Register your product to gain access to bonus material or receive a coupon.
EIGRP Network Design Solutions
- Sorry, this book is no longer in print.
- Your Price: $35.20
- List Price: $44.00
- About Watermarked eBooks
- Copyright 1999
- Edition: 1st
- ISBN-10: 1-57870-165-1
- ISBN-13: 978-1-57870-165-0
- eBook (Watermarked)
- ISBN-10: 1-58705-895-2
- ISBN-13: 978-1-58705-895-0
Ideal for professionals who are designing, implementing or troubleshooting enterprise, dial-up, or service provider networks with EIGRP.
- Learn from troubleshooting and design scenarios based on real-world experience
- Use all protocol families supported by EIGRP: IP, IPX, and AppleTalk
- Explore EIGRP network operation issues and usage of scalability features
- Deploy EIGRP over Frame Relay, ATM, and ISDN
- Find coverage of all EIGRP technologies, including DUAL, transport protocol, and topology database
EIGRP Network Design Solutions uses case studies and real-world configuration examples to help you gain an in-depth understanding of the issues involved in designing, deploying, and managing EIGRP-based networks. It details proper designs that can be used to build large and scalable EIGRP-based networks, and documents possible ways each EIGRP feature can be used in network design, implementation, troubleshooting, and monitoring.
With this comprehensive reference, you get detailed coverage of all EIGRP technologies, including DUAL, transport protocol, and topology database. In addition you get extensive coverage of EIGRP deployment over WAN and dial-up networks and information on such features as filter lists, route maps, summarization, EIGRP pacing, and MD5 authentication. EIGRP Network Design Solutions will help you build and maintain more scalable and reliable networks.
Table of Contents
I. EIGRP TECHNOLOGY.1. EIGRP Concepts and Technology.
EIGRP Concepts—Metrics and Distances. Initial IP EIGRP Configuration. EIGRP Concepts—Metrics and Distances.
Computing a Composite Metric. Computing Vector Metric11
DUAL—The Heart of EIGRP.
DUAL Terminolog. Simple DUAL Operation—Adding New Routes. DUAL Behavior on Route Loss. Local Computation. Diffusing Computation. Monitoring Diffusing Computation. Stuck-in-Active Routes.
Summary.2. Advanced EIGRP Concepts, Data Structures, and Protocols.
EIGRP Transport Mechanisms and Protocols.
EIGRP Encapsulation Methods and Packet Format. Hello Protocol. Reliable Transport Protocol.
EIGRP Neighbors. Discovering New Neighbors.
Initial Topology Table Exchange. Adjacency Resets—Causes and Consequences. Monitoring EIGRP Neighbors.
EIGRP Topology Table.
EIGRP Topology Table Contents. Internal EIGRP Routes. External Routes and Additional Route Attributes. Monitoring Network Convergence through the EIGRP Topology Table. Anomalies in EIGRP Topology Tables.
Building Routing Tables from EIGRP Topology Tables.
Administrative Distance of EIGRP Routes. EIGRP Variance and Its Influence on Traffic Load Sharing. Valid and Invalid Examples of Using Variance.
Summary.3. IPX EIGRP.
IPX EIGRP Configuration and Route Redistribution. Integration of IPX RIP Metrics into IPX EIGRP and IPX Route Selection.
IPX RIP Refresher. Redistribution between IPX RIP and IPX EIGRP. Sample Redistribution Scenarios.
IPX SAP Integration. Backward Compatibility of IPX EIGRP and IPX SAP. Summary.4. AppleTalk EIGRP.
AppleTalk EIGRP Configuration and Route Redistribution. Integration of RTMP and AppleTalk EIGRP and AppleTalk Route Selection.
RTMP Refresher. Sample Redistribution Scenarios.
II. DESIGNING ENTERPRISE EIGRP NETWORKS.5. Scalability Issues in Large Enterprise Networks.
Case Study 1—Large Enterprise Network Experiencing Meltdown Situations.
Why Did DUAL-Mart Fail? Case Study Summary.
Query Boundaries—What They Are and Why They Are Useful. Monitoring the Stability of Your EIGRP Network. Case Study 2—Diffused Computation in Hierarchical Networks.
Remote Office PVC Failure. Shadow PVC Failure. Primary PVC Failure with Traffic Rerouting.
Summary.6. EIGRP Route Summarization.
Case Study—Connectivity Loss Following Private IP Address Deployment.
Autosummarization. Query Boundaries with Autosummarization. Conclusion. Manual Per-Interface Summarization. Case Study—EIGRP Behavior in DUAL-Mart Network after Regional Summarization. Case Study—EIGRP Behavior in DUAL-Mart Network after Two-Step Summarization.
Summary.7. Route Filters.
Case Study—Partial Connectivity over ISDN Backup. EIGRP Route Filters. Query Boundaries Established by EIGRP Route Filters. Case Study—DUAL-Mart ISDN Dial-Backup Network Redesign. Prefix Lists—Improved Route Filters. Case StudyNetwork Meltdown after Frame Relay Failure. Summary.8. Default Routes.
IP Default Routing and IOS Specifics.
Classful and Truly Classless Routing in IOS. Default Candidates and Gateways of Last Resort. Monitoring Default Candidates.
Default Routes and Default Candidates in EIGRP.
EIGRP Default Routes—Design Examples.
Enterprise Network with a Single Connection to the Internet. Enterprise Network with Multiple Connections to the Internet.
Case Study—GreatCoals Network.
Summary.9. Integrating EIGRP with Other Enterprise Routing Protocols.
Case Study 1—Large Network with No Addressing Structure Case Study 2—Large Network with No Layering. Case Study 3—Network Migrating from Another Vendor to Cisco. Case Study 4—Service Provider with a Large Number of Routes. Redistribution between Routing Processes.Various Redistribution Designs and Potential Caveats.
One-Point, One-Way Redistribution. Multipoint One-Way Redistribution. Multipoint Two-Way Redistribution.
Case Study Solutions.
Case Study 1 Solution—Integrating RIP with EIGRP. Case Study 2 Solution—Multiple EIGRP Processes. Case Study 3 Solution—RIPv2 and EIGRP Integration with Filters. Case Study 4 Solution—BGP and EIGRP Integration.
Summary.10. Designing Scalable IPX EIGRP Networks.
IPX Route Filters. IPX Default Routes. Controlling Route Redistribution between IPX Routing Protocols. Case Study—GreatCoals. Case Study—Reducing IPX EIGRP Diameter in GreatCoals Network. Case Study—Combining IPX RIP and IPX EIGRP in an Access Network. Summary.11. Designing Scalable AppleTalk EIGRP Networks.
AppleTalk EIGRP Route Filters. Other AppleTalk EIGRP Scalability Options. Case StudyFrisco Systems, Inc. Case Study Solution. Summary275
III. RUNNING EIGRP OVER SWITCHED WAN AND DIAL-UP NETWORKS.12. Switched WAN Networks and Their Impact on EIGRP.
Case Study 1A Large Number of EIGRP Neighbors over a Frame Relay Link. Broadcast Emulation on Switched WAN (Pseudobroadcasting). Layer 2 to Layer 3 Mapping in WAN Environment. Troubleshooting Neighbor Map Problems.
Scenario 1—Missing Broadcast Keyword on a Neighbor Map. Scenario 2—Wrong IP Address in the Neighbor Map. Scenario 3—Wrong DLCI Number in the Neighbor Map.
Point-to-Point and Multipoint Subinterfaces. Creating, Configuring, and Removing Subinterfaces. Using Subinterfaces to Reduce Interface Output Load Due to EIGRP Hello Packets.
Summary.13. Running EIGRP over WAN Networks.
Case Study—Improving Neighbor Loss Detection.
Overhead Placed on the WAN Links by the EIGRP Hello Packets.
Case Study—WAN Link Overload Due to EIGRP Traffic.
Load Control on WAN LinksEIGRP Pacing. EIGRP Pacing Design. EIGRP Pacing Design Examples.
Case Study—Partial Connectivity over Frame Relay.
EIGRP Split Horizon.
Running EIGRP over Various Switched WAN Technologies.
Running EIGRP over X.25. Running EIGRP over Frame Relay. Running EIGRP over ATM.
Summary.14. EIGRP and Dial-Up Networks.
Case Study—A Simple Dial-Up Network.
EIGRP Bandwidth Issues in Dial-Up Networks. EIGRP Query Boundaries in a Dial-Up Environment.
Case Study—Route Flaps in a Dial-Up Environment. Case StudyDial-Out Requirements.
EIGRP Use in Dial-Out Requirements.
Case Study—EIGRP Use in a Dial-Backup Scenario.
EIGRP Neighbor Loss Detection Issues.
Summary.5. Secure EIGRP Operation.
Case Study—Collecting Usernames and Passwords through a Fake Server. Case Study—Denial-of-Service Attack on a Core Network. EIGRP MD5 Authentication.
Configuring EIGRP MD5 Authentication. Shortcomings of EIGRP MD5 Authentication. Design Issues and Guidelines. Key Rollover Design and Integration with NTP. Troubleshooting EIGRP MD5 Authentication.