I.EIGRP TECHNOLOGY.
1.EIGRP Concepts and Technology. EIGRP ConceptsMetrics and Distances. Initial IP EIGRP Configuration. EIGRP ConceptsMetrics and Distances.
Computing a Composite Metric. Computing Vector Metric11
DUALThe Heart of EIGRP.
DUAL Terminolog. Simple DUAL OperationAdding New Routes. DUAL Behavior on Route Loss. Local Computation. Diffusing Computation. Monitoring Diffusing Computation. Stuck-in-Active Routes.
Summary.
2.Advanced EIGRP Concepts, Data Structures, and Protocols. EIGRP Transport Mechanisms and Protocols.
EIGRP Encapsulation Methods and Packet Format. Hello Protocol. Reliable Transport Protocol.
EIGRP Neighbors. Discovering New Neighbors.
Initial Topology Table Exchange. Adjacency ResetsCauses and Consequences. Monitoring EIGRP Neighbors.
EIGRP Topology Table.
EIGRP Topology Table Contents. Internal EIGRP Routes. External Routes and Additional Route Attributes. Monitoring Network Convergence through the EIGRP Topology Table. Anomalies in EIGRP Topology Tables.
Building Routing Tables from EIGRP Topology Tables.
Administrative Distance of EIGRP Routes. EIGRP Variance and Its Influence on Traffic Load Sharing. Valid and Invalid Examples of Using Variance.
Summary.
3.IPX EIGRP. IPX EIGRP Configuration and Route Redistribution. Integration of IPX RIP Metrics into IPX EIGRP and IPX Route Selection.
IPX RIP Refresher. Redistribution between IPX RIP and IPX EIGRP. Sample Redistribution Scenarios.
IPX SAP Integration. Backward Compatibility of IPX EIGRP and IPX SAP. Summary.
4.AppleTalk EIGRP. AppleTalk EIGRP Configuration and Route Redistribution. Integration of RTMP and AppleTalk EIGRP and AppleTalk Route Selection.
RTMP Refresher. Sample Redistribution Scenarios.
Summary.
II.DESIGNING ENTERPRISE EIGRP NETWORKS.
5.Scalability Issues in Large Enterprise Networks. Case Study 1Large Enterprise Network Experiencing Meltdown Situations.
Why Did DUAL-Mart Fail? Case Study Summary.
Query BoundariesWhat They Are and Why They Are Useful. Monitoring the Stability of Your EIGRP Network. Case Study 2Diffused Computation in Hierarchical Networks.
Remote Office PVC Failure. Shadow PVC Failure. Primary PVC Failure with Traffic Rerouting.
Summary.
6.EIGRP Route Summarization. Case StudyConnectivity Loss Following Private IP Address Deployment.
Autosummarization. Query Boundaries with Autosummarization. Conclusion. Manual Per-Interface Summarization. Case StudyEIGRP Behavior in DUAL-Mart Network after Regional Summarization. Case StudyEIGRP Behavior in DUAL-Mart Network after Two-Step Summarization.
Summary.
7.Route Filters. Case StudyPartial Connectivity over ISDN Backup. EIGRP Route Filters. Query Boundaries Established by EIGRP Route Filters. Case StudyDUAL-Mart ISDN Dial-Backup Network Redesign. Prefix ListsImproved Route Filters. Case StudyNetwork Meltdown after Frame Relay Failure. Summary.
8.Default Routes. IP Default Routing and IOS Specifics.
Classful and Truly Classless Routing in IOS. Default Candidates and Gateways of Last Resort. Monitoring Default Candidates.
Default Routes and Default Candidates in EIGRP.
EIGRP Default RoutesDesign Examples.
Enterprise Network with a Single Connection to the Internet. Enterprise Network with Multiple Connections to the Internet.
Case StudyGreatCoals Network.
Summary.
9.Integrating EIGRP with Other Enterprise Routing Protocols. Case Study 1Large Network with No Addressing Structure Case Study 2Large Network with No Layering. Case Study 3Network Migrating from Another Vendor to Cisco. Case Study 4Service Provider with a Large Number of Routes. Redistribution between Routing Processes.Various Redistribution Designs and Potential Caveats.
One-Point, One-Way Redistribution. Multipoint One-Way Redistribution. Multipoint Two-Way Redistribution.
Case Study Solutions.
Case Study 1 SolutionIntegrating RIP with EIGRP. Case Study 2 SolutionMultiple EIGRP Processes. Case Study 3 SolutionRIPv2 and EIGRP Integration with Filters. Case Study 4 SolutionBGP and EIGRP Integration.
Summary.
10.Designing Scalable IPX EIGRP Networks. IPX Route Filters. IPX Default Routes. Controlling Route Redistribution between IPX Routing Protocols. Case StudyGreatCoals. Case StudyReducing IPX EIGRP Diameter in GreatCoals Network. Case StudyCombining IPX RIP and IPX EIGRP in an Access Network. Summary.
11.Designing Scalable AppleTalk EIGRP Networks. AppleTalk EIGRP Route Filters. Other AppleTalk EIGRP Scalability Options. Case StudyFrisco Systems, Inc. Case Study Solution. Summary275
III.RUNNING EIGRP OVER SWITCHED WAN AND DIAL-UP NETWORKS.
12.Switched WAN Networks and Their Impact on EIGRP. Case Study 1A Large Number of EIGRP Neighbors over a Frame Relay Link. Broadcast Emulation on Switched WAN (Pseudobroadcasting). Layer 2 to Layer 3 Mapping in WAN Environment. Troubleshooting Neighbor Map Problems.
Scenario 1Missing Broadcast Keyword on a Neighbor Map. Scenario 2Wrong IP Address in the Neighbor Map. Scenario 3Wrong DLCI Number in the Neighbor Map.
Subinterfaces.
Point-to-Point and Multipoint Subinterfaces. Creating, Configuring, and Removing Subinterfaces. Using Subinterfaces to Reduce Interface Output Load Due to EIGRP Hello Packets.
Summary.
13.Running EIGRP over WAN Networks. Case StudyImproving Neighbor Loss Detection.
Overhead Placed on the WAN Links by the EIGRP Hello Packets.
Case StudyWAN Link Overload Due to EIGRP Traffic.
Load Control on WAN LinksEIGRP Pacing. EIGRP Pacing Design. EIGRP Pacing Design Examples.
Case StudyPartial Connectivity over Frame Relay.
EIGRP Split Horizon.
Running EIGRP over Various Switched WAN Technologies.
Running EIGRP over X.25.Running EIGRP over Frame Relay. Running EIGRP over ATM.
Summary.
14.EIGRP and Dial-Up Networks. Case StudyA Simple Dial-Up Network.
EIGRP Bandwidth Issues in Dial-Up Networks. EIGRP Query Boundaries in a Dial-Up Environment.
Case StudyRoute Flaps in a Dial-Up Environment. Case StudyDial-Out Requirements.
EIGRP Use in Dial-Out Requirements.
Case StudyEIGRP Use in a Dial-Backup Scenario.
EIGRP Neighbor Loss Detection Issues.
Summary.
5.Secure EIGRP Operation. Case StudyCollecting Usernames and Passwords through a Fake Server. Case StudyDenial-of-Service Attack on a Core Network. EIGRP MD5 Authentication.
Configuring EIGRP MD5 Authentication. Shortcomings of EIGRP MD5 Authentication. Design Issues and Guidelines. Key Rollover Design and Integration with NTP. Troubleshooting EIGRP MD5 Authentication.
Summary.
Index.