10. Allows all traffic with the source IP address of the first row to 234.5.. Please note that when a host's IP address is listed, there is no mask must be associated with it. The second line from the subnet 5.10.10.32/27 deny all traffic. To observe one of the access lists are rather shielded, they use what Cisco calls "wildcard Fu Ping cover." Shielding of these masks is very similar with one important difference. Network Shield operations from left to right. Wildcard Fu Ping shelter operations from right to left. Therefore, when you look at the configuration, matches the wildcard Fu Ping shelter is in the 5.10.10.32 of 32 addresses. (Due to zero is a valid mask, it counts as one address. 31 therefore shielding is used instead of 32).

The remaining two lines, one from 5.10.10.0.0/16 and 123.234.0.0/24 to allow communication. At first glance, newcommer to access list might think the only access denied to this network is second and permits are not necessary. In the access list, but aims to selectively license, you cannot selectively deny traffic. Therefore, implicitly denies exists in this end of the access list. (More what does not explicitly match the access list entry is removed).

There are a few other important things to consider when you create an access list. First, the order is extremely important. Because access list via "short circuit" function (relief when matches are found), those most likely to match the communications entries should be listed first. IP access-list processing is very processor-intensive. Frequently listed by first matching processor utilization is kept to a minimum. Notes 2 and 3, lines of the above example. Collectively, they state, all traffic from 5.10.0.0/16 will be allowed except those hosts in 5.10.10.32/27. If line 2 (deny statements) listed in the 3rd row, than the refusal has no effect. Traffic will be allowed due to Line 3 line and will allow you to try to prevent these host access. When you create an access control list, you should examine them very carefully and must not have the wrong sort has occurred.
 
Second thing when you create an access list to watch out for are changes to the Cisco router is in effect immediately after their arrival. It is a fact that most access list is not stagnant, unchanging creatures, we want them to be. Time and again, they will need to be modified. Modify the access list refers to an existing list and re-create it with the changes. In refference to visit list when configuring the interface does not exist, traffic, by default, to allow. However, when you create an access list, implicit deny at the end of session will result in your configuration are filtered out. As a matter of policy, it is good practice refference to the access list is removed from the interface access list before modifying it. (Through the "no IP access group 123" or list your plans to visit refference).

Generate extended access lists are a bit more complicated, and requires several steps. Because the extended access-list filter based on source and destination IP addresses, the need for the two parts of each item. Following is a brief example of the IP extended access list. 
 
 access-list 101 permit tcp any any established
 access-list 101 permit tcp any 204.34.5.25 host eq 80
 access-list 101 permit ip 203.45.34.0 0.0.0.255 204.34.5.0 0.0.0.255
 access-list 101 permit tcp 203.44.32.0 0.0.0.31 204.34.5.0 0.0.0.255 eq telnet
 access-list 101 permit tcp any 204.34.5.10 eq smtp
 
This access list permits all TCP connections with the established flag, which allows any user to access host 204.34.5.25,TCP port 80 (the HTTP port), from 203.45.34.0/24 to reach any host within the 204.34.5.0 class C,203.44.32.0/27 of all IP protocols in any host can telnet to 204.34.5.0 on all hosts And allow all hosts connecting to the SMTP port on the host 204.34.5.10.

Configure Asynchronous Transfer Mode (ATM)

ATM's structures are mostly from the X.25 and frame relay, but the objective is to run at a higher speed. However, with different frame relay is for 7,000 and 7,500 series routers specifically designed to work with ATM network adapter. It is also possible to configure an ATM using a serial interface (Federal information/HSSI) or serial interface (4000) NMP. This configuration details, please refer to the configuration guide, chapter 7th.

Configure the ATM interfaces specified at the beginning of the interface IP address (as shown earlier in this document). Frame relay ATM needs on the part of every host on the same subnet. Next configure the Pvc. There are two parts. First create a PVC "maps" on the interface. Second Protocol address images to each create a PVC. Pvc is described by the virtual circuit (VCD) is assigned to the given virtual path identifier (VPI) and virtual circuit identifier (VCI) is created. With a frame relay Dlci, for a given link, VCI assigned by the carrier. Creates a PVC on the General form of a given interface is the command

atm pvc <vcd> <vpi> <vci> <aal-encapsulation> [[<midlow> <midhigh>]
    [<peak> <avg> <burst> [oam <seconds>]]


VCD is specific to the router and the router is used to match VPI/VCI and can be used to determine the VPI and VCI numbers are different. It is also needs to be specified for ATM datagram encapsulated in the VCI. This is the ATM adaptation layer (AAL). Peak and average values used to specify where the PVC will be allowed connection bandwidth. When these values are ignored, and are assumed to be the highest possible connection rate.

Next, you need an image on an interface to create a protocol for each PVC. This is achieved by creating a list of maps. Each entry in this list have "<protocol> <address> ATM-VC <vcd> [radio]" where the IP or IPX protocol, or for example, AppleTalk. The address is on the Protocol address of the remote router is transmitting through a virtual connection.


Once the map is created, it need to be associated with a given ATM interface using the interface command "map-group <map name> 

An example configuration might look as follows

interface ATM1/0
 ip address 1.2.3.4 255.255.255.224
 ipx network 121
 atm pvc 32 0 3 aal5snap
 atm pvc 33 0 4 aal5snap
 map-group atm-map-1

map-list atm-map-1
 ip 1.2.3.5 atm-vc 3 broadcast
 ipx 121.0000.0c7e.a45.546 atm-vc 4

Two principle AAL package suitable for use with the data. First, as has already been shown to be aal5snap. This encapsulation allows multiprotocol routing on virtual circuits. Second meeting of encapsulates AAL5MUX. This encapsulation, a single agreement are committed to a virtual circuit. It has slightly less overhead than AAL5SNAP and may be useful, when you are connected to the network use charges for each datagram is set.

Current default is Cisco IOS AAL5SNAP. However, earlier versions of operating software AAL5NLPID specified as the default. Turntable is somewhat similar to run ATM over a serial interface (the HSSI) in an external ATM DSU is necessary often using multi-protocol encapsulation of the snap. This package is popular in exchange points such as Ameritech's NAP (AADS).

How to Add IP Routes and Set a Default Route

It is clear that Internet was not around a router. Normally, go to another system needs at least one other router (possibly more). This also may be a single interface can have multiple networks. General form of Cisco's routing command is

ip route <network> <mask> <interface/next-hop> [metric]

Metric is determined by some routing protocols (RIP on the other router to the network "distance" when prompted for advertising the route to other routers. Under normal circumstances, you can omit the metric, the default value is assigned to the routing protocol.

Examples:

 Add a route for 202.123.100.0 (class C) through 204.203.12.1.

  ip route 202.123.100.0 255.255.255.0 204.203.12.1
Add 122.250.0.0 (class B) to ethernet0

  ip route 122.250.0.0 255.255.0.0 Ethernet0


Classless Inter-Domain Routing:

With the recent explosive growth of the Internet, addresses are divided into classes a, b, c, and d networks are no longer enough. Cisco IOS support Classless Inter-domain routing, or CIDR entries (often clearly "Apple juice") allows a subset of any type for the given network, given the destination routing concepts. For example, the following example specify the route 8 CS router.

 ip route 221.243.242.0 255.255.248.0 128.230.3.1

Please note changes from the above examples are just different screen. This command uses the subnet mask-style split in early August by 221.243.250.0 class c network, and lists as a next hop router 128.230.3.1. Under normal circumstances, 8 routes will be needed to complete this one did. CIDR routing when the objective is to simplify and reduce Internet routing tables (such as Sprint, ANS and Alternet) reaches the point where the old backbone network by just does not have enough memory to accommodate the Internet tables folded they did not work to prevent the entire routing table size. This Internet service interruption caused severe damage around the world.

Often use a practice of subnetting class c network into 64 or 32 IP address blocks for customers all 254 addresses are required to save wasting large numbers. Traditional class c subnetting allows you to be split into blocks of 4, 8, 16, 32, 64, and 128, but only one size. Cisco IOS supports variable-length subnetting, however. This subparagraph allows a class c, which may have some part 4 addresses the length, some on 32, and so on. That allows to eliminate only going to use 6-bit customers sent 32 addresses the need to more effectively address.

Subnet be noted IOS does not generally allow you to specify a class c subnet mask addresses (IE, you cannot route 8 address 203.102.123.0 subnet because this is a class c network number, it wants to be regarded as class c, route). When you view the routing table, this can cause some confusion. To work around this problem, Cisco provides a command to override this behavior:

  ip subnet-zero
Once that has been entered, it will very happily take the subnet route.


How to Configuring the Router

Cisco Internetwork operating system (IOS) is a very flexible and powerful. Therefore, there are many nuances to configure some services and routers can do many of the things you will never use. Can be used with full description of the options for each of these commands, see the router configuration guides and command references. In print form and through the world wide, these stalls are available. This is a good bookmark in Netscape placing). From there, you can select the appropriate version of the IOS, find the part you are looking for.

Cisco interface is based on the interface type and interface number naming. , 7,000 and 7,500 series router slot numbers have been added. All interfaces and slots are an index of zero. Models 2501, the first Ethernet port on the router will be identified to the Ethernet0. 7,000 with the fourth serial port serial card in slot 2 Serial2/3.

* For the remainder of this section, it assumes that the reader has passed the "Configure Terminal" Terminal privileged EXEC prompt to enter the router configuration mode.

 Set a Hostname:

Configure the router in the first order of business is to choose a router host name. This name does not use router itself and is perfect for human consumption. You set the host name is replaced in the "router" and can distinguish which router is connected, and then use telnetting across several routers. This line inside the first 20 rows appear in the configuration file, and can be differentiated from another router configuration has been saved. This command takes the form

hostname <name>

Establishing Enable Password Protection:


Router before connecting to your network, it is also a good idea to set the enable password. This password is used to gain privileged access to the router, so it shouldn't be obvious passwords. The format for this command is shown below:

Enable password <password>


This password may include any of the up to 80 alphanumeric characters, including spaces, but must not start with a number or a space. The password is stored in the configuration file is not encrypted (plain text) formats. Obviously, it is best to save it before with an encrypted password. To do this, use:

Service password-encryption

This will cause all of the codes, the system before being stored in the saved configuration Cisco proprietary encryption algorithm used for encryption.

Note: there is no way to recover a lost encrypted password.

Configure Console and Network Access:

Means, the device installation is the only console. When in the field, it's programs, maintained through a router instead of a Telnet connection to which you want to configure each router to dial-up or monitoring system is more convenient. To do this, you must configure virtual TTY (vtys). In General, should, however configured with 5 vtys, the router will support up to 100. Each timeout should be given, in order to avoid all the vtys are in use. If all the vtys are in used, further connection attempts will result in "connection refused". It may be a good idea to force the user to enter a password before you can log on to the router through a vty as well. An example of this configuration is shown.

  line vty 0 4
  exec-timeout 30 0
  login
  password steamboat


This will create 5 vtys numbered 0 through 4. Each vty timeout time of four minutes and 30 seconds. The vtys need to enter a password to log in. The password is "hot pot". Note: If the encrypted passwords are enabled, this password is encrypted before being stored in the router configuration. May enable vtys is the minimum number of 5.

Usually when you don't want console access requires a password, but you want to specify a timeout period.

  line con 0
  exec-timeout 15 0


For a full description of how each vty may be configured, refer to chapter 4 of the router configuration guide.

Configuring the CIP card and the virtual interfaces:

CIP cards appear on the router as a controller rather than a standard interface. T1 channels may be defined, modified, or deleted without any external configuration card. CSU cycle may boot and run from the software release and test patterns in these loops from the router. Full management advantages are well known to anyone who has any time at all to perform network operations technician jobs. Reported power outages to the carrier's ability to quickly determine when CSU State, trying to quickly fix and get a complete diagnosis issues and valuable. During the initial report can provide them with more information that often can greatly speed up, diagnose and repair process.

T3 controller, because it is built on a VIP2 technologies introduced into the third level is specified. Rather than simply slot/Port, it does not introduce a port adapter. Because only one CT3IP per card, ports, and port adapter will always be zero. In slot 2 of the interface will be identified as 2/0/0. After T1 channels (numbered by specifying a 1 28 to meet belcore) interface identifier of the interface are designated by a colon and a channel number. In the previous example, the 17th 2/0/0:17 T1 channel.

The interface configuration of the T3 is the first step. T3 framework, clock source and cable distances (this is used to determine) the settings that you want. Default is 224 feet cable length. This should be acceptable for most applications. Our website supports frame type cbit and the m23. It is possible to configure the router automatically detects frame but in many cases, automatic may cause problems in the future so it is best to use this only if you're not sure is using frames. Once you have determined the framework, it can then set up a static router configuration.

 For most muxed T3s, the framing type will be m23. cbit is used, for example, in a clear channel T3 into an ATM network.

  controller t3 0/0/0
  framing m23
  clock source line
  cablelength 224









  controller t3 0/0/0
  t1 1 timeslots 1-24 speed 64
  t1 1 clock source line
  t1 1 framing esf
  t1 1 linecone b8zs


After the T1 configuration, the router will create a virtual serial interface. Until the T1 has been created and determined in the same manner as described above, this interface does not appear. For example, for refference first T1 serial interface, it will be identified as serial 0/0/0:1. This interface can be used as any other serial interface beconfigured.

Levels starting from the interface loopback test. T3 also may be back from the controller configuration cycles. It is important to note the configuration from the controller could not possibly ring T1.

How to Configure EIGRP Routing Protocol With Simple Network Topology

EIGRP Enhanced Interior Gateway Routing Protocol

It has been described as a hybrid routing protocol
Administrative distance (AD)-90
Support for CIDR and VLSM
It uses diffusion algorithm to find the best path
Metric=256x(Bandwidth+Delay)
It uses RTP (a reliable transport protocol)
Multi-protocol support
Fast convergence

Now we're going to see EIGRP routing configurations and using a datagram tracer, a simple network topology

Step one: create a topology and configuration IP address like
All of the interface and the PC.


Router R1,Configuration


In Global configuration mode,

R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#exit

Once you have given no shutdown command the port become up

R1(config)#interface serial 2/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#encapsulation ppp
R1(config-if)#no shutdown
R1(config-if)#exit

Router R2,Config


In Global configuration mode,

R2#config terminal
R2(config)#interface serial 2/0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#encapsulation ppp
R2(config-if)#no shutdown
R2(config-if)#exit

Interface Serial2/0 and Line protocol on Interface Serial2/0 changed state to up


R2(config)#
R2(config)#interface serial 3/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#clock rate 64000
R2(config-if)#encapsulation ppp
R2(config-if)#no shutdown
R2(config-if)#exit

Router R3,Config


In Global configuration mode,


R3(config)#interface serial 3/0
R3(config-if)#ip address 30.0.0.2 255.0.0.0
R3(config-if)#encapsulation ppp
R3(config-if)#no shutdown
R3(config-if)#exit


Interface Serial3/0 and Line protocol, changed state to up


R3(config)#interface fastethernet0/0
R3(config-if)#ip address 40.0.0.1 255.0.0.0
R3(config-if)#no shutdown
R3(config-if)#exit

Interface fastethernet0/0 and wire protocols, changed State to up

All the IP addresses of all interfaces and assign it lights green. If there is any error we get red or amber.


Step 2:Now we see how to configure EIGRP routing protocols in this routers.


R1 Router,In Global Configuration mode,


R1(config)#router eigrp 200
R1(config-router)#network 10.0.0.0
R1(config-router)#network 20.0.0.0
R1(config-router)#exit

R2 Router,In Global Configuration mode,

R2(config)#router eigrp 200
R2(config-router)#network 20.0.0.0
R2(config-router)#network 30.0.0.0
R2(config-router)#exit


R3 Router,In Global Configuration mode,


R3(config)#router eigrp 200
R3(config-router)#network 30.0.0.0
R3(config-router)#network 40.0.0.0
R3(config-router)#exit

I.e.here 200 Atonomous systems, which was down common admistration, different router router Atonomous Number groupings
Will not communicate with each other. So the Atonomous should be the same on all routers.

Popular Posts

Powered by Blogger.