RE: InternetExpert Audio - EIGRP Neig w/ Auth

From: Brian McGahan (bmcgahan@internetworkexpert.com)
Date: Mon Apr 25 2005 - 14:58:00 GMT-3


Sean,

        Which recording is this in, the CCIE lab strategy one?

Brian McGahan, CCIE #8593
bmcgahan@internetworkexpert.com

Internetwork Expert, Inc.
http://www.InternetworkExpert.com
Toll Free: 877-224-8987 x 705
Outside US: 775-826-4344 x 705
24/7 Support: http://forum.internetworkexpert.com
Live Chat: http://www.internetworkexpert.com/chat/

> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> Sean C
> Sent: Monday, April 25, 2005 12:18 PM
> To: Group Study
> Subject: InternetExpert Audio - EIGRP Neig w/ Auth
>
> Hello,
>
> First, I want to thank InternetworkExpert for their excellent audio
> program on
> preparing for the CCIE lab.
> http://www.internetworkexpert.com/onlineclassroom.htm
>
> One item mentioned in the audio program caught my attention and I have
not
> been able to duplicate it, nor have I found any supporting
documentation
> on
> Cisco, through Googling and the Groupstudy archives. During the Audio
> program
> at about time mark @ 1:44:40, Brian Dennis mentions that a caveat of
using
> EIGRP key-chain is "... you can't use a neighbor statement". I'm at a
> loss
> understanding this. I labbed up 2 routers, applied EIGRP, applied
key-
> chains,
> and then applied neighbor statements - from what I could see, the
routers
> were
> able to see each others as EIGRP neighbors and pass EIGRP prefixes.
Did I
> misunderstand something? Also, the audio mentions there is a specific
> order
> of operations when applying EIGRP key-chain statements - does anyone
have
> the
> correct order? Perhaps I just got lucky with the order of operations
when
> configuring the routers.
>
> Thanks in advance,
> Sean
>
> ================================
> R2:
> key chain TEST
> key 1
> key-string CISCO
> !
> interface Loopback102
> ip address 172.16.102.1 255.255.255.0
> !
> interface Ethernet0
> ip address 23.23.23.2 255.255.255.0
> ip authentication mode eigrp 1 md5
> ip authentication key-chain eigrp 1 TEST
> !
> router eigrp 1
> network 23.23.23.0 0.0.0.255
> network 172.16.102.0 0.0.0.255
> neighbor 23.23.23.3 Ethernet0
> ======================================
> R3:
> key chain TEST
> key 1
> key-string CISCO
> !
> interface Loopback103
> ip address 172.16.103.1 255.255.255.0
> !
> interface FastEthernet0/0
> ip address 23.23.23.3 255.255.255.0
> ip authentication mode eigrp 1 md5
> ip authentication key-chain eigrp 1 TEST
> !
> router eigrp 1
> network 23.23.23.0 0.0.0.255
> network 172.16.103.0 0.0.0.255
> neighbor 23.23.23.2 FastEthernet0/0
> no auto-summary
>
> ======================================
> r2#sh ip route eig
> 172.16.0.0/16 is variably subnetted, 7 subnets, 3 masks
> D 172.16.103.0/24 [90/409600] via 23.23.23.3, 00:01:27,
Ethernet0
>
> r2#sh ip eig neig
> IP-EIGRP neighbors for process 1
> H Address Interface Hold Uptime SRTT RTO Q
Seq
> Type
> 0 23.23.23.3 Et0 13 00:01:34 20 200 0
39
> S
>
> R3#sh ip rout eig
> 172.16.0.0/16 is variably subnetted, 7 subnets, 3 masks
> D 172.16.102.0/24 [90/156160] via 23.23.23.2, 00:03:31,
> FastEthernet0/0
>
> R3#sh ip eig neig
> IP-EIGRP neighbors for process 1
> H Address Interface Hold Uptime SRTT RTO Q
Seq
> Type
> 0 23.23.23.2 Fa0/0 14 00:03:37 12 200 0
44
> S
>
>



This archive was generated by hypermail 2.1.4 : Tue May 03 2005 - 07:55:08 GMT-3